Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Singapore Management University

2001

Discipline
Keyword
Publication

Articles 1 - 30 of 37

Full-Text Articles in Physical Sciences and Mathematics

Discrete Singular Convolution For The Prediction Of High Frequency Vibration Of Plates, Yibao Zhao, G. W. Wei, Y. Xiang Dec 2001

Discrete Singular Convolution For The Prediction Of High Frequency Vibration Of Plates, Yibao Zhao, G. W. Wei, Y. Xiang

Research Collection Lee Kong Chian School Of Business

Theoretical analysis of high frequency vibrations is indispensable in a variety of engineering designs. Much effort has been made on this subject in the past few decades. However, there is no single technique which can be applied with confidence to various engineering structures for high frequency predictions at present. This paper introduces a novel computational approach, the discrete singular convolution (DSC) algorithm, for high frequency vibration analysis of plate structures. Square plates with six distinct boundary conditions are considered. To validate the proposed method, a completely independent approach, the Levy method, is employed to provide exact solutions for a comparison. …


Automated Online News Classification With Personalization, Chee-Hong Chan, Aixin Sun, Ee Peng Lim Dec 2001

Automated Online News Classification With Personalization, Chee-Hong Chan, Aixin Sun, Ee Peng Lim

Research Collection School Of Computing and Information Systems

Classification of online news, in the past, has often been done manually. In our proposed Categorizor system, we have experimented an automated approach to classify online news using the Support Vector Machine (SVM). SVM has been shown to deliver good classification results when ample training documents are given. In our research, we have applied SVM to personalized classification of online news.


Pickup And Delivery Problem With Time Windows: Algorithms And Test Case Generation, Hoong Chuin Lau, Zhe Liang Nov 2001

Pickup And Delivery Problem With Time Windows: Algorithms And Test Case Generation, Hoong Chuin Lau, Zhe Liang

Research Collection School Of Computing and Information Systems

In the pickup and delivery problem with time windows (PDPTW), vehicles have to transport loads from origins to destinations respecting capacity and time constraints. In this paper, we present a two-phase method to solve the PDPTW. In the first phase, we apply a novel construction heuristics to generate an initial solution. In the second phase, a tabu search method is proposed to improve the solution. Another contribution of this paper is a strategy to generate good problem instances and benchmarking solutions for PDPTW, based on Solomon's benchmark test cases for VRPTW. Experimental results show that our approach yields very good …


Hierarchical Text Classification And Evaluation, Aixin Sun, Ee Peng Lim Nov 2001

Hierarchical Text Classification And Evaluation, Aixin Sun, Ee Peng Lim

Research Collection School Of Computing and Information Systems

Hierarchical Classification refers to assigning of one or more suitable categories from a hierarchical category space to a document. While previous work in hierarchical classification focused on virtual category trees where documents are assigned only to the leaf categories, we propose atop-down level-based classification method that can classify documents to both leaf and internal categories. As the standard performance measures assume independence between categories, they have not considered the documents incorrectly classified into categories that are similar or not far from the correct ones in the category tree. We therefore propose the Category-Similarity Measures and Distance-Based Measures to consider the …


Privacy Protection For Transactions Of Digital Goods, Feng Bao, Robert H. Deng Nov 2001

Privacy Protection For Transactions Of Digital Goods, Feng Bao, Robert H. Deng

Research Collection School Of Computing and Information Systems

In this paper we study the problem of how to protect users’ privacy in web transactions of digital goods. In particular, we introduce a system which allows a user to disclose his/her identity information (such as user account or credit card number) to a web site in exchange for a digital item, but prevents the web site from learning which specific item the user intends to obtain. The problem concerned here is orthogonal to the problem of anonymous transactions [RSG98], [RR98] but commensurate with the general problem of PIR (private information retrieval) [CGK95]


Integrating Color And Spatial Features For Content-Based Video Retrieval, Tong Lin, Chong-Wah Ngo, Hong-Jiang Zhang, Qing-Yun Shi Oct 2001

Integrating Color And Spatial Features For Content-Based Video Retrieval, Tong Lin, Chong-Wah Ngo, Hong-Jiang Zhang, Qing-Yun Shi

Research Collection School Of Computing and Information Systems

In this paper, we present a novel and efficient scheme for extracting, indexing and retrieving color images. Our motivation was to reduce the space overhead of partition-based approaches taking advantage of the fact that only a relatively low number of distinct values of a particular visual feature is present in most images. To extract color feature and build indices into our image database we take into consideration factors such as human color perception and perceptual range, and the image is partitioned into a set of regions by using a simple classifying scheme. The compact color feature vector and the spatial …


Hierarchical Mobility Management For Voip Traffic, Archan Misra, Subir Das, Anthony J. Mcauley Oct 2001

Hierarchical Mobility Management For Voip Traffic, Archan Misra, Subir Das, Anthony J. Mcauley

Research Collection School Of Computing and Information Systems

A hierarchical IP-based mobility management mechanism is proposed for VoIP applications. The suggested mechanism uses the DMA (dynamic mobility agent) architecture, based on IDMP (intra-domain mobility management protocol), for managing intra-domain mobility and the dynamic binding mechanism of SIP (session initiation protocol) for managing global mobility. This combination of network and application layer mobility management reduces the global signaling load, provides fast handoff for ongoing conversations, enables efficient global transport and supports IP-layer paging.


Modeling And Simulation Of Steady State And Transient Behaviors For Emergent Socs, Joann M. Paul, Arne Suppe, Donald E. Thomas Oct 2001

Modeling And Simulation Of Steady State And Transient Behaviors For Emergent Socs, Joann M. Paul, Arne Suppe, Donald E. Thomas

Research Collection School Of Computing and Information Systems

We introduce a formal basis for viewing computer systems as mixed steady state and non-steady state (transient) behaviors to motivate novel design strategies resulting from simultaneous consideration of function, scheduling and architecture. We relate three design styles: Hierarchical decomposition, static mapping and directed platform that have traditionally been separate. By considering them together, we reason that once a steady state system is mapped to an architecture, the unused processing and communication power may be viewed as a platform for a transient system, ultimately resulting in more effective design approaches that ease the static mapping problem while still allowing for effective …


Jointly Coordinating Ecn And Tcp For Rapid Adaptation To Varying Bandwidth, Archan Misra, Teunis Ott Oct 2001

Jointly Coordinating Ecn And Tcp For Rapid Adaptation To Varying Bandwidth, Archan Misra, Teunis Ott

Research Collection School Of Computing and Information Systems

The introduction of service differentiation in the Internet implies that the residual bandwidth available to best-effort traffic becomes highly variable. We explore the design of a rapidly-reactive congestion control framework, where the ECN-aware best-effort flows aggressively go after any unused capacity. By making routers mark packets in a much more aggressive manner, we are able to achieve fast backoff in the network without resorting to the TCP's current drastic step of halving the congestion window. Simulations indicate that our ECN-mod protocol is better than ECN-NewReno in exploiting rapid variations in the available bandwidth. Moreover, the milder backoff policy of ECN-mod …


Mining Multi-Level Rules With Recurrent Items Using Fp'-Tree, Kok-Leong Ong, Wee-Keong Ng, Ee Peng Lim Oct 2001

Mining Multi-Level Rules With Recurrent Items Using Fp'-Tree, Kok-Leong Ong, Wee-Keong Ng, Ee Peng Lim

Research Collection School Of Computing and Information Systems

Association rule mining has received broad research in the academic and wide application in the real world. As a result, many variations exist and one such variant is the mining of multi-level rules. The mining of multi-level rules has proved to be useful in discovering important knowledge that conventional algorithms such as Apriori, SETM, DIC etc., miss. However, existing techniques for mining multi-level rules have failed to take into account the recurrence relationship that can occur in a transaction during the translation of an atomic item to a higher level representation. As a result, rules containing recurrent items go unnoticed. …


On Clustering And Retrieval Of Video Shots, Chong-Wah Ngo, Ting-Chuen Pong, Hong-Jiang Zhang Oct 2001

On Clustering And Retrieval Of Video Shots, Chong-Wah Ngo, Ting-Chuen Pong, Hong-Jiang Zhang

Research Collection School Of Computing and Information Systems

Clustering of video data is an important issue in video abstraction, browsing and retrieval. In this paper, we propose a two-level hierarchical clustering approach by aggregating shots with similar motion and color features. Motion features are computed directly from 20 tensor histograms, while color features are represented by 30 color histograms. Cluster validity analysis is further applied to automatically determine the number of clusters at each level. Video retrieval can then be done directly based on the result of clustering. The proposed approach is found to be useful particularly for sports games, where motion and color are important visual cues …


Nonparametric Techniques To Extract Fuzzy Rules For Breast Cancer Diagnosis Problem, Manish Sarkar, Tze-Yun Leong Sep 2001

Nonparametric Techniques To Extract Fuzzy Rules For Breast Cancer Diagnosis Problem, Manish Sarkar, Tze-Yun Leong

Research Collection School Of Computing and Information Systems

This paper addresses breast cancer diagnosis problem as a pattern classification problem. Specifically, the problem is studied using Wisconsin-Madison breast cancer data set. Fuzzy rules are generated from the input-output relationship so that the diagnosis becomes easier and transparent for both patients and physicians. For each class, at least one training pattern is chosen as the prototype, provided (a) the maximum membership of the training pattern is in the given class, and (b) among all the training patterns, the neighborhood of this training pattern has the least fuzzy-rough uncertainty in the given class. Using the fuzzy-rough uncertainty, a cluster is …


Vide: A Visual Data Extraction Environment For The Web, Yi Li, Wee-Keong Ng, Ee Peng Lim Sep 2001

Vide: A Visual Data Extraction Environment For The Web, Yi Li, Wee-Keong Ng, Ee Peng Lim

Research Collection School Of Computing and Information Systems

With the rapid growth of information on the Web, a means to combat information overload is critical. In this paper, we present ViDE (Visual Data Extraction), an interactive web data extraction environment that supports efficient hierarchical data wrapping of multiple web pages. ViDE has two unique features that differentiate it from other extraction mechanisms. First, data extraction rules can be easily specified in a graphical user interface that is seamlessly integrated with a web browser. Second, ViDE introduces the concept of grouping which unites the extraction rules for a set of documents with the navigational patterns that exist among them. …


Exploiting Image Indexing Techniques In Dct Domain, Chong-Wah Ngo, Ting-Chuen Pong, Ronald T. Chin Sep 2001

Exploiting Image Indexing Techniques In Dct Domain, Chong-Wah Ngo, Ting-Chuen Pong, Ronald T. Chin

Research Collection School Of Computing and Information Systems

This paper is concerned with the indexing and retrieval of images based on features extracted directly from the JPEG discrete cosine transform (DCT) domain. We examine possible ways of manipulating DCT coefficients by standard image analysis approaches to describe image shape, texture, and color. Through the Mandala transformation, our approach groups a subset of DCT coefficients to form ten blocks. Each block represents a particular frequency content of the original image. Two blocks are used to model rough object shape; nine blocks to describe subband properties; and one block to compute color distribution. As a result, the amount of data …


Autoconfiguration, Registration And Mobility Management For Pervasive Computing, Archan Misra, Subir Das, Anthony Mcauley, Sajal K. Das Aug 2001

Autoconfiguration, Registration And Mobility Management For Pervasive Computing, Archan Misra, Subir Das, Anthony Mcauley, Sajal K. Das

Research Collection School Of Computing and Information Systems

In the vision of pervasive computing, users will exchange information and control their environments from anywhere using various wireline/wireless networks and computing devices. We believe that current protocols, such as DHCP, PPP, and Mobile IP, must be enhanced to support pervasive network access. In particular, this article identifies three fundamental functions: autoconfiguration, registration, and mobility management, that need such enhancements. Realizing that the IP autoconfiguration capabilities must be extended to configure routers and large dynamic networks, we first describe our autoconfiguration solution based on the dynamic configuration and distribution protocol (DCDP). Second, we discuss why providing user-specific services over a …


Generating Market Basket Data With Temporal Information, Yingjiu Li, Peng Ning, X. Sean Wang, Sushil Jajodia Aug 2001

Generating Market Basket Data With Temporal Information, Yingjiu Li, Peng Ning, X. Sean Wang, Sushil Jajodia

Research Collection School Of Computing and Information Systems

This paper presents a synthetic data generator that outputs timestamped transactional data with embedded temporal patterns controlled by a set of input parameters. In particular, calendar schema, which is determined by a hierarchy of input time granularities, is used as a framework of possible temporal patterns. An example of calendar schema is (year, month, day), which provides a framework for calendar-based temporal patterns of the form -38352 , where each is either an integer or the symbol . For example, is such a pattern, which corresponds to the time intervals consisting of all the 16th days of all months in …


Analysis Of A New Vehicle Scheduling And Location Problem, Ebru K. Bish, Thin Yin Leong, Chun-Lun Li, Jonathan W. C. Ng, David Simchi-Levi Aug 2001

Analysis Of A New Vehicle Scheduling And Location Problem, Ebru K. Bish, Thin Yin Leong, Chun-Lun Li, Jonathan W. C. Ng, David Simchi-Levi

Research Collection School Of Computing and Information Systems

We consider a container terminal discharging containers from a ship and locating them in the terminal yard. Each container has a number of potential locations in the yard where it can be stored. Containers are moved from the ship to the yard using a fleet of vehicles, each of which can carry one container at a time. The problem is to assign each container to a yard location and dispatch vehicles to the containers so as to minimize the time it takes to download all the containers from the ship. We show that the problem is NP-hard and develop a …


A Method For Fast Revocation Of Public Key Certificates And Security Capabilities, D. Boneh, Xuhua Ding, Gene Tsudik, Chi Ming Wong Aug 2001

A Method For Fast Revocation Of Public Key Certificates And Security Capabilities, D. Boneh, Xuhua Ding, Gene Tsudik, Chi Ming Wong

Research Collection School Of Computing and Information Systems

We present a new approach to fast certificate revocation centered around the concept of an on-line semi-trusted mediator (SEM). The use of a SEM in conjunction with a simple threshold variant of the RSA cryptosystem (mediated RSA) offers a number of practical advantages over current revocation techniques. Our approach simplifies validation of digital signatures and enables certificate revocation within legacy systems. It also provides immediate revocation of all security capabilities. This paper discusses both the architecture and implementation of our approach as well as performance and compatibility with the existing infrastructure. Our results show that threshold cryptography is practical for …


The Determination Of Natural Frequencies Of Rectangular Plates With Mixed Boundary Conditions By Discrete Singular Convolution, G. W. Wei, Yibao Zhao, Y. Xiang Aug 2001

The Determination Of Natural Frequencies Of Rectangular Plates With Mixed Boundary Conditions By Discrete Singular Convolution, G. W. Wei, Yibao Zhao, Y. Xiang

Research Collection Lee Kong Chian School Of Business

This paper introduces the discrete singular convolution algorithm for vibration analysis of rectangular plates with mixed boundary conditions. A unified scheme is proposed for the treatment of simply supported, clamped and transversely supported (with nonuniform elastic rotational restraint) boundary conditions. The robustness and reliability of the present approach are tested by a number of numerical experiments. All results agree well with those in the literature.


A Multi-Agent Framework For Supporting Intelligent Fourth-Party Logistics, Hoong Chuin Lau, G. Lo Aug 2001

A Multi-Agent Framework For Supporting Intelligent Fourth-Party Logistics, Hoong Chuin Lau, G. Lo

Research Collection School Of Computing and Information Systems

A distributed intelligent agent-based framework that supports fourth-party logistics optimization under a web-based e-Commerce environment has been proposed in this paper. In the framework, customer job requests come through an e-Procurement service. These requests are consolidated and pushed to the e-Market Place service periodically. The e-Market Place then serves as a broker that allows intelligent agents to bid to serve these requests optimally in real-time by solving multiple instances of underlying logistics optimization problem. The resulting system was implemented based on the Java 2 Enterprise Edition (J2EE) platform using distributed system technology for communication between objects.


Video Partitioning By Temporal Slice Coherency, Chong-Wah Ngo, Ting-Chuen Pong, Roland T. Chin Aug 2001

Video Partitioning By Temporal Slice Coherency, Chong-Wah Ngo, Ting-Chuen Pong, Roland T. Chin

Research Collection School Of Computing and Information Systems

We present a novel approach for video partitioning by detecting three essential types of camera breaks, namely cuts, wipes, and dissolves. The approach is based on the analysis of temporal slices which are extracted from the video by slicing through the sequence of video frames and collecting temporal signatures. Each of these slices contains both spatial and temporal information from which coherent regions are indicative of uninterrupted video partitions separated by camera breaks. Properties could further be extracted from the slice for both the detection and classification of camera breaks. For example, cut and wipes are detected by color-texture properties, …


Secure And Private Distribution Of Online Video And Some Related Cryptographic Issues, Feng Bao, Robert H. Deng, Peirong Bao, Yan Guo, Hongjun Wu Jul 2001

Secure And Private Distribution Of Online Video And Some Related Cryptographic Issues, Feng Bao, Robert H. Deng, Peirong Bao, Yan Guo, Hongjun Wu

Research Collection School Of Computing and Information Systems

With the rapid growth of broadband infrastructure, it is thought that the bottleneck for video-on-demand service through Internet is being cleared. However, digital video content protection and consumers privacy protection emerge as new major obstacles. In this paper we propose an online video distribution system with strong content security and privacy protection. We mainly focus on the study of security and privacy problems related to the system. Besides presenting the new system, we intensively discuss some relevant cryptographic issues, such as content protection, private information retrieval, super-speed encryption/decryption for video, and PKC with fast decryption etc. The paper can be …


Recent Advances In Content-Based Video Analysis, Chong-Wah Ngo, Ting-Chuen Pong, Hong-Jiang Zhang Jul 2001

Recent Advances In Content-Based Video Analysis, Chong-Wah Ngo, Ting-Chuen Pong, Hong-Jiang Zhang

Research Collection School Of Computing and Information Systems

In this paper, we present major issues in video parsing, abstraction, retrieval and semantic analysis. We discuss the success, the difficulties and the expectations in these areas. In addition, we identify important opened problems that can lead to more sophisticated ways of video content analysis. For video parsing, we discuss topics in video partitioning, motion characterization and object segmentation. The success in video parsing, in general, will have a great impact on video representation and retrieval. We present three levels of abstracting video content by scene, keyframe and key object representations. These representation schemes in overall serve as a good …


Mobile Commerce: Promises, Challenges And Research Agenda, Keng Siau, Ee Peng Lim Jul 2001

Mobile Commerce: Promises, Challenges And Research Agenda, Keng Siau, Ee Peng Lim

Research Collection School Of Computing and Information Systems

Advances in wireless technology increase the number of mobile device users and give pace to the rapid development of e-commerce using these devices. The new type of e-commerce, conducting transactions via mobile terminals, is called mobile commerce. Due to its inherent characteristics such as ubiquity, personalization, flexibility, and dissemination, mobile commerce promises businesses unprecedented market potential, great productivity, and high profitability. This paper presents an overview of mobile commerce development by examining the enabling technologies, the impact of mobile commerce on the business world, and the implications to mobile commerce providers. The paper also provides an agenda for future research …


Application-Centric Analysis Of Ip-Based Mobility Management Techniques, Archan Misra, Subir Das, Prathima Agrawal Jul 2001

Application-Centric Analysis Of Ip-Based Mobility Management Techniques, Archan Misra, Subir Das, Prathima Agrawal

Research Collection School Of Computing and Information Systems

This paper considers three applications—VoIP, mobile Web access and mobile server-based data transfers—and evaluates the applicability of various IP-based mobility management mechanisms. We first survey the features and characteristics of various IP mobility protocols, such as MIPv4, MIPv6, MIP-RO, SIP, CIP, HAWAII, MIP-RR and IDMP, and then evaluate their utility on an application-specific basis. The diversity in the mobility-related requirements ensures that no single mobility solution is universally applicable. We recommend a hierarchical mobility architecture. The framework uses our Dynamic Mobility Agent (DMA) architecture for managing intra-domain mobility and multiple application-based binding protocols for supporting inter-domain mobility. Thus, we recommend …


Implementation And Performance Evaluation Of Telemip, Kaushik Chakraborty, Archan Misra, Subir Das, Anthony J. Mcauley, Ashutosh Dutta, Sajal K. Das Jun 2001

Implementation And Performance Evaluation Of Telemip, Kaushik Chakraborty, Archan Misra, Subir Das, Anthony J. Mcauley, Ashutosh Dutta, Sajal K. Das

Research Collection School Of Computing and Information Systems

In this paper, we present our implementation of TeleMIP a two-level architecture for IP based mobility management TeleMIP essentially uses an Intra-Domain Mobility Management Protocol IDMP for managing mobility within a domain and Mobile IP for supporting inter-domain global mobility. Unlike other proposed schemes for intra-domain mobility management IDMP uses two care of addresses for mobility management The global care of address is relatively stable and identifies the mobile nodes current domain[1] while the local care of address changes every time the mobile changes subnets and identifies the mobiles current point of attachment. The paper describes our TeleMIP implementation based …


Effect Of Exponential Averaging On The Variability Of A Red Queue, Archan Misra, Teunis Ott, John Baras Jun 2001

Effect Of Exponential Averaging On The Variability Of A Red Queue, Archan Misra, Teunis Ott, John Baras

Research Collection School Of Computing and Information Systems

The paper analyzes how using a longer memory of the past queue occupancy in computing the average queue occupancy affects the stability and variability of a RED queue. Extensive simulation studies with both persistent and Web TCP sources are used to study the variance of the RED queue as a function of the memory of the averaging process. Our results show that there is very little performance improvement (and in fact, possibly significant performance degradation) if the length of memory is increased beyond a very small value. Contrary to current practice, our results show that a longer memory reduces the …


Genetic Algorithms For Communications Network Design - An Empirical Study Of The Factors That Influence Performance, Hsinghua Chou, G. Premkumar, Chao-Hsien Chu Jun 2001

Genetic Algorithms For Communications Network Design - An Empirical Study Of The Factors That Influence Performance, Hsinghua Chou, G. Premkumar, Chao-Hsien Chu

Research Collection School Of Computing and Information Systems

We explore the use of GAs for solving a network optimization problem, the degree-constrained minimum spanning tree problem. We also examine the impact of encoding, crossover, and mutation on the performance of the GA. A specialized repair heuristic is used to improve performance. An experimental design with 48 cells and ten data points in each cell is used to examine the impact of two encoding methods, three crossover methods, two mutation methods, and four networks of varying node sizes. Two performance measures, solution quality and computation time, are used to evaluate the performance. The results obtained indicate that encoding has …


Idmp-Based Fast Handoffs And Paging In Ip-Based Cellular Networks, Archan Misra, Subir Das, Ashutosh Dutta, Sajal K. Das May 2001

Idmp-Based Fast Handoffs And Paging In Ip-Based Cellular Networks, Archan Misra, Subir Das, Ashutosh Dutta, Sajal K. Das

Research Collection School Of Computing and Information Systems

We consider the use of our previously proposed Intra-Domain Mobility Management Protocol (IDMP) in fourth-generation mobile networks. On evaluating the heterogeneous access technologies, cellular layouts, and application characteristics of 4G environments, we realize a need to reduce both handoff latency and the frequency of mobility-related signaling. We first present IDMP's fast intradomain handoff mechanism that uses a duration-limited proactive packet multicasting solution. We quantify the expected buffering requirements of our proposed multicasting scheme for typical 4G network characteristics and compare it with alternative IP-based fast handoff solutions. We also present a paging scheme under IDMP that replicates the current cellular …


Predictive Self-Organizing Networks For Text Categorization, Ah-Hwee Tan Apr 2001

Predictive Self-Organizing Networks For Text Categorization, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

This paper introduces a class of predictive self-organizing neural networks known as Adaptive Resonance Associative Map (ARAM) for classification of free-text documents. Whereas most sta- tistical approaches to text categorization derive classification knowledge based on training examples alone, ARAM performs supervised learn- ing and integrates user-defined classification knowledge in the form of IF-THEN rules. Through our experiments on the Reuters-21578 news database, we showed that ARAM performed reasonably well in mining categorization knowledge from sparse and high dimensional document feature space. In addition, ARAM predictive accuracy and learning efficiency can be improved by incorporating a set of rules derived from …