This paper presents an approach of using image contour recognition in the navigation for enterprise geographic information systems (GIS). The extraction of object mark images is based on some morphological structural patterns which are described by morphological structural points, contour property, and other geometrical data in a binary image of enterprise geographic information map. Some preprocessing methods, contour smooth following, linearization and extraction patterns of structural points, are introduced. If a focus point of a map is selected, based on the extracted object mark image, a dynamic layout and navigation diagram is constructed, which consists of three underlying views: a graph navigation view, an image layout view, and an enterprise information view. In the diagram each object mark image is represented by a node, the relation information between two nodes is represented by an edge. If a node is selected, the new dynamic layout and navigation diagram is found based on the extracted object mark images around the selected node, which contains the relation with the previous diagram. Therefore a dynamic layout adjustment and navigation for enterprise GIS is determined.
{"title":"Using image contour recognition in GIS navigation","authors":"Wei Lai, Donggang Yu, J. Tanaka, Cai Fei","doi":"10.1109/ICITA.2005.297","DOIUrl":"https://doi.org/10.1109/ICITA.2005.297","url":null,"abstract":"This paper presents an approach of using image contour recognition in the navigation for enterprise geographic information systems (GIS). The extraction of object mark images is based on some morphological structural patterns which are described by morphological structural points, contour property, and other geometrical data in a binary image of enterprise geographic information map. Some preprocessing methods, contour smooth following, linearization and extraction patterns of structural points, are introduced. If a focus point of a map is selected, based on the extracted object mark image, a dynamic layout and navigation diagram is constructed, which consists of three underlying views: a graph navigation view, an image layout view, and an enterprise information view. In the diagram each object mark image is represented by a node, the relation information between two nodes is represented by an edge. If a node is selected, the new dynamic layout and navigation diagram is found based on the extracted object mark images around the selected node, which contains the relation with the previous diagram. Therefore a dynamic layout adjustment and navigation for enterprise GIS is determined.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129395212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Intrusion detection systems (IDS) have become widely used tools for ensuring system and network security. Among many other challenges, contemporary IDS have to cope with increasingly higher bandwidths, which sometimes force them to let some data go by without being checked for possible malicious activity. This paper presents a novel method to improve the performance of IDS based on multimedia traffic classification. In the proposed method, the IDS has additional knowledge about common multimedia file formats and uses this knowledge to perform a more detailed analysis of packets carrying that type of data. If the structure and selected contents of the data are compliant, the corresponding stream is tagged accordingly, and the IDS is spared from further work on that stream. Otherwise, an anomaly is detected and reported. Our experiments using Snort confirm that this additional specialized knowledge results in substantial computational savings, without significant overhead for processing non-multimedia data
{"title":"A Multimedia Traffic Classification Scheme for Intrusion Detection Systems","authors":"Oge Marques, Pierre Baillargeon","doi":"10.1109/ICITA.2005.28","DOIUrl":"https://doi.org/10.1109/ICITA.2005.28","url":null,"abstract":"Intrusion detection systems (IDS) have become widely used tools for ensuring system and network security. Among many other challenges, contemporary IDS have to cope with increasingly higher bandwidths, which sometimes force them to let some data go by without being checked for possible malicious activity. This paper presents a novel method to improve the performance of IDS based on multimedia traffic classification. In the proposed method, the IDS has additional knowledge about common multimedia file formats and uses this knowledge to perform a more detailed analysis of packets carrying that type of data. If the structure and selected contents of the data are compliant, the corresponding stream is tagged accordingly, and the IDS is spared from further work on that stream. Otherwise, an anomaly is detected and reported. Our experiments using Snort confirm that this additional specialized knowledge results in substantial computational savings, without significant overhead for processing non-multimedia data","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129589527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Reconstructing 3D models from 2D images is an important problem in visualization, particularly in medical and biological visualization. We present a new algorithm for 3D model reconstruction from 2D-images. In our approach, a 3D atlas is deformed to fit the feature data set in the target images. Compared with existing 3D reconstruction techniques, our approach is more efficient and easier to control. The resultant model has good inherent connectivity and smoothness. The resolution of the final model is determined by the resolution of reference model rather than the dataset. The model generates highly detailed view with a limited number of images. This algorithm has been successfully applied to medical simulation.
{"title":"A 3D reconstruction algorithm based on 3D deformable atlas","authors":"Ying Zhu, S. Belkasim","doi":"10.1109/ICITA.2005.3","DOIUrl":"https://doi.org/10.1109/ICITA.2005.3","url":null,"abstract":"Reconstructing 3D models from 2D images is an important problem in visualization, particularly in medical and biological visualization. We present a new algorithm for 3D model reconstruction from 2D-images. In our approach, a 3D atlas is deformed to fit the feature data set in the target images. Compared with existing 3D reconstruction techniques, our approach is more efficient and easier to control. The resultant model has good inherent connectivity and smoothness. The resolution of the final model is determined by the resolution of reference model rather than the dataset. The model generates highly detailed view with a limited number of images. This algorithm has been successfully applied to medical simulation.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128062938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The proposed neural network controller (NNC) is for user/server level dynamic buffer tuning. It eliminates overflow by making the buffer length always cover the queue length adaptively on the fly. The NNC and the AQM (active queue management) mechanism(s) at the system/router level together form a unified buffer overflow prevention solution for the TCP channels. The NNC provides the following advantages: a) it prevents the AQM resources dished out already at the system level from being wasted, b) it shortens the service roundtrip time (RTT) by eliminating the chance of retransmission due to user-level overflow, and c) it alleviates network congestion. The NNC operates by the {0,/spl Delta/}/sup 2/ objective function and the principle is to maintain the given /spl Delta/ safety margin about the reference point symbolically represented by the "0" in {0,/spl Delta/}/sup 2/. The NNC stability and precision are traffic pattern independent for its statistical nature. This independence makes the NNC immensely suitable for Internet applications because Internet traffic can be LRD (long-range dependence), SRD (short-range dependence) or multifractal, and switch suddenly.
{"title":"A novel traffic independent NNC for dynamic buffer tuning to shorten the RTT of a TCP channel","authors":"Wilfred W. K. Lin, Allan K. Y. Wong, T. Dillon","doi":"10.1109/ICITA.2005.39","DOIUrl":"https://doi.org/10.1109/ICITA.2005.39","url":null,"abstract":"The proposed neural network controller (NNC) is for user/server level dynamic buffer tuning. It eliminates overflow by making the buffer length always cover the queue length adaptively on the fly. The NNC and the AQM (active queue management) mechanism(s) at the system/router level together form a unified buffer overflow prevention solution for the TCP channels. The NNC provides the following advantages: a) it prevents the AQM resources dished out already at the system level from being wasted, b) it shortens the service roundtrip time (RTT) by eliminating the chance of retransmission due to user-level overflow, and c) it alleviates network congestion. The NNC operates by the {0,/spl Delta/}/sup 2/ objective function and the principle is to maintain the given /spl Delta/ safety margin about the reference point symbolically represented by the \"0\" in {0,/spl Delta/}/sup 2/. The NNC stability and precision are traffic pattern independent for its statistical nature. This independence makes the NNC immensely suitable for Internet applications because Internet traffic can be LRD (long-range dependence), SRD (short-range dependence) or multifractal, and switch suddenly.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131309997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Multi-carrier direct sequence code division multiple access (MC/DS CDMA) technique is one of the optimum technique for the reverse link mobile transmission. However, because of multi-carrier property, large PAPR (peak to average ratio) may be generated in MC/DS CDMA system. In this paper, DFT spreading code is applied to reduce high PAPR efficiently. As results, about 6 dB PAPR can be achieved at CCDF of 10 -3 in the MC/DS CDMA system with 12 data carriers. SER performance can be improved significantly compared with conventional MC/DS CDMA system with nonlinear HPA
{"title":"PAPR Reduction in MC/DS CDMA System by DFT Spreading Codes","authors":"Yingshan Li, Ju-Hyun Kyung, Jong-Won Son, H. Ryu","doi":"10.1109/ICITA.2005.205","DOIUrl":"https://doi.org/10.1109/ICITA.2005.205","url":null,"abstract":"Multi-carrier direct sequence code division multiple access (MC/DS CDMA) technique is one of the optimum technique for the reverse link mobile transmission. However, because of multi-carrier property, large PAPR (peak to average ratio) may be generated in MC/DS CDMA system. In this paper, DFT spreading code is applied to reduce high PAPR efficiently. As results, about 6 dB PAPR can be achieved at CCDF of 10 -3 in the MC/DS CDMA system with 12 data carriers. SER performance can be improved significantly compared with conventional MC/DS CDMA system with nonlinear HPA","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121605402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xin-Yi Tsai, Yu-Ju Chen, Huang-Chu Huang, Shang-Jen Chuang, R. Hwang
In this paper, the signal recognition by using quantum neural network (QNN) is studied and simulated. The signals with fuzziness distributed in the boundary of two different types of signals could be effectively recognized due to the structure of QNN's hidden units. To demonstrate the capability of QNN in recognition, the signals in a two-dimension (NC2) non-convex system is simulated. All the experiments are also performed by using the traditional neural network (NN) for a comparison.
{"title":"Quantum NN vs. NN in signal recognition","authors":"Xin-Yi Tsai, Yu-Ju Chen, Huang-Chu Huang, Shang-Jen Chuang, R. Hwang","doi":"10.1109/ICITA.2005.228","DOIUrl":"https://doi.org/10.1109/ICITA.2005.228","url":null,"abstract":"In this paper, the signal recognition by using quantum neural network (QNN) is studied and simulated. The signals with fuzziness distributed in the boundary of two different types of signals could be effectively recognized due to the structure of QNN's hidden units. To demonstrate the capability of QNN in recognition, the signals in a two-dimension (NC2) non-convex system is simulated. All the experiments are also performed by using the traditional neural network (NN) for a comparison.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115797952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ying-Hong Wang, Jenhui Chen, Chih-Feng Chao, Chien-Min Lee
Mobile ad hoc networks (MANETs) enable all mobile nodes to communicate each other without base stations or access points, and the transfer of data packets is completed through the relay among all mobile nodes. However, a MANET is a self-organizing and adaptive wireless network formed by the dynamic gathering of mobile nodes, and the topology of a MANET frequently changes. To cope with the intrinsic properties of MANETs, a transparent cache-based mechanism is proposed in this paper. With the aid of the mechanism, the repetition of data and data path occurring in a MANET could be cached in some special mobile nodes. Routes and time span to access data are therefore shortened, and the data reusable rate is enhanced to reduce the use of bandwidth and the power consumption of battery
{"title":"A Transparent Cache-Based Mechanism for Mobile Ad Hoc Networks","authors":"Ying-Hong Wang, Jenhui Chen, Chih-Feng Chao, Chien-Min Lee","doi":"10.1109/ICITA.2005.47","DOIUrl":"https://doi.org/10.1109/ICITA.2005.47","url":null,"abstract":"Mobile ad hoc networks (MANETs) enable all mobile nodes to communicate each other without base stations or access points, and the transfer of data packets is completed through the relay among all mobile nodes. However, a MANET is a self-organizing and adaptive wireless network formed by the dynamic gathering of mobile nodes, and the topology of a MANET frequently changes. To cope with the intrinsic properties of MANETs, a transparent cache-based mechanism is proposed in this paper. With the aid of the mechanism, the repetition of data and data path occurring in a MANET could be cached in some special mobile nodes. Routes and time span to access data are therefore shortened, and the data reusable rate is enhanced to reduce the use of bandwidth and the power consumption of battery","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122915540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we propose a multi-expert seal imprint verification system. The system has been specifically designed for applications in the Japanese bank check processing. A difficult problem encountered in automatic seal imprint verification is that the system is required an extremely low error rate despite of using a small number of reference data for training. To conquer this problem, it combines two different algorithms for seal imprint verification. A seal imprint is first extracted from bank check image based on color features. The first verification algorithm is based on a method using local and global features of seal imprint. The second algorithm uses a special correlation based on a global approach. The two algorithms are combined in the multi-expert system by a voting strategy. Experimental results showed that the combination of the two algorithms improves significantly the verification performance both on "false-acceptance error rate" and "false-rejection error rate".
{"title":"Automatic seal imprint verification system for bank check processing","authors":"K. Ueda, Ken'ichi Matsuo","doi":"10.1109/ICITA.2005.81","DOIUrl":"https://doi.org/10.1109/ICITA.2005.81","url":null,"abstract":"In this paper, we propose a multi-expert seal imprint verification system. The system has been specifically designed for applications in the Japanese bank check processing. A difficult problem encountered in automatic seal imprint verification is that the system is required an extremely low error rate despite of using a small number of reference data for training. To conquer this problem, it combines two different algorithms for seal imprint verification. A seal imprint is first extracted from bank check image based on color features. The first verification algorithm is based on a method using local and global features of seal imprint. The second algorithm uses a special correlation based on a global approach. The two algorithms are combined in the multi-expert system by a voting strategy. Experimental results showed that the combination of the two algorithms improves significantly the verification performance both on \"false-acceptance error rate\" and \"false-rejection error rate\".","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121339776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Iris feature extraction is the crucial stage of the whole iris recognition process for personal identification. A brief survey is made firstly in this paper on the methods that feasibly implemented in iris feature extraction. Because the iris capture devices in use are mostly exposed to the natural scene, so the natural illumination or other variant conditions sometimes can greatly influence the iris images captured and further impact the recognition result. Out of this consideration, we made some experimental try to extract the iris feature using the 2D phase congruency, which invariant to changes in intensity or contrast, to try to avoid those problems
{"title":"Iris Feature Extraction Using 2D Phase Congruency","authors":"Xiaoyan Yuan, P. Shi","doi":"10.1109/ICITA.2005.166","DOIUrl":"https://doi.org/10.1109/ICITA.2005.166","url":null,"abstract":"Iris feature extraction is the crucial stage of the whole iris recognition process for personal identification. A brief survey is made firstly in this paper on the methods that feasibly implemented in iris feature extraction. Because the iris capture devices in use are mostly exposed to the natural scene, so the natural illumination or other variant conditions sometimes can greatly influence the iris images captured and further impact the recognition result. Out of this consideration, we made some experimental try to extract the iris feature using the 2D phase congruency, which invariant to changes in intensity or contrast, to try to avoid those problems","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126941413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we propose the use of layered forward error correction (FEC) as an error control mechanism in a layered video protocol known as "SPLIT". By organizing FEC into multiple layers, a receiver can obtain different level of protection with respect to the channel capacity. By effectively dropping data layers, overall effective bandwidth can also be achieved. In our work, we integrated Reed-Solomon based FEC error control into SPLIT protocol, which is a priority based protocol. We used NS-2 simulator to evaluate FEC on SPLIT protocol and the results show that the video quality can be significantly improved at the same communication rate when layered FEC is used
{"title":"Multimedia Multicast Using SPLIT and Layered FEC","authors":"N. Chilamkurti, B. Soh","doi":"10.1109/ICITA.2005.185","DOIUrl":"https://doi.org/10.1109/ICITA.2005.185","url":null,"abstract":"In this paper, we propose the use of layered forward error correction (FEC) as an error control mechanism in a layered video protocol known as \"SPLIT\". By organizing FEC into multiple layers, a receiver can obtain different level of protection with respect to the channel capacity. By effectively dropping data layers, overall effective bandwidth can also be achieved. In our work, we integrated Reed-Solomon based FEC error control into SPLIT protocol, which is a priority based protocol. We used NS-2 simulator to evaluate FEC on SPLIT protocol and the results show that the video quality can be significantly improved at the same communication rate when layered FEC is used","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127196708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}