Seyed Mojtaba Saif, H. Shah-Hosseini, Mohammad Reza Feizi
{"title":"Empire Establishment Algorithm","authors":"Seyed Mojtaba Saif, H. Shah-Hosseini, Mohammad Reza Feizi","doi":"10.1109/ICCTD.2009.71","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.71","url":null,"abstract":"The main goal of the research has described in this paper is to change the simple GA (Genetic Algorithm) for better accuracy. The proposed Empire Establishment Algorithm is similar to the parallel Genetic Algorithm. Genetic Algorithms are a subclass of Evolutionary Algorithms. Genetic Algorithms mimic some processes of nature. Here, with the distribution fashion of the tribes in several regions and empire establishment, some changes in the simple Genetic Algorithm are proposed. These changes will add to the accuracy and the success of the GA.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132917466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Effect of Technological Improvement on the Development of Photovoltaic Industry","authors":"Chen Ming","doi":"10.1109/ICCTD.2009.250","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.250","url":null,"abstract":"In recent years, China's PV industry has being developed rapidly due to the demand from international market. Technological progress pushed the cost of power generation to decline continuously. Comparing to the cost of normal power generation, however, there is no competitive advantage, and there remains a huge gap with foreign companies in technology. In order to long-term development, greater scientific research investment should be given to promote independent innovation and speed up scientific and technological progress.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134135923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Stability Criterion of Networked Control Systems","authors":"Xiaohua Ge, Xiefu Jiang, Xinxin Zhang","doi":"10.1109/ICCTD.2009.73","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.73","url":null,"abstract":"This paper concerns with robust stability criteria of networked control systems (NCSs) with the effects of both the time-varying network-induced delay and data packet dropout taken into consideration. A less conservative delay-dependent stability condition is formulated in the form of a linear matrix inequality based on a Lyapunov–Krasovskii functional. No slack matrix variables are introduced and overly bounding for some term is avoided. Furthermore, a strict proof is given to show less conservatism of the proposed method.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134312521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Owner-Controlled Towards Personal Information Stored in Hippocratic Database","authors":"N. Ghani, Z. M. Sidek","doi":"10.1109/ICCTD.2009.90","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.90","url":null,"abstract":"Privacy protection has become one of the important requirement in web-based information system that deal with personal information. There are an issues arise that personal information collected should be privacy-protected. Owner should know to what extent information about them has been collected, how it’ll used and able to control their own information. Hippocratic Database (HDB) introduced by Agrawal, et al. (2002) is a relational database system that has been proposed in order to protect the privacy at database level. Hippocratic Database used the purpose as a central concept in the database development. But, currently with the notion of purpose, owner is unable to control his/her PI stored in HDB regardless they are able to. This paper discussed and introduced an initial architecture of owner-controlled Hippocratic Database","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134477964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interactive Electronic Reader to Support English Education","authors":"Rowel Atienza, T. Tai","doi":"10.1109/ICCTD.2009.108","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.108","url":null,"abstract":"Knowledge of English in the Philippines is important not only in the work place, but as well as in education. English is the primary language of instruction in the Philippines, even in public schools. Students who have difficulty understanding English will also have trouble with the other subjects like Science and Math. However, there is a lack of qualified English school teachers, particularly in the public school system where the teachers themselves use wrong grammar and mispronounce words. To help alleviate the problem, our group has partnered with the Department of Education to create an electronic reader. The electronic reader can demonstrate proper pronunciation and can supplement the lessons taught in a traditional classroom environment with interactive exercises and activities. A complete Grade 3 English course in an electronic game console format was developed and deployed in an elementary school to test its effectiveness. About 300 students got involved in the experiment. After one school year of monitoring and evaluation, students who used the reader showed improved scores in government administered tests. Students from low performing sections had particularly significant gains.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130297819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Butterfly Subdivision Scheme Used for the Unorganized Points Reconstruction in Virtual Environment","authors":"I. Mohamad, A. Bade","doi":"10.1109/ICCTD.2009.214","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.214","url":null,"abstract":"An unorganized point is a discrete point that represents a data for a 3d object. This unorganized data need to handle on the way to represent a piecewise of 3d object which is able to produce a smooth surface at the crease and boundary. Various methods have been purpose for subdivision scheme, but none of this method capable to produce a good sharp feature such as darts, creases and corner. A butterfly subdivision surface is an interpolating scheme and is a good approach for a reconstruction of an unorganized point. This scheme is capable to produce an effective multiresolution representation for a piecewise smooth surfaces. In this paper, we will propose an approach to implement a butterfly subdivision scheme for the reconstruction of unorganized points in virtual environment.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113997181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New S-Box Structure to Increase Complexity of Algebraic Expression for Block Cipher Cryptosystems","authors":"B.N. Tran, T. Nguyen, T. D. Tran","doi":"10.1109/ICCTD.2009.235","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.235","url":null,"abstract":"In this paper, we propose a new approach to represent general S-Box based on linear-transform and a given non-linear function that increases the complexity of algebraic expression and size of S-Box. In the case of size of 8, the proposed S-Box can archive the maximum number of terms (255 terms) and therefore it can be used to replace the classical S-Box component in the original AES. Furthermore, the proposed S-Box inherits all good cryptographic characteristics of the original AES S-Box, such as nonlinearity, differential uniformity, and strict avalanche.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114695076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Devising a Biological Model to Detect Polymorphic Computer Viruses Artificial Immune System (AIM): Review","authors":"S. Abdulla, O. Zakaria","doi":"10.1109/ICCTD.2009.54","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.54","url":null,"abstract":"Currently, in most virus detection techniques the signature recognition process of unknown viruses are challenging task. The process has become more difficulties after the complexities of the viruses’ structure have developed, as in the Polymorphic computer viruses. This paper reviews and then explains some used techniques to detect the known polymorphic viruses. Besides, the paper contains the review of some biological models for virus detection. Finally, a new biological model for detecting polymorphic viruses is suggested.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123092120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Agent Based Virtual Enterprise","authors":"Wei Feng, Rulin Wang","doi":"10.1109/ICCTD.2009.16","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.16","url":null,"abstract":"This paper presents an Agent-based architecture of distributed virtual enterprise; describes different Agent’s responsibilities, Agent organizations and their coordination.; proposes the dynamic virtual enterprise distributed processing environment, agent platform, virtual market and a three-tier architecture composed of business process specification, registration and management.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123361421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on Expressing Principles of Semantics in Product Design","authors":"Zhang Xin, Zhang Jianwu, Yang Mei","doi":"10.1109/ICCTD.2009.236","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.236","url":null,"abstract":"Product semantics is a tool in product design to generate newer, better and more meaningful forms. Consumer preference and perception of products strongly influence a product's acceptability. Both are expressed by words that may be studied using product semantics. As product semantics spreads rapidly in product design, it faces more interrogative challenges from the lack of empirical evidence to substantiate the claims of some product semanticists. Based on the study of product semantics design methods, this paper presents several principles which should be followed for expressing semantics in product design. Then, it explains the meanings of these principles by some examples. These principles should be helpful in product design.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121067609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}