International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II最新文献

筛选
英文 中文
A toolkit for automatically constructing outdoor radio maps 一个用于自动构建室外无线电地图的工具包
Kay Connelly, Yong Liu, Daniel Bulwinkle, Adam Miller, Ian Bobbitt
{"title":"A toolkit for automatically constructing outdoor radio maps","authors":"Kay Connelly, Yong Liu, Daniel Bulwinkle, Adam Miller, Ian Bobbitt","doi":"10.1109/ITCC.2005.48","DOIUrl":"https://doi.org/10.1109/ITCC.2005.48","url":null,"abstract":"Outdoor location systems based on wireless access point (WAP) signal strength must either know the exact location of the WAPs in order to use a triangulation algorithm, or must construct a radio-map of the signal strengths. While the radio-map technique increases accuracy and can accommodate a wireless network that is not owned by any one entity, conventional methods for constructing a radio-map are labor-intensive and impractical in such environments. We introduce a toolkit for automatically constructing outdoor radio-maps. Our toolkit can easily be carried by delivery personnel and security guards during their normal work duties to obtain signal readings. The scattered data readings are then fed into an interpolation algorithm to construct a more complete grid that can be used as the radio-map.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116893950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Virtual classroom for interactive synchronous education 面向互动同步教育的虚拟课堂
S. Çakir, H. H. Basak
{"title":"Virtual classroom for interactive synchronous education","authors":"S. Çakir, H. H. Basak","doi":"10.1109/ITCC.2005.292","DOIUrl":"https://doi.org/10.1109/ITCC.2005.292","url":null,"abstract":"The World Wide Web provides new opportunities for distance education over the Internet. The Web, when combined with other network tools can be used to create a virtual classroom to bring together a community of learners for interactive education. In the paper we purpose the moving some of educational instructions of the Institute of Science Dokuz Eylul University at the WWW. This objective is achieved by investigating the use of emerging network technologies for training full time students and part time students. This research uses the electronic educational materials already available on the Web; and it evaluates the effectiveness of various collaborative tools.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116952787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Load-balancing strategy of multi-gateway for ad hoc Internet connectivity 自组网Internet连接的多网关负载均衡策略
Jin H. Zhao, Xiao Yang, Hong W. Liu
{"title":"Load-balancing strategy of multi-gateway for ad hoc Internet connectivity","authors":"Jin H. Zhao, Xiao Yang, Hong W. Liu","doi":"10.1109/ITCC.2005.184","DOIUrl":"https://doi.org/10.1109/ITCC.2005.184","url":null,"abstract":"Mobile ad hoc networks (MANET) are autonomous, infrastructureless networks that support multi-hop communication through IP routing. MANET and Internet have many differences. These differences are not only the structure and topology of the networks, but also communication patterns of nodes in both networks. Therefore, it is a challenging problem for MANET to access to the Internet due to these differences. There are many kinds of accessing mode such as single fix gateway or multi-gateway, where load-balancing is the most important problem. In this paper, we propose the dynamic gateway concept that acts as an interface between MANET and the Internet. These dynamic gateways can use mobile IP and DSDV protocol when they communicate with the Internet and interact with MANET, respectively. The dynamic gateway is used to solve the load-balancing problem. Several simulation experimental results in the dynamic gateway environment show that the performance of network has been improved.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117211137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Dihedral angle based dimensionality reduction for protein structural comparison 基于二面角的蛋白质结构降维比较
N. Kandiraju, S. Dua, S. Conrad
{"title":"Dihedral angle based dimensionality reduction for protein structural comparison","authors":"N. Kandiraju, S. Dua, S. Conrad","doi":"10.1109/ITCC.2005.131","DOIUrl":"https://doi.org/10.1109/ITCC.2005.131","url":null,"abstract":"Structural comparison of proteins is considered as one of the highly focused research areas in the field of bioinformatics. Structural similarity estimation techniques using singular geometric parameters derived from spatial coordinates of protein structural atoms have been reported previously, but it is also ascertained that a single geometric parameter based structural estimation can result in misconstrued classification and functional interpretation. In this paper we propose a novel geometric parameters based comparison protocol that uses previously unexplored pair of dihedral angles NC/sub a/NC/sub a/ and NCNC for similarity search. An orthonormal transformation is employed on the two-dimensional distribution for feature extraction and selective feature-space is represented in an indexing schema later used for similarity calibration. The results demonstrate the success of this dimensionality reduction based similarity measure in performing a rapid and length-independent similarity analysis of the protein structures.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127510263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Design and implementation of a unique blood-vessel detection algorithm towards early diagnosis of diabetic retinopathy 针对糖尿病视网膜病变早期诊断的独特血管检测算法的设计与实现
S. Dua, N. Kandiraju, H. Thompson
{"title":"Design and implementation of a unique blood-vessel detection algorithm towards early diagnosis of diabetic retinopathy","authors":"S. Dua, N. Kandiraju, H. Thompson","doi":"10.1109/ITCC.2005.120","DOIUrl":"https://doi.org/10.1109/ITCC.2005.120","url":null,"abstract":"Diabetic retinopathy (DR), a major complication of diabetes and the leading cause of new cases of blindness among adults, can be cured by the early and precise detection of the disease. An important aspect of DR is the micro-vascular changes that cause detectable changes in the appearance of retinal blood vessels. In this paper, we propose a new blood-vessel detection technique in retinal images, based on the regional recursive hierarchical decomposition using quadtrees and post-filtration of edges. We exploit the fact that in retinal images, the blood vessels appear as focal and/or penumbral blurred edges, which can be characterized by an estimable intensity gradient, which also serves in dismissing false alarms to a large extent. Our technique provides information on retinal blood vessel morphology that can be calibrated to normal expected blood vessel diameters and which can detect fine blood vessel anomalies that characterize the blood vessel pathology and hence aid early detection of diabetic retinopathy.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126036739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Recognition and extraction high precision digital road map 高精度数字地图的识别与提取
Mang Chen, Yuncai Liu
{"title":"Recognition and extraction high precision digital road map","authors":"Mang Chen, Yuncai Liu","doi":"10.1109/ITCC.2005.239","DOIUrl":"https://doi.org/10.1109/ITCC.2005.239","url":null,"abstract":"This paper presents a system of high precision road navigation map generation from CAD geographical map. First, get road curb line; then, pairing two road curb line built road, and computing road central line built road navigation vector; last, detecting intersection create intersection vector. By extensive experiments, the system has shown good efficiency and robustness.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123282209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Analyzing relations among software patterns based on document similarity 基于文档相似度的软件模式关系分析
A. Kubo, H. Washizaki, A. Takasu, Y. Fukazawa
{"title":"Analyzing relations among software patterns based on document similarity","authors":"A. Kubo, H. Washizaki, A. Takasu, Y. Fukazawa","doi":"10.1109/ITCC.2005.87","DOIUrl":"https://doi.org/10.1109/ITCC.2005.87","url":null,"abstract":"In software development, many kinds of knowledge are shared and reused as software patterns. However, the relation analysis among software patterns by hand is difficult on the large scale. In this paper, we propose a technique for the automatic relation analysis among the patterns. Our technique is based on a new pattern model to treat various patterns, and utilizes exiting text processing techniques to extract patterns from documents and to calculate the strength of pattern relations. As a result of experiments, the system that implements our technique has extracted appropriate relations among patterns without information on relations described in original pattern documents. Moreover, our system has the ability to suggest relations among patterns that the author has not noticed.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123694239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Towards an intrusion detection system for pervasive computing environments 面向普适计算环境的入侵检测系统
Pradeep Kannadiga, Mohammad Zulkernine, Sheikh Iqbal Ahamed
{"title":"Towards an intrusion detection system for pervasive computing environments","authors":"Pradeep Kannadiga, Mohammad Zulkernine, Sheikh Iqbal Ahamed","doi":"10.1109/ITCC.2005.279","DOIUrl":"https://doi.org/10.1109/ITCC.2005.279","url":null,"abstract":"A pervasive computing environment consists of numerous casually accessible, frequently mobile, embedded, handheld devices capable of sensing the environment around it and reacting intelligently to simplify user activities. These devices are distributed everywhere at office, homes, stores, classroom, and are often connected to ad-hoc network and the Internet providing access from anywhere and anytime. Access control mechanisms can sometimes fail to provide complete security to these pervasive computing devices as witnessed in infrastructure based networks. The addition of pervasive computing devices to infrastructure based networks makes the problem of intrusion detection even harder. In this paper, the challenges and characteristics of intrusion detection in pervasive computing devices are discussed along with a mobile agents-based solution for both for a network environment made up of infrastructure based network and pervasive computing devices.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125521318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Measuring software processes performance based on the fuzzy multi agent measurements 基于模糊多智能体度量的软件过程性能度量
M. Seyyedi, M. Teshnehlab, F. S. Aliee
{"title":"Measuring software processes performance based on the fuzzy multi agent measurements","authors":"M. Seyyedi, M. Teshnehlab, F. S. Aliee","doi":"10.1109/ITCC.2005.190","DOIUrl":"https://doi.org/10.1109/ITCC.2005.190","url":null,"abstract":"The present article discusses and presents a new comprehensive approach aimed at measuring the maturity and quality of software processes. This method has been designed on the basis of software Capability Maturity Model (SW-CMM) and the multi-level fuzzy inference model and is used as a measurement and analysis tool. Among the most important characteristics of this method one can mention simple usage, accuracy, quantitative measures and comparability. Fuzzy logic-based tools are designed to provide such functions.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126767773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Finding colluders in card games 在纸牌游戏中发现共谋者
C. Vallve-Guionnet
{"title":"Finding colluders in card games","authors":"C. Vallve-Guionnet","doi":"10.1109/ITCC.2005.153","DOIUrl":"https://doi.org/10.1109/ITCC.2005.153","url":null,"abstract":"In card games, two or more players can act as colluders: they exchange information in order to collectively win the game. Electronic games (e-gaming) are supposed to be played under secure e-gaming protocols. Hence some tricks cannot be performed: card exchange, knowledge of opponent cards without their consent, shuffling and dealing the deck for one's own benefit, etc. Therefore, if two or more players collude, all they can do is exchange information. In the real world, other players can usually discover such colluders but, in a virtual world, colluders can use several ways to collude: cellular phones, instant messaging software,... they could even be seating next to each other while playing. In this paper, several methods to detect collusion in virtual card games are described.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116111405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信