2005 International Conference on Information and Communication Technologies最新文献

筛选
英文 中文
A Survey on Intrusion Detection Approaches 入侵检测方法综述
2005 International Conference on Information and Communication Technologies Pub Date : 2005-08-27 DOI: 10.1109/ICICT.2005.1598592
A. Murali, M. Rao
{"title":"A Survey on Intrusion Detection Approaches","authors":"A. Murali, M. Rao","doi":"10.1109/ICICT.2005.1598592","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598592","url":null,"abstract":"Intrusion detection plays one of the key roles in computer security techniques and is one of the prime areas of research. Usages of computer network services are tremendously increasing day by day and at the same time intruders are also playing a major role to deny network services, compromising the crucial services for Email, FTP and Web. Realizing the importance of the problem due to intrusions, many researchers have taken up research in this area and have proposed several solutions. It has come to a stage to take a stock of the research results and project a comprehensive view so that further research in this area will be motivated objectively to fulfill the gaps exists till now.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130062079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 70
Complex Software Systems—An Assessment of Risks 复杂软件系统—风险评估
2005 International Conference on Information and Communication Technologies Pub Date : 2005-08-27 DOI: 10.1109/ICICT.2005.1598637
I. Naqvi, H. Memon, A. Uqaili
{"title":"Complex Software Systems—An Assessment of Risks","authors":"I. Naqvi, H. Memon, A. Uqaili","doi":"10.1109/ICICT.2005.1598637","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598637","url":null,"abstract":"This paper analyse the risks involved in developing the complex software systems (CoSS). CoSS are high cost, large and ambitious projects with complicated user interfaces, and stringent performance requirements. We acknowledge previous work of Charette (1996) which concluded that, large-scale project management is a risk management. Complex software development inevitably involves risks due to rapid development in communication technology. The identified risk include: technological complexity, technological novelty, system integration, and long schedule and developers capabilities. It is argued that these risks are the certain characteristics of Complex Software Systems (CoSS). Paper also highlights that software engineering practices are not scaling with large and complex software development. Paper also suggested few risk management practices (i.e. Modular Approach, Integrated solutions, Simplicity etc). The paper concludes with management lessons and further research issues.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114469763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secured Network Model for Management Information System Based On IP Security (IPSec) Encryption Using Multilayered Approach of Network Security 基于IP安全(IPSec)加密的管理信息系统安全网络模型
2005 International Conference on Information and Communication Technologies Pub Date : 2005-08-27 DOI: 10.1109/ICICT.2005.1598594
A. Pathan, M. Irshad
{"title":"Secured Network Model for Management Information System Based On IP Security (IPSec) Encryption Using Multilayered Approach of Network Security","authors":"A. Pathan, M. Irshad","doi":"10.1109/ICICT.2005.1598594","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598594","url":null,"abstract":"Secured flow of information through the network and play important role in the management information systems. In this paper I describe Secured Network Model For Corporate & Business Organization In Based On Network Level IP Security (IPSec) Encryption & Its Physical Layout Using Multilayered Approach. I have four important considerations for adoption of secured network model as secured network model for management information system.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126028124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software Delivery Delay Factors Estimation 软件交付延迟因素估计
2005 International Conference on Information and Communication Technologies Pub Date : 2005-08-27 DOI: 10.1109/ICICT.2005.1598626
B. Shahzad, N. Saqib
{"title":"Software Delivery Delay Factors Estimation","authors":"B. Shahzad, N. Saqib","doi":"10.1109/ICICT.2005.1598626","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598626","url":null,"abstract":"This has been observed that most of the software faces a general problem of delayed schedule of delivery. This is because of many factors that are still to be addressed at length. So, because of the lack of knowledge and lower scale of practice of software development principles, problems exist at almost all phases in most of the software. This paper will unleash the critical factors that play a major role in delaying the delivery of software. The solutions for such critical problems have also been suggested in this paper.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124497929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Comparative Study and Analysis of PVM and MPI for Parallel and Distributed Systems 并行与分布式系统中PVM与MPI的比较研究与分析
2005 International Conference on Information and Communication Technologies Pub Date : 2005-08-27 DOI: 10.1109/ICICT.2005.1598580
S. Hussain, G. Ahmed
{"title":"A Comparative Study and Analysis of PVM and MPI for Parallel and Distributed Systems","authors":"S. Hussain, G. Ahmed","doi":"10.1109/ICICT.2005.1598580","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598580","url":null,"abstract":"Networks of Workstations (NOWs) based on various operating systems are globally accepted as the standard for computing environments in the IT industry. To harness the tremendous potential for computing capability represented by these NOWs, various new tools are being developed. Parallel Virtual Machine (PVM) and Message Passing Interface (MPI) have existed on UNIX workstations for some time, and are maturing in their capability for handling Distributed Parallel Processing (DPP). This research is aimed to explore each of these two vehicles for DPP, considering capability, ease of use, and availability, and compares their distinguishing features; and also explores programmer interface and their utilisation for solving real world parallel processing applications. The research conducted herein concludes that each API has its unique features of strength, hence has potential to remain active into the foreseeable future. This work recommends a potential research issue, that is, to study the feasibility of creating a programming environment that allows access to the virtual machine features of PVM and the message passing features of MPI.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115662181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Study of Data Provenance and Annotation Model for Information Reliability Suggested for Pathological Laboratory Environment in Pakistan 巴基斯坦病理实验室环境数据来源及信息可靠性注释模型研究
2005 International Conference on Information and Communication Technologies Pub Date : 2005-08-27 DOI: 10.1109/ICICT.2005.1598582
N. Aamir, A. Pervaiz
{"title":"Study of Data Provenance and Annotation Model for Information Reliability Suggested for Pathological Laboratory Environment in Pakistan","authors":"N. Aamir, A. Pervaiz","doi":"10.1109/ICICT.2005.1598582","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598582","url":null,"abstract":"Trust and reliability of information is a very critical issue of today's information age. Keeping provenance of data not only ensures us about its origination but it also keeps track of all the changes that happen to the data through out its life cycle. In this paper we have discussed the importance of data provenance, difference between Where & Why Provenance and different models for keeping such information. The objective of this study is to select a provenance model which can be implemented in scientific environment of our country. For this purpose we have taken the annotation model and have applied it on the pathological laboratories so as to experience the usefulness and practicality of this concept.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131257362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Handoff Study in Mobile Networks Using Mobile IP 基于移动IP的移动网络切换研究
2005 International Conference on Information and Communication Technologies Pub Date : 2005-08-27 DOI: 10.1109/ICICT.2005.1598617
A. Iqbal, K. Khushk
{"title":"Handoff Study in Mobile Networks Using Mobile IP","authors":"A. Iqbal, K. Khushk","doi":"10.1109/ICICT.2005.1598617","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598617","url":null,"abstract":"Wireless LAN and mobile devices are becoming very popular because of its characteristics like connections without any physical cabling links. To make wireless devices working on built-in communication stack, it is important to consider Internet Protocol layer. For mobile networks IETF has proposed Mobile IP that provides facilities to roam between base stations while mobile devices moves between different cells transparently to application and higher level protocols. This paper provides the brief look on mobile IP architecture and then discusses the future research issues that should be resolved to increase the effectiveness of this protocol.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124638372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Approach for Anti-aliasing Raster Data in Air Borne Imagery 航空图像中栅格数据抗混叠的新方法
Fahim Arif, Muhammad Akbar
{"title":"A New Approach for Anti-aliasing Raster Data in Air Borne Imagery","authors":"Fahim Arif, Muhammad Akbar","doi":"10.1117/12.626787","DOIUrl":"https://doi.org/10.1117/12.626787","url":null,"abstract":"Air borne sensed data is in the form of raster data. Aliasing is always present in a sampled image causing artifact error. To reduce possible aliasing effects, it is a good idea to blur an image slightly before applying a resampling method on it. This paper presents a technique for anti-aliasing remotely sensed images. The technique uses Gaussian low pass filter (GLPF) for generation of slight blur. Then resampling of raster data is performed with the help of bilinear interpolation. Algorithm is developed in MATLAB using some inbuilt functions.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121523331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Problems of Learning in Theoretical Computer Science 理论计算机科学中的学习问题
2005 International Conference on Information and Communication Technologies Pub Date : 2005-08-27 DOI: 10.1109/ICICT.2005.1598548
M. A. Iqbal
{"title":"Problems of Learning in Theoretical Computer Science","authors":"M. A. Iqbal","doi":"10.1109/ICICT.2005.1598548","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598548","url":null,"abstract":"In today's \"Information society,\" the future of economic well-being rests on the effectiveness of schools and corporations to empower their people to be more effective learners and knowledge creators Joseph D. Novak Understanding the processes that takes place inside the human mind-while it is thinking and learning-has remained an elusive exercise mostly because of lack of powerful research tools and techniques. Now because of recent advances in various branches of science dealing with mind and brain, it has become possible to better understand the processes of thinking and learning, and the capacity to create new knowledge. For example research from cognitive psychology has considerably increased our understanding of the principles of knowledge organization that govern people's abilities to learn, understand and create new knowledge. It is perhaps the right time to apply these developments in the study of learning to help people to think and read critically, to express themselves clearly and persuasively, and to solve complex problems. In this tutorial we would first be studying and then applying tools and techniques of science of learning to determine which problems are hard to understand in the field of Theoretical Computer Science. We shall also try to find why a problem is hard and why most of the learners fail to solve it in spite of the fact that they have all the prerequisite knowledge as well as the motivation to do it.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122128842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of Decision Support System for Nuclear Emergency 核应急决策支持系统的开发
2005 International Conference on Information and Communication Technologies Pub Date : 2005-08-27 DOI: 10.1109/ICICT.2005.1598629
Uzma Ilyas
{"title":"Development of Decision Support System for Nuclear Emergency","authors":"Uzma Ilyas","doi":"10.1109/ICICT.2005.1598629","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598629","url":null,"abstract":"Decision Support System (DSS) is developed for Karachi Nuclear Power Plant (KANUPP) for off-site emergency management. By only one click to get all information about Karachi Emergency Relief Plan (KERP) document, countermeasures on the basis of priority, economic cost and social behavior of the affected area by Nuclear hazard. Also share work with others across the Network. This computer-based expert system can also provide. System is a distributed application, which consists of a comprehensive database in SQL 7.0 server and a user-friendly environment in Microsoft Visual Basic 6.0.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125518709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信