2008 International Symposium on Information Technology最新文献

筛选
英文 中文
A review of iris recognition algorithms 虹膜识别算法综述
2008 International Symposium on Information Technology Pub Date : 2008-09-26 DOI: 10.1109/ITSIM.2008.4631656
Richard Yew Fatt Ng, Yong Haur Tay, K. Mok
{"title":"A review of iris recognition algorithms","authors":"Richard Yew Fatt Ng, Yong Haur Tay, K. Mok","doi":"10.1109/ITSIM.2008.4631656","DOIUrl":"https://doi.org/10.1109/ITSIM.2008.4631656","url":null,"abstract":"Iris recognition has become a popular research in recent years. Due to its reliability and nearly perfect recognition rates, iris recognition is used in high security areas. Among its applications are border control in airports and harbors, access control in laboratories and factories, identification for Automatic Teller Machines (ATMs) and restricted access to police evidence rooms. This paper provides a review of major iris recognition researches. There are three main stages in iris recognition system: image preprocessing, feature extraction and template matching. A literature review of the most prominent algorithms implemented in each stage is presented.","PeriodicalId":314159,"journal":{"name":"2008 International Symposium on Information Technology","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132858197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
Requirements engineering problems in 63 software companies in Malaysia 马来西亚63家软件公司的需求工程问题
2008 International Symposium on Information Technology Pub Date : 2008-09-26 DOI: 10.1109/ITSIM.2008.4631911
B. Solemon, S. Sahibuddin, Abdul Azim Abd Ghani
{"title":"Requirements engineering problems in 63 software companies in Malaysia","authors":"B. Solemon, S. Sahibuddin, Abdul Azim Abd Ghani","doi":"10.1109/ITSIM.2008.4631911","DOIUrl":"https://doi.org/10.1109/ITSIM.2008.4631911","url":null,"abstract":"It is widely acknowledged that problems associated with Requirements Engineering affect the quality of software and the effectiveness of the software development process. Malaysia is fast becoming an IT outsourcing heaven yet there is a lack of published studies on these problems in the region. This paper presents exploratory survey results of project and Requirements Engineering problems as identified by 63 Malaysian software development companies.","PeriodicalId":314159,"journal":{"name":"2008 International Symposium on Information Technology","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133258005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Identifying monitoring nodes in MANET by detecting unauthorized and malicious nodes 通过检测未授权和恶意节点来识别MANET中的监控节点
2008 International Symposium on Information Technology Pub Date : 2008-09-26 DOI: 10.1109/ITSIM.2008.4631948
M. Rafsanjani, A. Movaghar
{"title":"Identifying monitoring nodes in MANET by detecting unauthorized and malicious nodes","authors":"M. Rafsanjani, A. Movaghar","doi":"10.1109/ITSIM.2008.4631948","DOIUrl":"https://doi.org/10.1109/ITSIM.2008.4631948","url":null,"abstract":"Mobile ad hoc networks have different characteristics from wired networks. There are new challenges related to security issues that need to be addressed. In this paper, first, critical nodes and authentication in mobile ad hoc networks are discussed. Then, a monitoring nodes selection method with high battery power in these networks is presented. We propose a three-phase detection scheme. In the first phase, unauthorized nodes and in the second phase, malicious nodes are detected. Finally in the third phase, nodes with the largest battery power as monitoring nodes are considered. In the first and the second phases, detection scheme uses non-interactive zero knowledge technique in order to determine the identity of nodes. In this technique, nodes do not need to exchange multiple messages to prove their identities. The proposed scheme is enabled with the main operations of ad hoc networking, which are found at the link and network layers. So, the proposed scheme could improve intrusion detection in the area of security.","PeriodicalId":314159,"journal":{"name":"2008 International Symposium on Information Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127822266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Enhancing speaker verification in noisy environments using Recursive Least-Squares (RLS) adaptive filter 利用递推最小二乘自适应滤波器增强噪声环境下的说话人验证
2008 International Symposium on Information Technology Pub Date : 2008-09-26 DOI: 10.1109/ITSIM.2008.4631877
M. Z. Ilyas, S. Samad, A. Hussain, K. A. Ishak
{"title":"Enhancing speaker verification in noisy environments using Recursive Least-Squares (RLS) adaptive filter","authors":"M. Z. Ilyas, S. Samad, A. Hussain, K. A. Ishak","doi":"10.1109/ITSIM.2008.4631877","DOIUrl":"https://doi.org/10.1109/ITSIM.2008.4631877","url":null,"abstract":"In this paper, we present a speaker verification system based on the Hidden Markov Model (HMM) technique and Recursive Least Squares (RLS) adaptive filtering. The aim of using RLS adaptive filtering is to improve the HMM performance in noisy environments. A Malay spoken digit database is used for the testing and validation modules. It is shown that, in a clean environment a total success rate (TSR) of 89.97% is achieved using HMM. For speaker verification, the true speaker rejection rate is 25.3% while the impostor acceptance rate is 9.99% and the equal error rate (EER) is 16.66%. In noisy environments without RLS adaptive filtering TSRs of between 43.07%–51.26% are achieved for SNRs of 0–30 dBs. Meanwhile, after RLS filtering, TSRs of between 50.95%–56.75% are achieved for SNRs 0–30 dB.","PeriodicalId":314159,"journal":{"name":"2008 International Symposium on Information Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127407724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
In search of a model for evaluating the quality of E-commerce Web sites 寻找电子商务网站质量评价模型
2008 International Symposium on Information Technology Pub Date : 2008-09-26 DOI: 10.1109/ITSIM.2008.4631628
Zain Balfagih, Norshidah Mohamed, M. Mahmud
{"title":"In search of a model for evaluating the quality of E-commerce Web sites","authors":"Zain Balfagih, Norshidah Mohamed, M. Mahmud","doi":"10.1109/ITSIM.2008.4631628","DOIUrl":"https://doi.org/10.1109/ITSIM.2008.4631628","url":null,"abstract":"The nature of e-commerce is diverse [15]. E-commerce has been categorized into business-to-consumer (B2C), business-to-business (B2B), business-to-government (B2G), consumer-to-consumer (C2C) etc. Users of e-commerce Web sites may be consumers, software developers/designers, business/service providers, business partners, suppliers, governments etc. Researchers have also shown that there are several perspectives about evaluation on quality for e-commerce Web sites that is, one may take an approach or combination of approaches like product quality, systems as product quality, service quality of provider, quality of services offered and quality of the Human-Computer Interface (HCI) design. This paper documents the review of literature on models for evaluating the quality of e-commerce Web sites and argues that there is still a lack of research in the area because of the inherent diversity of e-commerce.","PeriodicalId":314159,"journal":{"name":"2008 International Symposium on Information Technology","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133752628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Particular model for improving failure mode and effect analysis (FMEA) by using of overall equipment efficiency (OEE) 利用设备总体效率改进失效模式与影响分析(FMEA)的特殊模型
2008 International Symposium on Information Technology Pub Date : 2008-09-26 DOI: 10.1109/ITSIM.2008.4631974
G. Esmaeilian, M.M.H. Megat Ahmad, Napsiah Ismail, S. Sulaiman, Maryam Hamedi
{"title":"Particular model for improving failure mode and effect analysis (FMEA) by using of overall equipment efficiency (OEE)","authors":"G. Esmaeilian, M.M.H. Megat Ahmad, Napsiah Ismail, S. Sulaiman, Maryam Hamedi","doi":"10.1109/ITSIM.2008.4631974","DOIUrl":"https://doi.org/10.1109/ITSIM.2008.4631974","url":null,"abstract":"Almost all of factories use failure mode and effect analysis (FMEA) technique to reduced risk priority number (RPN). This paper proposes a new model to reduce RPN by improving overall equipment efficiency (OEE) by using of heuristic mathematic model based on total productive maintenance index. Three factors are considered: (i) probability of failure (Occurrence), (ii) severity and (iii) distinction. A textile industry is used as a test case that produces some product for seat cover. It was shown that the RPN decreased in FMEA.","PeriodicalId":314159,"journal":{"name":"2008 International Symposium on Information Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115490962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Performance comparison of various MLPs for material recognition based on sonar data 基于声纳数据的各种mlp材料识别性能比较
2008 International Symposium on Information Technology Pub Date : 2008-09-26 DOI: 10.1109/ITSIM.2008.4631885
H. Talib, J. Mohamad-Saleh
{"title":"Performance comparison of various MLPs for material recognition based on sonar data","authors":"H. Talib, J. Mohamad-Saleh","doi":"10.1109/ITSIM.2008.4631885","DOIUrl":"https://doi.org/10.1109/ITSIM.2008.4631885","url":null,"abstract":"Sonar data from the UCI Machine Learning Repository database has large input features. It is known that too many input features have high tendency for redundant data and difficult to be handled by Multilayer Perceptron (MLP).This paper proposes the integration between MLP and circle-segments method for material detection based on sonar data. Circle-segments is a data visualization methods useful for feature selection to the reduce number of inputs but yet closely maintain the integrity of original data. The proposed method has been compared with MLP without feature selection. The results show that the MLP trained without feature selection obtains higher percentage of correct classification compared to MLP trained with the circle-segments feature selection data.","PeriodicalId":314159,"journal":{"name":"2008 International Symposium on Information Technology","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115678533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A visualization tool for risk assessment in software development 用于软件开发中风险评估的可视化工具
2008 International Symposium on Information Technology Pub Date : 2008-09-26 DOI: 10.1109/ITSIM.2008.4631892
N. Sanusi, Nuridawati Mustafa
{"title":"A visualization tool for risk assessment in software development","authors":"N. Sanusi, Nuridawati Mustafa","doi":"10.1109/ITSIM.2008.4631892","DOIUrl":"https://doi.org/10.1109/ITSIM.2008.4631892","url":null,"abstract":"Software risk management is the practice of assessing and controlling risks that affects the software projects, process or products. Those who practice risk management agreed that it is must be performed regularly throughout the lifecycle of a software system. But one of the main challenges in dealing with software risks is to provide a visual risk assessment tool. This paper intends to report on the visualization tool development based on a traditional software development process model — “Waterfall Model”. This paper also shows the proposed framework and structured approach for this tool. The objective of this research is to construct a visualization tool for software risk assessment for all phases in software development processes.","PeriodicalId":314159,"journal":{"name":"2008 International Symposium on Information Technology","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115778572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Bluetooth mobile advertising system using pull-based approach 蓝牙移动广告系统采用拉式为主的方式
2008 International Symposium on Information Technology Pub Date : 2008-09-26 DOI: 10.1109/ITSIM.2008.4631881
Azni H. Halim, A. H. Fauzi, S. Tarmizi
{"title":"Bluetooth mobile advertising system using pull-based approach","authors":"Azni H. Halim, A. H. Fauzi, S. Tarmizi","doi":"10.1109/ITSIM.2008.4631881","DOIUrl":"https://doi.org/10.1109/ITSIM.2008.4631881","url":null,"abstract":"The focus of this paper is on the implementation of Bluetooth as a tool to provide m-advertising (mobile advertising). The paper attempts to introduce the implementation of Bluetooth m-advertising system based on user-driven concept using pull-based approach. User-driven concept gives flexibility to end users to select the preferred advertisements from the server while pull-based m-advertising provides advertisement to users based on their willingness and request. This paper also will address two issues in push-based m-advertising systems, which are spamming and time limit.","PeriodicalId":314159,"journal":{"name":"2008 International Symposium on Information Technology","volume":"269 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115887678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A web ervices-based system for wireless personal area network 一个基于web服务的无线个人区域网络系统
2008 International Symposium on Information Technology Pub Date : 2008-09-26 DOI: 10.1109/ITSIM.2008.4631851
Muhammad Abdul Aleem
{"title":"A web ervices-based system for wireless personal area network","authors":"Muhammad Abdul Aleem","doi":"10.1109/ITSIM.2008.4631851","DOIUrl":"https://doi.org/10.1109/ITSIM.2008.4631851","url":null,"abstract":"Among other techniques of wireless connectivity, WPAN is quite new direction in IT industry which appeared in recent years. The research in the field of private area networks is aimed to elaborate new standards and approaches concerning various issues such as connectivity, integration, routing, power consumption, security, quality of service. Rapid development of WPAN technology is expected and implying it into different market segment is near future. This paper investigates a WPAN distributed system to show the possibility of utilization of WPAN technology and possible ways of WPAN integration with distributed environments and the utilization of such kind of network to provide some service based upon their functionality. It is an attempt to show the possible integration of distributed computing and WEB services which can be applied to improve the existing communication systems with new and effective functionality.","PeriodicalId":314159,"journal":{"name":"2008 International Symposium on Information Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114484154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信