2005 International Conference on Information and Communication Technologies最新文献

筛选
英文 中文
Using Agents for Unification of Information Extraction and Data Mining 利用代理实现信息抽取与数据挖掘的统一
2005 International Conference on Information and Communication Technologies Pub Date : 2005-08-27 DOI: 10.1109/ICICT.2005.1598583
S. Imtiaz, A. Hussain, S. Hiyat
{"title":"Using Agents for Unification of Information Extraction and Data Mining","authors":"S. Imtiaz, A. Hussain, S. Hiyat","doi":"10.1109/ICICT.2005.1598583","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598583","url":null,"abstract":"Early work for unification of information extraction and data mining is motivational and problem stated work. This paper proposes a solution framework for unification using intelligent agents. A Relation manager agent extracted feature with cross feedback approach and also provide a Unified Undirected graphical handle. An RPM agent an approach to minimize loop back proposes pooling and model utilization with common parameter for both text and entity level abstractions.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132932854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Shadow Based On-Road Vehicle Detection and Verification Using HAAR Wavelet Packet Transform 基于HAAR小波包变换的道路车辆阴影检测与验证
2005 International Conference on Information and Communication Technologies Pub Date : 2005-08-27 DOI: 10.1109/ICICT.2005.1598621
A. Ali, S. Afghani
{"title":"Shadow Based On-Road Vehicle Detection and Verification Using HAAR Wavelet Packet Transform","authors":"A. Ali, S. Afghani","doi":"10.1109/ICICT.2005.1598621","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598621","url":null,"abstract":"The paper describes a novel, approach for an on road vehicle detection system with the view of driving assistance. The presented technique generates the initial hypothesis by detecting the shadows projected by vehicles on the road surface. The results of detection are then verified using the Haar wavelet packet transform. The verification step compares the standard deviations of the best basis vector of the hypothesized vehicle with pre-computed feature vector of similar values for different vehicular structures. Experimental results confirm the validity of the presented approach in different lightening conditions and scenarios. The presented technique is capable of detecting vehicles at twelve frames per sec which makes it ideal for real time pre-crash sensing.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128887087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
An Investigation into the Skills Gap in the Software Industry of Pakistan 巴基斯坦软件产业技能差距调查
2005 International Conference on Information and Communication Technologies Pub Date : 2005-08-27 DOI: 10.1109/ICICT.2005.1598586
Z. Sharf, W. A. Khan
{"title":"An Investigation into the Skills Gap in the Software Industry of Pakistan","authors":"Z. Sharf, W. A. Khan","doi":"10.1109/ICICT.2005.1598586","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598586","url":null,"abstract":"Software Industry workers require an adequate skill set to gain maximum output from the effective use of technology. The purpose of this study is to explore the nature of actual and desired software developer, jobs skill set. Survey methodology will be used to obtain reports of actual skill level and those desired to define common dimensions of the software developer skill set. Anticipated results will add to the existing body of IT job skills knowledge and may provide practice with job development and career planning guidance. We also intend to propose a skill standard for the software industry of Pakistan that meets the requirements of the local market as well as satisfy the international standards being practiced worldwide.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130656533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mapping OGC PRINCE 2 to SEI CMMI 1.1 OGC PRINCE 2到SEI CMMI 1.1的映射
2005 International Conference on Information and Communication Technologies Pub Date : 2005-08-27 DOI: 10.1109/ICICT.2005.1598602
A. Luqman, F. Hussain, S. Tauseef-ur-Rehman
{"title":"Mapping OGC PRINCE 2 to SEI CMMI 1.1","authors":"A. Luqman, F. Hussain, S. Tauseef-ur-Rehman","doi":"10.1109/ICICT.2005.1598602","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598602","url":null,"abstract":"The Capability Maturity Model Integration (CMMI) version 1.1, developed by the Software Engineering Institute (SEI), USA and the PRoject IN Controlled Environment (PRINCE) version 2 developed by Central Computing and Telecommunications Agency (CCTA) now Office of Government Commerce (OGC) as UK Government standard for IT Project Management, share a common concern with Project and Quality management by improved process management. Both are driven by similar concerns and intuitively correlated. Organizations concerned with PRINCE 2 certification often question its overlap with the CMMI. We have looked into OGC PRINCE 2 process/components and map it to the different goals/practices in the SEI CMMI 1.1. Analysis provides answers to some common questions about the comparisons and mapping of these standards. The result of the analysis indicates that, although PRINCE 2-compliant organization would not necessarily satisfy all of the Process Areas of CMMI, but it would satisfy most of the goals and practices of continuous representation. PRINCE 2 certified organizations would have generally significant advantages & less difficulty in obtaining CMMI certification. In order to achieve good transformation there is a need of applying proper software metrics. These metrics needs to be implemented on each and every process / goal /Practice.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131966786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Partial Word Order Representation of Urdu Sentence in Lexical Functional Grammar 词汇功能语法中乌尔都语句子的部分词序表示
2005 International Conference on Information and Communication Technologies Pub Date : 2005-08-27 DOI: 10.1109/ICICT.2005.1598631
Mutee-u-Rahman, A. Shah, R. Memon
{"title":"Partial Word Order Representation of Urdu Sentence in Lexical Functional Grammar","authors":"Mutee-u-Rahman, A. Shah, R. Memon","doi":"10.1109/ICICT.2005.1598631","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598631","url":null,"abstract":"Natural languages with free word order contain sentences with partial constituent ordering. Urdu is an example of free word order language. Computational treatment of Urdu sentence requires a suitable formalism that should be capable enough to represent the syntax and expressive enough to describe the free word order. Lexical Functional Grammar (LFG) does not only represent the syntax but also have expressive power of describing free constituent ordering of a sentence. LFG handles syntax representation with free word order of Urdu sentence in a quite reasonable way. In this paper LFG representation of different Urdu language sentences with partial word order is discussed with examples in LFG Grammar Writer's Workbench (GWB) for Linux.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129225313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
"Ergonomics: Implications on Computer End-users" 人机工程学:对计算机终端用户的影响
2005 International Conference on Information and Communication Technologies Pub Date : 2005-08-27 DOI: 10.1109/ICICT.2005.1598589
M. Ghauri, A. Siddiqui
{"title":"\"Ergonomics: Implications on Computer End-users\"","authors":"M. Ghauri, A. Siddiqui","doi":"10.1109/ICICT.2005.1598589","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598589","url":null,"abstract":"Ergonomics is the application of scientific information related to humans to the design of objects, systems and environment for human use. The objective is to apply human characteristics to the design of computer-based work environments to reduce problems of people at work. Lack of ergonomics has serious repercussions on end-users, including physical and mental illnesses. Using ergonomics to design computer-intensive environments would maximize efficiency, productivity and job satisfaction of employees. Unfortunately, in the Government Sector in Pakistan, there is no application of ergonomics in computer-based environments, and this leads to inefficiencies, errors, and safety and health issues. The purpose of this research paper is to highlight the implications of ergonomics on employees working in a computer-based environment in Pakistan. I will be studying the effects of ergonomics on employee productivity and morale by investigating the problems that occur due to the absence of ergonomics when designing computer-based environments in Government organizations in Pakistan. To conduct the research, I aim to choose an ergonomic model organization, specifically a Multinational company, and study its computer-based environment, studying the ergonomic factors that lead to their increase in employee productivity and morale. I would use these factors to do an extensive survey of 3 Government organizations to highlight the problems that arise because of the lack of ergonomically-designed computer systems and environments.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116062178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Simulated data Generation, Transfer for the Testing of Layered Compression Coder ASIC Design using Scaleable Algorithm 基于可扩展算法的分层压缩编码器测试的模拟数据生成、传输ASIC设计
2005 International Conference on Information and Communication Technologies Pub Date : 2005-08-27 DOI: 10.1109/ICICT.2005.1598627
M. Kamran, S. Feng, Ji Weixing
{"title":"Simulated data Generation, Transfer for the Testing of Layered Compression Coder ASIC Design using Scaleable Algorithm","authors":"M. Kamran, S. Feng, Ji Weixing","doi":"10.1109/ICICT.2005.1598627","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598627","url":null,"abstract":"Our paper presents the procedure of dealing with pixel data for the ASIC using scalable algorithm and effectiveness of the image data generated for the simulation and testing of Layered Image Compression Chip. Data acquiring technique from external file is not only useful for our ASIC but also very handy for any other kind of ASIC whose requirement is to get generated representing the actual input video data. Actual video data may of format BT 656, or from some other source like Philips device 7114. Our paper presents the co-design of hardware VHDL and software like C or C++ to generate the input test vectors to verify the working of first module of Chip architecture. Large input data for testing, which is nearly impossible to be put manually. The problem of data input vectors is practically encountered while designing the chip.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116738153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Performance Comparison of Data Encryption Algorithms 数据加密算法的性能比较
2005 International Conference on Information and Communication Technologies Pub Date : 2005-08-27 DOI: 10.1109/ICICT.2005.1598556
A. Nadeem, M. Javed
{"title":"A Performance Comparison of Data Encryption Algorithms","authors":"A. Nadeem, M. Javed","doi":"10.1109/ICICT.2005.1598556","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598556","url":null,"abstract":"The principal goal guiding the design of any encryption algorithm must be security against unauthorized attacks. However, for all practical applications, performance and the cost of implementation are also important concerns. A data encryption algorithm would not be of much use if it is secure enough but slow in performance because it is a common practice to embed encryption algorithms in other applications such as e-commerce, banking, and online transaction processing applications. Embedding of encryption algorithms in other applications also precludes a hardware implementation, and is thus a major cause of degraded overall performance of the system. In this paper, the four of the popular secret key encryption algorithms, i.e., DES, 3DES, AES (Rijndael), and the Blowfish have been implemented, and their performance is compared by encrypting input files of varying contents and sizes, on different Hardware platforms. The algorithms have been implemented in a uniform language, using their standard specifications, to allow a fair comparison of execution speeds. The performance results have been summarized and a conclusion has been presented. Based on the experiments, it has been concluded that the Blowfish is the best performing algorithm among the algorithms chosen for implementation.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"329 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122844310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 436
Traffic Engineering in DiffServ-Based MPLS Networks 基于diffserv的MPLS网络流量工程
2005 International Conference on Information and Communication Technologies Pub Date : 2005-08-27 DOI: 10.1109/ICICT.2005.1598633
A. Jamal
{"title":"Traffic Engineering in DiffServ-Based MPLS Networks","authors":"A. Jamal","doi":"10.1109/ICICT.2005.1598633","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598633","url":null,"abstract":"The combined use of the differentiated services (DiffServ) and multiprotocol label switching (MPLS) technologies is envisioned to provide guaranteed quality of service (QoS) for multimedia traffic in IP networks. One of the most attractive applications of MPLS is traffic engineering (TE), However, MPLS by itself cannot provide service differentiation, which brings up the need to complement it with another technology capable of providing such a feature: DiffServ. By mapping the traffic from different DiffServ classes of service on separate LSPs(light switched paths) networks can meet engineering constraints specific to the given class on both shortest and non-shortest path. This TE strategy is called DiffServ-aware TE (DS-TE). The experimental results caculated in this paper plot the efficiency of GMPLS/Lightwave Agile Switching Simulator (GLASS) as a network manager in different and unpredictable traffic conditions at the expense of a limited increase in the computational complexity and cost.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133832396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visualization of Retrieved Positive Data Using Blending Function 利用混合函数实现检索正数据的可视化
2005 International Conference on Information and Communication Technologies Pub Date : 2005-08-27 DOI: 10.1109/ICICT.2005.1598597
M. Shoaib, Habib-ur-Rehman, A.A. Shah
{"title":"Visualization of Retrieved Positive Data Using Blending Function","authors":"M. Shoaib, Habib-ur-Rehman, A.A. Shah","doi":"10.1109/ICICT.2005.1598597","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598597","url":null,"abstract":"Data visualization is an important technique used in data mining. We present the retrieved data into visual format to discover features and trends inherent to the data. Some features of the data to be retrieved are already known to us. Visualization should preserve these known features inherent to the data. Positivity is one such known feature that is inherent to most of the scientific and business data sets. For example, mass, volume and percentage concentration are meaningful only when they are positive values. However certain visualization techniques do not guarantee to preserve this feature while constructing visualization of retrieved data sets that are inherently positive. This research present a solution to the problem of positivity while visualizing the retrieved positive data sets.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121971172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信