2005 International Conference on Information and Communication Technologies最新文献

筛选
英文 中文
Shading Algorithms for 3-d Computer Graphics 三维计算机图形的阴影算法
2005 International Conference on Information and Communication Technologies Pub Date : 2005-08-27 DOI: 10.1109/ICICT.2005.1598545
A. Butt
{"title":"Shading Algorithms for 3-d Computer Graphics","authors":"A. Butt","doi":"10.1109/ICICT.2005.1598545","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598545","url":null,"abstract":"Computer graphics deals with realistic rendering of 3-d objects. There are many rendering algorithms used. Two of the most famous algorithms are Gouraud Shading Algorithm and Phong Shading Algorithm. These algorithms handle location of light source, location of the camera, and surface reflection properties in different manners and produce different results. Their computational complexities are also very different; Phong Shading being very complex compared to Gouraud Shading. In this talk, the rendering problem is analyzed using 3-d geometry to see how location of light source, location of the observer, and the surface reflection properties play their role. The equations for the two shading algorithms is derived, the computational complexities of the algorithms are compared, and an adaptive shading scheme is presented that chooses between computationally complex Phong Shading algorithm to render the parts of a 3-d object where it is really needed. For other parts of the 3-d object, computationally simple Gouraud Shading is used. This type of adaptive shading scheme has been in existence for some time. However, the algorithms for selection between two rendering methods are not very robust. A new algorithm, developed by the author, for such selection is presented. The comparative results of existing algorithms vs.. the new algorithm are also presented.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115647401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Risk Analysis-Relative Impact Factorization 增强风险分析-相对影响分解
2005 International Conference on Information and Communication Technologies Pub Date : 2005-08-27 DOI: 10.1109/ICICT.2005.1598603
B. Shahzad, T. Afzal, R. Irfan
{"title":"Enhanced Risk Analysis-Relative Impact Factorization","authors":"B. Shahzad, T. Afzal, R. Irfan","doi":"10.1109/ICICT.2005.1598603","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598603","url":null,"abstract":"Software engineering is an area of development which always has the risk factor present and software engineering can hardly be done on some straight line. So, the manager has to handle the dynamically changing circumstances in order to complete the job. The target of development team is to develop the software according to the requirements within specified time. Wide variety of risks I are present that may grab the development effort. A good manager must ensure that all measures have been taken against the risks that may possibly come. This paper focuses on determining the relative impact of risk factors on the software development activities. Relative impact ratio ensures to determine the direct and indirect impacts of a risk on all activities of software development.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126189016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Comparative Analysis of Major IT Systems for Electronic Business in Modern Organizational Domain: ERP, DSS and MIS 现代组织领域电子商务主要IT系统的比较分析:ERP、DSS和MIS
2005 International Conference on Information and Communication Technologies Pub Date : 2005-08-27 DOI: 10.1109/ICICT.2005.1598628
N. Kolachi
{"title":"Comparative Analysis of Major IT Systems for Electronic Business in Modern Organizational Domain: ERP, DSS and MIS","authors":"N. Kolachi","doi":"10.1109/ICICT.2005.1598628","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598628","url":null,"abstract":"This paper reports on a study of Information Technology (IT) systems, their comparative analysis, issues and applications in electronic business activities with special reference to modern organizational setup. It covers the major challenges which usually hinder the successful electronic business functions. Due to the magnitude and growth in e-culture, the need for such studies has become very important but there is a still lot of room available to have theoretical and empirical work on the topic. This paper investigates the impact of technological size and organizational complexity of IT systems. Moreover, the paper also focuses on the study of Major IT issues from the individual perspective and organizational exposure with substantial and diverse involvement of ERP, DSS and MIS in Electronic Business platform. The paper comprises on four main sections: First is about the introduction of IT systems concerning Electronic Business environment. Second is about the success and failure phenomena of electronic business. Third section relates to the detailed comparative analysis among major IT systems and Fourth part is followed by few suggestions and conclusion as well.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126688043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Face Recognition using Sub-Holistic PCA 基于子整体PCA的人脸识别
2005 International Conference on Information and Communication Technologies Pub Date : 2005-08-27 DOI: 10.1109/ICICT.2005.1598573
Muhammad Murtaza Khan, M. Y. Javed, M. A. Anjum
{"title":"Face Recognition using Sub-Holistic PCA","authors":"Muhammad Murtaza Khan, M. Y. Javed, M. A. Anjum","doi":"10.1109/ICICT.2005.1598573","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598573","url":null,"abstract":"This paper proposes a face recognition scheme that enhances the correct face recognition rate as compared to conventional Principal Component Analysis (PCA). The proposed scheme, Sub-Holistic PCA (SH-PCA), was tested using ORL database and out performed PCA for all test scenarios. SH-PCA requires more computational power and memory as compared to PCA however it yields an improvement of 6% correct recognition on the complete ORL database of 400 images. The correct recognition rate for the complete ORL database is 90% for the SH-PCA technique.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124963312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Creating Active Space in ExRTI 在ExRTI中创建活动空间
2005 International Conference on Information and Communication Technologies Pub Date : 2005-08-27 DOI: 10.1109/ICICT.2005.1598612
A. Malik, S.A. Khan
{"title":"Creating Active Space in ExRTI","authors":"A. Malik, S.A. Khan","doi":"10.1109/ICICT.2005.1598612","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598612","url":null,"abstract":"This paper presents a proposed ExRTI architecture which is much more flexible, dynamic, and able to handle mobile devices and also based on authentication mode to provide security. In this new architecture GAIA layer is embedded in the RTI, thus creating active space in distributed operating system (ExRTI). This architecture promotes physical spaces with hundreds of specialized embedded devices that increase productivity, alleviate some specific everyday tasks and provide new ways of interacting with the computational environment. Physical spaces become computer systems, or in other terms, Active Spaces. However, these Active Spaces require novel system software capable of seamlessly coordinating their hidden complexity. Our goal is to extend the RTI model in order to allow interaction with physical spaces and their contained entities (physical and virtual) by means of a single abstraction called Active Space, with this architecture mobile node can also take part in the simulations. When communicating between different mobile agents it is important to encrypt communication information between agents for the security of the network intrusion detection system itself. During the agents on different layer or on the same layers, communication information is easily to be monitored; intercepted and modified because of the exposed position that agent lies in.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131327215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Low-Cost Solution for Urban Air-Pollution Monitoring Using Existing Infrastructure and Loosely Connected Ground Based Sensing Equipment 利用现有基础设施和松散连接的地面传感设备进行城市空气污染监测的低成本解决方案
2005 International Conference on Information and Communication Technologies Pub Date : 2005-08-27 DOI: 10.1109/ICICT.2005.1598577
M. Ikram, A. Akram, M. Amin
{"title":"A Low-Cost Solution for Urban Air-Pollution Monitoring Using Existing Infrastructure and Loosely Connected Ground Based Sensing Equipment","authors":"M. Ikram, A. Akram, M. Amin","doi":"10.1109/ICICT.2005.1598577","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598577","url":null,"abstract":"This paper provides a cost effective and generic solution for urban air pollution monitoring using existing computing resources and infrastructure. The design has been modularised into three subsystems — the Data Acquisition System (DAS), Data Transmission System (DTS), and the Data Collation System (DCS). The DAS is composed of ground-based sensing equipment attached to the PCs, of citizen-volunteers geographically spread out in a city, connected to a central server via the internet. The devices periodically send snap-shots of urban environmental conditions of their respective localities to the central server using the DTS. Here, the DCS seamlessly aggregates received data to build a comprehensive database (DB) of the history of environmental conditions in a given urban setting and allows internet users to view analyses run on that data.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125347818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance Evaluation of Sparse Storage Formats 稀疏存储格式的性能评价
2005 International Conference on Information and Communication Technologies Pub Date : 2005-08-27 DOI: 10.1109/ICICT.2005.1598546
A. Usman, M. Luján, L. Freeman
{"title":"Performance Evaluation of Sparse Storage Formats","authors":"A. Usman, M. Luján, L. Freeman","doi":"10.1109/ICICT.2005.1598546","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598546","url":null,"abstract":"Sparse matrices are pervasive in many Computational Science and Engineering (CS&E) applications. There is a significant number of storage formats used to represent sparse matrices. This paper presents a performance evaluation of storage formats for the main kernel of iterative methods for numerical linear algebra, namely matrix-vector multiplication. The experiments consider a set of almost 200 sparse matrices from the Matrix Market collection covering both systems of linear equations and eigenvalue problems. For each matrix, the experiments perform the matrix-vector multiplication with most commonly used sparse storage formats and also the recently proposed Java Sparse Array storage fonmat. To the best of the authors' knowledge, there is no other performance evaluation of storage formats for sparse matrices which consider such a variety of matrices and storage formats.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131297575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification of Compressed Human Face Images by using Principle Components 基于主分量的压缩人脸图像分类
2005 International Conference on Information and Communication Technologies Pub Date : 2005-08-27 DOI: 10.1109/ICICT.2005.1598566
Z. Riaz, A. Gilgiti, Z. Ali
{"title":"Classification of Compressed Human Face Images by using Principle Components","authors":"Z. Riaz, A. Gilgiti, Z. Ali","doi":"10.1109/ICICT.2005.1598566","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598566","url":null,"abstract":"This paper describes the novel approach of classifying the humans on the basis of their compressed face images. The compression of the face images is performed using Discrete Wavelet Transform (DWT). While the classification encompass the use of Principal Components Analysis (PCA). Classification technique utilizes PCA in some different way. Only first principal component is used as feature vector out of 92 components (since image size is 112×92), causing a better results of 87.39%. The Euclidean distance is used as distance metric. In the end our results are compared to our previous research of classifying the uncompressed images.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124239782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Quantified Model of COBIT for Corporate IT Governance 面向企业IT治理的COBIT量化模型
2005 International Conference on Information and Communication Technologies Pub Date : 2005-08-27 DOI: 10.1109/ICICT.2005.1598575
S. J. Hussain, M. Siddiqui
{"title":"Quantified Model of COBIT for Corporate IT Governance","authors":"S. J. Hussain, M. Siddiqui","doi":"10.1109/ICICT.2005.1598575","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598575","url":null,"abstract":"Now organizations are more concerned about the appropriate IT governance. The growing dependency on IT due to the increasing volume of business process automation further challenges the role of Information System Auditor. IT Governance Institute has developed COBIT1 as a model for this purpose [1][2]. The model proposed in this research quantifies the COBIT by developing matrices for all four domains of COBIT; hence it provides a quantitative approach for better implementation of corporate IT governance through effective audit and control.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130031740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Ethical and Societal Challenges of Information Technology (The Pakistani Scenario) 信息技术的伦理和社会挑战(巴基斯坦情景)
2005 International Conference on Information and Communication Technologies Pub Date : 2005-08-27 DOI: 10.1109/ICICT.2005.1598547
A. Siddiqi
{"title":"Ethical and Societal Challenges of Information Technology (The Pakistani Scenario)","authors":"A. Siddiqi","doi":"10.1109/ICICT.2005.1598547","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598547","url":null,"abstract":"The whole world is now totally engrossed in the Information revolution. With the advent of the Internet and related Technologies, all barriers have been broken down and the world has become one large Global Village where doing business across the world has become as simple as doing business with ones neighbors living next door. Information Revolution has dramatically magnified our ability to acquire, manipulate, store and communicate information and conduct business though hyper-technology and open systems architecture of the Internet. While this provides all the facilities to conduct business smoothly and quickly it has also created a threat to the users of Hyperlink to engage in ethical and unethical business practices electronically anywhere in the world. There are Ethical Philosophies that most religions talk about, ethical values and models that guide the ethics of conducting business. These values apply to Information even more so, as now information is very easily available and mis-utilization of this information leads to very serious consequences. This paper looks at the Ethical and societal dimensions of IT and ethical principles governing IT and finally how IT is effecting the lives of everyday man, especially in the privacy realm. Pakistan is practically in the infancy of global e-business thus faces this threat even more then the other countries. This paper first looks at the ethical and unethical issues and then how the Pakistani are dealing with it. What are the youth learning and how are they spending most their leisure time.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130783015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信