{"title":"Initiatives and Challenges in Countering Inappropriate Internet Use","authors":"Kittichote Rojanakul, Hu Liang","doi":"10.1109/ICCTD.2009.26","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.26","url":null,"abstract":"Harnessing and countering inappropriate internet use to prevent children from viewing inappropriate at home, internet café and to generate awareness of potential dangers from some websites and certain computer game pose to children and internet users. In order to prevent children from exposure to inappropriate internet content and to promote confident and safe use of the internet, government and private sector should get involved. This research is focus on the survey from internet and game online users in Thailand in general. It has generated greater awareness of internet danger as number of internet users has increased and beneficial to the expanding community of internet, computer users and society in general.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134413959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Introduction of Ethical Subject in Re-designed PhD-level Computer Education Curriculum: A Teaching Experience Driven in Thailand","authors":"N. Sureerattanan","doi":"10.1109/ICCTD.2009.156","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.156","url":null,"abstract":"Driving from recent crisis of global-social ethics and the author’s experiences through ethical-added teaching at all levels in higher education since 2006, the student’s interest and acceptance of ethical-added learning is an important motivation for substantial advance ethical subject into computer education curriculum. King Mongkut’s University of Technology North Bangkok (KMUTNB) provides computer education as a Department of Faculty of Technical Education. Almost PhD students come from teacher profession. Human resource management is the most important for all countries around the world because this kind of resource takes major roles in propelling management of other resources, and also its own. To reach really sustainable development, human mind in aspect of ethical conscious must be extremely educated, especially in teaching the teacher. This research purposes to describe the development of ethical subject in PhD-level computer education curriculum at KMUTNB. The curriculum was re-designed in 2008. The new subject entitled “Ethical Development for Social in Digital Age (EDSDA)” has firstly conducted in semester 1/2009 for PhD students enrolled in Doctor of Philosophy Program in Computer Education. The course syllabus will be mentioned. The students’ opinion to the course conduct for early 5 weeks of the semester will be discussed as preliminary result of EDSDA subject.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130756387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Edge-Based Approach for Video Text Extraction","authors":"Shi Jianyong, Luo Xiling, Zhang Jun","doi":"10.1109/ICCTD.2009.177","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.177","url":null,"abstract":"Text in video is a compact but effective clue for video indexing and summarization. In this paper, we propose an edge-based video text extraction approach with low computation, which can automatically detect and extract text from complex video frames. We first detect the edge maps of both an intensity image and its binarized image, and merge the two into one edge map, which contains less edge pixels of background but enriched edge pixels of text. Then, the projection profile method is used to evaluate the distribution of the resulting edge map in both horizontal and vertical directions. In both directions, an adaptive thresholding method is applied to identify adjacent pixel rows and columns which contain text. The intersections of these rows and columns are extracted as text regions. Finally, a novel extraction method based on monochromatism of text is applied to the regions. The output of the extraction method can be directly fed to OCR. The performance of our approach is demonstrated by presenting experimental results for a set of video clips and static images.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129788738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved Chinese Segmentation Algorithm Based on Segmentation Dictionary","authors":"Yan Niu, Lala Li","doi":"10.1109/ICCTD.2009.125","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.125","url":null,"abstract":"Based on the analysis of the traditional forward maximum matching word segmentation algorithm and the characteristics of the principle on the basis of the results of the use of word frequency statistics, we design a new structure of the dictionary, a dictionary based on the new structure to improve the matching algorithm are the largest. After time complexity analysis and experiments, the improved forward maximum matching algorithm can further improve the efficiency of segmentation.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133603719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Ab-Rahman, Norazilawati Md-Zain, S. M. Mustaza, Aida Baharuddin, K. Jumari
{"title":"2x3 Optical Moderator Based on Planar Waveguide Device for Ftth Application","authors":"M. Ab-Rahman, Norazilawati Md-Zain, S. M. Mustaza, Aida Baharuddin, K. Jumari","doi":"10.1109/ICCTD.2009.145","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.145","url":null,"abstract":"In this paper, we present the design of 2x3 optical moderator based on waveguide with SU-8 polymer material. The technology ensures low cost fabrication and excellent performance as compared to conventional technique that uses fused coupler for optical splitter fabrication. The optical moderator is suggested to be used in passive customer access network FTTH-PON to variety the signals send to the premises. It is the first time reported. The problems arose such as the loss of output power is also discussed. The simulation result shows that various factors; namely the width of waveguide, refractive index and wide-angle branching will increase the output power loss. To obtain maximum power, the optimization of those parameters’ value must be used. This designed optical splitter is operated at wavelength 1500 nm – 1600 nm. In this study, we characterized the trend of total output power with the effect of the parameters studied.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132616925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Property of Kippenhahn Curves of Hadamard Products and Applications","authors":"Guangyuan Zhao","doi":"10.1109/ICCTD.2009.219","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.219","url":null,"abstract":"In this paper, and will denote reducible companion matrices. we combine the Kronecker product, Hadamard product with numerical rang of matrices, discuss the relations between the Kronecker product, Hadamard product with numerical rang of matrices, and illustrate that the kippenhahn curve consists of consists of one ellipse whose foci are and axis has a length .","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132707657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessment of Leaner's Understanding: An Experimental Result","authors":"Adidah Lajis, N. A. Aziz","doi":"10.1109/ICCTD.2009.109","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.109","url":null,"abstract":"Assessing leaner’s answers is very time consuming for educators and limits them to be involved in other activities. In many cases, exam papers comprise of questions that require learners to write at least one or two sentences toe express their understanding. However, there are not many computer-based assessment tools due to limitations in computerized marking technology. Our research attempts to address this limitation by introducing a technique to evaluate short free text answer. It is based on a hybrid approach that combines natural language processing, information extraction and artificial intelligence. A textual answer is converted into a node link representation to extract the hidden knowledge structure. We then apply excess entropy to compute the amount of known information for each model and later compute the score accordingly.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131810943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automated Reference Services","authors":"Pradit Songsangyos, S. Tumthong","doi":"10.1109/ICCTD.2009.139","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.139","url":null,"abstract":"In this study, an automated reference services was proposed and implemented using an expert system shell. This expert system can be automated reference service, by allow the user access to information sources directly at anytime. The first task of the system development was to analyze of the problem domain “reference services”. The next task was the extraction of knowledge then design a hierarchically related subject list. The forward-chaining mechanism is used to reach the goal. Then the system goes to searching the record(s) of Thailand reference sources kept in the database system. Finally, was the design of the user and computer interfacing by menu interface.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132130884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Simulation Model for Optimizing Support Resources in Requirement of Warship Mission Reliability","authors":"Rui Wang, Qing-Min Li, Hongwei Zhu, Ying-Wu Peng","doi":"10.1109/ICCTD.2009.243","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.243","url":null,"abstract":"The configuration of support resources is a main factor affecting warship mission reliability. Seeking the balance between support resources and mission reliability to sustain the demands of missions is one of the targets of materiel support studies. This paper proposes a discrete-event simulation model written in ExtendSim and employs an enhanced evolutionary algorithm for optimizing support resources in requirement of warship mission reliability. This would help military planner determine the best configuration of support resources given objective mission reliability and make support decision in operational support concept design for specific military object.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132210739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Flexible Security Protocol in Collaborative Editing Environment: An Overview","authors":"M. A. Omar, R. Abdullah, F. Haron","doi":"10.1109/ICCTD.2009.183","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.183","url":null,"abstract":"This paper proposes flexible security protocol for synchronous and asynchronous collaborative editing environment. The flexible security protocol comprises of preventive and corrective measures. The preventive measures ensure user authentication, access control and data confidentiality. The corrective measure includes fault tolerant measures to ensure data integrity.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134008005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}