Skip to main content

Über dieses Buch

This volume constitutes the refereed proceedings of the International Conferences, FGCN and DCA 2012, held as part of the Future Generation Information Technology Conference, FGIT 2012, Kangwondo, Korea, in December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of future generation communication and networking, and digital contents and applications.



Carrier Aggregation Receiver with Beamformer and Compensation of Doppler Effects and Timing Offset

Due to limitations in sampling capabilities for high frequency systems, the universal receiver at this time cannot sample the incoming signals just after a RF stage process. As one way, using sub-sampling technique can convert multi-band signals from RF band to IF band without oscillators. But as the filter performance in RF bands, signals converted to low bands possibly cause interference and degrade performances. In this paper, we extend a sub-sampling method to the case of multi-band receiver using pre-FFT beamformer, and a new approach is proposed to avoid interference by TDM method. The purpose of designing the pre-FFT beamformer is to coherently combine the desired signals and suppress the undesired signals so that it is able to provide medium to high gains in a mobile environment. Simulation results show that after compensating the Doppler effects and timing offset the approach works effectively and we can get optimal performances in the multi-band receiver.

Xin Wang, Heung-Gyoon Ryu

Source Localization for Uniform Noise Maximum Likelihood Estimation Method and Iterative Algorithm Based on AOA

maximum likelihood estimation(MLE) method and iterative algorithm based on Uniform noise ,which is the same for every sensor in the network, for localizing a source based on angle of arrival (AOA) measurements are presented. We compare MLE iterative method along with least squares estimation(LSE) approach through a number of simulations at various signal to noise levels and target to localization. We find that MLE iterative algorithm is less error and more robust to noise disturbance than LSE method.

An Qin-li, Chen Jian-feng, Yin Zhong-hai

Design and Implementation of Resource Management Tool for Virtual Machine

To support real time task in a virtual machine, hypervisor have to monitor system resource and provide exact resource for real time task. There are several monitor tools running on virtual machine, however, it has limitations on supporting detailed information for monitoring real time workload, performance degradation and difficult for controlling user interface. In this work, we proposed a resource monitoring and feedback tool for Xen virtual machine called XMM. XMM provides accurate resource monitoring in a hypervisor level without incurring much overhead. We also provide a GUI based control tool adjusting system resources based on user intervention, which can be useful in a multimedia system where user preference is important. XMM shows lots of information reflecting system behavior and it can give scheduling feedback for handling real time task. We believe XMM can be a useful tool for Xen virtual machine for various purposes.

Byung Ki Kim, Young Jun Yoo, Chuck Yoo, Young Woong Ko

Data Link Layer’ Security Analysis for Wireless Sensor Networks

Nowadays, the most exciting and challenging research domain remains Wireless Sensor Networks due to their rapidly progress in Information and Communication Technology. Follow-on different debates over the most effective means of securing wireless sensor networks, the intent of this paper is to investigate the security issues and challenges as well as solutions in WSN. Authentication is the primary focus, as the most malicious attacks on a network are the work of imposters, such as DOS attacks. Nevertheless, the data link layer is not spared, in this paper we emphasized on it for the reason that it handles everything within one hop such as the media access control (MAC), the error control (EC) and the power control (PC) while the link layer specifies the handshakes and handles retransmissions.

Ndibanje Bruce, Tae-Yong Kim, Hoon Jae Lee

Design and Implementation of Packet Analyzer for IEC 61850 Communication Networks in Smart Grid

In the aspect of stable operation for smart grid, the combination of communication technology is an important component. This paper proposes the design and implementation of a packet analyzer dedicated to IEC 61850 for effectively analyzing standard protocols for IEC 61850 communication networks. A substation automation system consists of a station, bay, and process level. Since the amount of packets is massive in IEC 61850, we need to develop a packet analyzer for analyzing communications between the substation automation system server and client, which demands real-time operation and high reliability. Our packet analyzer is implemented with FLA (fast later access) and DPI (deep packet inspection) features as a network application analyzing only IEC 61850 communication protocols. The experimental results show that our packet analyzer outperforms the existing Wireshark program significantly in terms of the packet analysis time.

Changhun Lee, Myungoh Park, Jiyoung Lee, Inwhee Joe

An Efficient AP Selection Scheme for Wireless Distributed Systems

In this paper, we propose an efficient access point (AP) selection scheme for wireless multi-hop networks. Some previous IEEE 802.11 studies have used multi-hop techniques to solve the shadow region and to cover the wide region in the area where the AP is deployed. However, users employing these techniques are unable to determine which AP is more efficient among the number of APs in the wireless multi-hop networks. In addition, it is very difficult to capture the status of the current channel using only the received signal strength indication (RSSI) in the existing AP selection scheme. Therefore, in this paper, we propose a new AP selection algorithm with the hop count for wireless multi-hop networks. We built a wireless distributed system (WDS) that can be easily constructed as a wireless multi-hop network without expert knowledge. Then, we measured the throughput and evaluated the performance of our AP selection scheme in UDP Downlink and UDP Uplink. Based on the results of our measurements, our AP selection scheme can increase the performance of all stations in wireless multi-hop networks.

Seok-woo Hong, Min Choi, Namgi Kim

Call Admission Control Satisfying Delay Constraint for Machine-to-Machine Communications in LTE-Advanced

Complex and large systems such as smart grid and intelligent transportation systems consist of a large number of sensors, actuators and controllers. Hence machine–to–machine (M2M) communications between them are essential for full automatic control of the systems. The M2M communications is typical in the sense that it involves an enormous number of machine–type–communication (MTC) devices and data traffic patterns as well as QoS requirements vary widely depending on applications. LTE–Advanced of 3GPP is preparing a list of supportive functions for the M2M communications. To this end, a massive admission control scheme for the M2M communications was proposed. However, it poorly handles the call admission requests when the transmission interval of a device is relatively longer than its delay constraint, resulting in higher call blocking probability. This paper proposes a method that is free from such limitation and furthermore can reduce the computational overhead required for determining the call admission as long as the transmission interval and the delay meet certain conditions. The improvement in the call blocking probability and the proofs that the proposed method can satisfy the delay constraint were provided along with the simulation results.

Kyungkoo Jun

A Trustworthy and Interoperable Identity Authentication Sharing Architecture

Identity authentication sharing technologies which allow many service providers to share the result of identity authentication of an identity provider receive high attention as alternatives for current problematic identity authentications in the future Internet environment, owing to their advantages including high usability, cost effectiveness of service providers, and privacy protection. However, in order for the identity authentication sharing technologies to be widely deployed in global Internet scale, the interoperability problem among the different identity authentication sharing protocols and the trustworthiness issue among the participating identity providers, service providers, and users should be resolved in advance. This paper firstly analyzes current status of the protocol interoperability issue and existing trust frameworks for identity authentication sharing. And then, based on the result of analysis, this paper proposes a trustworthy and interoperable identity authentication sharing architecture for future global Internet.

Seungchul Park

Model-Based Evaluation Approach for Quality of Web Service

With the increasing number of web services that provide similar functionality, it is important to find the best web service that meets the user’s needs. In this sense, it is essential to use metrics to evaluate the quality characteristics of web services. This paper proposes a pentagram model for evaluating Quality of Web Service (QoWS). The model consists of five factors, including price, latency, accessibility, accuracy, and reputation. The experimental results demonstrate that our approach can effectively obtain accurate quality of service evaluation for web services.

Yan Gong, Lin Huang, Zhiyong Shu, Ke Han

Practical Multi-party Versions of Private Set Intersection Protocols with Hardware Tokens

The objective of the private set intersection (PSI) protocol is that the participants want to compute the intersection based on their private input sets without revealing to another party any additional information about their respective sets. Several protocols for PSI have been proposed. In this paper we focus on the practical symmetric-key based PSI protocols using the hardware tokens, and extend the 2-party PSI protocols of [7] and [5] to the


-party versions where


 > 2 by adopting the untrusted third party model. Our protocols achieve the same level of security as the original 2-party protocols, and are very efficient compared with the prior general framework.

Ju-Sung Kang, Ok-Yeon Yi, Min-Ku Kim, Ku-Young Chang

Design and Implementation of a Signaling Protocol to Transmit UHDTV Contents in the Cable Broadcast Network

ltra high-definition television (UHDTV) is suggested as a next generation television technology beyond high-definition television (HDTV). In this paper, we propose the signaling protocol to transmit large-capacity UHDTV contents in the current cable broadcast network. The signaling protocol based on an in-band signaling is designed to minimize the change of the current cable network architecture. To send the channel bonding information from the headend to STBs, three kinds of 36 bits signaling message are designed. We describe procedures of the headend and the STB to serve UHDTV contents. In order to evaluate the performance of proposed signaling protocol, we implement a testbed system, which consists of a frame classifier, a frame merger, 1024-QAM transmitter/receiver, MPEG-2 TS Generator, and monitoring S/Ws. According to the testbed system, we can ascertain that 200Mbps UHDTV contents are successfully transmitted via four bonded channel.

Sunsik Roh, Sunghoon Kim

A New Group Key Rekeying with Homomorphic Encryption

Secure group communication enables only authorized group members to communicate securely with each other by means of group key. Because group membership can be changed frequently due to joining or leaving of members, a scalable group key rekeying is essential to preserve security. In this paper we present a new group key scheme based on homomorphic encryption. Compared with the previous schemes, our scheme improves scalability by reducing the number of multicasted keys for rekeying.The abstract should summarize the contents of the paper.

Heeyoul Kim

Spatially Smoothed Second Order DOA Estimator for Correlated Signals in the Presence of Correlated Antenna Noises

An array signal processing methodologies can provide the high resolution of a signal direction of arrival (DOA) estimation, thanks to their conceptual increase of signal-to-noise ratio (S/N). Exploring the eigen-structure based algorithms such as MUSIC, Root MUSIC, etc, gives efficient DOA results when the multiple signals are incoherent. A class of Spatial Smoothing (SS) algorithms spatially break the correlation of coherent signals using spatially distributed overlapping sub-arrays. On the other hand, Second Order (SO) algorithm has been proven to de-correlate correlated antenna noises with known or estimated noise correlation coefficients. In this paper, Spatially SmoothedSecond Order (SS-SO) algorithm, which is made by combining SS algorithm with SO technique, is proposed to resolve efficiently correlated multiple signals in the environment of correlated noise fields. Furthermore, the simulations are performed and analyzed to show that the proposed algorithm gives robust DOA results in several aspects.

Ill-Keun Rhee, Hee-Soo Kim, Hun-Jong Lee

An Analysis of Smartphone Power Dissipation by Use Cases

The spreading use of Smartphones stimulates growth of mobile computing. However, mobile computing through smartphones poses challenges due to its intrinsic nature of battery capacity, constraints of wireless networks and device limitation. In this research, we provide the analysis of smartphone power dissipation under two different point of views, usage scenarios and smartphone components. In general, smartphones have various components. We develop a queuing model for power analysis so that we can analyze the power dissipation on different components, and analyze battery lifetime with different usage behaviors.

Min Choi, Namgi Kim

Skype Chat Data Forgery Detection

Internet-based communication technologies are very widespread in recent years. Unfortunately, while the number of technologies such as Skype, Windows Live messenger, Yahoo messenger, QQ implicated in crime activities is relevant and growing, the capability to perform forgery detection of such technologies is limited. Skype is a kind of deployed application by using SQLite. Using SQLite database to store voice data, instant messaging, audio conferencing, and file transfer. Nowadays several GUI editors for SQLite database are developed. The main goal of these editor tools is to allow non-technical users to create, modify and edit SQLite database files. This paper presents an analysis of SQLite database features exploited in order to forge data and a method to detect forgery data using these exploits.

Szu-Yuan Teng, Yu-Li Lin

Self-synchronized and Energy-Aware Duty Cycle Control Algorithm in Energy-Harvested Wireless Sensor Networks

The energy harvesting is suggested and studied as the solution for energy constraint in wireless sensor network. In this paper, we propose a new duty cycle control algorithm in wireless sensor network with energy harvesting capability. This algorithm is designed to provide self-synchronization of a sensor and a system as they are concurrently activated during harvesting energy or at upper level of battery, and to guarantee the energy neutral operation of a sensor or a system. In order to achieve this purpose, we propose a neighbor discovery mechanism, a self-synchronization control mechanism and an energy model. We perform simulation with diverse parameters. From the results of simulations, we may ascertain that the proposed algorithm provides self-synchronization and the energy neutral operation regardless of the number of sensor.

Sunsik Roh

Design of PLC NMS Protocol for AMI

AMI(Advanced Meter Infrastructure) in electricity collecting real time consumption data of smart meter through communication network is important in supporting to power demand and load of whole electricity system. AMI PLC is a major communication technology at NAN(Neighborhood Area Network) with weak signal radio. In this paper, a PLC NMS protocol was designed and implemented. The PLC NMS protocol supports auto-registration, path construction, remote configuration, and collecting status & statistics at remote slave modems for efficiently operating and constructing NAN.

Byung Seok Park, Cheul Shin Kang, Young Hun Lee, Hyun Woo Yoo, Kyung Shub Yoon

A Resistance Deviation-To-Time Interval Converter Using Second Generation Current Conveyors

A resistance deviation-to-time interval converter using second generation current conveyors is designed for connecting resistive bridge sensors with a digital system based on dual-slope integration. Simulation results exhibit that a conversion sensitivity amounts to 15.56


s/Ω over the resistance deviation range of 0-200 Ω and its linearity error is less than ±0.02%. Its temperature stability is less than 220 ppm/℃ in the temperature range of −25-85℃.

Han-Seul Kim, Jae-Gyu Shin, Won-Sup Chung, Sang-Hee Son

Flexible Network Framework for Various Service Components of Network Based Robot

These days wide variety of platforms and frameworks were researched for network based robot (NBR) but it is difficult to apply those platforms and frameworks to the NBR, because the NBR and its service components keep developed. In other works, the interfaces and execution environments of the NBR and the service components are changed and upgraded very often, and at times, the service components are totally reconstructed. Consequently, a new flexible and reliable network framework that adapts to various service components is necessary. To handle these problems, a solution is suggested in this paper.

Dong W. Kim, Ho-Dong Lee, Jong-Wook Park, Sung-Wook Park

A Study on the Performance Analysis of the File System

In the current situation requiring high speed saving devices, file system isn’t suitable to high speed I/O processing. For that reason, performance needs to be analyzed depending on data processing size of DRAM-SSD and file system. In this paper, It analyzed performance according to block size intended for HDD storage device and DRAM-SSD storage. Case of HDD is not changed performance regardless of the block size changes, Case of DRAM-SSD is improved performance by increasing block size. Therefore, case of using HDD, block size is good to use as Appropriate block size in user environment, but, case of using DRAM-SSD, using maximum block size is good conclusions to maximize the performance.

Jae-Hwan Lee, Young-Hun Lee

The Design and Implementation of the Remote Emergency Control System for an Elevator

An elevator is essential elements that perform a variety of actions, while maintaining the precision of more than 20,000 parts for the building. And also many and unspecified people use publicity as a means of transportation. It required the high stability and reliability and need to build more secure environment to prevent accidents. In this paper, we propose the Remote Emergency Control System for an elevator that support a rapid decision-making in an emergency and make the communications environment that can be connected at any time. And also we suggest the remote system to control the elevator with mobile phone.

Woon-Yong Kim, SoonGohn Kim

An Analysis of Festival Satisfaction Evaluation Using Multiple Regression Model – EXPO 2012 YEOSU KOREA

Expo is a festival held at a national level and it has a great effect on both the economy and the society, while contributing to improving the image of the nation and inducing many visitors. Such mega events as the Olympics, World Cup Games and Expo revitalize the regional tourism industry and have great economic, socio-cultural, and environmental effects on the nation. In particular, it is believed to have a great positive effect on pertinent areas by enhancing regional promotions and improving image at home and abroad.

The paper aims to examine factors influencing the evaluation of satisfaction with festivals centering on visitors of the 2012 Yeosu Expo and to determine which factors lead to higher satisfaction, in order to analyze these effects and make it possible to make a prediction of the satisfaction level of a festival at the time of evaluation.

Bokhee Jung, Soongohn Kim

Performance Analysis of the Multichannel Wireless Mesh Networks

This paper identifies a problem in spreading the trials of channel re-assignment toward neighbors due to the channel interference in a wireless mesh network (WMN), and then newly defines an analytical model that can evaluate the identified problem that does affect the performance in WMNs. The results from simulation demonstrate that the proposed model can exactly evaluate the attempts of channel re-assignment occurred from mesh networks.

Kyungjun Kim, Jonghoon Park

An Efficient BRS Management System Using OAuth

Trend of information is diversified fast by the spread of wireless internet recently. The service of book information search may be available without limitation of time and place in university library, because fast diffusion of electronic publishing is increasing. Therefore, we wishes to propose the convenience to search another college’s digital property or display by printer simplifying certification between majority college that is using OAuth. We can propose case and certification formality of the library which is not conferred mutually that is conferred mutually and share island and media search effectively cloud computing and Mobile communication environment.

Jeong-Kyung Moon, Hwang-Rae Kim, Jin-Mook Kim

Software Qualification Approach for Safety-Critical Software of the Embedded System

Programmable Logic Controller (PLC) is applied to a control system as major components in industrial functional safety facilities. This paper describes the safety-critical software qualification approach which corresponds to the software verification and validation, software safety analysis, software quality assurance and software configuration management etc. Major qualification activities for safety-critical software are a technical evaluation, licensing suitability evaluation, inspection and traceability analysis, formal verification, software safety analysis, software quality assurance and its software configuration management etc. First, the technology evaluation performs a technical review which was based on engineering decision-making by verifiers. Second, the licensing suitability evaluation was performed according to the Code & Standard criteria by analyzing the designed outputs based on the functional characteristics and process characteristics defined in the verification and validation guidelines. Third, the inspection and traceability analysis covers the correctness, consistency, completeness, properties of the inputs and outputs, behavioral entities, interfaces, etc. with a three-folded checklist topology. Fourth, a formal verification perform for the statechart based on the Software Requirement Specification (SRS) and the Software Design Specification (SDS) by a Graphical Back Animation (GBA) and a simulation. Fifth, the software safety analysis use the HAZard Operability (HAZOP) method and it analyze the Failure Mode Effect Analysis (FMEA). Finally, a software configuration management under the software quality assurance estimate for the software documents and the source codes by using Software Configuration Management tool. We believe that we achieve the functionality, performance, reliability and safety that are the software qualification objective goals of the embedded system.

Jangyeol Kim, Soongohn Kim

Defense–in–Depth Strategy for Smart Service Sever Cyber Security

Defense-in-Depth (DID) is a crucial concept for the cyber security of computer systems. The strategies for DID have been suggested in many researches. In this work, a DID strategy is proposed for smart service servers in more concrete manner. We tried to find out the special features in applying DID concept to nuclear industry cyber security. To do this, we assigned cyber security levels to a typical digital I&C system using the DID concept in nuclear industry cyber security. Based on the lessons learned from the security level assignment case study, we could set up a DID strategy for smart service servers. The main strategy for smart service server security is an n-tier and ‘thin’ server architecture which is based on the DID concept. This work is expected to be very useful in applying the concept of DID to smart service industry with respect to cyber security.

Hanseong Son, Soongohn Kim

Dispersion Managed Optical Links with Non-uniform Distribution of Residual Dispersion Per Span

The possibility of implementing non-uniform residual dispersion per span (RDPS) in optical links with net residual dispersion (NRD) controlled by precompensation and postcompensation for 960 Gbps WDM transmissions is studied and discussed. It is confirmed that the optimal NRD is obtained to be one of +10 ps/nm or -10 ps/nm, which depend on the deciding of NRD and the exact RDPS configurations. And, effective NRD ranges resulting eye opening penalty (EOP) below 1 dB are independent of the exact RDPS distribution for relative low launch power.

Hwang-Bin Yim, Seong-Real Lee

A System Architecture for Augmenting Card Playing with a Projector and a Camera

We present a system for augmented playing card with a projector and a camera to add playfulness and communication for a traditional card gaming. The functionalities were specified based on a user survey session with actual play. Cards are recognized by a video camera without any artificial marker with an accuracy of 96%. A player is recognized by the same camera from the direction of the hand appearing over a table. The Pelmanism game was augmented on top of the system as a case study to validate the concept of augmentation and the performance of the recognitions. The results showed the feasibility of the system’s performance in an actual environment and the potentials of enhancing playfulness and communication among players.

Nozomu Tanaka, Satoshi Murata, Kaori Fujinami

Motion Detection Using Horn-Schunck Optical Flow

This system is design to detect motion in a crowd using one of the optical flow algorithms, Horn-Schunck method. By performing some appropriate feature extraction techniques, this system allows us to achieve better results in detecting motion and determining the velocity of that motion in order to analyze the human behaviour based on its velocities. This research works able to help human observer to monitor video recorded by closed-circuit television systems (CCTVs) attached in the region of interest (ROI) area.

Wan Nur Azhani W. Samsudin, Kamarul Hawari Ghazali

Implementation Strategies for ERP Adoption by SMEs

ERP systems are considered to be mission-critical information systems in the current business environment. The adoption of ERP should not be hindered solely by the size of an organisation. The key aims of this paper are to elucidate the various strategies Enterprise Resource Planning (ERP) vendors have developed to encourage Small to Medium Enterprises (SME) to adopt their products. These strategies focus around solutions such as pre-configured solutions, implementation methodologies and hosting options. In order to meet this aim, this paper utilises two case studies as examples which demonstrate the experiences of companies who have utilised these strategic options. Based on the extant literature, the barriers to implementation of ERP systems in SMEs have also been discussed. Discussion about the implementation barriers is included to explain how organisations can prepare and plan for effective ERP system implementation.

Srimannarayana Grandhi, Ritesh Chugh

Towards a New Order of the Polyhedral Honeycombs: Part I: The New Order Introduced

The periodic polyhedral honeycombs exhibit an elegant integrity and extraordinary interrelationship, and offer potential for diverse applications, but a satisfactory order that does them full justice appears lacking. Building on my prior order of the regular and semi-regular polyhedra [1, 2], I arrange the honeycombs according to lattice size and expansion/contraction sequences and groups, into an order that comprises three classes of symmetry. Primary polyhedra in all honeycombs are either situated at points of reference cubic arrays, and sometimes generate neutral elements disposed at mid-edges or mid-faces of reference cubic arrays; or they are situated in tetrahedral arrays, with alternating Tetrahedra or Truncated Tetrahedra. Examining lattice size for unit polyhedral edge, together with the disposition of common elements, suggests expansion/contraction groups in two classes, and the regular increase in lattice size at each stage of expansion helps validate the order. Part I provides an overview.

Robert C. Meurant

An On-Body Placement-Aware Heatstroke Alert on a Smartphone

A variety of portable heatstroke risk alert devices are available on the market in Japan; however, an issue in such an environmental measurement device is that the measurement might not be correct if the instrument is not outside, such as in a trousers pocket. We experimentally show the on-body placement-dependency of the measurement. To avoid possible distrust on an over-estimated alert and being at higher risk for heatstroke due to under-estimation, we designed a system that generates an alert message by reflecting the storing position. A prototype system was implemented on a commercial Android-based smartphone, which collects temperature and relative humidity readings from an external device via USB.

Yuan Xue, Shigeki Hosokawa, Satoshi Murata, Satoshi Kouchi, Kaori Fujinami

The Influence of Graphics Effects on Perceiving Depth in Minimized Virtual Environments

Enhancing depth perception accuracy in virtual environments is important and an active ongoing area of study. This research examines the impact of a variety of depth cues on depth perception accuracy in minimized virtual environments. For this study, we developed an application that applies various graphics techniques selectively onto 3D terrain maps. An experimental study was conducted using a one-wall 3D projection system to measure the impact of depth cues and graphical effects on depth perception accuracy. The experimental results showed a tendency of depth overestimation in minimized virtual environments. It also suggests research directions for investigating the influence of depth cues objectively on virtual spaces.

Tristan Hartzell, Mark Thompson, Beomjin Kim

A Token-Based Group Mutual Exclusion Algorithm for MANETs

A mobile ad hoc network can be defined as a network that is spontaneously deployed and is independent of any static network. The network consist of mobile nodes with wireless interfaces and has an arbitrary dynamic topology. The networks suffers from frequent link formation and disruption due to the mobility of the nodes. In this paper we present a token based algorithm for Group Mutual Exclusion in ad hoc mobile networks. The proposed algorithm is adapted from the RL algorithm in [1]. We utilizes also the concept used in [6] to detect that all the nodes concurrently accessing the same resource have terminated their tasks (

concurrent entering

). The algorithm ensures the mutual exclusion, the bounded delay, and the concurrent entering properties.

Ousmane Thiare

Acoustical Analysis of Filled Pause in Malay Spontaneous Speech

Filled pause is one of disfluencies types, identified as the often occurred disfluency in spontaneous speech, known to affect Automatic Speech Recognition accuracy. The purpose of this study is to analyze acoustical features of filled pauses in Malay language spontaneous speech as the preliminary step of filled pause detection. The acoustic features that are extracted from the filled pause are formant frequencies and pitch. Two automated segmentation methods which are Zero Crossing Rates and Gaussian Probability Density Function are compared in our study to acquire an exact representation of the filled pause. The results reveal that the pitch and formant frequencies have lower standard deviation when segmented using Gaussian Probability Density Function compared to Zero Crossing Rates. The analysis of Malay filled pause presented in this paper is important as it proved that filled pauses in any language have standard acoustic features such as flat pitch and stable formant frequencies.

Raseeda Hamzah, Nursuriati Jamil, Noraini Seman

Strategically Managing Facility Management Knowledge Sharing via Web 2.0

Transaction costs requires reductions and via knowledge practices and the Web 2.0. This can be significantly curtailed, the study looks at the literature and the success of the social network site, Facebook and draws conclusions thereof.

Donald Henry Ah Pak, Rita Yi Man Li

A Content Analysis in Hong Kong Sustainable Smart Home Knowledge Sharing via World Wide Web

Centuries ago, the major function of residential buildings was to provide a shelter to humans, protecting from wind, rain and dust. Later on, economic development in our society leads us to an increase in requirement on dwellings’ quality. Comfortable indoor environment becomes a must in home selection criteria. Nowadays, residential units continue to serve the abovementioned functions. Nevertheless, people has a higher demand. The global warming drives us to looks for ways to minimize the negative environmental impact. With the help of content analysis, this paper studies the Hong Kong sustainable smart home knowledge sharing.

Rita Yi Man Li

Noise Robustness of Spectrum Delta (SpD) Features in Malay Vowel Recognition

In Malaysia, there is increasing number of speech recognition researchers focusing on developing independent speaker speech recognition systems that uses Malay Language which are noise robust and accurate. The performance of speech recognition application under adverse noisy condition often becomes the topic of interest among speech recognition researchers regardless of the languages in use. This paper present a study of noise robust capability of an improved vowel feature extraction method called Spectrum Delta (SpD). The features are extracted from both original data and noise-added data and classified using three classifiers; (i) Multinomial Logistic Regression (MLR), (ii) K-Nearest Neighbors (k-NN) and (iii) Linear Discriminant Analysis (LDA). Results show that the proposed SpD is robust towards noise and LDA performs the best in overall vowel classification compared to MLR and k-NN in terms of robustness capability especially with signal-to-noise (SNR) above 20dB.

Mohd Yusof Shahrul Azmi, M. Nor Idayu, D. Roshidi, A. R. Yaakob, Sazali Yaacob

Design of Intelligent Controller for Temperature Process

Temperature is one of the most important and significant parameter of control in food processing, pharmaceuticals and in polymerization. The temperature process is highly nonlinear and design of robust controllers for such nonlinear systems is a challenge. This paper proposes a novel method for the control of temperature process. The traditional PI controllers which are in practice produce high overshoot and the design procedure seems complex. The proposed intelligent controller offers better performance in terms of overshoot and settling time and thus increases the robustness of the system. This paper describes the modeling of the temperature process in detail and discusses how the process responds to conventional and intelligent controllers.

D. Pamela, T. Jebarajan

Modelling of System Configuration and Reconfiguration for IMS

The operation of Discrete Event Systems is represented as a chronological sequence of events. Each event occurs at an instant in time and marks a change of state in the system. A system configuration (SC) of Discrete Event (DE) in linear model has been considered, a formal feature of closed loop structure. To prevent data from getting lost due to noise in the wireless channel, an error-coding scheme is applied. Turbo code is a powerful error coding technique employed nowadays in communication systems. In this paper the image is retained in the receiving end by proper design of the error coding scheme. The images obtained after decoding are found to be suitable for recognition and diagnosis by the doctors. This novel technology will enhance the health care in rural area where the opinion of a specialized doctor is not available. The analyses of system performances for the configured and reconfigured system are done for pre and post layout simulation as per the design methodology. The design methodology used in implementation of 180nm technology, the system instances power, instances and area of the reconfigured system are compared with the configured system. We also infer that the reconfigured system obtain better performance during the run time of the system.

G. Manoj, J. Samson Immmanuel, P. S. Divya, A. P. Haran

Survey on Effective Audio Mastering

Mastering, a form of audio post-production, is the process of preparing and transferring recorded audio from a source containing the final mix to a data storage device (the master); the source from which all copies will be produced (via methods such as pressing, duplication or replication). Recently, the format choice includes using digital masters although analog masters, such as audio tapes, are still being used by the manufacturing industry and by a few engineers who have chosen to specialize in analog mastering. In order to make a deterministic process, mastering requires critical listening; there are software mastering tools available to facilitate this last step, but results still depend upon the accuracy of speaker monitors. In addition, “music mastering” engineers may also need to apply corrective equalization and dynamic enhancement in order to improve upon sound translation on all playback systems. This paper gives an overview of the audio mastering process and the various techniques used in it.

Shajin Prince, K. R. Shankar Kumar

Multi-algorithm Feature Level Fusion Using Finger Knuckle Print Biometric

This paper proposed the use of multi-algorithm feature level fusion as a means to improve the performance of Finger Knuckle Print (FKP) verification. LG, LPQ, PCA, and LPP have been used to extract the FKP features. Experiments are performed using the FKP database, which consists of 7,920 images. Results indicate that the multi-algorithm verification approach outperforms higher performance than using any single algorithm. The biometric performance using feature level fusions under different normalization technique as well have been demonstrated in this paper.

Harbi AlMahafzah, Mohammad Imran, H. S. Sheshadri

Symbolic Classification of Medical Imaging Modalities

In this paper, we propose a symbolic approach for classification of medical imaging modalities. Texture, appearance, and signal features are extracted from medical images. We propose to represent the extracted features by an interval valued feature vector. Unlike the conventional methods, the interval valued feature vector representation is able to preserve the variations existing among the extracted features of medical images. Based on the proposed symbolic representation, we present a method of classifying medical imaging modalities. The proposed classification method makes use of a symbolic similarity measure for classification. Experimentation is carried out on a benchmark medical imaging modalities database. Our proposed approach achieves classification within negligible time as it is based on a simple matching scheme.

Amir Rajaei, Elham Dallalzadeh, Lalitha Rangarajan

Survey on Information Processing in Visual Cortex: Cortical Feedback and Spiking Neural Network

Feedback is the fundamental property of neural circuits in the cerebral cortex. If cortical area A projects to cortical area B, then area B invariably sends feedback connections to area A. Similarly, within a given cortical area, there exists massive recurrent excitatory feedback between pyramidal neurons due to local horizontal connections.In cortical information processing feeback plays vital role. In this paper we reviewed the neural coding strategies and learning methods based on the idea of feedback connections between cortical areas instantiate statistical generative models of cortical inputs.

A. Diana Andrushia, R. Thangarajan

A Tool for Scanning Document-Images with a Photophone or a Digicam

In this work, we propose a tool to scan a document-image acquired with a photophone or a digicam. Firstly, we try to reduce the noise in the document-image. Then we build a new image by cropping or by rectifying perspective the denoised one. From this step, we can expect the document to a real quadrangle. The new document is analyzed and we try to find images, logos or non text elements in the document-image by mean of an image segmentation. At this stage and if applicable, we provide two parts of the document image: the text part and the “non text” part of the document-image (images, logos ...). The text part of the document-image is enhanced by an original PDE’s based model that we proposed. The “non text” document is enhanced by classical methods such as retinex processing. Then, we merge both parts of the document image by a poisson image editing. The effectiveness and the robustness of the proposed process are shown on numerical examples in real-world situation (images acquired from photophones and digicams).

M. El Rhabi, A. Hakim, Z. Mahani, K. Messou, S. Saoud

Detection of Variations in HRV Using Discrete Wavelet Transform for Seizure Detection Application

During the seizure activity the heart rate variability of the patient differs from that of a normal person. In this paper statistical approach is used to calculate the HRV. The R peak is detected using discrete wavelet transform. Daubechies 6 (db6) is used as the mother wavelet. The statistical parameters of the R-R interval of a normal ECG and the ECG of a seizure patient are compared. The standard deviation, mean and variance of ECG of seizure patient are higher when compared to normal ECG. Hence variation in HRV can be used as one of the markers for seizure detection.

P. Grace Kanmani Prince, Rani Hemamalini

Image Pre-processing and Feature Extraction Techniques for Magnetic Resonance Brain Image Analysis

Image pre-processing and feature extraction techniques are mandatory for any image based applications. The accuracy and convergence rate of such techniques must be significantly high in order to ensure the success of the subsequent steps. But, most of the time, the significance of these techniques remain unnoticed which results in inferior results. In this work, the importance of such approaches is highlighted in the context of Magnetic Resonance (MR) brain image classification and segmentation. In this work, suitable pre-processing techniques are developed to remove the skull portion surrounding the brain tissues. Also, texture based feature extraction techniques are also illustrated in this paper. The experimental results are analyzed in terms of segmentation efficiency for pre-processing and distance measure for feature extraction techniques. The convergence rate of these approaches is also discussed in this work. Experimental results show promising results for the proposed approaches.

D. Jude Hemanth, J. Anitha

Design of Circularly Polarized Microstrip Patch Antenna with Wide-Band Characteristic

A novel wide-band circularly polarized (WCP) microstrip patch antenna for wireless power transmission (WPT) at 5.2 GHz and 5.5 GHz is proposed. In particular, we are designed to be able to services for 5.2 GHz wireless local area network (WLAN) in wireless battery charging at 5.5 GHz. The designed antenna has two probes feeding, a corners-truncated and the two shorted diagonal slots in the square patch. As a result, this paper presents possibility for the design of microstrip patch antenna (MPA) with wide-band and CP characteristics with the general TLC substrate.

Dong Hee Park

Empirical Analysis of General Bayesian Network-Driven Online Recommendation Mechanism: Emphasis on User Satisfaction and Psychological Reactance

As Internet technology permeates into our daily lives, the importance of online recommendation grows quite rapidly. Needless to say, the success of the online recommendation mechanism depends heavily on how much users are satisfied by the recommendation results. Moreover, it is essential that users feel less psychological reactance about the recommendation results when it comes to the effectiveness of the online recommendation mechanism. To accomplish those two goals, we propose a new online recommendation mechanism on the basis of the General Bayesian Network (GBN). It is common that users have a large number of personal wants and needs in their minds when using the recommendation mechanism. In this case, GBN is very effective in selecting a small number of relevant factors and organizing a set of causal relationships among them. An advantage of GBN like this allows users to have much satisfaction about the recommendation results, and enjoy rich implications from them. We implemented the proposed GBN-driven online recommendation mechanism (GBNOREM), and tested with users who are suffering from minor health problems and therefore in need of proper menus at the right restaurants. Empirical results clearly revealed that the proposed GBNOREM can enhance users’ perceived satisfaction about the recommendation results, while reducing the level of users’ perceived psychological reactance.

Dahee Chung, Kun Chang Lee, Seung Chang Seong

Evaluation of E-government Systems with Cognitive Mapping Simulation

E-Government system performance must be measured by an exporting company prior to implementation in other countries. However, it is extremely difficult to perform this task due to the existence of a large number of factors to consider and analyze. The motivation of this study was to propose a new method to reduce this difficulty in measuring e-Government system performance. We adopted a cognitive mapping approach for this purpose, where a set of relevant factors that affect e-Government system performance were collected and the causal relationships among them were identified and analyzed to investigate the equilibrium results given certain input conditions. The e-Government system used for handling intellectual property in South Korea was used as a test-bed. Experiment results revealed that cognitive mapping simulation can yield statistically sound and practically rich results.

Eunsung Lee


Weitere Informationen

Premium Partner

Neuer Inhalt

BranchenIndex Online

Die B2B-Firmensuche für Industrie und Wirtschaft: Kostenfrei in Firmenprofilen nach Lieferanten, Herstellern, Dienstleistern und Händlern recherchieren.



Product Lifecycle Management im Konzernumfeld – Herausforderungen, Lösungsansätze und Handlungsempfehlungen

Für produzierende Unternehmen hat sich Product Lifecycle Management in den letzten Jahrzehnten in wachsendem Maße zu einem strategisch wichtigen Ansatz entwickelt. Forciert durch steigende Effektivitäts- und Effizienzanforderungen stellen viele Unternehmen ihre Product Lifecycle Management-Prozesse und -Informationssysteme auf den Prüfstand. Der vorliegende Beitrag beschreibt entlang eines etablierten Analyseframeworks Herausforderungen und Lösungsansätze im Product Lifecycle Management im Konzernumfeld.
Jetzt gratis downloaden!