2009 International Conference on Computer Technology and Development最新文献

筛选
英文 中文
The Utilization of Metrics Usability to Evaluate the Software Quality 度量可用性在软件质量评估中的应用
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.58
Jaroslav Zeman, P. Tanuška, M. Kebísek
{"title":"The Utilization of Metrics Usability to Evaluate the Software Quality","authors":"Jaroslav Zeman, P. Tanuška, M. Kebísek","doi":"10.1109/ICCTD.2009.58","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.58","url":null,"abstract":"This article discusses about metrics that could be used in the field of software testing. The standard ISO/IEC 9126 was analysed. There is need for change of the design of academic information system at the Faculty of Materials and Science in Trnava as the current one is obsolete. Knowledge about usability metrics has been used for purpose of the proposed new design. By preparing the new application design and testing before being put into service have been saved considerable financial resources that can be invested in further development of the system.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122700743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Correctness Proof and Complexity Analysis of the Hybrid Reasoning Algorithm of Beta-PSML β - psml混合推理算法的正确性证明与复杂性分析
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.97
Yila Su
{"title":"Correctness Proof and Complexity Analysis of the Hybrid Reasoning Algorithm of Beta-PSML","authors":"Yila Su","doi":"10.1109/ICCTD.2009.97","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.97","url":null,"abstract":"We have studied the theoretical problems of logic of β-PSML (Problem Solver Markup Language) constructed by combining description logic and Horn clauses. In the nonrecursive case, we show that a single step of applying a Horn clause needs to be replaced by a more sophisticated reasoning step in β-PSML. We call it as the hybrid reasoning algorithm. We described the hybrid reasoning algorithm in former paper. In this paper, we will prove the correctness of the hybrid reasoning algorithm. Hybrid reasoning algorithm provides a sound and complete inference procedure for nonrecursive β-PSML knowledge bases in which the description logic component is decidable.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126030899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis on the One-Way Communication Capability of GPS Satellites in Orbit Transmitting Non-navigational Information 非导航信息在轨GPS卫星单向通信能力分析
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.135
Cheng Xi-jun, Xu Jiang-ning, Cao Ke-jin, Zhu Ying-bin
{"title":"Analysis on the One-Way Communication Capability of GPS Satellites in Orbit Transmitting Non-navigational Information","authors":"Cheng Xi-jun, Xu Jiang-ning, Cao Ke-jin, Zhu Ying-bin","doi":"10.1109/ICCTD.2009.135","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.135","url":null,"abstract":"The GPS system is capable of the one-way communication (OWC) transmitting non-navigational information if the reserved bits of L1C Nav message and the newly-added CNav message types for L2C signal are utilized. Excluding the potential communication protocol overheads, a single frequency with one satellite transmits data at 0.5B/s; with the dual frequency transmission by using L1C and L2C frequencies and the parallel transmission of multiple satellites, the transmission rate can be increased to approximately 4B/s. The one-way communication of GPS is covert due to the covertness of communication channels, the occasionality of one-way communication, the disorderly distribution of information and the difficulty in recognizing and understanding communication data when the communication protocol is unknown. This paper discusses the problems of satellite rise-and-fall, data packetization and data dropout and gives solutions for them. A design paradigm for the format of newly-added L2C CNav message types is given. The GPS one-way communication has the advantages of global coverage, day-and-night and all-weather operation, as well as low cost, thus it can meet the needs for special purposes, such as civilian emergency broadcast communication, military submarine command system and command of intelligence collection.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129706398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Notice of RetractionReal-time Data Storage Research Based on RAM 基于RAM的实时数据存储研究
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.36
Zhang Yan, Liu Wenyi
{"title":"Notice of RetractionReal-time Data Storage Research Based on RAM","authors":"Zhang Yan, Liu Wenyi","doi":"10.1109/ICCTD.2009.36","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.36","url":null,"abstract":"The use of FPGA internal RAM can be an effective alternative to external FIFO, using the method OF Programming FOR the FPGA, Make full use of FPGA internal resources that provided strong support For the realization of a programmable system chip (SOPC, SystemOn Programable Chip). It Effected reducing the use of devices and minimizing the circuit boards. Acquisition and storage respectively controlled by two FPGA chips in this study. Use their own internal RAM, program variety controlling models by VHDL hardware language. And then connect the internal schematic to replace the external FIFO. This is the internal FIFO of FPGA.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116050887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Model Based on Network Business Security 基于网络业务安全的安全模型
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.160
Wu Ke-he, Zhang Tong, Li Wei, Ma Gang
{"title":"Security Model Based on Network Business Security","authors":"Wu Ke-he, Zhang Tong, Li Wei, Ma Gang","doi":"10.1109/ICCTD.2009.160","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.160","url":null,"abstract":"Enterprise Network Information System is not only the platform for information sharing and information exchanging, but also the platform for Enterprise Production Automation System and Enterprise Management System working together. As a result, the security defense of Enterprise Network Information System does not only include information system network security and data security, but also include the security of network business running on information system network, which is the confidentiality, integrity, continuity and real-time of network business. According to the security defense of Enterprise Network Information System, this paper proposes the \"network business security\" concept. In this paper, the object of information security is defined in three parts - - data security, network system security and network business security, and the network business security model is described. The proposal of the concept \"network business security\" provides theoretical basis for security defense of enterprise automatic production system and enterprise management information system.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121036995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Impulse Detection Adaptive Fuzzy (IDAF) Filter 脉冲检测自适应模糊(IDAF)滤波器
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.157
H. Kam, W. Tan
{"title":"Impulse Detection Adaptive Fuzzy (IDAF) Filter","authors":"H. Kam, W. Tan","doi":"10.1109/ICCTD.2009.157","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.157","url":null,"abstract":"An Impulse Detection Adaptive Fuzzy (IDAF) filter is proposed in this paper, to achieve improved filtering of impulsive noise while preserving image details. It is a spatial filter which operates in 2-stage 3x3 windows where the update value of the central pixel is a function of the median value of the pixels in the window. The proposed IDAF filter operates as follows. First, an impulse detection method classifies each pixel to be noisy pixel or image pixel. Then, if a pixel is assumed to be noisy, it is not used for deciding the new value of other pixels. A scheme is introduced to obtain a good replacement pixel value, which is then stored. The median of the stored values is a considered a good estimate of the image pixel. Finally, the adaptive fuzzy filter will then assign weights to the stored pixel values to produce the central pixel’s new value. Weights are assigned to remove impulse noise or preserve the image details, depending on the pixel’s characteristics. These characteristics are identified from the noisy image beforehand using a compatibility measure. The process detailed above enables the IDAF filter to remove impulse noise while preserving image details. Through testing, our experimental results show that the IDAF filter performs better than other standard median based methods.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121113339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Enhancement of Bone Fracture Images by Equalization Methods 用均衡方法增强骨折图像
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.115
N. Parveen, M. phil, Dr. M. Mohammed Sathik
{"title":"Enhancement of Bone Fracture Images by Equalization Methods","authors":"N. Parveen, M. phil, Dr. M. Mohammed Sathik","doi":"10.1109/ICCTD.2009.115","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.115","url":null,"abstract":"A fracture is a crack or break in the bone. This can be easily detected by taking an X-ray in that area. But some times these images lack sufficient brightness. Various Equalization Methods can be adapted to enhance the image. In this paper, two such methods are compared. They are Histogram Equalization and Contrast Limited Adaptive Histogram Equalization. The results show that Contrast Limited Adaptive Histogram Equalization gives better result than other Equalization method.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121124169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Discovering the Rules in a Poker Player's Mind Based on the Association Rule Mining 基于关联规则挖掘的扑克玩家心理规则发现
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.117
Afshin Mehrabi, A. Haghighat
{"title":"Discovering the Rules in a Poker Player's Mind Based on the Association Rule Mining","authors":"Afshin Mehrabi, A. Haghighat","doi":"10.1109/ICCTD.2009.117","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.117","url":null,"abstract":"One of the weaknesses and drawbacks of a computer compared to a human being is the creativity and intelligence of a human being in encountering with different problems and his power of deduction and reasoning. Therefore computer engineers have been trying to make computers more intelligent and inferential and reasonable in encountering with different problems. Thus in this article we have tried to increase the intelligence and deduction of a computer when playing a poker game. In this article a method is proposed based on the association rule mining which enables the computer to sense thoughts in a poker player's mind and guess his hand by observing his moves. According to the evaluation and a confidence of 78.6%, the rules in a poker player's mind were proven to be guessed correctly by the computer.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121187723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Knowledge Management of Software Enterprises with Lenovo for Case Study 软件企业知识管理研究——以联想为例
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.257
L. Lan
{"title":"Research on Knowledge Management of Software Enterprises with Lenovo for Case Study","authors":"L. Lan","doi":"10.1109/ICCTD.2009.257","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.257","url":null,"abstract":"Lenovo Group puts priority on knowledge management .Successful experience of knowledge management of Lenovo Group mainly lies in that, firstly, Lenovo has established a set of practicable and effective flows to facilitate service engineers to submit knowledge files at random and present all customer questions/problems solved at ordinary times at any time; secondly, Lenovo has established an incentive mechanism to give material and spiritual encouragement on basis of merit and scoring; and finally, it has a set of organizational system to ensure.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126636459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The IGWM Method for Tabriz Traffic Modeling: Data-Oriented Approach 大不里士交通建模的IGWM方法:面向数据的方法
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.149
A. Navin, N. J. Navimipour, M. Mirnia
{"title":"The IGWM Method for Tabriz Traffic Modeling: Data-Oriented Approach","authors":"A. Navin, N. J. Navimipour, M. Mirnia","doi":"10.1109/ICCTD.2009.149","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.149","url":null,"abstract":"Traffic models play an important role in traffic research and in many traffic applications such as traffic flow prediction, incident detection and traffic control. The traffic problem is one of the challenging issues in large cities nowadays. Intelligent Transportation System (ITS) is one of the suitable methods for solving this problem. ITS for Tabriz as a large city in Iran is very vital. Traffic modeling is the first step to implement the ITS. In this paper an Intelligent Green Wave Model (IGWM) based on data-oriented approach has been introduced for traffic modeling of this city. This model is suitable for green wave based controller systems.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126736920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信