2009 International Conference on Computer Technology and Development最新文献

筛选
英文 中文
Shortest Path Simulation Using Interactive SVG Map 使用交互式SVG地图的最短路径仿真
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.204
J. Sidi, Liew Wei Fa, Syahrul Nizam Junaini
{"title":"Shortest Path Simulation Using Interactive SVG Map","authors":"J. Sidi, Liew Wei Fa, Syahrul Nizam Junaini","doi":"10.1109/ICCTD.2009.204","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.204","url":null,"abstract":"This paper presents reports a design and development of the interactive map using Scalable Vector Graphics (SVG) that can be used to find the shortest path. Using our interactive map, the user will be able to set the route or path to the desired location. If that path is congested, the map will find the second shortest path to the user. In the usability study, we have tested the map with the mean value of 4.76 out of 5.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121433765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Exploratory Study of Storytelling Approach as an Instructional Tool from Educators' Perspective 教育工作者视角下讲故事教学法的探索性研究
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.122
Savita K. Sugathan, K. Kalid
{"title":"An Exploratory Study of Storytelling Approach as an Instructional Tool from Educators' Perspective","authors":"Savita K. Sugathan, K. Kalid","doi":"10.1109/ICCTD.2009.122","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.122","url":null,"abstract":"In today’s education scenario, educators intentionally and unintentionally use stories as part of their teaching tool to increase students’ understanding. While storytelling is widely recognized tool in classroom teaching, its implementation and acceptance in higher education institution in Malaysia is still unclear. This paper reports a case study that explores the perception of educators in the usage of storytelling as a teaching aid in courses at Universiti Teknologi PETRONAS. The objectives of this study are to explore the usage of stories and acceptance of stories as a teaching aid in lecture as well as issues faced by the educators in utilizing the storytelling approach. This study is an exploratory case study that uses a mixed method approach. Data were collected from June until December 2008 through interviews, questionnaires and non-participant observation. Results show that 67% of the participants have used stories in their lectures. Overall, the results indicate that the storytelling approach is practiced deliberately and in deliberately by educators. The usage of storytelling has raised a number of issues such as lack of understanding and lack of awareness of the approach. However, educators believe that storytelling can facilitate the learning process in higher education and encourage the critical thinking skills in students.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114422724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Research and Application of SOA in B2B Electronic Commerce SOA在B2B电子商务中的研究与应用
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.256
Li Xiong-yi
{"title":"Research and Application of SOA in B2B Electronic Commerce","authors":"Li Xiong-yi","doi":"10.1109/ICCTD.2009.256","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.256","url":null,"abstract":"With the rapid development of Internet technology today, B2B E-commerce quickly grows up. Enterprises only have their own business system, is unable to meet the rapidly changing business needs, which bring by corporate merger acquisition and fierce competition. Enterprises must be able to face to the market quickly, find a better approach of information systems integration, so that suppliers and partners are more effective collaboration through the network. SOA including the protocols and standards are a new distributed scheme. The goal of SOA is to provide a common technology layer, which is independent upon languages and platforms. The applications of different platforms need this technology layer to connect and integrate with each other. SOA technology is used in E-commerce can be good to meet these needs. In the network era, B2B E-commerce is developing continuously. Although most of the corporations have accomplished the informational- action, they always are independently. How to integrate the systems of several corporations and use the B2B E-commerce systems synthetically becomes the most important problem. With the change from developing a new system to using existing systems adequately, the Service-Oriented Architecture becomes the best way to satisfy the new demand. SOA can increase reusability, reduce the total cost, Therefore, SOA has become an effective method to solve application integration. This paper provides first an overview of the B2B E-commerce, then a brief introduction of the key SOA technologies, and final a scheme of using SOA technologies to construct a B2B E-commerce model on the J2EE platform.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113958917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
The Development of a Web-Based Claims System 基于web的索赔系统的开发
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.248
S. Idrus, A. Rozali, H. Desa
{"title":"The Development of a Web-Based Claims System","authors":"S. Idrus, A. Rozali, H. Desa","doi":"10.1109/ICCTD.2009.248","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.248","url":null,"abstract":"The main purpose of this study is to develop a computer system for University Malaysia Perlis (UniMAP) staff to make claims via electronic media. Since this system is Web-based, staff can make claims anywhere, anytime and at any locations. This method can overcome not only human errors but also more efficient, fast and accurate. Therefore, this system can also save time, effort, and administrative costs. In this study, Active Server Pages (ASP) has been chosen to make the calculation and also to generate reports. After the system has been developed, a test was conducted using forms that have been simulated manually. The purpose is to enable the researcher to make comparison with the ones made using the developed system in order to detect errors or flaws from the manual simulation in the system.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128148724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Review on Fingerprint Classification Techniques 指纹分类技术综述
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.240
Fadzilah Ahmad, D. Mohamad
{"title":"A Review on Fingerprint Classification Techniques","authors":"Fadzilah Ahmad, D. Mohamad","doi":"10.1109/ICCTD.2009.240","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.240","url":null,"abstract":"Automatic fingerprint recognition has been widely applied as a personal identification tool and biometrics applications due to their reliability and uniqueness features. One of the important tasks for any large scale fingerprint recognition system is fingerprint classification. Classifying a fingerprint images is a very difficult pattern recognition problem, due to the small interclass variability, the large intraclass variability, the presence of noise and the ambiguous properties of fingerprints. An accurate classification algorithm can greatly reduce the number of comparisons during fingerprint retrieval and consequently speeded up the identification process. Over the past few decades, a significant amount of researches and techniques has been proposed for distinguishing fingerprint classes. In this paper, we review existing approaches that have been applied to the classification problems. The explanation and discussion in this paper will cover the issues, designs and performance of several techniques for fingerprint classification system.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128158860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
An XML-Based Syllabus Repository System for Inter-university Credit Exchange Systems 基于xml的校际学分交换教学大纲存储系统
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.53
S. Chatvichienchai
{"title":"An XML-Based Syllabus Repository System for Inter-university Credit Exchange Systems","authors":"S. Chatvichienchai","doi":"10.1109/ICCTD.2009.53","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.53","url":null,"abstract":"In this paper, two problems in publishing syllabus information for inter-university credit exchange systems are discussed. The first is overhead cost in preparing and publishing syllabi of the systems every year. The second is that the website presenting the syllabi lacks a search facility that allows a student to find the courses satisfied by complex search condition. In order to solve the above problems, an XML-based syllabus repository system (XSRS) which integrates syllabus data from affiliated universities is proposed. In order to minimize the impact of implementing this system on faculty staff operations, a technique that can extract syllabus data from the documents edited by some office software is also presented.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131364586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Establishing an Efficient and Searchable Encrypted Log Using Record Authenticator 利用记录认证器建立高效、可搜索的加密日志
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.228
A. Sabbaghi, F. Mahmoudi
{"title":"Establishing an Efficient and Searchable Encrypted Log Using Record Authenticator","authors":"A. Sabbaghi, F. Mahmoudi","doi":"10.1109/ICCTD.2009.228","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.228","url":null,"abstract":"Audit logs are very important part of any secure system and should be highly considered. The content of them which is past events is so sensitive and poses a threat to privacy and information security, so should be protected against any illegal reading and modification. The best way to do this is encryption. Important challenges in an encrypted audit log are speed of log and search process, correctness and semantic of search results and log size. In this paper a novel algorithm in order to build a secure searchable encrypted audit log by generating a record authenticator is presented. SQL command keywords along with their places, form record authenticator. Our new algorithm brings remarkable advantages such as: fast and high accurate search without decrypting any record, fast logging process, keeping tamper resistance of the log, decreasing log size and improving the correctness of search results by recognizing all irrelevant records in search time.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130067713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Notice of RetractionHow to be an Innovative Organization - Developing a Culture of Innovation in Organizations 如何成为一个创新的组织——在组织中培养创新文化
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.68
U. Kanchan, A. Gupta
{"title":"Notice of RetractionHow to be an Innovative Organization - Developing a Culture of Innovation in Organizations","authors":"U. Kanchan, A. Gupta","doi":"10.1109/ICCTD.2009.68","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.68","url":null,"abstract":"Innovation & creativity are the valuable intangible assets which play a vital role in the transformation of business & society. The emergence of globalization & increasing competition created a threat for the organizations to survive in market and innovation & differentiation became necessity to sustain economic development and competitiveness. Recessions and times of uncertainty present unusual opportunities. In these times, companies need to seize new opportunities not by retrenching, but by rebalancing: focusing on the right innovation projects and then executing those innovations more efficiently, effectively and creatively. Therefore every organisation wants to be more and more innovative. Innovation comes in many forms like product innovation, process innovation, service innovation, business model innovation etc but it is not so easy to become innovative. Many barriers exist in the way of innovation and one of the biggest & powerful hurdles to becoming more innovative is changing the corporate culture to accept and embrace innovation. The prevailing age of cost cutting and focus on process excellence have created in many firms a culture that is focused on the risk avoidance & operational excellence. For including innovation in the culture & to see innovation as one of the corporate objectives, it is required that the culture must change to accommodate the risk of failure and uncertainty along with the focus on innovation. This paper takes a brief look on the dimension of innovation and different forces & strategies that can help in shaping the culture to drive innovation. The focus is on the idea that how the people of an organisation may become more innovative.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131523522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Architecture and Characteristics of Wireless Sensor Network 无线传感器网络的结构与特点
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.44
Yong-Min Liu, Shu-Ci Wu, Nian Xiao-hong
{"title":"The Architecture and Characteristics of Wireless Sensor Network","authors":"Yong-Min Liu, Shu-Ci Wu, Nian Xiao-hong","doi":"10.1109/ICCTD.2009.44","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.44","url":null,"abstract":"As a novel information acquiring and processing technology, WSN (wireless sensor network) is made by the convergence of sensor, micro-electro-mechanism system and networks technologies. WSN consist of small nodes with sensing, computation and wireless communication capabilities. Various architectures have been developed for WSN, depending upon the requirement of application. WSN are used in different applications e.g. environmental monitoring, habitat monitoring, home automation, military application etc. In this paper we present the architecture and characteristics of WSN. As viewed from the existing work, the hot spots recent representative routing protocols are analyzed, and their characteristics and application areas are compared. Finally, the future research issues in this area are pointed out.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130757583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
ECA Rule Analysis in a Distributed Active Database 分布式活动数据库中的ECA规则分析
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.282
J. Medina-Marin, G. Pérez-Lechuga, Xiaoou Li
{"title":"ECA Rule Analysis in a Distributed Active Database","authors":"J. Medina-Marin, G. Pérez-Lechuga, Xiaoou Li","doi":"10.1109/ICCTD.2009.282","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.282","url":null,"abstract":"Active database systems integrate event-based rule processing with traditional database functionality. The model most widely used to represent event-based rules is the Event- Condition-Action rule (ECA rule) model. However, the relationships among rules in the development of a base of ECA rules can fall in an infinite rule triggering: the No termination problem. In this article, an approach based in Petri Net theory is proposed. This approach detects cyclic paths in the base of ECA rules. Furthermore, it can analyze the relationships among ECA rule components.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130872996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信