2009 International Conference on Computer Technology and Development最新文献

筛选
英文 中文
Implementation of 2-Pass Mesh Warping Algorithm by Using Bezier Curve 利用Bezier曲线实现2通道网格翘曲算法
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.153
Vilas Lambture, A. Gaidhani, Shashikant R. Kamble
{"title":"Implementation of 2-Pass Mesh Warping Algorithm by Using Bezier Curve","authors":"Vilas Lambture, A. Gaidhani, Shashikant R. Kamble","doi":"10.1109/ICCTD.2009.153","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.153","url":null,"abstract":"In this paper, successfully we implemented 2-pass mesh warping algorithm by using Bezier curve for warping the images and various video effects that consists two passes. We obtained enchanting results on various images. Mainly its applications are remote sensing, movies and advertisements.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130946280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on the Application of RBF NN on Enterprise Early-warning RBF神经网络在企业预警中的应用研究
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.50
S. Yang
{"title":"Research on the Application of RBF NN on Enterprise Early-warning","authors":"S. Yang","doi":"10.1109/ICCTD.2009.50","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.50","url":null,"abstract":"Enterprise early-warning management is a new mode in the modern enterprise management. The introduction of Neural Network (NN) into enterprise management is one of the newly development orientations of artificial intelligence. The Radial Basis Function (RBF) NN was introduced into enterprise early-warning management. The method of compound index was applied to deal with the indexes. And a dynamic nearest neighbor-clustering algorithm was putted forward to computer the hidden nodes’ number and center value, which overcome the dependence of most neighbor algorithm on parameters. Using the monitoring indexes based on the compound index method, the mathematics model was constructed. Simulation result that adopted RBF NN indicates that the method has good effect, which also proves the validity of this method.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132783842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Monitoring of the Network Traffic Based On Queuing Theory and Simulation in Heterogeneous Network Environment 异构网络环境下基于排队理论的网络流量监控与仿真
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.242
S. H. Kamali, Maysam Hedayati, A. Izadi, Hamid reza Hoseiny
{"title":"The Monitoring of the Network Traffic Based On Queuing Theory and Simulation in Heterogeneous Network Environment","authors":"S. H. Kamali, Maysam Hedayati, A. Izadi, Hamid reza Hoseiny","doi":"10.1109/ICCTD.2009.242","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.242","url":null,"abstract":"This paper evaluate and estimate the monitoring of the network traffic based on queuing theory in heterogeneous environment the monitoring of network traffic is necessary for evaluating of efficiency and confidence from constant operations of network which we discuss the performance and prediction of network traffic management and will give a suggestion for control the performance of work traffic based on queuing theory and little law theory and balancing the network Congestion rate (which divided to two groups instantaneous and stable Congestion). So, we can understand intellectually prediction process and aware of network traffic. Finally, for conclusion, we simulate network environment LAN based on queuing theory which can be a model for real world (Network environment LAN).","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133562873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Performance of WiMAX Security Algorithm (The Comparative Study of RSA Encryption Algorithm with ECC Encryption Algorithm) WiMAX安全算法的性能(RSA加密算法与ECC加密算法的比较研究)
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.192
Masood Habib, T. Mehmood, Fasee Ullah, M. Ibrahim
{"title":"Performance of WiMAX Security Algorithm (The Comparative Study of RSA Encryption Algorithm with ECC Encryption Algorithm)","authors":"Masood Habib, T. Mehmood, Fasee Ullah, M. Ibrahim","doi":"10.1109/ICCTD.2009.192","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.192","url":null,"abstract":"IEEE 802.16, known as WiMax, is at the top of communication technology drive because it is gaining a great position in the next generation of wireless networks. Due to the evolution of new technologies wireless is not secured as like others networking technologies. A lot of security concerns are needed to secure a wireless network. By keeping in mind the importance of security, the WiMax working groups has designed several security mechanisms to provide protection against unauthorized access and malicious threats, but still facing a lot of challenging situations. An authentication and authorization model provides protection for a network or technology and protects its resources from unauthorized use. This paper examines the threats which are associated with MAC layer and physical layer of WiMax and also proposes some enhancements to the existing model for improving the performance of the encryption algorithm. The paper proposes some techniques in the existing model to enhance its functionality and capability. Simulation is done using Qualnet4.5 simulation tool and the results are given at the end.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133709427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Analysis, Design and Implementation of a Web-Based Payroll Application Software 基于web的工资单应用软件的分析、设计与实现
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.112
Husin J. Then, B. Issac, L. T. Chung, Susanti Wongso, Riyan Bong, Lesley Lu, Yu Ling
{"title":"Analysis, Design and Implementation of a Web-Based Payroll Application Software","authors":"Husin J. Then, B. Issac, L. T. Chung, Susanti Wongso, Riyan Bong, Lesley Lu, Yu Ling","doi":"10.1109/ICCTD.2009.112","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.112","url":null,"abstract":"The need to develop customized application software is quite high now-a-days with the ever increasing automation process within many companies. In this paper, we analyze, design, implement and test a web-based payroll software for an external company with the Setup module, PI (personnel information) module, OT (over time) module, Payroll module and Report module. These modules and their implementation are discussed in detail. The software development life cycle followed is discussed to show how different phases are evolved and how they interact with each other to form the software that the client needs.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132285793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Realization of an Economical Self-Fabricated Polymer Optical Fiber Splitters for Small World Communication 用于小世界通信的经济型自制聚合物光纤分路器的实现
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.222
Mohd Syuhaimi Ab-Rahman, K. Jumari, H. Guna, M. Harun
{"title":"Realization of an Economical Self-Fabricated Polymer Optical Fiber Splitters for Small World Communication","authors":"Mohd Syuhaimi Ab-Rahman, K. Jumari, H. Guna, M. Harun","doi":"10.1109/ICCTD.2009.222","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.222","url":null,"abstract":"Small world networks are promising candidates for communication networks since typical data-flow patterns in communication networks show a large amount of clustering with a small number of long-distance communications that need to be completed quickly. Polymer Optical Fiber (POF) can be and are being used in various fields of application. Two of the main fields are the automotive and the home networking. So, POF here can be seen as one of the best solutions for small world communication especially in home networking application. In this paper, optical 1x3 fused-taper-twisted polymer optical fiber (POF) splitters has been fabricated by a perform technique and proposed to be applied on small world communication application. There several systems available on the market, which can be split a coupled signal to be transmitted into some different channels, which are all afflicted with certain disadvantages. But all these solutions have one main disadvantage; they are all too expensive for most of the applications mentioned above. So the goal of this study is to develop an economical splitter for small world communication over POFs. Characterization of the splitter was reported. Red LED with a 650 nm wavelength has been injected into the splitter for the purpose of characterization testing to analyze the level of power efficiency of the splitter. Final analysis shows that efficiency of splitter output able to reach up to 30%. The device performance can be improved gradually through experience and practice. Main point here is, the fabrication process is simple, easy and suitable to be used for household.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128871311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Architecture of Distributed Traffic Simulation System Based on SOA and Multi-Agents 基于SOA和多agent的分布式交通仿真系统体系结构
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.63
B. Jiang, Hai Zhang
{"title":"Architecture of Distributed Traffic Simulation System Based on SOA and Multi-Agents","authors":"B. Jiang, Hai Zhang","doi":"10.1109/ICCTD.2009.63","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.63","url":null,"abstract":"The architecture of distributed traffic simulation system has much to do with its performance, flexibility and maintainability. To improve the heterogeneity, reusability and interoperability of the system as well as the coordination among different modules, the architecture with four layers is designed based on Service Oriented Architecture (SOA) and multi-agents. New modules are encapsulated into Service Component Architecture (SCA) composites, which not only meet the requirements of heterogeneity and reusability but also facilitate constructions and assemblies of services. Moreover, SOA accessing modules are designed to facilely incorporate existing applications into the SOA system with little modification. With this architecture, the whole system incarnates its superiorities in heterogeneity, reusability and interoperability. Finally, the simulation as an experiment based on a given area demonstrates the validity of the whole system.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114394582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Test-Bed Based Comparison of Single and Parallel TCP and the Impact of Parallelism on Throughput and Fairness in Heterogenous Networks 基于测试平台的单、并行TCP比较及并行性对异构网络吞吐量和公平性的影响
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.144
Mohamed A. Alrshah, M. Othman
{"title":"Test-Bed Based Comparison of Single and Parallel TCP and the Impact of Parallelism on Throughput and Fairness in Heterogenous Networks","authors":"Mohamed A. Alrshah, M. Othman","doi":"10.1109/ICCTD.2009.144","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.144","url":null,"abstract":"Parallel Transport Control Protocol (TCP) has been used to effectively utilize bandwidth for data intensive applications over high Bandwidth-Delay Product (BDP) networks. On the other hand, it has been argued that, a single based TCP connection with proper modification such as HSTCP can emulate and capture the robustness of parallel TCP and can well replace it. In this work a Comparison between Single-Based and the proposed parallel TCP has been conducted to show the differences in their performance measurements such as throughput performance and throughput ratio, as well as the link sharing Fairness also has been observed to show the impact of using the proposed Parallel TCP on the existing Single-Based TCP connections. The experiment results show that, single-based TCP cannot overcome Parallel TCP especially in heterogeneous networks where the packet losses are common. Furthermore, the proposed parallel TCP does not affect TCP fairness which makes parallel TCP highly recommended to effectively utilize bandwidth for data intensive applications.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116162360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Importance of Web Services Using the RPC and REST Architecture 使用RPC和REST架构的Web服务的重要性
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.15
Pîrnau Mironela
{"title":"The Importance of Web Services Using the RPC and REST Architecture","authors":"Pîrnau Mironela","doi":"10.1109/ICCTD.2009.15","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.15","url":null,"abstract":"A Web service is a software application that can be accessed remotely using XML-based languages. It represents a communication interface offered by the server, through that the clients (programs on other systems) may require different information. The customer may vary, may be present on the same computer server, may be in the same local network or it may be located in the opposite part of the country. It is a method by which applications can communicate with each other through asynchronous messages or calls on remote procedure (RPC Remote Procedure Call). So it can be concluded that a Web service is a software application that can be accessed remotely using XML-based languages. Web services are just two programs that change data between them on the Internet or Intranet in XML format called SOAP (Simple Object Access Protocol).","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125794368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Research on the Application of QFD and Knowledge Management in the Outsourcing Software Quality Assurance QFD与知识管理在外包软件质量保证中的应用研究
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.116
Xiong Wei, Wu Zhixin, Yu Shaozhong
{"title":"Research on the Application of QFD and Knowledge Management in the Outsourcing Software Quality Assurance","authors":"Xiong Wei, Wu Zhixin, Yu Shaozhong","doi":"10.1109/ICCTD.2009.116","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.116","url":null,"abstract":"Requirements change has become a great challenge in software development, in order to control requirements change more effectively, it’s necessary to extend or improve the traditional Quality Function Deployment (QFD) method. Thus, on the basis of model of SECI a new methodology called Dynamic Quality Function Deployment (DQFD) is put forward in this study. Then, combining with the software structure design method of Quantification Method of Type 3, DQFD is applied to control requirements change, Syncretizing the theory and method of knowledge management and an approach called software requirements change management based on DQFD is proposed. The applicability and validity of the proposed approach are testified through its application to an actual software development project, and these results further consummate the theory framework of this paper.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129781230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信