{"title":"A Scalable Secure Routing Protocol for MANETs","authors":"L. Qabajeh, Laiha Binti Mat Kiah, M. M. Qabajeh","doi":"10.1109/ICCTD.2009.179","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.179","url":null,"abstract":"Wireless Mobile Ad-Hoc Networks (MANETs) are becoming highly applicable in many fields. Due to MANETs special characteristics, secure routing may be one of the most difficult areas to deal with as opponents can add themselves to a MANET using the existing common routing protocols. This paper proposes a new model of routing protocol called ARANz, which is an extension of the original Authenticated Routing for Ad-Hoc Networks (ARAN). Later, we will demonstrate that apart from the authentication methods adopted from ARAN, ARANz aims to increase security, achieve robustness and solve the single point of failure and attack problems by introducing multiple Local Certificate Authority servers. We will reveal that via dealing with the network as zones and using restricted directional flooding, our new model will exhibit better scalability and performance.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131690147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Optimized, Mathematical-Based Flight Performance Planning","authors":"Arman Rezaee, S. Izadpanah","doi":"10.1109/ICCTD.2009.12","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.12","url":null,"abstract":"In today’s challenging Aviation Industry, the role of high-speed and accurate Flight Planning cannot be over-emphasized. On time flight operation while maintaining the standard level of safety is a demanding task which airlines are facing recently. In our innovative flight performance planning, we have combined the applications of Maple 12 [1] (as a calculating software) with Delphi 6 [2] (programming Software) in order to have the most reliable and yet highest-speed flight performance planning procedure in the world. In lieu of drawing lines joining the performance chart, line equations are used to increase accuracy and swiftness of the flight performance planning. The study results show a 40% of elapsed time enhancement while increasing the accuracy by 30%.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130426816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Hermitian Positive Definite Solution of Nonlinear Matrix Equations","authors":"Guangyuan Zhao","doi":"10.1109/ICCTD.2009.217","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.217","url":null,"abstract":"In this paper, we study the Hermitian positive definite solutions of the nonlinear matrix equation $X+A* X^{-2} A+I$. Suppose $X$ is a Hermitian positive definite solution of this equation. We discuss the relation between $X$ and $A$ by the eigenvalue and eigenvector of $X$ and $A$ respectively.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128392958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Systemic Water Analysis - The Procedure","authors":"L. Chew, Lim Poh Wing, N. Herman","doi":"10.1109/ICCTD.2009.137","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.137","url":null,"abstract":"This paper is the continuation of previous work on the Systemic Water Analysis. It reflects a more complete version of the discussion on the Processes within the Systemic Water Analysis with more elaborated explanations on some of the ambiguous parts of the procedure.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128884560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Flexible, Wearable Algorithms for Web Services","authors":"Xiwang Yang, Wang Hua","doi":"10.1109/ICCTD.2009.151","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.151","url":null,"abstract":"The implications of read-write methodologies have been far-reaching and pervasive. Given the current status of wearable configurations, steganographers particularly desire the simulation of Markov models, which embodies the intuitive principles of cryptoanalysis. Our focus here is not on whether simulated annealing and online algorithms can synchronize to fulfill this objective, but rather on presenting an analysis of evolutionary programming (ZIBET).","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134173396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Initiatives and Challenges in Countering Inappropriate Internet Use","authors":"Kittichote Rojanakul, Hu Liang","doi":"10.1109/ICCTD.2009.26","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.26","url":null,"abstract":"Harnessing and countering inappropriate internet use to prevent children from viewing inappropriate at home, internet café and to generate awareness of potential dangers from some websites and certain computer game pose to children and internet users. In order to prevent children from exposure to inappropriate internet content and to promote confident and safe use of the internet, government and private sector should get involved. This research is focus on the survey from internet and game online users in Thailand in general. It has generated greater awareness of internet danger as number of internet users has increased and beneficial to the expanding community of internet, computer users and society in general.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"258 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134413959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Introduction of Ethical Subject in Re-designed PhD-level Computer Education Curriculum: A Teaching Experience Driven in Thailand","authors":"N. Sureerattanan","doi":"10.1109/ICCTD.2009.156","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.156","url":null,"abstract":"Driving from recent crisis of global-social ethics and the author’s experiences through ethical-added teaching at all levels in higher education since 2006, the student’s interest and acceptance of ethical-added learning is an important motivation for substantial advance ethical subject into computer education curriculum. King Mongkut’s University of Technology North Bangkok (KMUTNB) provides computer education as a Department of Faculty of Technical Education. Almost PhD students come from teacher profession. Human resource management is the most important for all countries around the world because this kind of resource takes major roles in propelling management of other resources, and also its own. To reach really sustainable development, human mind in aspect of ethical conscious must be extremely educated, especially in teaching the teacher. This research purposes to describe the development of ethical subject in PhD-level computer education curriculum at KMUTNB. The curriculum was re-designed in 2008. The new subject entitled “Ethical Development for Social in Digital Age (EDSDA)” has firstly conducted in semester 1/2009 for PhD students enrolled in Doctor of Philosophy Program in Computer Education. The course syllabus will be mentioned. The students’ opinion to the course conduct for early 5 weeks of the semester will be discussed as preliminary result of EDSDA subject.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"43 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130756387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Edge-Based Approach for Video Text Extraction","authors":"Shi Jianyong, Luo Xiling, Zhang Jun","doi":"10.1109/ICCTD.2009.177","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.177","url":null,"abstract":"Text in video is a compact but effective clue for video indexing and summarization. In this paper, we propose an edge-based video text extraction approach with low computation, which can automatically detect and extract text from complex video frames. We first detect the edge maps of both an intensity image and its binarized image, and merge the two into one edge map, which contains less edge pixels of background but enriched edge pixels of text. Then, the projection profile method is used to evaluate the distribution of the resulting edge map in both horizontal and vertical directions. In both directions, an adaptive thresholding method is applied to identify adjacent pixel rows and columns which contain text. The intersections of these rows and columns are extracted as text regions. Finally, a novel extraction method based on monochromatism of text is applied to the regions. The output of the extraction method can be directly fed to OCR. The performance of our approach is demonstrated by presenting experimental results for a set of video clips and static images.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129788738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved Chinese Segmentation Algorithm Based on Segmentation Dictionary","authors":"Yan Niu, Lala Li","doi":"10.1109/ICCTD.2009.125","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.125","url":null,"abstract":"Based on the analysis of the traditional forward maximum matching word segmentation algorithm and the characteristics of the principle on the basis of the results of the use of word frequency statistics, we design a new structure of the dictionary, a dictionary based on the new structure to improve the matching algorithm are the largest. After time complexity analysis and experiments, the improved forward maximum matching algorithm can further improve the efficiency of segmentation.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133603719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Ab-Rahman, Norazilawati Md-Zain, S. M. Mustaza, Aida Baharuddin, K. Jumari
{"title":"2x3 Optical Moderator Based on Planar Waveguide Device for Ftth Application","authors":"M. Ab-Rahman, Norazilawati Md-Zain, S. M. Mustaza, Aida Baharuddin, K. Jumari","doi":"10.1109/ICCTD.2009.145","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.145","url":null,"abstract":"In this paper, we present the design of 2x3 optical moderator based on waveguide with SU-8 polymer material. The technology ensures low cost fabrication and excellent performance as compared to conventional technique that uses fused coupler for optical splitter fabrication. The optical moderator is suggested to be used in passive customer access network FTTH-PON to variety the signals send to the premises. It is the first time reported. The problems arose such as the loss of output power is also discussed. The simulation result shows that various factors; namely the width of waveguide, refractive index and wide-angle branching will increase the output power loss. To obtain maximum power, the optimization of those parameters’ value must be used. This designed optical splitter is operated at wavelength 1500 nm – 1600 nm. In this study, we characterized the trend of total output power with the effect of the parameters studied.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132616925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}