Recently, the concept of indirect associations, a new type of infrequent patterns that indirectly connect two rarely co-occurred items via a frequent item set called ¡§mediator¡¨, has been shown its power in capturing interesting information over web usage data. Most contemporary indirect association mining algorithms are developed for static dataset. Our previous work has proposed an algorithm, MIA-LM, tailored to streaming data. In this paper, we propose a new efficient algorithm, namely EMIA-LM, for mining indirect associations over web data streams. EMIA-LM employs a mediator-exploiting search strategy, which reduce the search space as well as computation cost for generating indirect associations. Besides, EMIA-LM adopts a compact data structure, alleviating unnecessary data transforming processes and consuming far less memory storage. Preliminary experiments conducted on real Web streaming datasets show that EMIA-LM is superior to the leading HI-mine* algorithm for static data and MIA-LM both in computation speed and memory consumption.
{"title":"A Mediator Exploiting Approach for Mining Indirect Associations from Web Data Streams","authors":"Wen-Yang Lin, Yi-Ching Chen","doi":"10.1109/IBICA.2011.50","DOIUrl":"https://doi.org/10.1109/IBICA.2011.50","url":null,"abstract":"Recently, the concept of indirect associations, a new type of infrequent patterns that indirectly connect two rarely co-occurred items via a frequent item set called ¡§mediator¡¨, has been shown its power in capturing interesting information over web usage data. Most contemporary indirect association mining algorithms are developed for static dataset. Our previous work has proposed an algorithm, MIA-LM, tailored to streaming data. In this paper, we propose a new efficient algorithm, namely EMIA-LM, for mining indirect associations over web data streams. EMIA-LM employs a mediator-exploiting search strategy, which reduce the search space as well as computation cost for generating indirect associations. Besides, EMIA-LM adopts a compact data structure, alleviating unnecessary data transforming processes and consuming far less memory storage. Preliminary experiments conducted on real Web streaming datasets show that EMIA-LM is superior to the leading HI-mine* algorithm for static data and MIA-LM both in computation speed and memory consumption.","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130445457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To protect data security and business continuity of enterprise, the paper introduce a method of choosing a data center location for enterprise, again analyze various factors and their proportion based on Delphi. On the basis, list many major cities to make a qualitative compare, in that way, we get several preferred cities.
{"title":"Method of Locating Data Center Based on Delphi","authors":"Fei Yang, Li-Xuan Ye","doi":"10.1109/IBICA.2011.79","DOIUrl":"https://doi.org/10.1109/IBICA.2011.79","url":null,"abstract":"To protect data security and business continuity of enterprise, the paper introduce a method of choosing a data center location for enterprise, again analyze various factors and their proportion based on Delphi. On the basis, list many major cities to make a qualitative compare, in that way, we get several preferred cities.","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"186 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131990931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yanfeng Zhang, Xiaofei Xu, Yingqun Liu, Xutao Li, Yunming Ye
Classification is an important task in machine learning and data mining. Lots of classification models have been proposed based on different theories and assumptions. Several researchers have proposed to build classifiers by using a sequence of nested clusterings based on the assumption that if objects are spatially close to one another in data space, they tend to have the same categorical label. In this paper, we pro- pose to build such classifiers by using the agglomerative fuzzy k-means because of its three good properties: (1) the clustering algorithm is insensitive to initial centers; (2) the algorithm can automatically determine the number of clusters combined with cluster validation techniques; (3) the algorithm can control the density level of clusters identified. The comparison experiments with traditional classifiers on benchmark data sets from UCI Machine Learning Repository have shown the effectiveness of our proposed approach.
{"title":"An Agglomerative Fuzzy K-means Approach to Building Decision Cluster Classifiers","authors":"Yanfeng Zhang, Xiaofei Xu, Yingqun Liu, Xutao Li, Yunming Ye","doi":"10.1109/IBICA.2011.99","DOIUrl":"https://doi.org/10.1109/IBICA.2011.99","url":null,"abstract":"Classification is an important task in machine learning and data mining. Lots of classification models have been proposed based on different theories and assumptions. Several researchers have proposed to build classifiers by using a sequence of nested clusterings based on the assumption that if objects are spatially close to one another in data space, they tend to have the same categorical label. In this paper, we pro- pose to build such classifiers by using the agglomerative fuzzy k-means because of its three good properties: (1) the clustering algorithm is insensitive to initial centers; (2) the algorithm can automatically determine the number of clusters combined with cluster validation techniques; (3) the algorithm can control the density level of clusters identified. The comparison experiments with traditional classifiers on benchmark data sets from UCI Machine Learning Repository have shown the effectiveness of our proposed approach.","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131922276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A new algorithm for palm segmentation for personalidentification to process real time hand-palm images ispresented in this paper. The suggested approach is based oncharacteristics of human hand palms in an image after certainprocessing for the quick identification. The segmentation stepfollows the hand palm real time extraction from sequencedimages or videos. The achieved results will give a rigidpresentation that the auto palm print segmentation can satisfythe real time personal identification we need. (Abstract)
{"title":"Auto Palmprint Segmentation and Sobel Based Detection for Personal Idenfication","authors":"Shunyu Yang","doi":"10.1109/IBICA.2011.88","DOIUrl":"https://doi.org/10.1109/IBICA.2011.88","url":null,"abstract":"A new algorithm for palm segmentation for personalidentification to process real time hand-palm images ispresented in this paper. The suggested approach is based oncharacteristics of human hand palms in an image after certainprocessing for the quick identification. The segmentation stepfollows the hand palm real time extraction from sequencedimages or videos. The achieved results will give a rigidpresentation that the auto palm print segmentation can satisfythe real time personal identification we need. (Abstract)","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115795432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Electronic documents are considered to be the most valuable information assets in enterprises. This article explains all the typical styles of document security management products. As the cloud security era is coming, the existing systems need to be upgraded with most cost-effective measures, so a document security management system suitable for cloud security is also designed in this article.
{"title":"Cloud Technology in the Security Management of Enterprise Document","authors":"Na Liu","doi":"10.1109/IBICA.2011.70","DOIUrl":"https://doi.org/10.1109/IBICA.2011.70","url":null,"abstract":"Electronic documents are considered to be the most valuable information assets in enterprises. This article explains all the typical styles of document security management products. As the cloud security era is coming, the existing systems need to be upgraded with most cost-effective measures, so a document security management system suitable for cloud security is also designed in this article.","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124590044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Chung, Ching Yuan Huang, Shiau-Chin Wang, Cheng-Ming Lin
For smart living, interactive applications are increasingly important especially on interaction of people and the environment. In this work, a Bluetooth-based mobile sensor interactive application in Android was designed and implemented. An application framework of interactive applications is presented. The results show that animation view on the application changes along with the mobile sensor value. The power issue was also measured and concluded as extending handler timing to reduce the consumption.
{"title":"Bluetooth-Based Android Interactive Applications for Smart Living","authors":"C. Chung, Ching Yuan Huang, Shiau-Chin Wang, Cheng-Ming Lin","doi":"10.1109/IBICA.2011.82","DOIUrl":"https://doi.org/10.1109/IBICA.2011.82","url":null,"abstract":"For smart living, interactive applications are increasingly important especially on interaction of people and the environment. In this work, a Bluetooth-based mobile sensor interactive application in Android was designed and implemented. An application framework of interactive applications is presented. The results show that animation view on the application changes along with the mobile sensor value. The power issue was also measured and concluded as extending handler timing to reduce the consumption.","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125595293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Blurred underwater image is always an annoying problem in the oceanic engineering. In this paper, we propose an efficient and low complexity underwater image enhancement method based on dark channel prior. Our method employs the median filter instead of the soft matting procedure to estimate the depth map of image. Moreover, a color correction method is adopted to enhance the color contrast for underwater image. The experimental results show that the proposed approach can effectively enhance the underwater image and reduce the execution time. Besides, this method requires less computing resource and is well suitable for implementing on the surveillance and underwater navigation in real time.
{"title":"Low Complexity Underwater Image Enhancement Based on Dark Channel Prior","authors":"Hung-Yu Yang, Pei-Yin Chen, Chien-Chuan Huang, Ya-Zhu Chuang, Yeu-Horng Shiau","doi":"10.1109/IBICA.2011.9","DOIUrl":"https://doi.org/10.1109/IBICA.2011.9","url":null,"abstract":"Blurred underwater image is always an annoying problem in the oceanic engineering. In this paper, we propose an efficient and low complexity underwater image enhancement method based on dark channel prior. Our method employs the median filter instead of the soft matting procedure to estimate the depth map of image. Moreover, a color correction method is adopted to enhance the color contrast for underwater image. The experimental results show that the proposed approach can effectively enhance the underwater image and reduce the execution time. Besides, this method requires less computing resource and is well suitable for implementing on the surveillance and underwater navigation in real time.","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117075142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
MECS, the multimedia environmental control system, is a Windows-based tool for connection management. It carries out as an application interface to a wireless network packet communication system, in which it is used to provide local and remote audio and video control, and to interact with the other RS232/infrared-oriented devices that support shared controlling processes. In this paper we document the design, operation and continued evolution of MECS. We present MECS's general architecture model, its connection control protocol and its relationship to other system components.
{"title":"An Intergrated Controller Design for Multimedia Equipment","authors":"Ming-Hung Lin, T. Wey, Sheng-Yao Hu, Nien-Tsu Hu","doi":"10.1109/IBICA.2011.63","DOIUrl":"https://doi.org/10.1109/IBICA.2011.63","url":null,"abstract":"MECS, the multimedia environmental control system, is a Windows-based tool for connection management. It carries out as an application interface to a wireless network packet communication system, in which it is used to provide local and remote audio and video control, and to interact with the other RS232/infrared-oriented devices that support shared controlling processes. In this paper we document the design, operation and continued evolution of MECS. We present MECS's general architecture model, its connection control protocol and its relationship to other system components.","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122380105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wireless sensor networks consist of small battery powered devices with limited energy resources. The energy efficiency is key design that needs to be enhanced in order to improve the life-time of the network. However, the conventional cluster constructions are difficult to control the geographical area of a cluster. The methods usually generate long-distance intra-cluster routing and can not keep the energy efficiency. This paper presents an efficient cluster construction strategy that can handle the geographical area of a cluster. Accordingly, the numbers of sensor nodes of clusters are balanced and long-distance intra-cluster data delivery can be avoided.
{"title":"An Efficient Cluster Construction Strategy for Wireless Sensor Networks","authors":"Jong-Shin Chen, Kai-Cheng Chuang, Zong-Yi Lyu","doi":"10.1109/IBICA.2011.87","DOIUrl":"https://doi.org/10.1109/IBICA.2011.87","url":null,"abstract":"Wireless sensor networks consist of small battery powered devices with limited energy resources. The energy efficiency is key design that needs to be enhanced in order to improve the life-time of the network. However, the conventional cluster constructions are difficult to control the geographical area of a cluster. The methods usually generate long-distance intra-cluster routing and can not keep the energy efficiency. This paper presents an efficient cluster construction strategy that can handle the geographical area of a cluster. Accordingly, the numbers of sensor nodes of clusters are balanced and long-distance intra-cluster data delivery can be avoided.","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124448496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wireless digital home environment is now a trend to remove the unnecessary wires between different entertainment devices. To serve the multiple client and multiple video source request, a new video compressor for loss less and near loss less compression is one of the major components achieving wireless mobile, multiple access home entertainment system. Among loss less compression system, JPEG 2000 realizes SNR and size scalable loss less image compression, and video is also compressible via motion JPEG 2000 extension. This work presents a new loss less compression codec, the multiple source oriented scalable video compressor. Two important components from JPEG 2000 are extracted, namely LDWT and MQ-coder. According to the probability analysis, two pass quality driven bit plane sequencer is presented. A complete flowchart is constructed to conclude the proposed work. Quality driven magnitude refinement is also proposed to optimize the SNR scalability. According to the experiment results, the computation time of proposed work is almost one third of open JPEG (JEPG 2000) while the compression ratio is only 0.07 behind. According to the results, a computation-efficient size and SNR scalable codec is concluded.
{"title":"A Low Complexity Scalable Video Compressor for Multiple Source Digit Home Set-Top Box","authors":"T. Tsai, Hsueh-Yi Lin","doi":"10.1109/IBICA.2011.14","DOIUrl":"https://doi.org/10.1109/IBICA.2011.14","url":null,"abstract":"Wireless digital home environment is now a trend to remove the unnecessary wires between different entertainment devices. To serve the multiple client and multiple video source request, a new video compressor for loss less and near loss less compression is one of the major components achieving wireless mobile, multiple access home entertainment system. Among loss less compression system, JPEG 2000 realizes SNR and size scalable loss less image compression, and video is also compressible via motion JPEG 2000 extension. This work presents a new loss less compression codec, the multiple source oriented scalable video compressor. Two important components from JPEG 2000 are extracted, namely LDWT and MQ-coder. According to the probability analysis, two pass quality driven bit plane sequencer is presented. A complete flowchart is constructed to conclude the proposed work. Quality driven magnitude refinement is also proposed to optimize the SNR scalability. According to the experiment results, the computation time of proposed work is almost one third of open JPEG (JEPG 2000) while the compression ratio is only 0.07 behind. According to the results, a computation-efficient size and SNR scalable codec is concluded.","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124421000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}