2009 International Conference on Computer Technology and Development最新文献

筛选
英文 中文
Security Model Based on Network Business Security 基于网络业务安全的安全模型
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.160
Wu Ke-he, Zhang Tong, Li Wei, Ma Gang
{"title":"Security Model Based on Network Business Security","authors":"Wu Ke-he, Zhang Tong, Li Wei, Ma Gang","doi":"10.1109/ICCTD.2009.160","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.160","url":null,"abstract":"Enterprise Network Information System is not only the platform for information sharing and information exchanging, but also the platform for Enterprise Production Automation System and Enterprise Management System working together. As a result, the security defense of Enterprise Network Information System does not only include information system network security and data security, but also include the security of network business running on information system network, which is the confidentiality, integrity, continuity and real-time of network business. According to the security defense of Enterprise Network Information System, this paper proposes the \"network business security\" concept. In this paper, the object of information security is defined in three parts - - data security, network system security and network business security, and the network business security model is described. The proposal of the concept \"network business security\" provides theoretical basis for security defense of enterprise automatic production system and enterprise management information system.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121036995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Study on Expressing Principles of Semantics in Product Design 产品设计中语义学表达原则研究
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.236
Zhang Xin, Zhang Jianwu, Yang Mei
{"title":"Study on Expressing Principles of Semantics in Product Design","authors":"Zhang Xin, Zhang Jianwu, Yang Mei","doi":"10.1109/ICCTD.2009.236","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.236","url":null,"abstract":"Product semantics is a tool in product design to generate newer, better and more meaningful forms. Consumer preference and perception of products strongly influence a product's acceptability. Both are expressed by words that may be studied using product semantics. As product semantics spreads rapidly in product design, it faces more interrogative challenges from the lack of empirical evidence to substantiate the claims of some product semanticists. Based on the study of product semantics design methods, this paper presents several principles which should be followed for expressing semantics in product design. Then, it explains the meanings of these principles by some examples. These principles should be helpful in product design.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121067609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impulse Detection Adaptive Fuzzy (IDAF) Filter 脉冲检测自适应模糊(IDAF)滤波器
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.157
H. Kam, W. Tan
{"title":"Impulse Detection Adaptive Fuzzy (IDAF) Filter","authors":"H. Kam, W. Tan","doi":"10.1109/ICCTD.2009.157","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.157","url":null,"abstract":"An Impulse Detection Adaptive Fuzzy (IDAF) filter is proposed in this paper, to achieve improved filtering of impulsive noise while preserving image details. It is a spatial filter which operates in 2-stage 3x3 windows where the update value of the central pixel is a function of the median value of the pixels in the window. The proposed IDAF filter operates as follows. First, an impulse detection method classifies each pixel to be noisy pixel or image pixel. Then, if a pixel is assumed to be noisy, it is not used for deciding the new value of other pixels. A scheme is introduced to obtain a good replacement pixel value, which is then stored. The median of the stored values is a considered a good estimate of the image pixel. Finally, the adaptive fuzzy filter will then assign weights to the stored pixel values to produce the central pixel’s new value. Weights are assigned to remove impulse noise or preserve the image details, depending on the pixel’s characteristics. These characteristics are identified from the noisy image beforehand using a compatibility measure. The process detailed above enables the IDAF filter to remove impulse noise while preserving image details. Through testing, our experimental results show that the IDAF filter performs better than other standard median based methods.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121113339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A New S-Box Structure to Increase Complexity of Algebraic Expression for Block Cipher Cryptosystems 一种提高分组密码系统代数表达式复杂度的新s盒结构
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.235
B.N. Tran, T. Nguyen, T. D. Tran
{"title":"A New S-Box Structure to Increase Complexity of Algebraic Expression for Block Cipher Cryptosystems","authors":"B.N. Tran, T. Nguyen, T. D. Tran","doi":"10.1109/ICCTD.2009.235","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.235","url":null,"abstract":"In this paper, we propose a new approach to represent general S-Box based on linear-transform and a given non-linear function that increases the complexity of algebraic expression and size of S-Box. In the case of size of 8, the proposed S-Box can archive the maximum number of terms (255 terms) and therefore it can be used to replace the classical S-Box component in the original AES. Furthermore, the proposed S-Box inherits all good cryptographic characteristics of the original AES S-Box, such as nonlinearity, differential uniformity, and strict avalanche.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114695076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Secure Virtual Application Distribution 安全虚拟应用程序分发
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.56
W. Z. A. Zakaria, Mohd Azuddin Parman, Zharfan Hamdan, M. S. Rohmad, M. Isa
{"title":"Secure Virtual Application Distribution","authors":"W. Z. A. Zakaria, Mohd Azuddin Parman, Zharfan Hamdan, M. S. Rohmad, M. Isa","doi":"10.1109/ICCTD.2009.56","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.56","url":null,"abstract":"This paper describes about a framework for secure assignment of virtual application from server to client. The server is a gateway to many applications, which the client can utilize it by requesting the server through the client’s interface. The communication of this system is based on trust, where the Trusted Platform Module plays main role in communication part of this framework. Client machine applies virtualization technology, which is used to run the virtual application downloaded from the server.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116943160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Notice of RetractionReal-time Data Storage Research Based on RAM 基于RAM的实时数据存储研究
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.36
Zhang Yan, Liu Wenyi
{"title":"Notice of RetractionReal-time Data Storage Research Based on RAM","authors":"Zhang Yan, Liu Wenyi","doi":"10.1109/ICCTD.2009.36","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.36","url":null,"abstract":"The use of FPGA internal RAM can be an effective alternative to external FIFO, using the method OF Programming FOR the FPGA, Make full use of FPGA internal resources that provided strong support For the realization of a programmable system chip (SOPC, SystemOn Programable Chip). It Effected reducing the use of devices and minimizing the circuit boards. Acquisition and storage respectively controlled by two FPGA chips in this study. Use their own internal RAM, program variety controlling models by VHDL hardware language. And then connect the internal schematic to replace the external FIFO. This is the internal FIFO of FPGA.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116050887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancement of Bone Fracture Images by Equalization Methods 用均衡方法增强骨折图像
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.115
N. Parveen, M. phil, Dr. M. Mohammed Sathik
{"title":"Enhancement of Bone Fracture Images by Equalization Methods","authors":"N. Parveen, M. phil, Dr. M. Mohammed Sathik","doi":"10.1109/ICCTD.2009.115","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.115","url":null,"abstract":"A fracture is a crack or break in the bone. This can be easily detected by taking an X-ray in that area. But some times these images lack sufficient brightness. Various Equalization Methods can be adapted to enhance the image. In this paper, two such methods are compared. They are Histogram Equalization and Contrast Limited Adaptive Histogram Equalization. The results show that Contrast Limited Adaptive Histogram Equalization gives better result than other Equalization method.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121124169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Discovering the Rules in a Poker Player's Mind Based on the Association Rule Mining 基于关联规则挖掘的扑克玩家心理规则发现
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.117
Afshin Mehrabi, A. Haghighat
{"title":"Discovering the Rules in a Poker Player's Mind Based on the Association Rule Mining","authors":"Afshin Mehrabi, A. Haghighat","doi":"10.1109/ICCTD.2009.117","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.117","url":null,"abstract":"One of the weaknesses and drawbacks of a computer compared to a human being is the creativity and intelligence of a human being in encountering with different problems and his power of deduction and reasoning. Therefore computer engineers have been trying to make computers more intelligent and inferential and reasonable in encountering with different problems. Thus in this article we have tried to increase the intelligence and deduction of a computer when playing a poker game. In this article a method is proposed based on the association rule mining which enables the computer to sense thoughts in a poker player's mind and guess his hand by observing his moves. According to the evaluation and a confidence of 78.6%, the rules in a poker player's mind were proven to be guessed correctly by the computer.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121187723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Agent Based Virtual Enterprise 基于多代理的虚拟企业
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.16
Wei Feng, Rulin Wang
{"title":"Multi-Agent Based Virtual Enterprise","authors":"Wei Feng, Rulin Wang","doi":"10.1109/ICCTD.2009.16","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.16","url":null,"abstract":"This paper presents an Agent-based architecture of distributed virtual enterprise; describes different Agent’s responsibilities, Agent organizations and their coordination.; proposes the dynamic virtual enterprise distributed processing environment, agent platform, virtual market and a three-tier architecture composed of business process specification, registration and management.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"403 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123361421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Verification and Validation of Activity Diagrams Using Graph Transformation 使用图转换的活动图的验证和确认
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.172
V. Rafe, R. Rafeh, S. Azizi, M. Miralvand
{"title":"Verification and Validation of Activity Diagrams Using Graph Transformation","authors":"V. Rafe, R. Rafeh, S. Azizi, M. Miralvand","doi":"10.1109/ICCTD.2009.172","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.172","url":null,"abstract":"Graphical structures (like graphs, diagrams, visual sentences and others) are very useful to describe complex structures and systems. These structures are often augmented by formalisms which add a further dimension to the static description allowing for the modeling of the evolution of systems via any kind of transformation of such graphical structures. Graph transformation has been widely used for modeling. Graphs are well suited to describe the underlying structures of models. They provide a good method to carry out the analysis and verification activities and using the AGG toolset for designing them. A major goal of this paper is the ability to determine the correctness behavior and formal semantics of UML2.0 activity diagrams by Graph Transformation Systems.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130607130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信