Volume 8 Issue 2 April 2010


Hierarchical Clustering in Medical Document Collections: the BIC-Means Method

Nikos Hourdakis, Michalis Argyriou, Euripides G.M Petrakis, Evangelos E. Milios

https://doi.org/

Abstract Hierarchical clustering of text collections is a key problem in document management and retrieval. In partitional hierarchical clustering, which is more efficient than its agglomerative counterpart, the entire collection is split into clusters and the individual clusters are further split until a heuristicallymotivated termination criterion is met. In this paper, we define the BIC-means algorithm, which applies the Bayesian Information... Read More


Building Context-Awareness Models for Mobile Applications

Chantal Taconet, Zakia Kazi-Aoul

https://doi.org/

Abstract The design process followed to produce traditional applications needs to be enhanced to cope with new context-aware ubiquitous application requirements. With the popularity of ubiquitous computing, context-aware applications become clearly necessary. This new kind of applications allows mobile users to universally access services in respect to any context including his computing environment. Challenges for the design of such applications are... Read More


A Grayscale Image Steganography Based upon Discrete Cosine Transformation

Chin-Chen Chang, Pei-Yu Lin, and Jun-Chou Chuang

https://doi.org/

Abstract In this paper, a simple image steganography for secure communication is proposed. Our scheme is based on the discrete cosine transformation (DCT) technique. By using DCT, the most significant information of each DCT secret block can be embedded into the non-significant parts of each DCT cover block. To improve the image quality of the cover image, a quantization factor is... Read More


V-isoNet: A Virtualised and Isolated Network using Open Source Technologies

Michael Gleeson, David Markey, Fred Mtenzi

https://doi.org/

Abstract Computer Security and Forensics is an emerging academic discipline in which there are many challenges facing educational institutions in teaching, from both an educational and technical perspective. The School of Computing in Dublin Institute of Technology offers two Security and Forensic Computing modules, a 4th year BSc (Hons) module and an MSc module. Currently the BSc module requires a practical... Read More


A Web-based Surveillance System for Traffic Behavior and its Application for Practical Recommendation of Crosswalk Installation

Yoshiro Imai, Yukio Hori, Shin’ichi Masuda

https://doi.org/

Abstract A Web-based surveillance system has been developed to observe some intrusion into dangerous and security area. It is designed based on a Linux PC with Web services, Open CV engine, remote monitoring camera, remote controlling sub-server and other facilities. It supports users of mobile phones. Its image understanding facility by Open CV engine gives us information about intruders’ tracks at... Read More


Spam Blog Filtering with Bipartite Graph Clustering and Mutual Detection between Spam Blogs and Words

Kazunari Ishida

https://doi.org/

Abstract This paper proposes a mutual detection mechanism between spam blogs and words with bipartite graph clustering for filtering spam blogs from updated blog data. Spam blogs are problematic in extracting useful marketing information from the blogosphere; they often appear to be rich sources of information based on individual opinion and social reputation. One characteristic of spam blogs is copied-and-pasted articles... Read More


Cellular DBMS: An Attempt Towards Biologically-Inspired Data Management

Syed Saif ur Rahman, Veit Köppen, Gunter Saake

https://doi.org/

Abstract Existing database management systems (DBMS) are complex and less predictable (i.e., the consistency of performance with the increase of functionality and the data growth is not certain). Database researchers acknowledge the need for revisiting DBMS architectures to fulfill the needs of new hardware and application trends. We propose a biologically inspired DBMS architecture called \'\'Cellular DBMS... Read More


A Specification Model for Temporal and Spatial Relations of Segments in Multimedia Presentations

Veli Hakkoymaz

https://doi.org/

Abstract In this paper, we introduce a conceptual tuplebased model for specification of spatial, temporal and semantic relationships among media segments in a multimedia presentation. A multimedia presentation contains various kinds of multimedia objects such as audio, video, images, text media types and so on. The organization of a presentation is a complex task in that the display order of presentation... Read More