2009 Fourth International Conference on Computer Sciences and Convergence Information Technology最新文献

筛选
英文 中文
Trustworthy Scheduling Based on Constraint Solving Scheme 基于约束求解方案的可信调度
Juyang Zhang, Yixiang Chen
{"title":"Trustworthy Scheduling Based on Constraint Solving Scheme","authors":"Juyang Zhang, Yixiang Chen","doi":"10.1109/ICCIT.2009.14","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.14","url":null,"abstract":"Most of real-life scheduling problems are dynamic, where we do not know all the time variables of jobs in advance. In such uncertain environment, trustworthy scheduling effectively is a hot topic. In this paper we model the constraints in the dynamic scheduling problems by using CSP model. Moreover, we propose model the time constraint variables in logic way. Based on the constraint models, a constraint solving algorithm for solving the scheduling problems is designed. We prove that this algorithm is sound for solving the scheduling problems. The trustworthy of the schedule system can be promoted by applying this algorithm.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131945479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Increasing the Accuracy of Discriminative of Multinomial Bayesian Classifier in Text Classification 提高多项贝叶斯分类器在文本分类中的判别准确率
T. Mouratis, S. Kotsiantis
{"title":"Increasing the Accuracy of Discriminative of Multinomial Bayesian Classifier in Text Classification","authors":"T. Mouratis, S. Kotsiantis","doi":"10.1109/ICCIT.2009.13","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.13","url":null,"abstract":"Text Classification plays an important role in information extraction and summarization, text retrieval, and question-answering. The Discriminative Multinomial Naive Bayes classifier has been a focus of research in the field of text classification. This paper increases the accuracy of Discriminative Multinomial Bayesian Classifier with the usage of the feature selection technique that evaluates the worth of an attribute by computing the value of the chi-squared statistic with respect to the class. We performed a large-scale comparison on benchmark datasets with other state-of-the-art algorithms and the proposed methodology had greater accuracy in most cases.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114973134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Ontology Based Metadata Interoperable Aggregator for the Large Scaled Image Retrieval Supporting Multiple Schemas 基于本体的支持多模式的大规模图像检索元数据互操作聚合器
Saim Shin, Tae-Beom Lim, Seok-Pil Lee
{"title":"Ontology Based Metadata Interoperable Aggregator for the Large Scaled Image Retrieval Supporting Multiple Schemas","authors":"Saim Shin, Tae-Beom Lim, Seok-Pil Lee","doi":"10.1109/ICCIT.2009.41","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.41","url":null,"abstract":"In this paper, we review the system framework for the interoperability with JPSearch image search and retrieval technonlogies. More specifically, we specifies the core skeleton of the lexical resource ontology which contains the semantic relations between metadata schemas, and also a mechanism to add / update /delete the information in the ontology for helping transformation between schemas and queries.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124435277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Analysis of Resource Efficiency by Quality Management Messages in the Converged Wireless Networks 融合无线网络中质量管理消息对资源效率的分析
Hyun-Jong Kim, S. Choi, K. Lee, Hyunwoo Lee
{"title":"An Analysis of Resource Efficiency by Quality Management Messages in the Converged Wireless Networks","authors":"Hyun-Jong Kim, S. Choi, K. Lee, Hyunwoo Lee","doi":"10.1109/ICCIT.2009.101","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.101","url":null,"abstract":"In this paper, we analyze the efficiency of resource occupied by QoS management messages in the converged wireless networks. Handover blocking may be generated by radio resource limitation when a number of QoS management messages are transferred between nodes simultaneously. So, the analysis of bandwidth occupied by QoS management messages is required to prepare the solution for handover blocking problem. Through the analysis of QoS management messages’ impact network provider can select adequate transmission period taking the radio channel into consideration and organize the network topology for QoS management.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116800380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Algorithm Bangla Speech Separation 一种高效的孟加拉语语音分离算法
Nipa Chowdhury, Md. Abdus Sattar, A. K. Bishwas
{"title":"An Efficient Algorithm Bangla Speech Separation","authors":"Nipa Chowdhury, Md. Abdus Sattar, A. K. Bishwas","doi":"10.1109/ICCIT.2009.292","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.292","url":null,"abstract":"In this paper we present a new word separation algorithm for Real Time Speech i.e., Continuous Bangla Speech Recognition (CBSR). Prosody has great impact on Bangla speech and the algorithm is developed by considering prosodic feature with energy. Task of this algorithm is to separate Bangla speech into words. At first continuous Bangla speech are fed into the system and the word separation algorithm separate speech into isolate words. Performance of the proposed algorithm is compared to the existing algorithms and result shows that 97% word boundaries are correctly detect.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116973998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance Analysis of the Novel SSL Based UMTS Authentication Protocol 基于SSL的新型UMTS认证协议性能分析
Omar Al-Amir, S. Yousef, Abdel-Rahman Zoubaidi
{"title":"Performance Analysis of the Novel SSL Based UMTS Authentication Protocol","authors":"Omar Al-Amir, S. Yousef, Abdel-Rahman Zoubaidi","doi":"10.1109/ICCIT.2009.149","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.149","url":null,"abstract":"In this paper Authentication and Key Agreement (AKA) authentication protocol for Universal Mobile Telecommunications System (UMTS) networks is analyzed, a new authentication protocol is proposed and analyzed , performance analysis and bandwidth consumption comparison is achieved. The proposed protocol uses digital certificates public key infrastructure and Secure Socket Layer SSL symmetric key generation schemes to generate ciphering key and integrity key. In the proposed protocol International Mobile Subscriber Identity (IMSI) is sent encrypted while it is sent in plaintext in 3GPP AKA. The proposed protocol does not use authentication vectors, and instead it sends messages between network entities encrypted using their public keys. A fluid mobility model is used to investigate the performance and signaling messages between entities in both protocols. Analysis showed a big enhancement in signaling traffic and bandwidth in the proposed protocol.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116979265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Application Plan of Ubiquitous Technology Elements for Sustainable Pro-environmental Architecture 泛在技术元素在可持续亲环境建筑中的应用方案
Bo-bae Hong, Yoon-Sun Lee, Yeong-Jin Jun, Jae-Jun Kim
{"title":"An Application Plan of Ubiquitous Technology Elements for Sustainable Pro-environmental Architecture","authors":"Bo-bae Hong, Yoon-Sun Lee, Yeong-Jin Jun, Jae-Jun Kim","doi":"10.1109/ICCIT.2009.287","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.287","url":null,"abstract":"Ubiquitous as ubiquitous IT comprehending ubiquitous computing and ubiquitous network should consider environmental matters that the human race of 21st century is confronting. This is one of the solutions for composing architectural environment which is sustainable and pro-environmental. The applicable architectural technologies of ubiquitous is Smart-Display, environmental adjustment system, automatic control system and safe security system. These technologies are limited to a level of saving energy. In order to make an architectural space of pro-environmental ubiquitous that keeps balance between inside and outside space of the building by decreasing the emission amount of CO2, the technologies should be integrated in Smart Display.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120963225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Statistical Analysis about Zero-Failure Data with Weibull Distribution 基于威布尔分布的零故障数据的统计分析
Weiguo Li, Nianguo Guo, Yuanyuan Zhang
{"title":"Statistical Analysis about Zero-Failure Data with Weibull Distribution","authors":"Weiguo Li, Nianguo Guo, Yuanyuan Zhang","doi":"10.1109/ICCIT.2009.187","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.187","url":null,"abstract":"The article discuses the problem of zero-failure data with weibull distribution. Using the convex and concave property of the distribution functions. We give the relation about failure-probability in time. Basing on the relationship. We obtain Bayesian estimation about in time and estimate the distribution’s parameter. At last, we compute for actual data and analyze it.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121071725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Embedded System on NTP 基于NTP的嵌入式系统
Chien-Chi Chao, Shih-Ping Huang, Ho-Lung Hung
{"title":"Embedded System on NTP","authors":"Chien-Chi Chao, Shih-Ping Huang, Ho-Lung Hung","doi":"10.1109/ICCIT.2009.180","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.180","url":null,"abstract":"NTP is a protocol designed to synchronize the clocks of computers over a network. This paper will implement the NTP on an embedded system to serve as a server of the NTP Pool Project. The developed embedded system is based on the embedded Linux operating system. The benefits of utilization of the embedded Linux system rely on its lower power consumption, high system stability, the small size of whole system including hardware and software, and no extra cost protected by the GPL license. All these characteristics will provide the embedded Linux system to be a suitable system for the implementation of the NTP that will need the services provided by many non-centralized servers. By setting multiple NTP servers in each network domain and utilizing NTP Pool Project guidelines, it will help to evenly distribute the throughput of each server and enhance the stability of the system. This paper will provide the detailed introduction on the protocol of NTP and the framework of the NTP Pool Project, the development of the NTP on the embedded system, and followed by the suggestions of the implementation of the NTP.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125001773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Medical Image Segmentation Based on an Improved 2D Entropy 基于改进二维熵的医学图像分割
Liping Zheng, Hua Jiang, Q. Pan, Guangyao Li
{"title":"Medical Image Segmentation Based on an Improved 2D Entropy","authors":"Liping Zheng, Hua Jiang, Q. Pan, Guangyao Li","doi":"10.1109/ICCIT.2009.66","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.66","url":null,"abstract":"Medical image segmentation is the basis of medical image three-dimension reconstruction. The accuracy of image segmentation directly affects the results of image 3D reconstruction. Medical image is a kind of grayscale image. In order to adequately utilize gray information and spatial information of image, the traditional 2D gray histogram is improved and forms the 2D D¿value attribute gray histogram. Computation method of average gray and 2D entropy is improved. Use spatial information as a substitute for gray probability to compute entropy. Computation of entropy is based on D-value attribute gray histogram and created spatial different attribute information entropy(SDAIVE). In experiment, a series of head CT images are segmented. Experimental results show that improved threshold method can better segment noise image. This method has strong anti-noise capability and clear segmentation results.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125071435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信