2009 Fourth International Conference on Computer Sciences and Convergence Information Technology最新文献

筛选
英文 中文
A Quantification Method for Network Security Situational Awareness Based on Conditional Random Fields 基于条件随机场的网络安全态势感知量化方法
Jianping Li, Huiqiang Wang
{"title":"A Quantification Method for Network Security Situational Awareness Based on Conditional Random Fields","authors":"Jianping Li, Huiqiang Wang","doi":"10.1109/ICCIT.2009.155","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.155","url":null,"abstract":"Network Security Situational Awareness(NSSA) has been a hot research spot in the network security domain. In this paper, a quantification method for NSSA based on conditional random fields(CRFs) was proposed. The data of network attacks from Intrusion Detection System (IDS), the hosts’ vulnerabilities and the hosts’ states were firstly combined as the network security factors. And then the network security threat degree was defined to quantify the risk of the whole network and classify the attacks. A diverse set of effective features were incorporated in CRFs Model. Finally the experiments on the DARPA 2000 data set generate the explicit network security situational graph. It proves that the method introduced in this paper can represent network risk more accurate and offer a good quantification for the network security situation.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116662913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Analysis of Topological Structure of TDOA Base-station Spatial and Location Precision on AWGN AWGN上TDOA基站空间定位精度拓扑结构分析
Gong Feng-xun, Ma Cuicui, Ma Yanqiu
{"title":"Analysis of Topological Structure of TDOA Base-station Spatial and Location Precision on AWGN","authors":"Gong Feng-xun, Ma Cuicui, Ma Yanqiu","doi":"10.1109/ICCIT.2009.331","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.331","url":null,"abstract":"On the Gaussian white noise environment, based on the TDOA multi-base stations, it is presented in this paper by adding the quantities of base stations, which improving TDOA location precision method. Secondly, multi-base stations distributed situation are discussed in order to analyze the impacts to precision. At last, for the mobile targets in multibase stations, the simulation based on multi-base stations location method is carried with Friedlander algorithm, and the impact of positioning algorithm is analyzed using cumulative distribution function (CDF) as a positioning accuracy of the evaluation of different indicators for multi-base stations and different geometric distribution of base stations, simulation results show that the positioning precision of the regular polygon is lower than the arbitrary polygon.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116737240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Significance of Second Language Digital Literacy Why English-Language Digital Literacy Skills Should be Fostered in Korea 第二语言数字素养的重要性为什么在韩国应该培养英语数字素养技能
R. Meurant
{"title":"The Significance of Second Language Digital Literacy Why English-Language Digital Literacy Skills Should be Fostered in Korea","authors":"R. Meurant","doi":"10.1109/ICCIT.2009.192","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.192","url":null,"abstract":"Although digital resources play an increasing role in Second Language Acquisition (SLA), Korean learners of English are provided with little deliberate instruction in Second Language (L2) Digital Literacy. Student computer usage for SLA purposes is minimal, but is governed by teacher expectations; if teachers do not encourage student use of computers in English, this will not likely spontaneously occur. Institutional recognition of the importance of L2 digital literacy to SLA is also limited. However, the predominant use of English by non-native speakers will be in communication with other non-native speakers, not with native speakers. Secondly, the emergence of English as a global language has meant that the predominance of online discourse is in English. Thirdly, a critical threshold is approaching where the majority of interpersonal communications will be computer-mediated, rather than face-to-face; and this trend will likely accelerate. Non-native speakers will mainly use their English to navigate English language digital resources, and publish online content in English; and in computer-mediated communication with other mainly non-native speakers of English. Therefore L2 Digital Literacy in English is critically important to student development. Proactive use of English-language digital resources is needed, as is the teaching and learning of English-language digital skills.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125272714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Support for Programming Education with Structured Program Design Using Combination of Phrases 使用短语组合的结构化程序设计支持编程教育
D. Inaba, F. Harada, H. Shimakawa
{"title":"Support for Programming Education with Structured Program Design Using Combination of Phrases","authors":"D. Inaba, F. Harada, H. Shimakawa","doi":"10.1109/ICCIT.2009.32","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.32","url":null,"abstract":"We propose a method of designing the behavior of the program with combination of phrases. In this method, two design stages are prepared. The first stage is for students to design the outline of the program behavior. In this stage, the behavior of the program is expressed with three control structures and their contents of processing. The second stage is for students to design each module in detail, considering relationships between modules. In this stage, students design procedures with roles of arguments. Since there are two stages for designing the behavior, teachers can force students to design it logically. Students can study how to design program behavior without learning the particular designing methods.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125217256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Simulation on System Dependability Self-Tuning Method Based on Grade Optimization 基于等级优化的系统可靠性自整定方法仿真
Mingchuan Zhang, R. Zheng, Qingtao Wu, Guanfeng Li, Wangyang Wei
{"title":"Simulation on System Dependability Self-Tuning Method Based on Grade Optimization","authors":"Mingchuan Zhang, R. Zheng, Qingtao Wu, Guanfeng Li, Wangyang Wei","doi":"10.1109/ICCIT.2009.96","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.96","url":null,"abstract":"Ensuring system dependability is a key problem to increase the user service performance. Depending on transcendental self-tuning knowledge, a system dependability self-tuning method based on grade optimization is proposed in this paper. It attempts to implement the sustained growth of system dependability by online dependability evaluation, dependability dynamic prediction and self-tuning scheme selection in turn, which accomplishes the self renewal of transcendental knowledge according to the realtime feedback of self-tuning strategy. The result of experiment shows that it will ensure the increase of system dependability increment.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130122504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on AHP Averaged Structure Method and PPCE Gradient Dimension Reduction Method to Evaluate Railway Emergency Plans Comprehensively AHP平均结构法和PPCE梯度降维法综合评价铁路应急预案的研究
Yan-hui Wang, Wen-ting Luo, Xue-mei Xiao
{"title":"Research on AHP Averaged Structure Method and PPCE Gradient Dimension Reduction Method to Evaluate Railway Emergency Plans Comprehensively","authors":"Yan-hui Wang, Wen-ting Luo, Xue-mei Xiao","doi":"10.1109/ICCIT.2009.78","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.78","url":null,"abstract":"In this paper, based on the study of the emergency rescue system and emergency rescue command information systems in Qinghai-Tibet Railway, with qualitative and quantitative analysis, theory and practice analysis, from local to the overall comprehensive analysis methods, using the questionnaire survey and local investigation mode, the comprehensive evaluation of emergency plans in railway is studied in-depth and systemically. Based on the establishment of comprehensive evaluation index system of railway emergency plan, the traditional AHP weights making method and PPCE model were improved, and the AHP averaged structure method and PPCE gradient dimension reduction method were established, so as to achieve the goal that the object which contains a complex index system and a lot of qualitative evaluation data can be evaluated comprehensively. It has been applied in the evaluation of comprehensive emergency plans, special emergency plans and station emergency plans in Qinghai-Tibet Railway. At the same time, this comprehensive evaluation method can be applied in other industries, offering a gist for other industries to evaluate and perfect emergency plans.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"169 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113991045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Two-Phase Set Partitioning Model for Passenger Transportation 客运两阶段集划分模型
Broderick Crawford, Carlos Castro, É. Monfroy
{"title":"A Two-Phase Set Partitioning Model for Passenger Transportation","authors":"Broderick Crawford, Carlos Castro, É. Monfroy","doi":"10.1109/ICCIT.2009.84","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.84","url":null,"abstract":"A two-phase set partitioning model is proposed to solve passenger transportation, this problem is a real life application for the pickup and delivery problem where vehicles have to transport passengers from their locations to different destinations with minimal routing cost. Following the classical cluster-first route-second approach the problem is modelled in two phases and solved like a set partitioning problem using ant computing.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"438 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122883146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Performance Optimization of Job Scheduling Model Based on Grid Environment 基于网格环境的作业调度模型性能优化
Chong-Yen Lee, Tsang-Yean Lee, Homer Wu, Hau-Dong Tsui, Jiun-Bo Huang
{"title":"A Performance Optimization of Job Scheduling Model Based on Grid Environment","authors":"Chong-Yen Lee, Tsang-Yean Lee, Homer Wu, Hau-Dong Tsui, Jiun-Bo Huang","doi":"10.1109/ICCIT.2009.268","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.268","url":null,"abstract":"To achieve the best quality of overall optimal performance on grid environment and user services, job loads need to be balanced in grids due to the non-uniformly distributed nature of jobs submitted to grids. Jobs are transferred from a heavy loaded grid to other grids in order to achieve performance optimization. The running cost of a job is calculated at the time it is completed. In this paper, we propose a job schedule model considering job cost and performance. The algorithm is resided in all grids to schedule and arrange their own jobs by themselves to get best performance without extra user cost.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127716221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Rapid Mesh Fusion Method to Create 3D Virtual Characters in Games 一种快速网格融合方法在游戏中创建3D虚拟角色
Minchih Tsai, T. Lu
{"title":"A Rapid Mesh Fusion Method to Create 3D Virtual Characters in Games","authors":"Minchih Tsai, T. Lu","doi":"10.1109/ICCIT.2009.276","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.276","url":null,"abstract":"With an increasing growth of games and animations, animators pay attention to design sophisticated 3D models with vast imagination, while 3D model constructions are a labor-extensive and time-consuming task. In this paper, we aim to reuse existing mesh models to reproduce a virtual character by means of the proposed mesh fusion method. In comparison with the conventional fusion methods, we tend to develop a rapid method instead of devising an off-line technology. The proposed method first selects two fragmented models that have been cut in advance by users, and integrates the mesh fragments into a complete model with little user interference. In order to associate the two mesh fragments with each other, a unit circle is used to project two open cutting boundaries on it; in addition, we take advantage of mesh morphing to generate a mesh patch in between the two open cutting boundaries and smooth the patch by using the Bezier interpolation. The experimental results show that the proposed method will be able to create a virtual character with an even in-between patch and a low time complexity.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128099184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Impact of Culture on Mobile Phone Service Adoption and Diffusion: A Cross-Country Analysis 文化对移动电话服务采用和传播的影响:一项跨国分析
Bobby Swar, Jedong Kim, D. Lee, Jung-Nam Moon
{"title":"Impact of Culture on Mobile Phone Service Adoption and Diffusion: A Cross-Country Analysis","authors":"Bobby Swar, Jedong Kim, D. Lee, Jung-Nam Moon","doi":"10.1109/ICCIT.2009.104","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.104","url":null,"abstract":"In recent years mobile phone service has witnessed a massive surge in diffusion. This diffusion is considered an outcome of economic, political, geographical and cultural factors. Literature review shows that role of cultural factor in mobile phone service diffusion is still understudied. The rate of adoption and diffusion differs considerably across the countries. This study attempts to analyze the impact of national culture on the adoption and diffusion of mobile phone services. For this purpose, the study adopts the mobile penetration data of and uses Hofstede’s cultural dimension values across different countries. Based on the Hofstede’s cultural dimension values, the countries are categorized into different clusters. Then the coefficient of innovation effect and imitation effect is determined by using Bass diffusion model. Finally a comparison is made among the clusters to infer whether the culturally similar countries have similar adoption and diffusion behavior than culturally dissimilar countries.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133627915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信