The monitoring of the bearings makes it possible to avoid disassembling mechanical systems during their preventive controls and to be able to detect the approach of a failure. The paper describes a mechanical model ruling bearing devices' defects. The proposed model concerns defects related to surface waviness, flaking defects as well as those due to unbalanced rotor's effects. The defects' detection is formulated in the frame of vibratory analysis.
{"title":"Bearing's Behavior Modeling for Mechanical Defects' Detection and Diagnosis","authors":"M. Sene, Michel Barret, K. Madani","doi":"10.1109/CISIM.2007.19","DOIUrl":"https://doi.org/10.1109/CISIM.2007.19","url":null,"abstract":"The monitoring of the bearings makes it possible to avoid disassembling mechanical systems during their preventive controls and to be able to detect the approach of a failure. The paper describes a mechanical model ruling bearing devices' defects. The proposed model concerns defects related to surface waviness, flaking defects as well as those due to unbalanced rotor's effects. The defects' detection is formulated in the frame of vibratory analysis.","PeriodicalId":350490,"journal":{"name":"6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134368678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A multi-frequency lossless watermarking algorithm is proposed in this paper. Bandelet and optimal matrix norms are used to draw the geometric feature and the statistic feature. The bandelet transform is applied to the image, and the texture and edge traced by using the geometric flow via feature of the image to build the high frequency lossless watermarking. A low frequency watermarking scheme is also achieved, by selecting optimal matrix norm to process the low frequency part of wavelets coefficients. The experiments show the offered watermarking system is evaluated against standard watermarking attacks.
{"title":"Bandelet Union Optimal Matrix Norms Constructing Lossless Watermarking","authors":"Yang Yue-xiang, C. Li-zhi, L. Yong, Wang Rui","doi":"10.1109/CISIM.2007.18","DOIUrl":"https://doi.org/10.1109/CISIM.2007.18","url":null,"abstract":"A multi-frequency lossless watermarking algorithm is proposed in this paper. Bandelet and optimal matrix norms are used to draw the geometric feature and the statistic feature. The bandelet transform is applied to the image, and the texture and edge traced by using the geometric flow via feature of the image to build the high frequency lossless watermarking. A low frequency watermarking scheme is also achieved, by selecting optimal matrix norm to process the low frequency part of wavelets coefficients. The experiments show the offered watermarking system is evaluated against standard watermarking attacks.","PeriodicalId":350490,"journal":{"name":"6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126044733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This article discusses various ideas of deniable file systems, their advantages, drawbacks and use as a storage for sensitive data (e.g. private keys for the asymmetric algorithms). Also a design of such a new file system is presented. Its goal is to revive the concept and, in the future, popularize it by merging into Linux.
{"title":"Deniable File System--Application of Deniable Storage to Protection of Private Keys","authors":"Bartosz Oler, I. E. Fray","doi":"10.1109/CISIM.2007.25","DOIUrl":"https://doi.org/10.1109/CISIM.2007.25","url":null,"abstract":"This article discusses various ideas of deniable file systems, their advantages, drawbacks and use as a storage for sensitive data (e.g. private keys for the asymmetric algorithms). Also a design of such a new file system is presented. Its goal is to revive the concept and, in the future, popularize it by merging into Linux.","PeriodicalId":350490,"journal":{"name":"6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07)","volume":"213 3-4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121333625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This article presents a semi-automatic segmentation of the fibrous liver tissue in the in-vivo liver biopsy color images. The segmentation is performed using a tree-based classifier, with decision rules as tree leaves and binary operators (AND, OR) as tree nodes. Several image's local characteristics have been exploited, based on the image points' intensity levels, as well as taken from the texture analysis domain (fractal dimension, FFT, Gabor filters). Their effectiveness concerning quality of extraction has been compared using real clinical images with a manual delimitation given by physicians, as a reference. A user friendly application has been developed which enables the operator to interactively create and store the classifiers. It also offers to a physician a predefined set of the best found classifiers, to allow him an effective work in his every-day practice. The method is semi-automatic - it still leaves to the operator, beside the classifier choice, a possibility to manually (with the mouse) adjust the main parameter (s) which visually, on the fly, grows/shrinks the extracted fibrous region.
{"title":"Semi-Automatic Segmentation of Fibrous Liver Tissue","authors":"P. Andruszkiewicz, C. Boldak, J. Jaroszewicz","doi":"10.1109/CISIM.2007.57","DOIUrl":"https://doi.org/10.1109/CISIM.2007.57","url":null,"abstract":"This article presents a semi-automatic segmentation of the fibrous liver tissue in the in-vivo liver biopsy color images. The segmentation is performed using a tree-based classifier, with decision rules as tree leaves and binary operators (AND, OR) as tree nodes. Several image's local characteristics have been exploited, based on the image points' intensity levels, as well as taken from the texture analysis domain (fractal dimension, FFT, Gabor filters). Their effectiveness concerning quality of extraction has been compared using real clinical images with a manual delimitation given by physicians, as a reference. A user friendly application has been developed which enables the operator to interactively create and store the classifiers. It also offers to a physician a predefined set of the best found classifiers, to allow him an effective work in his every-day practice. The method is semi-automatic - it still leaves to the operator, beside the classifier choice, a possibility to manually (with the mouse) adjust the main parameter (s) which visually, on the fly, grows/shrinks the extracted fibrous region.","PeriodicalId":350490,"journal":{"name":"6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122049087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
One of the most vital problems of free-text document processing is the curse of dimensionality. The paper presents a dimensionality reduction algorithm based on informed feature selection. Terms describing the document are based on histogram-like statistics which can be computed as well as incrementally updated at low complexity. The document representation can adapt to changing document collection characteristics. Along with the fundamental concepts we present an empirical verification of the approach.
{"title":"Histogram-Based Dimensionality Reduction of Term Vector Space","authors":"K. Ciesielski, M. Kłopotek, S. Wierzchon","doi":"10.1109/CISIM.2007.35","DOIUrl":"https://doi.org/10.1109/CISIM.2007.35","url":null,"abstract":"One of the most vital problems of free-text document processing is the curse of dimensionality. The paper presents a dimensionality reduction algorithm based on informed feature selection. Terms describing the document are based on histogram-like statistics which can be computed as well as incrementally updated at low complexity. The document representation can adapt to changing document collection characteristics. Along with the fundamental concepts we present an empirical verification of the approach.","PeriodicalId":350490,"journal":{"name":"6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127831379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An ad-hoc network is a self-supporting collection of mobile nodes that happen to exist within a close proximity in an interval of time. In this paper, a reactive routing protocol has been proposed that computes the shortest path in between any source-destination pair on demand. The approach, unlike other reactive protocols, finds a loop-free, optimal path between the end nodes. It does not use broadcasting like DSR or some other reactive protocols. In fact ORRP exchanges only (n-1) control packets, in the best case. A comparative performance evaluation establishes the advantages of ORRP. The paper is a substantial extension of our earlier work reported in [S. Dulta et al., 2006].
ad-hoc网络是一种自支持的移动节点集合,这些节点碰巧在一段时间内存在于距离很近的地方。本文提出了一种响应式路由协议,根据需要计算任意源-目的对之间的最短路径。与其他响应式协议不同,该方法在终端节点之间找到无环路的最优路径。它不像DSR或其他一些响应式协议那样使用广播。事实上,在最好的情况下,ORRP只交换(n-1)个控制数据包。一项比较绩效评估确立了ORRP的优势。该论文是我们在[S.]报告的早期工作的实质性扩展。Dulta et al., 2006]。
{"title":"ORRP: Optimal Reactive Routing Protocol for Mobile Ad-Hoc Networks","authors":"N. Chaki, R. Chaki","doi":"10.1109/CISIM.2007.55","DOIUrl":"https://doi.org/10.1109/CISIM.2007.55","url":null,"abstract":"An ad-hoc network is a self-supporting collection of mobile nodes that happen to exist within a close proximity in an interval of time. In this paper, a reactive routing protocol has been proposed that computes the shortest path in between any source-destination pair on demand. The approach, unlike other reactive protocols, finds a loop-free, optimal path between the end nodes. It does not use broadcasting like DSR or some other reactive protocols. In fact ORRP exchanges only (n-1) control packets, in the best case. A comparative performance evaluation establishes the advantages of ORRP. The paper is a substantial extension of our earlier work reported in [S. Dulta et al., 2006].","PeriodicalId":350490,"journal":{"name":"6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127146062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}