Pub Date : 2010-09-02DOI: 10.1109/ICEIE.2010.5559757
S. Khakbaz, M. Dadfarnia
Vehicular Adhoc Networks (VANETs) are new network environment for intelligent transportation systems. One of the fundamental services in VANET is broadcasting, that is a challenging task due to different road topologies and network conditions. One of its challenges is broadcasting at intersections, that because vehicles in different roads constituting an intersections can affect on broadcast process of other roads, message may not be propagated in some directions. In this paper we propose a method that by classifying vehicles based on their location and the road they move in solves this problem. Our method is simulated in NS2, and simulation results show our method assures broadcasting in all directions.
{"title":"The challenge of broadcasting at intersections in Vehicular Adhoc Networks","authors":"S. Khakbaz, M. Dadfarnia","doi":"10.1109/ICEIE.2010.5559757","DOIUrl":"https://doi.org/10.1109/ICEIE.2010.5559757","url":null,"abstract":"Vehicular Adhoc Networks (VANETs) are new network environment for intelligent transportation systems. One of the fundamental services in VANET is broadcasting, that is a challenging task due to different road topologies and network conditions. One of its challenges is broadcasting at intersections, that because vehicles in different roads constituting an intersections can affect on broadcast process of other roads, message may not be propagated in some directions. In this paper we propose a method that by classifying vehicles based on their location and the road they move in solves this problem. Our method is simulated in NS2, and simulation results show our method assures broadcasting in all directions.","PeriodicalId":211301,"journal":{"name":"2010 International Conference on Electronics and Information Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131275263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-02DOI: 10.1109/ICEIE.2010.5559667
Wei Pi, Jiun Shin, Dongsun Park
In recent years, finger vein authentication technology becomes a new highlight in biometric technology. However, the acquired images are low quality because of near-infrared conditions and different structures in different parts of finger, which will severely impacts identification accuracy of the whole system. Therefore, it is necessary to improve the quality of images. In this paper, an effective approach for improving the quality of images is proposed. At first, edge-preserving filter is used for denoising, and then the small blurred finger vein textures are enhanced by elliptic highpass filter. Finally, histogram equalization enhances the contrast of images. The experimental images and estimation results show that the finger vein images become much clearer than original ones, and prove the proposed approach is efficient to improve the quality of images.
{"title":"An effective quality improvement approach for low quality finger vein image","authors":"Wei Pi, Jiun Shin, Dongsun Park","doi":"10.1109/ICEIE.2010.5559667","DOIUrl":"https://doi.org/10.1109/ICEIE.2010.5559667","url":null,"abstract":"In recent years, finger vein authentication technology becomes a new highlight in biometric technology. However, the acquired images are low quality because of near-infrared conditions and different structures in different parts of finger, which will severely impacts identification accuracy of the whole system. Therefore, it is necessary to improve the quality of images. In this paper, an effective approach for improving the quality of images is proposed. At first, edge-preserving filter is used for denoising, and then the small blurred finger vein textures are enhanced by elliptic highpass filter. Finally, histogram equalization enhances the contrast of images. The experimental images and estimation results show that the finger vein images become much clearer than original ones, and prove the proposed approach is efficient to improve the quality of images.","PeriodicalId":211301,"journal":{"name":"2010 International Conference on Electronics and Information Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133819974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-02DOI: 10.1109/ICEIE.2010.5559835
Yeong-Sik Pak, Byunggi Kim
XML is extensible data format and used in various areas. Thus it is proposed by independent criteria and updated frequently. But structures designed without explicit guidelines decrease dependencies in the future extension and efficiencies of parsing program. In this paper we study general structure and suggest direction for designs of efficient structures based on the relation between parsing time and complexity. We use parser for structure analysis, and propose visualization method using Cascade Style Sheet (CSS). Proposed method will provide structure analysis function for XML format designing continuously, and identify efficient structures.
{"title":"Visualization and structure analysis for efficient XML design","authors":"Yeong-Sik Pak, Byunggi Kim","doi":"10.1109/ICEIE.2010.5559835","DOIUrl":"https://doi.org/10.1109/ICEIE.2010.5559835","url":null,"abstract":"XML is extensible data format and used in various areas. Thus it is proposed by independent criteria and updated frequently. But structures designed without explicit guidelines decrease dependencies in the future extension and efficiencies of parsing program. In this paper we study general structure and suggest direction for designs of efficient structures based on the relation between parsing time and complexity. We use parser for structure analysis, and propose visualization method using Cascade Style Sheet (CSS). Proposed method will provide structure analysis function for XML format designing continuously, and identify efficient structures.","PeriodicalId":211301,"journal":{"name":"2010 International Conference on Electronics and Information Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124131277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-02DOI: 10.1109/ICEIE.2010.5559784
M. Maheshwari
Nowadays, every one want to use cell phone and access internet from anywhere at home, office or public place due to rapid growth of Electronic and Telecommunication industry. Due to these demands the analysis of signal propagation inside and outside building is necessary. The outdoor propagation is simple as compared to indoor propagation. This paper models the path loss coefficient and general expression for loss due to roof for an indoor Wi-Fi system (Wi-Fi= Wireless Fidelity). It was concluded that the path loss coefficient depends on the objects inside the room and loss due to roof depends on the roof thickness.
{"title":"Modelling of path loss coefficient and loss due to roof for a indoor Wi-Fi system","authors":"M. Maheshwari","doi":"10.1109/ICEIE.2010.5559784","DOIUrl":"https://doi.org/10.1109/ICEIE.2010.5559784","url":null,"abstract":"Nowadays, every one want to use cell phone and access internet from anywhere at home, office or public place due to rapid growth of Electronic and Telecommunication industry. Due to these demands the analysis of signal propagation inside and outside building is necessary. The outdoor propagation is simple as compared to indoor propagation. This paper models the path loss coefficient and general expression for loss due to roof for an indoor Wi-Fi system (Wi-Fi= Wireless Fidelity). It was concluded that the path loss coefficient depends on the objects inside the room and loss due to roof depends on the roof thickness.","PeriodicalId":211301,"journal":{"name":"2010 International Conference on Electronics and Information Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114315314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-02DOI: 10.1109/ICEIE.2010.5559893
Le Hoang Son
Nowadays, Spatial Analysis is one of the most interesting trends in GIS. In fact, there are some intensive researches about its use in various branches such as geology, environment, society. This paper performs an exploratory study about some spatial analysis techniques in three dimensional maps for the SGIS-3D system which was proposed by [4]. This system was designed for spatial analysis operations in 3D maps and it showed the effeciency in some measurement, calculation tasks of geography, geology and many other branches.
{"title":"An exploratory study about spatial analysis techniques in three dimensional maps for SGIS-3D system","authors":"Le Hoang Son","doi":"10.1109/ICEIE.2010.5559893","DOIUrl":"https://doi.org/10.1109/ICEIE.2010.5559893","url":null,"abstract":"Nowadays, Spatial Analysis is one of the most interesting trends in GIS. In fact, there are some intensive researches about its use in various branches such as geology, environment, society. This paper performs an exploratory study about some spatial analysis techniques in three dimensional maps for the SGIS-3D system which was proposed by [4]. This system was designed for spatial analysis operations in 3D maps and it showed the effeciency in some measurement, calculation tasks of geography, geology and many other branches.","PeriodicalId":211301,"journal":{"name":"2010 International Conference on Electronics and Information Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114431133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-02DOI: 10.1109/ICEIE.2010.5559758
Yan Li, Jih-Chieh Yu
The blocking of commercial information, the complexity of deal, the high cost as well as the high risk are the barriers in front of our Chinese enterprise when doing e-commerce nowadays. The theme of the article is to clear the barriers based on the detailed and systematic analysis of the enterprise e-commercial system. I will start from the analysis of system demand with the usage of rational union process(RUP) of software development, and based on the technique platform of J2EE, I will complete the design of the system and eventually work out a cross regional and cross platform e-commerce system for the enterprise comprise three branch system — information display, back-stage management, commerce center. In this way, we can make the trade process as the information publish, trade negotiation, contract talk, conclude of contract, as well as the trace of contract be done promptly so as to fulfill the enterprise' development requirement on e-commerce.
商业信息的闭塞性、交易的复杂性、高成本和高风险是我国企业开展电子商务所面临的障碍。本文的主题是在对企业电子商务系统进行详细系统分析的基础上,清除障碍。从系统需求分析入手,运用软件开发的rational union process(RUP),以J2EE为技术平台,完成系统的设计,最终设计出一个由信息显示、后台管理、商务中心三个分支系统组成的跨区域、跨平台的企业电子商务系统。从而使信息发布、贸易谈判、合同洽谈、合同订立、合同跟踪等贸易过程得以及时完成,以满足企业对电子商务的发展需求。
{"title":"Design on the framework of management information system for enterprises based on e-commerce","authors":"Yan Li, Jih-Chieh Yu","doi":"10.1109/ICEIE.2010.5559758","DOIUrl":"https://doi.org/10.1109/ICEIE.2010.5559758","url":null,"abstract":"The blocking of commercial information, the complexity of deal, the high cost as well as the high risk are the barriers in front of our Chinese enterprise when doing e-commerce nowadays. The theme of the article is to clear the barriers based on the detailed and systematic analysis of the enterprise e-commercial system. I will start from the analysis of system demand with the usage of rational union process(RUP) of software development, and based on the technique platform of J2EE, I will complete the design of the system and eventually work out a cross regional and cross platform e-commerce system for the enterprise comprise three branch system — information display, back-stage management, commerce center. In this way, we can make the trade process as the information publish, trade negotiation, contract talk, conclude of contract, as well as the trace of contract be done promptly so as to fulfill the enterprise' development requirement on e-commerce.","PeriodicalId":211301,"journal":{"name":"2010 International Conference on Electronics and Information Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116817851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-02DOI: 10.1109/ICEIE.2010.5559763
S. Babaie, Saeid Agaalizadeh, Mehdi Golsorkhtabaramiri
In designing of the routing protocols for Wireless Sensor Networks, clustering is one of the methods used to manage network energy consumption efficiently. LEACH is one of the most famous clustering mechanisms. It elects a cluster head based on probability model. In LEACH, within each 1/p rounds, once a node has been selected as a cluster-head (CH), its threshold will be set to 0, and thus it will lose the chance to participate cluster-head selection, even if it still has enough energy. In this paper, we present a novel cluster-head selection algorithm. Instead of changing the threshold to 0 directly, the proposed algorithm adjusts the threshold of each node gradually according to the number of live and dead nodes in each round, so more nodes could have the opportunity to be CHs. Simulation results demonstrate that the proposed algorithm has higher efficiency and can achieve better network lifetime and energy consumption.
{"title":"The novel threshold based hierarchical clustering method for Wireless Sensor Networks","authors":"S. Babaie, Saeid Agaalizadeh, Mehdi Golsorkhtabaramiri","doi":"10.1109/ICEIE.2010.5559763","DOIUrl":"https://doi.org/10.1109/ICEIE.2010.5559763","url":null,"abstract":"In designing of the routing protocols for Wireless Sensor Networks, clustering is one of the methods used to manage network energy consumption efficiently. LEACH is one of the most famous clustering mechanisms. It elects a cluster head based on probability model. In LEACH, within each 1/p rounds, once a node has been selected as a cluster-head (CH), its threshold will be set to 0, and thus it will lose the chance to participate cluster-head selection, even if it still has enough energy. In this paper, we present a novel cluster-head selection algorithm. Instead of changing the threshold to 0 directly, the proposed algorithm adjusts the threshold of each node gradually according to the number of live and dead nodes in each round, so more nodes could have the opportunity to be CHs. Simulation results demonstrate that the proposed algorithm has higher efficiency and can achieve better network lifetime and energy consumption.","PeriodicalId":211301,"journal":{"name":"2010 International Conference on Electronics and Information Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120841954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-02DOI: 10.1109/ICEIE.2010.5559787
Doosung Min, Hongki Min
With the emergence of ubiquitous era, it has become increasingly important for context-aware computing which takes full advantage of proactive services to support user environment. Many kinds of studies on context-aware services for supporting user-centric services have been performed. Recently related researches are concentrated on only service acquisition. Therefore most studies of them have not designed to provide a dynamic service while it has focused on executing services. In this paper, we present dynamic service management technique for various context-information. Firstly, we analyze previous researches out supporting context-aware services and draw its requirements from the dynamic context-aware services. Secondly, we propose DSM which provides dynamic situation considering context-domain's management and both service add and delete. We introduce service implementation based on the user interesting area in smart spaces. Finally, our approach is illustrated as a manifestation of the benefits of the introduced technique.
{"title":"Dynamic service management technique for various context information","authors":"Doosung Min, Hongki Min","doi":"10.1109/ICEIE.2010.5559787","DOIUrl":"https://doi.org/10.1109/ICEIE.2010.5559787","url":null,"abstract":"With the emergence of ubiquitous era, it has become increasingly important for context-aware computing which takes full advantage of proactive services to support user environment. Many kinds of studies on context-aware services for supporting user-centric services have been performed. Recently related researches are concentrated on only service acquisition. Therefore most studies of them have not designed to provide a dynamic service while it has focused on executing services. In this paper, we present dynamic service management technique for various context-information. Firstly, we analyze previous researches out supporting context-aware services and draw its requirements from the dynamic context-aware services. Secondly, we propose DSM which provides dynamic situation considering context-domain's management and both service add and delete. We introduce service implementation based on the user interesting area in smart spaces. Finally, our approach is illustrated as a manifestation of the benefits of the introduced technique.","PeriodicalId":211301,"journal":{"name":"2010 International Conference on Electronics and Information Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125895072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-02DOI: 10.1109/ICEIE.2010.5559828
Jr-Shian Chen, Hung-Lieh Chou, D. Tai
Feature selections have seen growing importance placed on statistics, pattern recognition, machine learning and data mining. Researchers have demonstrated the interest in the methods for improving the performance of their forecasting results. Therefore, this study proposes a feature selection approach, which based on minimize entropy principle approach. Experimental results have shown that the proposed model provided more average accuracy rate and stability then other methods.
{"title":"Feature selection based on modified minimize entropy principle","authors":"Jr-Shian Chen, Hung-Lieh Chou, D. Tai","doi":"10.1109/ICEIE.2010.5559828","DOIUrl":"https://doi.org/10.1109/ICEIE.2010.5559828","url":null,"abstract":"Feature selections have seen growing importance placed on statistics, pattern recognition, machine learning and data mining. Researchers have demonstrated the interest in the methods for improving the performance of their forecasting results. Therefore, this study proposes a feature selection approach, which based on minimize entropy principle approach. Experimental results have shown that the proposed model provided more average accuracy rate and stability then other methods.","PeriodicalId":211301,"journal":{"name":"2010 International Conference on Electronics and Information Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124795380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-02DOI: 10.1109/ICEIE.2010.5559879
Hossein Rahmani, M. Moghaddam
This paper presents a new semi-blind robust image watermarking scheme based on most perceptually important sub-image (MPISI) of watermark and original image. The proposed method is based on lossless approach and to prevent false-positive watermark detection in this approach, a watermark certificate is inserted in the image. Therefore, the proposed method has two phases; in the first phase, the MPISI of watermark is inserted as a certificate in the MPISI of original image. In the second phase, the watermark is inserted in the image by a lossless approach. Also, in embedding procedure, a secret image and a secret key are created based on DC coefficients of MPISI of the original image and similarity between DCT coefficients of watermarked image and watermark, respectively. In the extraction procedure, the original image is not required and only the secret image and secret key are used. The experimental results showed that the proposed scheme was robust against various attacks such as JPEG compression, filtering, cropping, and additive Noise while the quality of extracted watermark was acceptable.
{"title":"A semi-blind robust watermarking scheme based on most perceptually important region of images","authors":"Hossein Rahmani, M. Moghaddam","doi":"10.1109/ICEIE.2010.5559879","DOIUrl":"https://doi.org/10.1109/ICEIE.2010.5559879","url":null,"abstract":"This paper presents a new semi-blind robust image watermarking scheme based on most perceptually important sub-image (MPISI) of watermark and original image. The proposed method is based on lossless approach and to prevent false-positive watermark detection in this approach, a watermark certificate is inserted in the image. Therefore, the proposed method has two phases; in the first phase, the MPISI of watermark is inserted as a certificate in the MPISI of original image. In the second phase, the watermark is inserted in the image by a lossless approach. Also, in embedding procedure, a secret image and a secret key are created based on DC coefficients of MPISI of the original image and similarity between DCT coefficients of watermarked image and watermark, respectively. In the extraction procedure, the original image is not required and only the secret image and secret key are used. The experimental results showed that the proposed scheme was robust against various attacks such as JPEG compression, filtering, cropping, and additive Noise while the quality of extracted watermark was acceptable.","PeriodicalId":211301,"journal":{"name":"2010 International Conference on Electronics and Information Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128225580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}