Content-Based Image Retrieval (CBIR) considers the characteristics of the image itself, for example its shapes, colors and textures. The Current approaches to CBIR differ in terms of which image features are extracted. Recent work deals with combination of distances or scores from different and independent representations. This work attempts to induce high level semantics from the low level descriptors of the images. In this paper, we propose a new approach that integrates techniques of salient, color and texture features. Our approach extracts interest salient regions that work as local descriptors. A greedy graph matching algorithm with a proposed modified scoring function is applied to determine the final image rank. The proposed approach is appropriate for accurately retrieving images even in distortion cases such as geometric deformations and noise. This approach was tested on proprietary image databases. Also an offline case study is developed where our approach is tested on images retrieved from Google keyword based image search engine. The results show that a combination of our approach as a local image descriptor with another global descriptor outperforms other approaches.
{"title":"An Image Retrieval Approach Based on Composite Features and Graph Matching","authors":"M. Helala, M. Selim, H. Zayed","doi":"10.1109/ICCEE.2009.86","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.86","url":null,"abstract":"Content-Based Image Retrieval (CBIR) considers the characteristics of the image itself, for example its shapes, colors and textures. The Current approaches to CBIR differ in terms of which image features are extracted. Recent work deals with combination of distances or scores from different and independent representations. This work attempts to induce high level semantics from the low level descriptors of the images. In this paper, we propose a new approach that integrates techniques of salient, color and texture features. Our approach extracts interest salient regions that work as local descriptors. A greedy graph matching algorithm with a proposed modified scoring function is applied to determine the final image rank. The proposed approach is appropriate for accurately retrieving images even in distortion cases such as geometric deformations and noise. This approach was tested on proprietary image databases. Also an offline case study is developed where our approach is tested on images retrieved from Google keyword based image search engine. The results show that a combination of our approach as a local image descriptor with another global descriptor outperforms other approaches.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"437 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132685318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The semantic web is an extension of current web. It is gaining the interests of researcher from few years. The aim of this web is to make web meaningful, understandable and machine processable. Making use of information on current web for the productiveness of future web is becoming vital. Heterogeneity of relational data coupled with present web complicates utilization of information for future web. To use the data associated with current web we need it to transform it into ontology. The already presented and provided algorithms merely give the result in user required form. This paper presents a scheme for the identification of association in real scenarios, where there can be very little metadata availability.`
{"title":"An Effective Approach for Association Identification in Real Scenarios","authors":"Asif Sohail Abid, M. Y. Javed","doi":"10.1109/ICCEE.2009.152","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.152","url":null,"abstract":"The semantic web is an extension of current web. It is gaining the interests of researcher from few years. The aim of this web is to make web meaningful, understandable and machine processable. Making use of information on current web for the productiveness of future web is becoming vital. Heterogeneity of relational data coupled with present web complicates utilization of information for future web. To use the data associated with current web we need it to transform it into ontology. The already presented and provided algorithms merely give the result in user required form. This paper presents a scheme for the identification of association in real scenarios, where there can be very little metadata availability.`","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132906416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Electrochemical double layer capacitors (EDLC) or Supercapacitors (SC) are useful in many pulse power applications such as memory backups, mobiles, laptops and communication systems. Symmetrical, aqueous, metal oxide based 8F, 5.5V SC module is developed and its charging with solar array has been investigated. Use of this capacitor for pulse power application was investigated. Standard Maxwell, Nesscap SC and the developed module was tested for flash gun operation of camera. SC is a power rich device and photovoltaic system being energy rich; makes best pair to give new stable power source.
{"title":"Photovoltaic Chargeable Electrochemical Double Layer Capacitor","authors":"P. B. Karandikar, D. Rathod, D. Talange","doi":"10.1109/ICCEE.2009.36","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.36","url":null,"abstract":"Electrochemical double layer capacitors (EDLC) or Supercapacitors (SC) are useful in many pulse power applications such as memory backups, mobiles, laptops and communication systems. Symmetrical, aqueous, metal oxide based 8F, 5.5V SC module is developed and its charging with solar array has been investigated. Use of this capacitor for pulse power application was investigated. Standard Maxwell, Nesscap SC and the developed module was tested for flash gun operation of camera. SC is a power rich device and photovoltaic system being energy rich; makes best pair to give new stable power source.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132971380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The virtual library implies no sense of physical location, whether for the end user or for the source. The user can access the information from anywhere and the information can be held anywhere. There is a sense of randomness in and its irrelevant to the user where the information is held.
{"title":"The Virtual Library: Virtually a Reality?","authors":"Mahesh V. Mudhol, Vasanth N.","doi":"10.1109/ICCEE.2009.267","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.267","url":null,"abstract":"The virtual library implies no sense of physical location, whether for the end user or for the source. The user can access the information from anywhere and the information can be held anywhere. There is a sense of randomness in and its irrelevant to the user where the information is held.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127614588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This study illustrates that the overall model based on pharmacokinetic diagrams of insulin and glucose is able to follow the dynamics of glucose in Type I diabetes. Both models are capable of predicting the blood glucose and insulin levels, total glucose uptake and the renal glucose excretion. A four-daily dose and continuous injection of insulin therapy has been used for suppressing and normalizing the change of blood glucose. The results show that continuous injection has more precise control than the traditional regime of daily injections.
{"title":"Simulation Studies Based on the Pharmacokinetic Model of Diabetes Mellitus","authors":"H. Karimipour, H. T. Shandiz","doi":"10.1109/ICCEE.2009.89","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.89","url":null,"abstract":"This study illustrates that the overall model based on pharmacokinetic diagrams of insulin and glucose is able to follow the dynamics of glucose in Type I diabetes. Both models are capable of predicting the blood glucose and insulin levels, total glucose uptake and the renal glucose excretion. A four-daily dose and continuous injection of insulin therapy has been used for suppressing and normalizing the change of blood glucose. The results show that continuous injection has more precise control than the traditional regime of daily injections.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123153845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we propose a technique to determine the decision thresholds in multi-bit distributed detection. Detection thresholds are required to quantize the acquired information from the environment to send them to a fusion center. In multi-bit detection, decision making is complicated and in most cases, methods based on simulation or Person by Person Optimizations are applied to find the thresholds. In such methods, the thresholds are usually determined by estimating environmental conditions and conducting the necessary simulations and carrying out complex computations. In our proposed method we have adopted a simple analytical technique in place of these complicated methods with a detection performance close to the optimal. Compared with the detection performance of optimized solutions, the difference is slight while the simplicity and the speed of computations in our method allows the possibility of using it in a sensor network after it has deployed in the environment and the actual conditions have been determined.
{"title":"An Analytical Technique to Determine the Decision Thresholds of Multi-bit Distributed Detection in Sensor Networks","authors":"H. Varaee, G. Mirjalily, Ahmad Pouramini","doi":"10.1109/ICCEE.2009.198","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.198","url":null,"abstract":"In this paper we propose a technique to determine the decision thresholds in multi-bit distributed detection. Detection thresholds are required to quantize the acquired information from the environment to send them to a fusion center. In multi-bit detection, decision making is complicated and in most cases, methods based on simulation or Person by Person Optimizations are applied to find the thresholds. In such methods, the thresholds are usually determined by estimating environmental conditions and conducting the necessary simulations and carrying out complex computations. In our proposed method we have adopted a simple analytical technique in place of these complicated methods with a detection performance close to the optimal. Compared with the detection performance of optimized solutions, the difference is slight while the simplicity and the speed of computations in our method allows the possibility of using it in a sensor network after it has deployed in the environment and the actual conditions have been determined.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123349815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jingfeng Xue, Changzhen Hu, Kunsheng Wang, Rui Ma, B. Leng
Software structure is very important for software security. But it is very difficult to obtain software structure by software execution trace. In this paper, by researching system call sequences in the process of software execution, similar call graph is proposed. We present how to generate similar call graph by observed system call sequences. Based on this, a knowledge base for software security detection is constructed. Experiments show false alarm rate can be decreased effectively by the knowledge base and detection rate is higher by using appropriate threshold.
{"title":"Constructing a Knowledge Base for Software Security Detection Based on Similar Call Graph","authors":"Jingfeng Xue, Changzhen Hu, Kunsheng Wang, Rui Ma, B. Leng","doi":"10.1109/ICCEE.2009.66","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.66","url":null,"abstract":"Software structure is very important for software security. But it is very difficult to obtain software structure by software execution trace. In this paper, by researching system call sequences in the process of software execution, similar call graph is proposed. We present how to generate similar call graph by observed system call sequences. Based on this, a knowledge base for software security detection is constructed. Experiments show false alarm rate can be decreased effectively by the knowledge base and detection rate is higher by using appropriate threshold.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126246673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sustainable land management evaluation system is a complex system and involves in many aspects. In this paper, the attributes of sustainable land use and its management evaluation process is analyzed in detail to provide evidence for determining the influencing factors and the function of the system. Base on the analysis and five major objectives of sustainable land use proposed by FAO, eighty-six indexes are picked out as alternative factors. And then, by the means of containment, replacing competition analysis and expert evaluation, 46 influencing factors are sorted out from all the alternative factors, of which the weight is acquired by using AHP. Finally, the basic framework of the sustainable land management evaluation index system is established. In this research, the design of the land sustainable management evaluation system is from the aspect of GIS technology, which makes some preliminary exploration and research for the information of land management and evaluation.
{"title":"Design and Analysis of Sustainable Land Management Evaluation System","authors":"Dezhuang Yang, Li Li","doi":"10.1109/ICCEE.2009.40","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.40","url":null,"abstract":"Sustainable land management evaluation system is a complex system and involves in many aspects. In this paper, the attributes of sustainable land use and its management evaluation process is analyzed in detail to provide evidence for determining the influencing factors and the function of the system. Base on the analysis and five major objectives of sustainable land use proposed by FAO, eighty-six indexes are picked out as alternative factors. And then, by the means of containment, replacing competition analysis and expert evaluation, 46 influencing factors are sorted out from all the alternative factors, of which the weight is acquired by using AHP. Finally, the basic framework of the sustainable land management evaluation index system is established. In this research, the design of the land sustainable management evaluation system is from the aspect of GIS technology, which makes some preliminary exploration and research for the information of land management and evaluation.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126456328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E-learning has altered, and will continue to affect teaching and learning contexts in tertiary education but very little research has been undertaken on university instructor perspectives of technology use in e-learning teaching. This paper explores the perceived benefits of technology use in elearning by university instructors in Taiwan. These perceived benefits included benefits for the university, for the instructors themselves and for the students. An interpretive paradigm utilizing qualitative and quantitative methods was adopted. The paper outlines the findings from 27 e-learning instructors in in-depth interviews and 69 e-learning instructors who responded to the questionnaire. The purpose of this paper is to motivate more instructors to teach in e-learning by elaborating the benefits of technology use in blended courses. University administrators interested in solving the issue of the under-use of e-learning would be wise to broadcasting the benefits of technology use in e-learning to help overcome instructor personal barriers in their blended courses.
{"title":"University Instructor Perceptions of the Benefits of Technology Use in E-learning","authors":"Su-Chen Wang","doi":"10.1109/ICCEE.2009.275","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.275","url":null,"abstract":"E-learning has altered, and will continue to affect teaching and learning contexts in tertiary education but very little research has been undertaken on university instructor perspectives of technology use in e-learning teaching. This paper explores the perceived benefits of technology use in elearning by university instructors in Taiwan. These perceived benefits included benefits for the university, for the instructors themselves and for the students. An interpretive paradigm utilizing qualitative and quantitative methods was adopted. The paper outlines the findings from 27 e-learning instructors in in-depth interviews and 69 e-learning instructors who responded to the questionnaire. The purpose of this paper is to motivate more instructors to teach in e-learning by elaborating the benefits of technology use in blended courses. University administrators interested in solving the issue of the under-use of e-learning would be wise to broadcasting the benefits of technology use in e-learning to help overcome instructor personal barriers in their blended courses.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122545564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Takrouni, V. Cocquempot, N. Zanzouri, M. Ksouri
Hybrid Dynamical Systems (HDS) constitute a wide class of common industrial applications, where the behavior is determined by the interaction between continuous and discrete dynamics, i.e. behavioral modes succession. The general principle of model-based Fault Detection and Isolation (FDI) algorithms is to compare the expected behavior of the system, given by a model, with its actual behavior, known through on-line observations. Faults in HDS may corrupt the two dynamics. In that paper, we propose to limit the set of possible mode candidates by using a priori information on the discrete evolution under normal and faulty hypothesis. Two kinds of graphs are derived from the initial hybrid model, namely Normal Behavior Graphs (NBG), Faulty Behavior Graphs (FBG). Using these graphs allows us not only to identify efficiently the actual mode but also to directly interpret (diagnose) the discrete faulty evolution in terms of faults. The whole FDI methodology is described and applied to a two tanks system example.
{"title":"Behavior Graphs for Hybrid Systems Monitoring","authors":"A. Takrouni, V. Cocquempot, N. Zanzouri, M. Ksouri","doi":"10.1109/ICCEE.2009.143","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.143","url":null,"abstract":"Hybrid Dynamical Systems (HDS) constitute a wide class of common industrial applications, where the behavior is determined by the interaction between continuous and discrete dynamics, i.e. behavioral modes succession. The general principle of model-based Fault Detection and Isolation (FDI) algorithms is to compare the expected behavior of the system, given by a model, with its actual behavior, known through on-line observations. Faults in HDS may corrupt the two dynamics. In that paper, we propose to limit the set of possible mode candidates by using a priori information on the discrete evolution under normal and faulty hypothesis. Two kinds of graphs are derived from the initial hybrid model, namely Normal Behavior Graphs (NBG), Faulty Behavior Graphs (FBG). Using these graphs allows us not only to identify efficiently the actual mode but also to directly interpret (diagnose) the discrete faulty evolution in terms of faults. The whole FDI methodology is described and applied to a two tanks system example.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121666036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}