{"title":"Security Model Based on Network Business Security","authors":"Wu Ke-he, Zhang Tong, Li Wei, Ma Gang","doi":"10.1109/ICCTD.2009.160","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.160","url":null,"abstract":"Enterprise Network Information System is not only the platform for information sharing and information exchanging, but also the platform for Enterprise Production Automation System and Enterprise Management System working together. As a result, the security defense of Enterprise Network Information System does not only include information system network security and data security, but also include the security of network business running on information system network, which is the confidentiality, integrity, continuity and real-time of network business. According to the security defense of Enterprise Network Information System, this paper proposes the \"network business security\" concept. In this paper, the object of information security is defined in three parts - - data security, network system security and network business security, and the network business security model is described. The proposal of the concept \"network business security\" provides theoretical basis for security defense of enterprise automatic production system and enterprise management information system.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121036995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on Expressing Principles of Semantics in Product Design","authors":"Zhang Xin, Zhang Jianwu, Yang Mei","doi":"10.1109/ICCTD.2009.236","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.236","url":null,"abstract":"Product semantics is a tool in product design to generate newer, better and more meaningful forms. Consumer preference and perception of products strongly influence a product's acceptability. Both are expressed by words that may be studied using product semantics. As product semantics spreads rapidly in product design, it faces more interrogative challenges from the lack of empirical evidence to substantiate the claims of some product semanticists. Based on the study of product semantics design methods, this paper presents several principles which should be followed for expressing semantics in product design. Then, it explains the meanings of these principles by some examples. These principles should be helpful in product design.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121067609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impulse Detection Adaptive Fuzzy (IDAF) Filter","authors":"H. Kam, W. Tan","doi":"10.1109/ICCTD.2009.157","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.157","url":null,"abstract":"An Impulse Detection Adaptive Fuzzy (IDAF) filter is proposed in this paper, to achieve improved filtering of impulsive noise while preserving image details. It is a spatial filter which operates in 2-stage 3x3 windows where the update value of the central pixel is a function of the median value of the pixels in the window. The proposed IDAF filter operates as follows. First, an impulse detection method classifies each pixel to be noisy pixel or image pixel. Then, if a pixel is assumed to be noisy, it is not used for deciding the new value of other pixels. A scheme is introduced to obtain a good replacement pixel value, which is then stored. The median of the stored values is a considered a good estimate of the image pixel. Finally, the adaptive fuzzy filter will then assign weights to the stored pixel values to produce the central pixel’s new value. Weights are assigned to remove impulse noise or preserve the image details, depending on the pixel’s characteristics. These characteristics are identified from the noisy image beforehand using a compatibility measure. The process detailed above enables the IDAF filter to remove impulse noise while preserving image details. Through testing, our experimental results show that the IDAF filter performs better than other standard median based methods.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121113339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New S-Box Structure to Increase Complexity of Algebraic Expression for Block Cipher Cryptosystems","authors":"B.N. Tran, T. Nguyen, T. D. Tran","doi":"10.1109/ICCTD.2009.235","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.235","url":null,"abstract":"In this paper, we propose a new approach to represent general S-Box based on linear-transform and a given non-linear function that increases the complexity of algebraic expression and size of S-Box. In the case of size of 8, the proposed S-Box can archive the maximum number of terms (255 terms) and therefore it can be used to replace the classical S-Box component in the original AES. Furthermore, the proposed S-Box inherits all good cryptographic characteristics of the original AES S-Box, such as nonlinearity, differential uniformity, and strict avalanche.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114695076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Z. A. Zakaria, Mohd Azuddin Parman, Zharfan Hamdan, M. S. Rohmad, M. Isa
{"title":"Secure Virtual Application Distribution","authors":"W. Z. A. Zakaria, Mohd Azuddin Parman, Zharfan Hamdan, M. S. Rohmad, M. Isa","doi":"10.1109/ICCTD.2009.56","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.56","url":null,"abstract":"This paper describes about a framework for secure assignment of virtual application from server to client. The server is a gateway to many applications, which the client can utilize it by requesting the server through the client’s interface. The communication of this system is based on trust, where the Trusted Platform Module plays main role in communication part of this framework. Client machine applies virtualization technology, which is used to run the virtual application downloaded from the server.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116943160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Notice of RetractionReal-time Data Storage Research Based on RAM","authors":"Zhang Yan, Liu Wenyi","doi":"10.1109/ICCTD.2009.36","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.36","url":null,"abstract":"The use of FPGA internal RAM can be an effective alternative to external FIFO, using the method OF Programming FOR the FPGA, Make full use of FPGA internal resources that provided strong support For the realization of a programmable system chip (SOPC, SystemOn Programable Chip). It Effected reducing the use of devices and minimizing the circuit boards. Acquisition and storage respectively controlled by two FPGA chips in this study. Use their own internal RAM, program variety controlling models by VHDL hardware language. And then connect the internal schematic to replace the external FIFO. This is the internal FIFO of FPGA.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116050887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancement of Bone Fracture Images by Equalization Methods","authors":"N. Parveen, M. phil, Dr. M. Mohammed Sathik","doi":"10.1109/ICCTD.2009.115","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.115","url":null,"abstract":"A fracture is a crack or break in the bone. This can be easily detected by taking an X-ray in that area. But some times these images lack sufficient brightness. Various Equalization Methods can be adapted to enhance the image. In this paper, two such methods are compared. They are Histogram Equalization and Contrast Limited Adaptive Histogram Equalization. The results show that Contrast Limited Adaptive Histogram Equalization gives better result than other Equalization method.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121124169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Discovering the Rules in a Poker Player's Mind Based on the Association Rule Mining","authors":"Afshin Mehrabi, A. Haghighat","doi":"10.1109/ICCTD.2009.117","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.117","url":null,"abstract":"One of the weaknesses and drawbacks of a computer compared to a human being is the creativity and intelligence of a human being in encountering with different problems and his power of deduction and reasoning. Therefore computer engineers have been trying to make computers more intelligent and inferential and reasonable in encountering with different problems. Thus in this article we have tried to increase the intelligence and deduction of a computer when playing a poker game. In this article a method is proposed based on the association rule mining which enables the computer to sense thoughts in a poker player's mind and guess his hand by observing his moves. According to the evaluation and a confidence of 78.6%, the rules in a poker player's mind were proven to be guessed correctly by the computer.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121187723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Agent Based Virtual Enterprise","authors":"Wei Feng, Rulin Wang","doi":"10.1109/ICCTD.2009.16","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.16","url":null,"abstract":"This paper presents an Agent-based architecture of distributed virtual enterprise; describes different Agent’s responsibilities, Agent organizations and their coordination.; proposes the dynamic virtual enterprise distributed processing environment, agent platform, virtual market and a three-tier architecture composed of business process specification, registration and management.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"403 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123361421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Verification and Validation of Activity Diagrams Using Graph Transformation","authors":"V. Rafe, R. Rafeh, S. Azizi, M. Miralvand","doi":"10.1109/ICCTD.2009.172","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.172","url":null,"abstract":"Graphical structures (like graphs, diagrams, visual sentences and others) are very useful to describe complex structures and systems. These structures are often augmented by formalisms which add a further dimension to the static description allowing for the modeling of the evolution of systems via any kind of transformation of such graphical structures. Graph transformation has been widely used for modeling. Graphs are well suited to describe the underlying structures of models. They provide a good method to carry out the analysis and verification activities and using the AGG toolset for designing them. A major goal of this paper is the ability to determine the correctness behavior and formal semantics of UML2.0 activity diagrams by Graph Transformation Systems.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130607130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}