International Journal of Computer Theory and Engineering最新文献

筛选
英文 中文
Character Analysis Scheme for Compressing Text Files 压缩文本文件的字符分析方案
International Journal of Computer Theory and Engineering Pub Date : 2015-10-01 DOI: 10.7763/IJCTE.2015.V7.986
S. Adewumi
{"title":"Character Analysis Scheme for Compressing Text Files","authors":"S. Adewumi","doi":"10.7763/IJCTE.2015.V7.986","DOIUrl":"https://doi.org/10.7763/IJCTE.2015.V7.986","url":null,"abstract":"achieved by taking each of these characters that makes up the text one at a time and then search first, for the position of the last occurrence of a particular character being considered for compression together with the length of its digits, and then, starting from the beginning of the text file, note all the positions where this character has occurred. The positions of occurrence of this character while the search is on, is made equal to the length of the digit of the last occurrence of the character by padding it with zeroes to the left of the most significant bit, if need be. Concatenate the values representing the positions of the occurrence of a character and covert the concatenated string into a decimal value. Divide this value successively by 2 until the result lies between one and less than two. Store the quotient obtained from these divisions and the sum of the number of times the division was carried out as an index k. Decompression is the reverse of the steps just described, and this is achieved by taking each character; obtained their corresponding quotient (q), index k and length li. To recover the decimal positions of the concatenated values, we multiply the quotient (q) by 2 k . We then use the length of this","PeriodicalId":306280,"journal":{"name":"International Journal of Computer Theory and Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129850674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mammographic Image Enhancement Based on SWT and High Boost Filtering 基于SWT和高升压滤波的乳房x线图像增强
International Journal of Computer Theory and Engineering Pub Date : 2015-10-01 DOI: 10.7763/IJCTE.2015.V7.988
P. S. A. Devi, M. G. Mini
{"title":"Mammographic Image Enhancement Based on SWT and High Boost Filtering","authors":"P. S. A. Devi, M. G. Mini","doi":"10.7763/IJCTE.2015.V7.988","DOIUrl":"https://doi.org/10.7763/IJCTE.2015.V7.988","url":null,"abstract":"—A Mammogram is a competent tool in early detection of breast cancer. Image enhancement in mammographic images increases the diagnosability of abnormalities in the images. The classical image enhancement techniques are not adept to improve the diagnostic features in mammograms. The enhancement technique proposed in this paper utilizes Stationary Wavelet Transform (SWT), modulus maxima and high boost filtering. The image is decomposed using SWT and its modulus maximum is determined. A fraction of the high pass filtered image obtained as the result of SWT decomposition and modulus maxima is added to original image. The scheme is evaluated visually and objectively using measures like contrast, PSNR etc. The performance measures are evaluated for different category of images and found to be suitable to all categories of mammographic images.","PeriodicalId":306280,"journal":{"name":"International Journal of Computer Theory and Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122576003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
The Application of Adaptive LMF Quadratic and Cubic Volterra Filters to ECG Signals 自适应LMF二次和三次Volterra滤波器在心电信号中的应用
International Journal of Computer Theory and Engineering Pub Date : 2015-10-01 DOI: 10.7763/IJCTE.2015.V7.982
W. Zgallai
{"title":"The Application of Adaptive LMF Quadratic and Cubic Volterra Filters to ECG Signals","authors":"W. Zgallai","doi":"10.7763/IJCTE.2015.V7.982","DOIUrl":"https://doi.org/10.7763/IJCTE.2015.V7.982","url":null,"abstract":"","PeriodicalId":306280,"journal":{"name":"International Journal of Computer Theory and Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130527654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Novel Prediction Error Based Reversible Data Hiding Method Using Histogram Shifting 基于直方图移位的预测误差可逆数据隐藏新方法
International Journal of Computer Theory and Engineering Pub Date : 2015-10-01 DOI: 10.7763/IJCTE.2015.V7.981
Ting Luo, G. Jiang, Mei Yu, W. Gao
{"title":"Novel Prediction Error Based Reversible Data Hiding Method Using Histogram Shifting","authors":"Ting Luo, G. Jiang, Mei Yu, W. Gao","doi":"10.7763/IJCTE.2015.V7.981","DOIUrl":"https://doi.org/10.7763/IJCTE.2015.V7.981","url":null,"abstract":"—Reversible data hiding can recover the original image from the marked image without any distortion. This paper presents a novel prediction error based reversible data hiding method using histogram shifting in spatial domain. Three predictors including Mean, JPEG lossless and median edge detector (MED) are employed to compute prediction values for current pixels, respectively. Prediction errors are calculated as well to build histogram bins. Histogram shifting mechanism is designed that bins with large prediction errors are shifted based on hiding level, and thus, it will not hurt marked image if hiding level is not high. Histogram bins with small error predictions are used to hide secret data. Experimental results demonstrate that average of prediction error is less than that of interpolation error used in existing data hiding methods, and the proposed method is good at high capacity hiding. MED is the best predictor among three predictors in the proposed method, and it outperforms existing data hiding methods in terms of capacity and marked image quality.","PeriodicalId":306280,"journal":{"name":"International Journal of Computer Theory and Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131752289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Performance Investigations of Routing Protocols in Vanet under IPv4 and IPv6 基于IPv4和IPv6的Vanet路由协议性能研究
International Journal of Computer Theory and Engineering Pub Date : 2015-10-01 DOI: 10.7763/IJCTE.2015.V7.990
M. Otmani, Fihri Mohammed, Ezzati Abdellah
{"title":"Performance Investigations of Routing Protocols in Vanet under IPv4 and IPv6","authors":"M. Otmani, Fihri Mohammed, Ezzati Abdellah","doi":"10.7763/IJCTE.2015.V7.990","DOIUrl":"https://doi.org/10.7763/IJCTE.2015.V7.990","url":null,"abstract":"","PeriodicalId":306280,"journal":{"name":"International Journal of Computer Theory and Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134172343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assistive Tools towards Personal Learning Environment in Higher Education 高等教育中个人学习环境的辅助工具
International Journal of Computer Theory and Engineering Pub Date : 2015-10-01 DOI: 10.7763/IJCTE.2015.V7.993
N. M. Tuah, Dg. Senandong Ajor, N. Jamil
{"title":"Assistive Tools towards Personal Learning Environment in Higher Education","authors":"N. M. Tuah, Dg. Senandong Ajor, N. Jamil","doi":"10.7763/IJCTE.2015.V7.993","DOIUrl":"https://doi.org/10.7763/IJCTE.2015.V7.993","url":null,"abstract":"This study explores the tools and materials used in personal learning environment (PLE) by investigating the impact of embedding a mashup technology into learning environment. With Web 2.0 technologies, mashing up several materials into learning repository helps learners to form their own scope of learning. A PLE mashup model is suggested in determining suitable tools and materials. Based on the current trends in Web 2.0, another aspect of PLE that could be further investigated is the adoption of social media application for formal higher education level. A study on student perception shows a positive acceptance towards PLE in their learning activities. In order to serve as learning tool, how the technology could be implemented, and its limitation towards efficiency was highlighted.","PeriodicalId":306280,"journal":{"name":"International Journal of Computer Theory and Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134237594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Development Method for Shariah Compliant e-Commerce Payment Processing 符合伊斯兰教法的电子商务支付处理的开发方法
International Journal of Computer Theory and Engineering Pub Date : 2015-10-01 DOI: 10.7763/IJCTE.2015.V7.995
T. Amboala, Ainnur Hafizah Anuar Mokhtar, M. Muhammad, M. Noordin, R. Othman
{"title":"Development Method for Shariah Compliant e-Commerce Payment Processing","authors":"T. Amboala, Ainnur Hafizah Anuar Mokhtar, M. Muhammad, M. Noordin, R. Othman","doi":"10.7763/IJCTE.2015.V7.995","DOIUrl":"https://doi.org/10.7763/IJCTE.2015.V7.995","url":null,"abstract":"The article is a response to rapid uptake of online transactions that encompasses the secure transactions that comply with the Shariah principles. The algorithm in the articles proposed the inclusion of Intermediate Shariah Transaction Party (ISTP) as an intermediary for communications between merchant and customers before the transactions can be concluded. The design facilitates the efficient and effective e-commerce transaction process to alleviate three common shortcomings in e-commerce transactions namely riba’, gharar and the validity and the legality of e-commerce transactions from Shariah point of view without compromising the security aspects of the transactions. The designs were refined and presented before by the Islamic scholars before the final design was agreed on. This invention will become a major breakthrough in Shariah compliance ecommerce transactions in order to serve 2.1 billion Muslims Ummah worldwide.","PeriodicalId":306280,"journal":{"name":"International Journal of Computer Theory and Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114906441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Performance Comparison of the Kalman Filter Variants for Dynamic Mobile Localization in Urban Area Using Cellular Network 基于蜂窝网络的城市动态移动定位卡尔曼滤波器的性能比较
International Journal of Computer Theory and Engineering Pub Date : 2015-10-01 DOI: 10.7763/IJCTE.2015.V7.985
N. Bouzera, N. Mezhoud, A. Khireddine, M. Oussalah
{"title":"Performance Comparison of the Kalman Filter Variants for Dynamic Mobile Localization in Urban Area Using Cellular Network","authors":"N. Bouzera, N. Mezhoud, A. Khireddine, M. Oussalah","doi":"10.7763/IJCTE.2015.V7.985","DOIUrl":"https://doi.org/10.7763/IJCTE.2015.V7.985","url":null,"abstract":"","PeriodicalId":306280,"journal":{"name":"International Journal of Computer Theory and Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130281394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Extended Object Tracking and Stream Control Model Based on Predictive Evaluation Metric of Multiple-Angled Streams 基于多角度流预测评价度量的扩展目标跟踪与流控制模型
International Journal of Computer Theory and Engineering Pub Date : 2015-10-01 DOI: 10.7763/IJCTE.2015.V7.983
D. Cymbalák, O. Kainz, F. Jakab
{"title":"Extended Object Tracking and Stream Control Model Based on Predictive Evaluation Metric of Multiple-Angled Streams","authors":"D. Cymbalák, O. Kainz, F. Jakab","doi":"10.7763/IJCTE.2015.V7.983","DOIUrl":"https://doi.org/10.7763/IJCTE.2015.V7.983","url":null,"abstract":"Paper describes the design of extended model for tracking and locating object in multi-cameras environment with controlling the streams from multiple angles in real time. Proposed and experimentally implemented solution is attempting to deliver via streaming technology of the only specific shot from scene that has the best view on tracked object in real time. Measurement of the best shot for the tracking object is based on proposed evaluation metric, consisting of dimensional, locational and reliability parameters gathered from object tracking methods. For latency optimization and accuracy of evaluation the prediction of evaluation metric was outlined. Solution is experimentally tested in standard and mobile environment as well. Approach described in this paper is innovative regarding the content related video stream delivery.","PeriodicalId":306280,"journal":{"name":"International Journal of Computer Theory and Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130828648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Intuitive Projection Display System Supporting the Manipulation of Dual Laser Pens 支持双激光笔操作的直观投影显示系统
International Journal of Computer Theory and Engineering Pub Date : 2015-08-01 DOI: 10.7763/IJCTE.2015.V7.979
Ching-Sheng Wang, Ding-Jung Chiang, Chien-Liang Chen, Hsin-Chueh Chen
{"title":"Intuitive Projection Display System Supporting the Manipulation of Dual Laser Pens","authors":"Ching-Sheng Wang, Ding-Jung Chiang, Chien-Liang Chen, Hsin-Chueh Chen","doi":"10.7763/IJCTE.2015.V7.979","DOIUrl":"https://doi.org/10.7763/IJCTE.2015.V7.979","url":null,"abstract":"The combined use of computers and projectors in delivering multimedia presentations and in teaching is very common. However, the common operating tools used to deliver presentations such as presentation pens or mice either have limited manipulation functionality or are less convenient, and it is difficult to perform functions such as zooming, rotating images, and writing. In addition to allowing users to move freely in space to remotely perform functions, the laser pen manipulation system proposed in this paper can also perform the writing functions of a laser pen. Moreover, the system can also support the simultaneous use of two laser pens to realize a touch mode similar to that of a tablet computer, thus achieving an intuitive projection display manipulation experience.","PeriodicalId":306280,"journal":{"name":"International Journal of Computer Theory and Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115711976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信