The proceedings contains 160 papers from the internationalconference on informationtechnology. The topics discussed include: performance evaluation of block-based motion estimation algorithms and distortion measures...
详细信息
ISBN:
(纸本)0769521088
The proceedings contains 160 papers from the internationalconference on informationtechnology. The topics discussed include: performance evaluation of block-based motion estimation algorithms and distortion measures;language model-based retrieval for farsi documents;a framework for trajectory based visual event retrieval;detecting anomalies in high-performance parallel programs;grid workflow based on dynamic modeling and scheduling;and extensible communication architecture for grid nodes.
Perfect phylogeny is one of the most popular character-based models. This model assumes the states of the characters are discrete. Although it provides a simple abstraction of characters, valuable information could be...
详细信息
ISBN:
(纸本)0769523153
Perfect phylogeny is one of the most popular character-based models. This model assumes the states of the characters are discrete. Although it provides a simple abstraction of characters, valuable information could be lost during the discretization of the experimental data. Indeed, fuzzy boundaries between species and degrees of character development are commonly found in nature. Therefore, we proposed the fizzy perfect phylogeny model that extends the perfect phylogeny model to allow for a fuzzy membership of the characters. The properties of this model, such as uniqueness and backward compatibility, were then shown. We also showed how the fuzzy perfect phylogeny problem can be transformed to the perfect phylogeny problem in O(mv) time where m is the number of objects and v is the number of distinct value of characters. As a result, valuable information from the experimental data can be used without substantially increase the problem complex.
With increasing amount of text data being stored in the compressed format, efficient information retrieval in the compressed domain has become a major concern. Being able to randomly access the compressed data is high...
详细信息
ISBN:
(纸本)0769521088
With increasing amount of text data being stored in the compressed format, efficient information retrieval in the compressed domain has become a major concern. Being able to randomly access the compressed data is highly desirable for efficient retrieval and is required in many applications. For example, in a library information retrieval system, only the records that are relevant to the query are displayed. We present modified LZW algorithms that support fast random access to the compressed text. Instead of fully decompressing the text and outputing the results selectively, we allow random access and partial decoding of the compressed text and displaying the relevant portion. The compression ratio can also be improved using the modified LZW algorithm. Preliminary results on the time and storage performance are given.
In this paper it is presented the state-of-the-art in fieldbus technology, according with the authors' particular experience, giving diverse points of view about the necessary skills for using development tools an...
详细信息
ISBN:
(纸本)0769521088
In this paper it is presented the state-of-the-art in fieldbus technology, according with the authors' particular experience, giving diverse points of view about the necessary skills for using development tools and involved electronic devices, currently present in the training market. Given its growing impact all over automotive industry, an introduction about the CAN fieldbus is presented, along with the software and hardware tools that configure training environments for this protocol. Following the two different CAN nodes developed currently by the authors, using the aforementioned tools, are presented. Finally, future developments with great potential in the education of IT engineers, and fieldbus training applied to automotive industry and others, are also mentioned.
The Intrusion Detection System architecture commonly used in commercial and research systems have a number of problems that limit their configurability, scalability or efficiency. In this paper, two machine-learning p...
详细信息
ISBN:
(纸本)0769521088
The Intrusion Detection System architecture commonly used in commercial and research systems have a number of problems that limit their configurability, scalability or efficiency. In this paper, two machine-learning paradigms, Artificial Neural Networks and Fuzzy Inference System, are used to design an Intrusion Detection System. SNORT is used to perform real time traffic analysis and packet logging on IP network during the training phase of the system. Then a signature pattern database is constructed using protocol analysis and Neuro-Fuzzy learning method. Using 1998 DARPA Intrusion Detection Evaluation Data and TCP dump raw data, the experiments are deployed and discussed.
In this paper, we present two techniques. The first technique called Privacy Sensitive information dilUtin Mechanism (PSIUM) is able to prevent the misuse of data by a service provider by using a mixture of true and f...
详细信息
ISBN:
(纸本)0769523153
In this paper, we present two techniques. The first technique called Privacy Sensitive information dilUtin Mechanism (PSIUM) is able to prevent the misuse of data by a service provider by using a mixture of true and false sensor data. The second technique protects privacy sensitive information from being revealed to an attacker through traffic analysis by using a combination of frequently changing pseudonyms and dummy traffic.
A huge quantity of Earth Observation and geospatial data is produced daily by numerous satellites launched by several worldwide space agencies. The Processing of remote sensing data requires several steps, some of whi...
详细信息
ISBN:
(纸本)0769521088
A huge quantity of Earth Observation and geospatial data is produced daily by numerous satellites launched by several worldwide space agencies. The Processing of remote sensing data requires several steps, some of which are computationally intensive. The extraction of prominent information from remote sensing data requires a coordinated use of many applications and algorithms. Sharing computational resources among different scientists represents the sole way to approach the problem in order to achieve good performance. In this paper, we describe a Problem Solving Environment for remote sensing data processing layered on grid technologies. The proposed architecture allows sharing resources among different organizations taking into account each access policy defined by the owner of the resource.
Mobile ad hoc networks (MANETs) are collections of autonomous mobile nodes with links that are made or broken in an arbitrary way. They have no fixed infrastructure and may have constrained resources. The next generat...
详细信息
ISBN:
(纸本)0769521088
Mobile ad hoc networks (MANETs) are collections of autonomous mobile nodes with links that are made or broken in an arbitrary way. They have no fixed infrastructure and may have constrained resources. The next generation of IT applications is expected to rely heavily on such networks. However before they can be successfully deployed several security threats must be addressed. These are mainly due to the ad hoc nature of these networks. Consequently it may be much harder (or even impossible) to establish routing communication paths that can tolerate malicious faults. In this paper we first propose a general Bayesian model that satisfies the basic mobility requirements of a MANET and define the requirements for secure communication in this model. We then consider several multipath routing schemes and propose a new adaptive multipath routing algorithm that satisfies our security requirements.
This paper proposes a non-scanning display digital algorism both for still and moving picture. This innovative method is independent of display device or camera/transmission hardware configuration limited by the numbe...
详细信息
ISBN:
(纸本)076951507X
This paper proposes a non-scanning display digital algorism both for still and moving picture. This innovative method is independent of display device or camera/transmission hardware configuration limited by the number of scanning lines. The concept is the realization of effective image data transmission to display devices that is a change in the deviation of image is converted as digital bits data.
This paper presents a semi-parallel architecture for decoding Low Density Parity Check (LDPC) codes. A modified version of Min-Sum algorithm has been used which has the advantage of simpler computations compared to Su...
详细信息
ISBN:
(纸本)0769521088
This paper presents a semi-parallel architecture for decoding Low Density Parity Check (LDPC) codes. A modified version of Min-Sum algorithm has been used which has the advantage of simpler computations compared to Sum-Product algorithm without any loss in performance. Special structure of the parity check matrix of the proposed code leads to an efficient semi-parallel implementation of the decoder for a family of (3, 6) LDPC codes. A prototype architecture has been implemented in VHDL on programmable hardware. The design is easily scalable and reconfigurable for larger block sizes. Simulation results show that our proposed decoder for a block length of 1536 bits can achieve data rates up to 127 Mbps.
暂无评论