23-25 May 2012
Filter Results
-
2012 International Conference on Information Science and Applications - ICISA 2012 [Title page]
Publication Year: 2012, Page(s): i|
PDF (135 KB)
-
2012 International Conference on Information Science and Applications [Copyright notice]
Publication Year: 2012, Page(s): i|
PDF (95 KB)
-
Greeting Message from the General Chair
Publication Year: 2012, Page(s): i|
PDF (52 KB)
-
Greeting Message from the General Co-Chair
Publication Year: 2012, Page(s): i|
PDF (72 KB)
-
ICISA 2012 Organization
Publication Year: 2012, Page(s):i - ii|
PDF (109 KB)
-
ICISA 2012 Program Committee
Publication Year: 2012, Page(s):i - iii|
PDF (103 KB)
-
ICISA 2012 List of Papers
Publication Year: 2012, Page(s):i - iii|
PDF (92 KB)
-
ICISA 2012 List of Authors
Publication Year: 2012, Page(s): i|
PDF (71 KB)
-
An Experimental Comparison of Packet Delivery Schemes in a Linear Mesh Topology
Publication Year: 2012, Page(s):1 - 4In this paper, we compare and analyze the performances of two mesh routing protocols (BATMAN-ADV and FLAME) and a WDS implementation of the IEEE 802.11, all of which run on Layer 2 of the OSI reference model. Sometimes the mesh network may simply form a linear topology to provide a service coverage to a line-shaped area. A linear topology can be built without any routing protocol involved, using W... View full abstract»
-
A Distributed Reliable and Energy-Efficient Topology Control Algorithm in Wireless Sensor Network
Publication Year: 2012, Page(s):1 - 6
Cited by: Papers (3)Topology control is an efficiency method that can enhance the energy efficiency in a wireless sensor network. There are several research discuss the topology control problem only focus on topology construction or topology maintenance. In this paper, we design a distributed reliable and energy- efficient topology control algorithm both take into consider with topology construction and maintenance. ... View full abstract»
-
A Selective Ahead-Of-Time Compiler on Android Device
Publication Year: 2012, Page(s):1 - 6
Cited by: Papers (2)The runtime environment of Android is based on its own Java Virtual Machine(JVM) called Dalvik Virtual Machine (DVM) which is said to be having overhead of interpreting every bytecode to machine code during runtime just like other JVMs. There are already well known techniques to overcome runtime overhead of interpreting and Google has adapted one of them which is Just-In-Time Compiler (JITC) since... View full abstract»
-
A Virtual Space Management Platform for Personalized Service
Publication Year: 2012, Page(s):1 - 5The purpose of this research is to propose an efficient management scheme for Virtual Personal World (VPW) which is a model focused on service continuity of personal world. Previous ubiquitous frameworks have been concerned with where is the user is serviced and what services can be offered in that space. However those questions above are not the most important problems anymore in VPW. We also int... View full abstract»
-
An Efficient Service Management Scheme Based on Virtual Object for Ubiquitous Computing Environment
Publication Year: 2012, Page(s):1 - 4For the ubiquitous computing environment, an important assumption is that all the components in any specific environment are connected with each other. With this assumption, we introduce an effective scheme to provide a personalized service based on Virtual Personal World (VPW). Virtual Personal World (VPW) which is a model focused on service continuity of personal world. Previous ubiquitous frame... View full abstract»
-
Efficient Pipelined Multistream AES CCMP Architecture for Wireless LAN
Publication Year: 2012, Page(s):1 - 5Widespread WLAN has used Advance Encryption Standard in Counter with Cipher Block Chaining Message Authentication Code Protocol (AES CCMP) as security services. As the next-generation WLAN adopts multiuser MIMO technology, multiple AES blocks are needed because this technology supports multiple packet transmission in parallel. To minimize the cost increase due to multiple AES blocks, we propose a ... View full abstract»
-
Proactive Service Environment for Intelligent Services
Publication Year: 2012, Page(s):1 - 4In recent years, there has been interest in home-service robots and their usages have been highly evaluated. However, home-service robots could not match expectations of users due to their poor cognitive abilities. There have been various ways to improve robot's usage. "Proactive Way" could be one of key aspects to make a home-service robot like rich cognitive ability and having intelligence as we... View full abstract»
-
Safeguard Workers Performing Catalyst Replacement inside Dangerous Chemical Reactors: An Application of the RF Communication Technology
Publication Year: 2012, Page(s):1 - 4Workers who perform catalyst replacement inside chemical reactors face life-threatening risks. This paper describes a system designed for safeguarding workers working in the confined chemical reactors at the Formosa Petrochemical Corporation's refinery plant. The system monitors the status of every worker by continuously receiving radio frequency signal and detects life-threatening events quickly ... View full abstract»
-
Wireless Sensor Network Localization with Autonomous Mobile Beacon by Path Finding
Publication Year: 2012, Page(s):1 - 6
Cited by: Papers (2)Sensor data with geographical information become ubiquitous with development of location base applications in various businesses. There is no exception to Wireless sensor network (WSN) as it is getting more practical under the booming of semiconductor industry. Localization of WSN usually depends on beacons that equip with GPS or GSM module. The cost of finance and energy hamper the application of... View full abstract»
-
A Threshold-Based Cache Allocation Algorithm for IPTV VoD Services
Publication Year: 2012, Page(s):1 - 6In recent years, IPTV service has been focused on and invested heavily by many service providers. Among the various IPTV service, VoD (Video on Demand) service is expected to be one of the most popular services. Currently, most of service providers are trying to provide VoD service by locating proxy nearby end-users because it is hard for a single server to cover all the requests from the entire s... View full abstract»
-
A Perceptually Adaptive and Retrievable QIM Scheme for Efficient Blind Audio Watermarking
Publication Year: 2012, Page(s):1 - 5
Cited by: Papers (1)This study proposes a feasible way to incorporate the quantization index modulation (QIM) scheme into a framework jointly formed by the discrete wavelet packet transform (DWPT) and discrete cosine transform (DCT) in the field of audio watermarking. To achieve a balance between the robustness and imperceptibility, an adaptive QIM has been developed under the guidance of the human auditory masking e... View full abstract»
-
Analysis and Performance Comparison of 3D Measurement Systems Based on Fringe Projection Profilometry
Publication Year: 2012, Page(s):1 - 6
Cited by: Papers (1)In this paper, four models of 3D measurement systems are evaluated based on collimating and perspective projections using a real-time 3D virtual scanning system. Fringe projection technique is utilized due to its popularity for real-time and high resolution applications. Analysis and performance comparison of the phase-to-coordinate relation for all four models is presented. Nonlinear system model... View full abstract»
-
Boundary Driven Interactive Segmentation
Publication Year: 2012, Page(s):1 - 5
Cited by: Papers (2)This paper presents a novel approach and interface to interactive image segmentation. Our interface uses sparse and inaccurate boundary cues provided by the user to produce a multi-layer segmentation of the image. Using boundary cues allows our interface to utilize a single "boundary brush" to produce a multi-layer segmentation, making it appealing for devices with touch screen user interface. Our... View full abstract»
-
Digital Image Watermarking Using Multilevel Wavelet Decomposition and Human Visual System
Publication Year: 2012, Page(s):1 - 5
Cited by: Papers (1)In this modern world Digital watermarking is of prime importance. This has increased the demand for copyright protection. Digital watermarking is a solution to the problem of copyright protection and authentication of multimedia data while working in a networked environment. In this paper a non-blind watermarking has been proposed that embed a randomly generated binary numbers as watermark. Human ... View full abstract»
-
Effective R2 Map-Based Liver Segmentation Method in an MR Image
Publication Year: 2012, Page(s):1 - 6Object recognition is usually processed based on region segmentation algorithm. Region segmentation in the IT field is carried out by computerized processing of various input information such as brightness, shape, and pattern analysis. If the information mentioned does not make sense, however, many limitations could occur with region segmentation during computer processing. Therefore, this paper s... View full abstract»
-
FPGA Based Stereo Vision System to Display Disparity Map in Realtime
Publication Year: 2012, Page(s):1 - 4
Cited by: Papers (2)Dense stereo disparity map displayed in real time as video is one form of 3D video that renders objects in the scene by the intensity modulation in terms of the distance to the objects. With two cameras whose the optical axes are parallel, the stereo disparity is calculated to find the range to the objects. Sophisticated matching algorithms are generally slow and difficult to apply parallelism to ... View full abstract»
-
Instruction and Data NAND Flash Memory System for Embedded Systems
Publication Year: 2012, Page(s):1 - 6Harvard architecture uses physically separate memories for their instructions and data. In the case of a flash memory with a buffer system, separate data and instruction buffers can lead to diversification of a flash architecture and achieve the high performance by overcoming effectively the limitations of a unified buffer. So, the proposed NAND flash system is composed of two separate buffers for... View full abstract»