2010 Second International Conference on Computer Research and Development最新文献

筛选
英文 中文
Student's Perception of an Online Exam within the Decision Support System Course at Al al Bayt University 学生对Al Al Bayt大学决策支持系统课程在线考试的看法
2010 Second International Conference on Computer Research and Development Pub Date : 2010-05-07 DOI: 10.1109/ICCRD.2010.15
I. Al-Mashaqbeh, Ahmad Al Hamad
{"title":"Student's Perception of an Online Exam within the Decision Support System Course at Al al Bayt University","authors":"I. Al-Mashaqbeh, Ahmad Al Hamad","doi":"10.1109/ICCRD.2010.15","DOIUrl":"https://doi.org/10.1109/ICCRD.2010.15","url":null,"abstract":"The aim of this study is to measure students' perceptions toward the use of online exam as an assessment tool on university campus within a Decision Support System Course at Al al Bayt University. The study will show the advantages and disadvantages of the using an online exam on the university campus. To do so a questionnaire was delivered to students taking the course and then it was analyzed using the SPSS. The results showed that there was a positive perception towards the adopting of online exam.","PeriodicalId":158568,"journal":{"name":"2010 Second International Conference on Computer Research and Development","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133845689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Implementing the TLS Protocol on a Bare PC 在裸PC上实现TLS协议
2010 Second International Conference on Computer Research and Development Pub Date : 2010-05-07 DOI: 10.1109/ICCRD.2010.83
A. Emdadi, R. Karne, A. Wijesinha
{"title":"Implementing the TLS Protocol on a Bare PC","authors":"A. Emdadi, R. Karne, A. Wijesinha","doi":"10.1109/ICCRD.2010.83","DOIUrl":"https://doi.org/10.1109/ICCRD.2010.83","url":null,"abstract":"A bare PC is an ordinary computer that runs applications without an operating system (OS). It thus provides immunity from attacks that target specific OS vulnerabilities while eliminating the OS overhead in a conventional system. We describe a novel implementation of TLS that runs on a bare PC. The TLS implementation differs from a conventional TLS implementation in that it is included within a bare PC application that manages its own CPU tasks, directly interfaces to the hardware, and communicates with network protocols without using a standard socket interface. Furthermore, the unique software architecture of a bare PC enables the TLS, TCP, and application protocols to be intertwined, thereby reducing the communication overhead compared to that of a conventional system. As an example, we give details of the internal architecture of a bare PC TLS Web server. We then illustrate intertwining of the TLS, TCP, and HTTP protocols. In particular, we show how a state transition model that represents events and actions in the TLS Web server is used to develop the intertwined protocol code. We also discuss the testing methodology, note some challenges with respect to implementing TLS on a bare PC, and outline the measures taken to address them.","PeriodicalId":158568,"journal":{"name":"2010 Second International Conference on Computer Research and Development","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114200383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Design of Grid Supported Services for Mobile Learning System 面向移动学习系统的网格支持服务设计
2010 Second International Conference on Computer Research and Development Pub Date : 2010-05-07 DOI: 10.1109/ICCRD.2010.89
M. Sayuti
{"title":"A Design of Grid Supported Services for Mobile Learning System","authors":"M. Sayuti","doi":"10.1109/ICCRD.2010.89","DOIUrl":"https://doi.org/10.1109/ICCRD.2010.89","url":null,"abstract":"Handheld devices such as mobile phone and PDA have become widespread in every areas of life. In higher education context, these devices can be transformed into mobile learning tools which students can use to download and study learning materials anytime and anywhere. MAVGRID is designed as a system that support ubiquitous learning environment or m-Learning (Mobile Learning) environment. It uses Grid and Web Service as underlying technologies to provide efficient processing, distribution and sharing of large digital contents such as pictures, ebooks audios and videos. This paper discusses the proposed design of MAVGRID by using Convert AVI use case to explain how these technologies can be integrated to implement a system that supports m-Learning environment.","PeriodicalId":158568,"journal":{"name":"2010 Second International Conference on Computer Research and Development","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114269336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Comparison of Bow-Tie and Slot Antenna Based on RWG Edge Elements 基于RWG边缘单元的领结天线与槽形天线性能比较
2010 Second International Conference on Computer Research and Development Pub Date : 2010-05-07 DOI: 10.1109/ICCRD.2010.152
M. A. Hossain, Mushlah Uddin Sarkar, M. Amin, M. Islam
{"title":"Performance Comparison of Bow-Tie and Slot Antenna Based on RWG Edge Elements","authors":"M. A. Hossain, Mushlah Uddin Sarkar, M. Amin, M. Islam","doi":"10.1109/ICCRD.2010.152","DOIUrl":"https://doi.org/10.1109/ICCRD.2010.152","url":null,"abstract":"One of the most convenient way of analyzing antenna parameters using Rao-Wilton-Glisson (RWG) edge elements where the antenna surface is divided into a two dimensional array of very small triangle of alternately charged in continuous fashion. In this paper, the concept of RWG edge elements and method of moment (MoM) have been explored to determine distribution of surface current density, profile of magnetic field intensity and current density along the horizontal dimension of the antenna. In this paper, we have made a comparison between bow-tie and slot antennas in selecting appropriate antenna for a particular wireless link based on RWG edge elements.","PeriodicalId":158568,"journal":{"name":"2010 Second International Conference on Computer Research and Development","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114533803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Study of ERP Test-Suite Reduction Based on Modified Condition/Decision Coverage 基于修正条件/决策覆盖的ERP测试集缩减研究
2010 Second International Conference on Computer Research and Development Pub Date : 2010-05-07 DOI: 10.1109/ICCRD.2010.77
J. Prabhu, N. Malmurugan, G. Gunasekaran, R. Gowtham
{"title":"Study of ERP Test-Suite Reduction Based on Modified Condition/Decision Coverage","authors":"J. Prabhu, N. Malmurugan, G. Gunasekaran, R. Gowtham","doi":"10.1109/ICCRD.2010.77","DOIUrl":"https://doi.org/10.1109/ICCRD.2010.77","url":null,"abstract":"Enterprise Resource Planning (ERP) systems represent a huge market in the commercial arena. Products from suppliers such as SAP, Oracle and more recently, Microsoft, dominate the software market. Testing in these projects is a significant effort but is hardly supported by methods and tools other than those provided by the suppliers themselves. Experience shows that testing in these projects is critical, but often neglected. Recent 'lessons learned' work by the Paul Gerrard indicates that a benefit, risk- and coverage-based test approach could significantly reduce the risk of failures. It is evidence that modified condition/decision coverage (MC/DC) is an effective verification method and can help to detect safety faults despite of its expensive cost. In regression testing, it is quite costly to return all of test cases in test suite because new test cases are added to test suite as the software evolves. Therefore, it is necessary to reduce the test suite to improve test efficiency and save test cost. Many existing test-suite reduction techniques are not effective to reduce MC/DC test suite. This paper proposes a new test-suite reduction technique for MC/DC: a bi-objective model that considers both the coverage degree of test case for test requirements and the capability of test cases to reveal error. Our experiment results show that the technique both reduces the size of test suite and better ensures the effectiveness of test suite to reveal error.","PeriodicalId":158568,"journal":{"name":"2010 Second International Conference on Computer Research and Development","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116864932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Research on Honeypot Information Fusion Based on Game Theory 基于博弈论的蜜罐信息融合研究
2010 Second International Conference on Computer Research and Development Pub Date : 2010-05-07 DOI: 10.1109/ICCRD.2010.147
Wei Li-feng, Wang Xiao-bin
{"title":"Research on Honeypot Information Fusion Based on Game Theory","authors":"Wei Li-feng, Wang Xiao-bin","doi":"10.1109/ICCRD.2010.147","DOIUrl":"https://doi.org/10.1109/ICCRD.2010.147","url":null,"abstract":"It is an important factor for the honeypot decoy system to accurately analyze on intrusion information and precisely locate them. As there are some conflict and cooperation relationship among the collected data by honeypot system, it needs to fuse the honey information so that normal decision can be made for intrusions. The paper regarded the fusion process of honeypot information as game process among information, so as to integrate theory game theory and information fusion, then the optimal security decision can be arrived. The research uses a new approach to fuse the multisource information, which plays certain role on early warning of network.","PeriodicalId":158568,"journal":{"name":"2010 Second International Conference on Computer Research and Development","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117048833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Watermark Embedder and Detector for Medical Images: The Requirements and Design 医学图像水印嵌入与检测:需求与设计
2010 Second International Conference on Computer Research and Development Pub Date : 2010-05-07 DOI: 10.1109/ICCRD.2010.36
Siau-Chuin Liew, J. Zain
{"title":"Watermark Embedder and Detector for Medical Images: The Requirements and Design","authors":"Siau-Chuin Liew, J. Zain","doi":"10.1109/ICCRD.2010.36","DOIUrl":"https://doi.org/10.1109/ICCRD.2010.36","url":null,"abstract":"Watermarking had been proven to be able to protect medical images from unauthorized tampering and modification. Numerous watermarking schemes are available for different purposes depending on the security needs. Watermark embedding and detection process need to be performed in an efficient manner so that the operation of the health institution is not affected. This paper will focus on the development of a watermark embedding and detection application using existing tools from the design point of view to operate in a PACS (Picture Archiving and Communication Systems) environment.","PeriodicalId":158568,"journal":{"name":"2010 Second International Conference on Computer Research and Development","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115134300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Question Matching Based on Domain Ontology and Description Logic 基于领域本体和描述逻辑的问题匹配
2010 Second International Conference on Computer Research and Development Pub Date : 2010-05-07 DOI: 10.1109/ICCRD.2010.151
Jibin Fu, Shuhong Li, Y. Qu
{"title":"Question Matching Based on Domain Ontology and Description Logic","authors":"Jibin Fu, Shuhong Li, Y. Qu","doi":"10.1109/ICCRD.2010.151","DOIUrl":"https://doi.org/10.1109/ICCRD.2010.151","url":null,"abstract":"Question matching is a key stone in web intelligent question answering system. A novel question matching algorithm based on ontology and description logic is presented in the paper. Domain knowledge represented by ontology is very important in question matching. Concepts and relations between concepts are extracted from both standard and user questions, then the concepts and relations in standard questions are translated to description logic (DL) rules, while concepts and relations in user question are translate to predicate. User questions and standard questions are matched based on description logic and matching ranking technique. The formal and semantic ability of the question matching method derived from ontology and description logic. The experimental results show the question matching algorithm is superior to methods based on word retrieve technique in precision and recall.","PeriodicalId":158568,"journal":{"name":"2010 Second International Conference on Computer Research and Development","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123226072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Framework for Malware Detection Using Combination Technique and Signature Generation 基于组合技术和签名生成的恶意软件检测框架
2010 Second International Conference on Computer Research and Development Pub Date : 2010-05-07 DOI: 10.1109/ICCRD.2010.25
M. F. Zolkipli, A. Jantan
{"title":"A Framework for Malware Detection Using Combination Technique and Signature Generation","authors":"M. F. Zolkipli, A. Jantan","doi":"10.1109/ICCRD.2010.25","DOIUrl":"https://doi.org/10.1109/ICCRD.2010.25","url":null,"abstract":"Malware detection must apply sophisticated technique to minimize malware thread that can break computer operation. Nowadays malware writers try to avoid detection by using several techniques such as polymorphic, hiding and also zero day of attack. However, commercial anti-virus or anti-spyware that used signature-based matching to detects malware cannot solve that kind of attack. In order to overcome this issue, we propose a new framework for malware detection that combines signature-based technique and genetic algorithm technique. This framework consists of three main components such as s-based detection, GA detection and signature generator. These three main components will work together as interrelated process in our propose framework. Result from this study is the new framework that design to solve new launce malware and also to generate signature automatically that can be used on signature-based detection.","PeriodicalId":158568,"journal":{"name":"2010 Second International Conference on Computer Research and Development","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123498123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Customer Relationship Management: Lifecycle of Predicting Customer Lifetime Value 客户关系管理:预测客户终身价值的生命周期
2010 Second International Conference on Computer Research and Development Pub Date : 2010-05-07 DOI: 10.1109/ICCRD.2010.24
Lim Chia Yean, V. Khoo
{"title":"Customer Relationship Management: Lifecycle of Predicting Customer Lifetime Value","authors":"Lim Chia Yean, V. Khoo","doi":"10.1109/ICCRD.2010.24","DOIUrl":"https://doi.org/10.1109/ICCRD.2010.24","url":null,"abstract":"In more recent years, customer lifetime value(CLV) has been a popular research topic in the field of customer relationship management. Many models, methods and approaches have been used to predict CLV. However, there are no readily available integrated guidelines for its prediction. This paper proposes an iterative approach for predicting CLV, which highlights the common causes of success and failure in terms of business performance management. An initial computer-assisted template is proposed for CLV prediction and related research.","PeriodicalId":158568,"journal":{"name":"2010 Second International Conference on Computer Research and Development","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121602275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信