2009 International Association of Computer Science and Information Technology - Spring Conference最新文献

筛选
英文 中文
Modeling and Simulation of Graspers Force in Minimally Invasive Surgery 微创手术中抓握力的建模与仿真
Ramin Hortamani, A. Zabihollah
{"title":"Modeling and Simulation of Graspers Force in Minimally Invasive Surgery","authors":"Ramin Hortamani, A. Zabihollah","doi":"10.1109/IACSIT-SC.2009.126","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.126","url":null,"abstract":"In Minimally Invasive Surgery (MIS) the operation is performed through introducing surgery instruments, graspers, scissor into the body. In the present work, a novel smart grasper is presented in which the surgeon can virtually acquire a feeling of force/momentum experienced by the organ/tissue. The smart grasper uses piezoelectric sensors bonded at desired locations to detect the applied force/momentum by surgeon and to measure the transmitted response to the tissue/organ.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124406137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prospects of Technological Advancements in Banking Sector Using Mobile Banking and Position of India 使用移动银行的银行业技术进步的前景和印度的地位
Mahesh K. Harma, Ritvik Dubey
{"title":"Prospects of Technological Advancements in Banking Sector Using Mobile Banking and Position of India","authors":"Mahesh K. Harma, Ritvik Dubey","doi":"10.1109/IACSIT-SC.2009.13","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.13","url":null,"abstract":"AbstractThe internet and the mobile phone that two technological advancements that have profoundly affected all of us in the last decade now on boom. The products of this association are mobile data services. Using a variety of platforms, services are being created to enable mobile devices to perform many activities of the traditional internet, albeit in a reduced format for mobile devices. One area of activity is mobile banking (one of the first areas of commercial transaction on the wireless internet). Banking is an area that has extended in many different ways in recent years, including telephone and online banking. M-banking provides yet another channel for banking services, and in emerging markets, provides some possibility for becoming a primary channel. Mobile banking, a symbiosis of technology and financial services, is the hottest area of development in the banking sector and is expected to replace the debit/credit card system, online or netbanking in future. In the past two years, the number of people using mobiles has increased three times, as compared to the use of debit/credit card holders. And, 85 per cent -90 per cent of mobile users do not own credit cards, There are 47 million mobile users, with 2 million being added every month. Despite such potential for convenience and business opportunity, few people use mobiles even for simple banking queries. Present paper is focused on about mobile banking, its use and applications in bank sector. The technology required in mobile banking and some barriers like interoperability, fraud and security will be discussed also in this paper. This paper examines the strategic implications of m-banking and the strategic positioning of m-banking services in different markets. The paper concludes with a discussion of the future for m-banking services.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115760464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Simulating the Perception Bias on Innovation Diffusion: An Experimental Study 创新扩散的感知偏差模拟:一个实验研究
M. Remondino, M. Pironti, R. Schiesari
{"title":"Simulating the Perception Bias on Innovation Diffusion: An Experimental Study","authors":"M. Remondino, M. Pironti, R. Schiesari","doi":"10.1109/IACSIT-SC.2009.69","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.69","url":null,"abstract":"The decision to adopt innovations has been investigated using both international patterns and behavioral theories. In this work, an agent-based (AB) model is created to study the spreading of innovation in enterprises (namely, the adoption of Information Technology outsourcing). The paradigm of AB simulation makes it possible to capture human factors, along with technical ones. This makes it possible to study the influence of perception, and the resulting bias. This work is focused on small and medium enterprises (SME), in which a restricted managing pool (sometimes just one person) decides whether to adopt a new technology or not, and bases the decision mainly on perception.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125041978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Case Study on the Multistage LED Packaging and Testing Scheduling Problem 多阶段LED封装测试调度问题的实例研究
Tien-Hsi Chuang, W. Chu, H. Lin, Chia Yang Hung
{"title":"A Case Study on the Multistage LED Packaging and Testing Scheduling Problem","authors":"Tien-Hsi Chuang, W. Chu, H. Lin, Chia Yang Hung","doi":"10.1109/IACSIT-SC.2009.123","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.123","url":null,"abstract":"Light-emitting diode (LED) industry will play an important role in the high-tech industry. At present, around the world promote energy-saving by reducing carbon. LED bulb could save more electricity than regular bulb, so the European Union from 2009 until 2012 will gradually replace energy-consuming bulbs and then be completely banned. A wide range of LED application, such as: the automotive industry, communications, information industry, with the signal display billboards and so on. LED industry is expected to be the next emerging industries. This study would focus on machine scheduling problem for LED packaging and testing factory. The light-emitting diodes packaging and testing scheduling problem (LEDPTSP) is a variation of the complex flow-shop scheduling problem, which is also a generalization of the classical flow batch process problem, and the identical parallel machine problem. In this paper, we present a case study on the LEDPTSP, which is taken from a final packaging and testing shop floor in an LED factory. For the LEDPTSP case investigated, the jobs are clustered by their product types, which are processed on groups of parallel machines at various process stages following the manufacturing sequence, which must be completed before the due dates. The job processing time depends on the product type, and the machine setup time is sequentially dependent on the orders of jobs processed. The objective in the case is to seek a LEDPTS with minimum total machine workload. The LEDPTSP involves serial-processing stage, job clusters, due dates, machine capacity, and sequence dependent setup time, it is more difficult to solve than the classical flow-shop scheduling problem. The LEDPTSP is formulated as in integer programming problem and the problem solved using the powerful CPLEX with effective implementation strategies.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124660949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on Geometric Tolerances Information Modelling in Integrated Manufacturing Processes 集成制造过程中几何公差信息建模研究
Chao Yan, Wu Liqun
{"title":"A Study on Geometric Tolerances Information Modelling in Integrated Manufacturing Processes","authors":"Chao Yan, Wu Liqun","doi":"10.1109/IACSIT-SC.2009.106","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.106","url":null,"abstract":"Tolerance information plays a critical role in many steps of the product life cycle and especially important due to the advances in Internet technologies and increasing integration requirements from industry. In this paper, geometric tolerances information in manufacturing process (IMP) is studied, and the layered conformance level of geometric tolerances is established according to ASME Y14.5-1994, STEP and DMIS. An EXPRESS-G data model of geometric tolerance information in IMP is established. The XML language is used to represent and program the geometric tolerances information in IMP.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"112 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134096666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Landmark Extraction from Echocardiography Sequence Based on Corner Detection Algorithms Using Gradient Vector Matcher 基于角点检测算法的梯度向量匹配超声心动图序列地标提取
M. Mansoory, H. Behnam, Emad Fatemi Zadeh
{"title":"Landmark Extraction from Echocardiography Sequence Based on Corner Detection Algorithms Using Gradient Vector Matcher","authors":"M. Mansoory, H. Behnam, Emad Fatemi Zadeh","doi":"10.1109/IACSIT-SC.2009.29","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.29","url":null,"abstract":"Landmark extraction is used as the first step of many vision tasks such as tracking, image registration, localization, image matching and recognition. Furthermore, landmarks are used to reduce the data flow and consequently the computational costs. In this paper we extracted landmarks from echocardiography sequence, our algorithm is based on corner extraction, and then we evaluate our algorithm with applying some test. For this purpose, we evaluated the detectors according to their repeatability, stability and landmark localization under changes in noise.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115664892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure Geocast in Ad Hoc Network Using Multicasting Key Distribution Scheme (SGAMKDS) 基于多播密钥分配方案(SGAMKDS)的Ad Hoc网络安全地理广播
V. Palanisamy, P. Annadurai
{"title":"Secure Geocast in Ad Hoc Network Using Multicasting Key Distribution Scheme (SGAMKDS)","authors":"V. Palanisamy, P. Annadurai","doi":"10.1109/IACSIT-SC.2009.70","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.70","url":null,"abstract":"An ad hoc network is a kind of wireless communication infrastructure that does not have base stations or routers. Each node acts as a router and is responsible for dynamically discovering other nodes it can directly communicate with. However, when a message without encryption is sent out through a general tunnel, it may be maliciously attacked. Ad hoc networks are increasingly growing these days and security field in ad hoc network communication has become a common research field. This paper addresses the problem of geocasting in mobile ad hoc network (MANET) environments. Geocast is useful for sending messages to everyone in a specified geographical region. Geocasting is a variant of the conventional multicasting problem. For multicasting, conventional protocols define a multicast group as a collection of hosts which register to a multicast group address. However, for geocasting, the group consists of the set of all nodes within a specified geographical region. Securing group communication and group key establishment for geocasting in ad hoc networks is covered in this paper. For a secure geocasting in ad hoc network for group communication, a group key is needed to be shared between group members to encrypt group messages. The main idea is to have group members actively participate to the security of the multicast group, therefore reducing the communication and computation load on the source. Since the group security is distributed among the group members in the specified geographical region","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"351 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115895771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Survey on Divisible Load Theory 可分负荷理论综述
Amin Shokripour, M. Othman
{"title":"Survey on Divisible Load Theory","authors":"Amin Shokripour, M. Othman","doi":"10.1109/IACSIT-SC.2009.55","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.55","url":null,"abstract":"During the last decade, using parallel and distributed system has been more general. In these systems a huge size of data or computation is distributed between many systems for getting better performance. Dividing data is one of the challenges in this type of system, because efficiency of system has direct relation to distributed data. One of proposed method for managing data distribution called Divisible Load Theory (DLT). This method is based on this actuality that data in some applications can be divided arbitrarily to some independent parts which each of them can be processed independently from others. In this paper we present a survey on DLT. This article will discuss about some fundamental concepts for understanding this method. Then some reasons for using it and used notations will be investigated and an example will be examined.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115946963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Numerical Simulation of the Surface Corrosion Damage Evolution 表面腐蚀损伤演化的数值模拟
Youhong Zhang, Rui Zhang, Enyi Chu, Shengli Zhou, Jupeng Liu
{"title":"Numerical Simulation of the Surface Corrosion Damage Evolution","authors":"Youhong Zhang, Rui Zhang, Enyi Chu, Shengli Zhou, Jupeng Liu","doi":"10.1109/IACSIT-SC.2009.49","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.49","url":null,"abstract":"In this paper, the corrosion damage of the aluminum alloy specimens were studied at different temperature for various corrosion times. The surface corrosion damage ratio of aluminum alloy structure was defined to reveal the degree of pit corrosion intensity. Based on the probability model of pitting corrosion growth, a new probability model capable of simulating the surface corrosion damage is developed and validated. The surface corrosion damage evolution is simulated using a Monte Carlo process and a reasonable agreement was found between experimental and calculated results.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124084980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Nonminutiae Based Fingerprint Matching 基于非特征的指纹匹配
Jaspreet Kour, Neeta Awasthy
{"title":"Nonminutiae Based Fingerprint Matching","authors":"Jaspreet Kour, Neeta Awasthy","doi":"10.1109/IACSIT-SC.2009.127","DOIUrl":"https://doi.org/10.1109/IACSIT-SC.2009.127","url":null,"abstract":"Fingerprint verification is one of the most reliable personal identification method. However, manual fingerprint verification is tedious, time consuming and expensive. Thus it is incapable to match the required speed and accuracy expected in modern world. Minutiae based and image based are two major approaches for fingerprint recognition. Image based approach offers much higher computation efficiency with minimum pre processing and proves effective when the image quality is too low to allow a reliable minutiae extraction. In this work, a novel method of image based fingerprint matching which uses the orientation field as a feature vector is proposed. The proposed method overcomes problems of shape distortion, variation in position, rotation and translation of image. Optimal core point detection of fingerprint (image) helps in improving accuracy of fingerprint matching system. Based on orientation feature, a fingerprint matching system is designed. The algorithm has been tested on two databases (10 subjects with five impressions from database available from neurotechnologija and 8 subjects with five impressions from FVC2002 D1_b). The performance of algorithm is measured in terms of receiver operating characteristics. For the neurotechnologija database at 0% false acceptance rate (FAR) the genuine acceptance GAR observed is 75% and at 21.1% FAR, GAR is 95%.For the FVC2002 database at 2.8% FAR the GAR observed is 80% and at 8.66% FAR the GAR is 97.5%.Computational Complexity of proposed algorithm is low and hence can be implemented as automatic fingerprint identification system.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124182456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信