Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711039
Koun-Tem Sun, Hsin-Te Chan, Kai-Min Chan
After analyzing previous researchers' researches, most of them focused on “how to improve teachers' evaluation capability on students' search capability.” In terms of the recording of search portfolio, none of them is complete. Taking the above understanding into consideration, this study combined web 2.0 concept and using the learning portfolio records of internet searching hoping to construct an on-line learning system that can “comprehensively record,” “completely share” and “actively present” the learning portfolio. Subjects of this research are fourth grade primary school students. It is proven by the experiment that no matter the teacher or the student, they all can record the complete search process and observe others' portfolio data in full. For teachers, they can explore students' search behavior in a more complete sense. For students, it is proven by experiment result analysis that observation-based learning is helpful for students search results.
{"title":"Research on the application of a Web2.0 concept-based internet search portfolio platform","authors":"Koun-Tem Sun, Hsin-Te Chan, Kai-Min Chan","doi":"10.1109/ICCIT.2010.5711039","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711039","url":null,"abstract":"After analyzing previous researchers' researches, most of them focused on “how to improve teachers' evaluation capability on students' search capability.” In terms of the recording of search portfolio, none of them is complete. Taking the above understanding into consideration, this study combined web 2.0 concept and using the learning portfolio records of internet searching hoping to construct an on-line learning system that can “comprehensively record,” “completely share” and “actively present” the learning portfolio. Subjects of this research are fourth grade primary school students. It is proven by the experiment that no matter the teacher or the student, they all can record the complete search process and observe others' portfolio data in full. For teachers, they can explore students' search behavior in a more complete sense. For students, it is proven by experiment result analysis that observation-based learning is helpful for students search results.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126803553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711070
Soonwook Hwang, Sehoon Lee, Sangdo Lee, Jincheol B. Kim, Vincent Breton, J. Salzemann, Hanh Thi Thanh Nguyen, Doman Kim
WISDOM is an international initiative to deploy large-scale in-silico docking on a public grid infrastructure in an attempt to find potential drugs against neglected or emerging diseases such as Malaria and Avian Flu. Within the framework of the WISDOM initiative, large-scale deployments of in silico docking have been done on production grid infrastructures, demonstrating the relevance of large scale grids for high throughput virtual screening from scientific and grid deployment perspective. However, from the usability point of view, there still seems to be a lot to be done in order to be able to get the grid-enabled large-scale virtual screening approach handier for non-experts of grid computing. To address this issue, we have developed an intuitive and easy-to-use grid-enabled virtual screening tool called Drugscreener-G (DSG), aiming to help scientists in drug discovery including biologists and biochemists to more easily carryout large-scale deployment of molecular docking on grids without having to know details of grid middleware services and tools. With the help of DSG, scientists can easily have access to the PDB database, download and view the 3D structure of target proteins of their interest, launch and manage millions of in-silico docking simulations on the Grid. To facilitate the analysis of docking results, visualization and molecular modeling tools such as Jmol and Chimera have been integrated into DSG as well. The DSG client tool is now being used and tested by biologists in Chonnam National University, one of long-time partners of the WISDOM collaboration. With the help of tools like DSG, their long-time dream of large-scale virtual screening on their own at any time with any help from grid experts is to be made realized in the near future.
{"title":"A grid-enabled problem solving environment for in-silico screening in drug discovery","authors":"Soonwook Hwang, Sehoon Lee, Sangdo Lee, Jincheol B. Kim, Vincent Breton, J. Salzemann, Hanh Thi Thanh Nguyen, Doman Kim","doi":"10.1109/ICCIT.2010.5711070","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711070","url":null,"abstract":"WISDOM is an international initiative to deploy large-scale in-silico docking on a public grid infrastructure in an attempt to find potential drugs against neglected or emerging diseases such as Malaria and Avian Flu. Within the framework of the WISDOM initiative, large-scale deployments of in silico docking have been done on production grid infrastructures, demonstrating the relevance of large scale grids for high throughput virtual screening from scientific and grid deployment perspective. However, from the usability point of view, there still seems to be a lot to be done in order to be able to get the grid-enabled large-scale virtual screening approach handier for non-experts of grid computing. To address this issue, we have developed an intuitive and easy-to-use grid-enabled virtual screening tool called Drugscreener-G (DSG), aiming to help scientists in drug discovery including biologists and biochemists to more easily carryout large-scale deployment of molecular docking on grids without having to know details of grid middleware services and tools. With the help of DSG, scientists can easily have access to the PDB database, download and view the 3D structure of target proteins of their interest, launch and manage millions of in-silico docking simulations on the Grid. To facilitate the analysis of docking results, visualization and molecular modeling tools such as Jmol and Chimera have been integrated into DSG as well. The DSG client tool is now being used and tested by biologists in Chonnam National University, one of long-time partners of the WISDOM collaboration. With the help of tools like DSG, their long-time dream of large-scale virtual screening on their own at any time with any help from grid experts is to be made realized in the near future.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121090534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711221
Shirly Lee, Hyotaek Lim, Hoon-Jae Lee
The emerging of ubiquitous technology has transformed mobile device such as PDA and smart phone from a device once considered as a luxury to a daily requirements device. This trend has lead the increasing of mobile data storage demand. In year 2008, Internet Advanced Technology Attachment (iATA) has been introduce by Yu-Shu They et al as one of the alternate solution to resolve the mobile devices' storage limitation issues. With iATA, mobile users are able to access their valuable data through the network anytime anywhere as is the storage device attached to them locally. However data safety is always a concern to the user in iATA environment as data transmission in iATA done via open TCP/IP network without adopting any security defense. The mobile user does not only wish to access their data ubiquity but they also can't let go the security of their data. In this paper, we focus on how to provide data authentication and confidentiality for iATA protocol. Taking consideration of the mobile devices' limited resources, we propose a lightweight secure data mechanism with the combination of nested hash function and NLM-128.In the propose mechanism we use nested hash function to provide data authentication, subsequently encrypt the message and the hash code with NLM-128 cipher to ensure the data confidentiality.
{"title":"Secure data mechanism for iATA Protocol","authors":"Shirly Lee, Hyotaek Lim, Hoon-Jae Lee","doi":"10.1109/ICCIT.2010.5711221","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711221","url":null,"abstract":"The emerging of ubiquitous technology has transformed mobile device such as PDA and smart phone from a device once considered as a luxury to a daily requirements device. This trend has lead the increasing of mobile data storage demand. In year 2008, Internet Advanced Technology Attachment (iATA) has been introduce by Yu-Shu They et al as one of the alternate solution to resolve the mobile devices' storage limitation issues. With iATA, mobile users are able to access their valuable data through the network anytime anywhere as is the storage device attached to them locally. However data safety is always a concern to the user in iATA environment as data transmission in iATA done via open TCP/IP network without adopting any security defense. The mobile user does not only wish to access their data ubiquity but they also can't let go the security of their data. In this paper, we focus on how to provide data authentication and confidentiality for iATA protocol. Taking consideration of the mobile devices' limited resources, we propose a lightweight secure data mechanism with the combination of nested hash function and NLM-128.In the propose mechanism we use nested hash function to provide data authentication, subsequently encrypt the message and the hash code with NLM-128 cipher to ensure the data confidentiality.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121202141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711072
C. Sinthanayothin, W. Bholsithi, N. Pichitchaiphan
Software plus Services might be the next step in the evolution of computing. Software plus Services is a concept that Software as a Service (SaaS) complements the traditional packaged software running on both client and server by services adding value. CephSmileV2 is dental application software for 2D cephalometric analysis, dental model analysis and focusing on orthodontics treatment planning and applied to simulate changes on the facial profile after receiving treatment. CephSmileV2 could be used to analyze craniofacial growth changes that lead to skeletal discrepancies and to study the cause of malocclusions. Since CephSmileV2 is intended to be sell as services or so called CephSmile plus Services, therefore, the implementation of the program to enable access to the web database is developed. There are two main steps for developing the CephSmile Plus Services. First step is the development of CephSmile V2 Program, which six main features have been developed as follows: Lateral Cephalometric Analysis, Superimposition, Orthodontic Treatment Simulation, PA Cephalometric Analysis, 3D Skull Simulation from 2D x-ray views and Dental Model Analysis. Second step is the implementation of CephSmile Plus Services, which divided in to two main steps: First step is the development of web database which is designed using PHP and MySQL. Second step is the further developing on the CephSmile V2 program to connect to the database via the network follow REST guideline using GET and POST methods. The result shows that CephSmileV2 can be used as a diagnostic tool for orthodontics treatment and simulation which requires username/password to login to database. The result also demonstrates the details of login user to use the CephSmile V2 program in term of amount of hours, amount of usages, functions that user has been accessing. Also the administrator is allowed to create the user account and setup the capabilities of user level in different packages: gold, silver, platinum and titanium packages. It is concluded that CephSmile plus Services can be provided to the orthodontist community as software plus services.
软件加服务可能是计算发展的下一步。软件加服务是一个概念,软件即服务(SaaS)通过服务增值来补充在客户端和服务器上运行的传统打包软件。cepphsmilev2是一款牙科应用软件,主要用于二维头颅测量分析、牙科模型分析和专注于正畸治疗计划,用于模拟接受治疗后面部轮廓的变化。cepphsmilev2可用于分析颅面生长变化导致的骨骼差异,并研究错咬合的原因。由于CephSmileV2打算作为服务或所谓的CephSmile plus services出售,因此,开发了允许访问web数据库的程序的实现。开发cepphsmile Plus服务有两个主要步骤。第一步是开发cepphsmile V2程序,该程序开发了六个主要功能:侧位头测量分析、叠加、正畸治疗模拟、PA头测量分析、2D x线视图三维颅骨模拟和牙齿模型分析。第二步是cepphsmile Plus Services的实现,主要分为两个步骤:第一步是web数据库的开发,使用PHP和MySQL进行设计。第二步是进一步开发cepphsmile V2程序,使用GET和POST方法通过遵循REST准则的网络连接到数据库。结果表明,CephSmileV2可以作为正畸治疗和模拟的诊断工具,需要用户名/密码登录数据库。结果还显示了登录用户使用CephSmile V2程序的时间、使用次数、访问过的功能等详细信息。此外,管理员还可以创建用户帐户,并在不同的包中设置用户级别的功能:金、银、白金和钛包。结论CephSmile plus Services可以作为软件+服务提供给正畸社区。
{"title":"Dental application: The steps toward the implementation of the CephSmile plus Services","authors":"C. Sinthanayothin, W. Bholsithi, N. Pichitchaiphan","doi":"10.1109/ICCIT.2010.5711072","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711072","url":null,"abstract":"Software plus Services might be the next step in the evolution of computing. Software plus Services is a concept that Software as a Service (SaaS) complements the traditional packaged software running on both client and server by services adding value. CephSmileV2 is dental application software for 2D cephalometric analysis, dental model analysis and focusing on orthodontics treatment planning and applied to simulate changes on the facial profile after receiving treatment. CephSmileV2 could be used to analyze craniofacial growth changes that lead to skeletal discrepancies and to study the cause of malocclusions. Since CephSmileV2 is intended to be sell as services or so called CephSmile plus Services, therefore, the implementation of the program to enable access to the web database is developed. There are two main steps for developing the CephSmile Plus Services. First step is the development of CephSmile V2 Program, which six main features have been developed as follows: Lateral Cephalometric Analysis, Superimposition, Orthodontic Treatment Simulation, PA Cephalometric Analysis, 3D Skull Simulation from 2D x-ray views and Dental Model Analysis. Second step is the implementation of CephSmile Plus Services, which divided in to two main steps: First step is the development of web database which is designed using PHP and MySQL. Second step is the further developing on the CephSmile V2 program to connect to the database via the network follow REST guideline using GET and POST methods. The result shows that CephSmileV2 can be used as a diagnostic tool for orthodontics treatment and simulation which requires username/password to login to database. The result also demonstrates the details of login user to use the CephSmile V2 program in term of amount of hours, amount of usages, functions that user has been accessing. Also the administrator is allowed to create the user account and setup the capabilities of user level in different packages: gold, silver, platinum and titanium packages. It is concluded that CephSmile plus Services can be provided to the orthodontist community as software plus services.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116648868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711216
Jian Wu, Jianming Hu, Jianbo Sun
Departure headway distribution is significant for intelligent traffic control and traffic simulations. Jilin, an ordinary large city, is selected in this paper to study the departure headway distributions. Experimental results show that the log-laplace distribution model fits headway data better for free flow traffic condition, while the log-logistic distribution model is more suitable on the peak hours. The existed studies of departure headway distributions in extremely large cities, e.g. Beijing are different from those obtained in this paper. The results are useful for traffic signal optimization, since signal timing algorithms should be modified for different city scales as well as different traffic conditions.
{"title":"Departure headway distribution modeling for ordinary large cities based on video information","authors":"Jian Wu, Jianming Hu, Jianbo Sun","doi":"10.1109/ICCIT.2010.5711216","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711216","url":null,"abstract":"Departure headway distribution is significant for intelligent traffic control and traffic simulations. Jilin, an ordinary large city, is selected in this paper to study the departure headway distributions. Experimental results show that the log-laplace distribution model fits headway data better for free flow traffic condition, while the log-logistic distribution model is more suitable on the peak hours. The existed studies of departure headway distributions in extremely large cities, e.g. Beijing are different from those obtained in this paper. The results are useful for traffic signal optimization, since signal timing algorithms should be modified for different city scales as well as different traffic conditions.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131415089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a security paradigm named self-existent mechanism of access control. The most distinct character is that it runs absolutely independent from program executing environment, even without cooperation of OS. That is to say, it has a unique structure to assure that computing is controlled under a secure mechanism that cannot be penetrated by software like virus, Trojan and other malicious programs. This paper explains its principle, and describes how to accomplish such control over general computers. Also, this paper gives advice to the design of microprocessor to make this control mechanism to work better.
{"title":"Access control through self-existent mechanism","authors":"Xiaoxia Zheng, Fangyong Hou, Hongjun He, Nong Xiao","doi":"10.1109/ICCIT.2010.5711212","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711212","url":null,"abstract":"This paper proposes a security paradigm named self-existent mechanism of access control. The most distinct character is that it runs absolutely independent from program executing environment, even without cooperation of OS. That is to say, it has a unique structure to assure that computing is controlled under a secure mechanism that cannot be penetrated by software like virus, Trojan and other malicious programs. This paper explains its principle, and describes how to accomplish such control over general computers. Also, this paper gives advice to the design of microprocessor to make this control mechanism to work better.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133501187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711158
L. Lihua, Su Yikun
To improve the efficiency of cost control in the high speed railway construction phase, we set up the model of earned value and install FBCWS index, through the contrast between FBCWS index and ACWP' index, we improve the efficiency of cost control in construction stage, so that we can do the better in the direction and control before costs incurred and make the construction cost control management more scientifically and effectively in the construction phase of high-speed rail project.
{"title":"The control model of engineering cost in construction phase of high-speed railway","authors":"L. Lihua, Su Yikun","doi":"10.1109/ICCIT.2010.5711158","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711158","url":null,"abstract":"To improve the efficiency of cost control in the high speed railway construction phase, we set up the model of earned value and install FBCWS index, through the contrast between FBCWS index and ACWP' index, we improve the efficiency of cost control in construction stage, so that we can do the better in the direction and control before costs incurred and make the construction cost control management more scientifically and effectively in the construction phase of high-speed rail project.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134530999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/iccit.2010.5711168
Fei Hu, Limin Luo, Feng Zhang, Jia Liu
{"title":"Action recognition using hybrid spatio-temporal bag-of-features","authors":"Fei Hu, Limin Luo, Feng Zhang, Jia Liu","doi":"10.1109/iccit.2010.5711168","DOIUrl":"https://doi.org/10.1109/iccit.2010.5711168","url":null,"abstract":"","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114224691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711217
F. Seifert, M. Rentzsch
For purposes of identification and education todays music modeling is rather limited. Systems that can identify music in a generic way are either very restricted or do not exist at all. Therefore, it is not possible to associate the countless potential occurrences of a certain song with at least one generic description. Analogously, there is no computational approach to evaluate the performance of a music student who has been asked to play a certain song and to accompany it in a certain style. We introduce a generic model for music representation. To test our model, we have developed a prototype that correlates symbolic music performances to the proposed representation.
{"title":"Generic modeling of music for computational education and recognition of song variations","authors":"F. Seifert, M. Rentzsch","doi":"10.1109/ICCIT.2010.5711217","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711217","url":null,"abstract":"For purposes of identification and education todays music modeling is rather limited. Systems that can identify music in a generic way are either very restricted or do not exist at all. Therefore, it is not possible to associate the countless potential occurrences of a certain song with at least one generic description. Analogously, there is no computational approach to evaluate the performance of a music student who has been asked to play a certain song and to accompany it in a certain style. We introduce a generic model for music representation. To test our model, we have developed a prototype that correlates symbolic music performances to the proposed representation.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123473800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711193
Yun-Hong Noh, S. Ye, Do-Un Jeong
Nowadays, the advance in sensors network, integrated circuit and wireless communication technologies giving capability of designing lightweight and low-cost sensor nodes particularly for healthcare application. In this paper, a wearable belt-type ECG electrode worn around the chest is designed for sake of the convenience to measure real-time ECG. The measured ECG signals carry a lot of clinical information for a cardiologist especially for heart arrhythmia detection. DTW (dynamic time warping) method is applied on normal ECG and abnormal ECG to detect arrhythmia detection. Arrhythmia detection algorithm using MIT-BIH databases is performed for performance evaluation purpose.
{"title":"Development of the belt-type ECG measurement system for wearable health monitoring","authors":"Yun-Hong Noh, S. Ye, Do-Un Jeong","doi":"10.1109/ICCIT.2010.5711193","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711193","url":null,"abstract":"Nowadays, the advance in sensors network, integrated circuit and wireless communication technologies giving capability of designing lightweight and low-cost sensor nodes particularly for healthcare application. In this paper, a wearable belt-type ECG electrode worn around the chest is designed for sake of the convenience to measure real-time ECG. The measured ECG signals carry a lot of clinical information for a cardiologist especially for heart arrhythmia detection. DTW (dynamic time warping) method is applied on normal ECG and abnormal ECG to detect arrhythmia detection. Arrhythmia detection algorithm using MIT-BIH databases is performed for performance evaluation purpose.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122872439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}