5th International Conference on Computer Sciences and Convergence Information Technology最新文献

筛选
英文 中文
Research on the application of a Web2.0 concept-based internet search portfolio platform 基于Web2.0概念的互联网搜索组合平台的应用研究
Koun-Tem Sun, Hsin-Te Chan, Kai-Min Chan
{"title":"Research on the application of a Web2.0 concept-based internet search portfolio platform","authors":"Koun-Tem Sun, Hsin-Te Chan, Kai-Min Chan","doi":"10.1109/ICCIT.2010.5711039","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711039","url":null,"abstract":"After analyzing previous researchers' researches, most of them focused on “how to improve teachers' evaluation capability on students' search capability.” In terms of the recording of search portfolio, none of them is complete. Taking the above understanding into consideration, this study combined web 2.0 concept and using the learning portfolio records of internet searching hoping to construct an on-line learning system that can “comprehensively record,” “completely share” and “actively present” the learning portfolio. Subjects of this research are fourth grade primary school students. It is proven by the experiment that no matter the teacher or the student, they all can record the complete search process and observe others' portfolio data in full. For teachers, they can explore students' search behavior in a more complete sense. For students, it is proven by experiment result analysis that observation-based learning is helpful for students search results.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126803553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A grid-enabled problem solving environment for in-silico screening in drug discovery 一个网格化的问题解决环境,用于药物发现中的计算机筛选
Soonwook Hwang, Sehoon Lee, Sangdo Lee, Jincheol B. Kim, Vincent Breton, J. Salzemann, Hanh Thi Thanh Nguyen, Doman Kim
{"title":"A grid-enabled problem solving environment for in-silico screening in drug discovery","authors":"Soonwook Hwang, Sehoon Lee, Sangdo Lee, Jincheol B. Kim, Vincent Breton, J. Salzemann, Hanh Thi Thanh Nguyen, Doman Kim","doi":"10.1109/ICCIT.2010.5711070","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711070","url":null,"abstract":"WISDOM is an international initiative to deploy large-scale in-silico docking on a public grid infrastructure in an attempt to find potential drugs against neglected or emerging diseases such as Malaria and Avian Flu. Within the framework of the WISDOM initiative, large-scale deployments of in silico docking have been done on production grid infrastructures, demonstrating the relevance of large scale grids for high throughput virtual screening from scientific and grid deployment perspective. However, from the usability point of view, there still seems to be a lot to be done in order to be able to get the grid-enabled large-scale virtual screening approach handier for non-experts of grid computing. To address this issue, we have developed an intuitive and easy-to-use grid-enabled virtual screening tool called Drugscreener-G (DSG), aiming to help scientists in drug discovery including biologists and biochemists to more easily carryout large-scale deployment of molecular docking on grids without having to know details of grid middleware services and tools. With the help of DSG, scientists can easily have access to the PDB database, download and view the 3D structure of target proteins of their interest, launch and manage millions of in-silico docking simulations on the Grid. To facilitate the analysis of docking results, visualization and molecular modeling tools such as Jmol and Chimera have been integrated into DSG as well. The DSG client tool is now being used and tested by biologists in Chonnam National University, one of long-time partners of the WISDOM collaboration. With the help of tools like DSG, their long-time dream of large-scale virtual screening on their own at any time with any help from grid experts is to be made realized in the near future.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121090534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure data mechanism for iATA Protocol iATA协议的安全数据机制
Shirly Lee, Hyotaek Lim, Hoon-Jae Lee
{"title":"Secure data mechanism for iATA Protocol","authors":"Shirly Lee, Hyotaek Lim, Hoon-Jae Lee","doi":"10.1109/ICCIT.2010.5711221","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711221","url":null,"abstract":"The emerging of ubiquitous technology has transformed mobile device such as PDA and smart phone from a device once considered as a luxury to a daily requirements device. This trend has lead the increasing of mobile data storage demand. In year 2008, Internet Advanced Technology Attachment (iATA) has been introduce by Yu-Shu They et al as one of the alternate solution to resolve the mobile devices' storage limitation issues. With iATA, mobile users are able to access their valuable data through the network anytime anywhere as is the storage device attached to them locally. However data safety is always a concern to the user in iATA environment as data transmission in iATA done via open TCP/IP network without adopting any security defense. The mobile user does not only wish to access their data ubiquity but they also can't let go the security of their data. In this paper, we focus on how to provide data authentication and confidentiality for iATA protocol. Taking consideration of the mobile devices' limited resources, we propose a lightweight secure data mechanism with the combination of nested hash function and NLM-128.In the propose mechanism we use nested hash function to provide data authentication, subsequently encrypt the message and the hash code with NLM-128 cipher to ensure the data confidentiality.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121202141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dental application: The steps toward the implementation of the CephSmile plus Services 牙科应用:实现CephSmile plus服务的步骤
C. Sinthanayothin, W. Bholsithi, N. Pichitchaiphan
{"title":"Dental application: The steps toward the implementation of the CephSmile plus Services","authors":"C. Sinthanayothin, W. Bholsithi, N. Pichitchaiphan","doi":"10.1109/ICCIT.2010.5711072","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711072","url":null,"abstract":"Software plus Services might be the next step in the evolution of computing. Software plus Services is a concept that Software as a Service (SaaS) complements the traditional packaged software running on both client and server by services adding value. CephSmileV2 is dental application software for 2D cephalometric analysis, dental model analysis and focusing on orthodontics treatment planning and applied to simulate changes on the facial profile after receiving treatment. CephSmileV2 could be used to analyze craniofacial growth changes that lead to skeletal discrepancies and to study the cause of malocclusions. Since CephSmileV2 is intended to be sell as services or so called CephSmile plus Services, therefore, the implementation of the program to enable access to the web database is developed. There are two main steps for developing the CephSmile Plus Services. First step is the development of CephSmile V2 Program, which six main features have been developed as follows: Lateral Cephalometric Analysis, Superimposition, Orthodontic Treatment Simulation, PA Cephalometric Analysis, 3D Skull Simulation from 2D x-ray views and Dental Model Analysis. Second step is the implementation of CephSmile Plus Services, which divided in to two main steps: First step is the development of web database which is designed using PHP and MySQL. Second step is the further developing on the CephSmile V2 program to connect to the database via the network follow REST guideline using GET and POST methods. The result shows that CephSmileV2 can be used as a diagnostic tool for orthodontics treatment and simulation which requires username/password to login to database. The result also demonstrates the details of login user to use the CephSmile V2 program in term of amount of hours, amount of usages, functions that user has been accessing. Also the administrator is allowed to create the user account and setup the capabilities of user level in different packages: gold, silver, platinum and titanium packages. It is concluded that CephSmile plus Services can be provided to the orthodontist community as software plus services.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116648868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Departure headway distribution modeling for ordinary large cities based on video information 基于视频信息的普通大城市发车时距分布建模
Jian Wu, Jianming Hu, Jianbo Sun
{"title":"Departure headway distribution modeling for ordinary large cities based on video information","authors":"Jian Wu, Jianming Hu, Jianbo Sun","doi":"10.1109/ICCIT.2010.5711216","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711216","url":null,"abstract":"Departure headway distribution is significant for intelligent traffic control and traffic simulations. Jilin, an ordinary large city, is selected in this paper to study the departure headway distributions. Experimental results show that the log-laplace distribution model fits headway data better for free flow traffic condition, while the log-logistic distribution model is more suitable on the peak hours. The existed studies of departure headway distributions in extremely large cities, e.g. Beijing are different from those obtained in this paper. The results are useful for traffic signal optimization, since signal timing algorithms should be modified for different city scales as well as different traffic conditions.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131415089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Access control through self-existent mechanism 通过自存在机制进行访问控制
Xiaoxia Zheng, Fangyong Hou, Hongjun He, Nong Xiao
{"title":"Access control through self-existent mechanism","authors":"Xiaoxia Zheng, Fangyong Hou, Hongjun He, Nong Xiao","doi":"10.1109/ICCIT.2010.5711212","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711212","url":null,"abstract":"This paper proposes a security paradigm named self-existent mechanism of access control. The most distinct character is that it runs absolutely independent from program executing environment, even without cooperation of OS. That is to say, it has a unique structure to assure that computing is controlled under a secure mechanism that cannot be penetrated by software like virus, Trojan and other malicious programs. This paper explains its principle, and describes how to accomplish such control over general computers. Also, this paper gives advice to the design of microprocessor to make this control mechanism to work better.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133501187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The control model of engineering cost in construction phase of high-speed railway 高速铁路建设阶段工程造价控制模型
L. Lihua, Su Yikun
{"title":"The control model of engineering cost in construction phase of high-speed railway","authors":"L. Lihua, Su Yikun","doi":"10.1109/ICCIT.2010.5711158","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711158","url":null,"abstract":"To improve the efficiency of cost control in the high speed railway construction phase, we set up the model of earned value and install FBCWS index, through the contrast between FBCWS index and ACWP' index, we improve the efficiency of cost control in construction stage, so that we can do the better in the direction and control before costs incurred and make the construction cost control management more scientifically and effectively in the construction phase of high-speed rail project.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134530999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Action recognition using hybrid spatio-temporal bag-of-features 基于混合时空特征袋的动作识别
Fei Hu, Limin Luo, Feng Zhang, Jia Liu
{"title":"Action recognition using hybrid spatio-temporal bag-of-features","authors":"Fei Hu, Limin Luo, Feng Zhang, Jia Liu","doi":"10.1109/iccit.2010.5711168","DOIUrl":"https://doi.org/10.1109/iccit.2010.5711168","url":null,"abstract":"","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114224691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Generic modeling of music for computational education and recognition of song variations 用于计算教育和歌曲变奏识别的通用音乐建模
F. Seifert, M. Rentzsch
{"title":"Generic modeling of music for computational education and recognition of song variations","authors":"F. Seifert, M. Rentzsch","doi":"10.1109/ICCIT.2010.5711217","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711217","url":null,"abstract":"For purposes of identification and education todays music modeling is rather limited. Systems that can identify music in a generic way are either very restricted or do not exist at all. Therefore, it is not possible to associate the countless potential occurrences of a certain song with at least one generic description. Analogously, there is no computational approach to evaluate the performance of a music student who has been asked to play a certain song and to accompany it in a certain style. We introduce a generic model for music representation. To test our model, we have developed a prototype that correlates symbolic music performances to the proposed representation.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123473800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Development of the belt-type ECG measurement system for wearable health monitoring 用于可穿戴健康监测的带式心电测量系统的研制
Yun-Hong Noh, S. Ye, Do-Un Jeong
{"title":"Development of the belt-type ECG measurement system for wearable health monitoring","authors":"Yun-Hong Noh, S. Ye, Do-Un Jeong","doi":"10.1109/ICCIT.2010.5711193","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711193","url":null,"abstract":"Nowadays, the advance in sensors network, integrated circuit and wireless communication technologies giving capability of designing lightweight and low-cost sensor nodes particularly for healthcare application. In this paper, a wearable belt-type ECG electrode worn around the chest is designed for sake of the convenience to measure real-time ECG. The measured ECG signals carry a lot of clinical information for a cardiologist especially for heart arrhythmia detection. DTW (dynamic time warping) method is applied on normal ECG and abnormal ECG to detect arrhythmia detection. Arrhythmia detection algorithm using MIT-BIH databases is performed for performance evaluation purpose.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122872439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信