2009 2nd IEEE International Conference on Computer Science and Information Technology最新文献

筛选
英文 中文
Estimation of angle glint for different radar targets 不同雷达目标的角闪烁估计
S. Balaji, R. Santhakumar, S. Rajalakshmi
{"title":"Estimation of angle glint for different radar targets","authors":"S. Balaji, R. Santhakumar, S. Rajalakshmi","doi":"10.1109/AHICI.2009.5340314","DOIUrl":"https://doi.org/10.1109/AHICI.2009.5340314","url":null,"abstract":"Angle glint can is the distortion in the radar echo signal phase front and is observed as deviation of the direction of power flow from the radial direction and give rise to radar pointing errors. The mechanism that gives rise to these errors is also responsible for angular errors observed in radar multipath conditions. The effect can be either natural or intentional and is due to the destructive interference between the reflections from different scattering centers on the target. The apparent direction from where a scattered field originates is perpendicular to the phase front of the wave, and in regions where there is destructive interference between the fields there can be significant distortion of the front. For various glint angles using different frequencies the received echo power is calculated and the result is simulated using MATLAB. The range glint is also calculated using different carrier frequency. In obtaining the received echo power, the polarization aspect is considered and the received echo power for different glint angle is simulated for different polarization. Thus the different simulation has been carried out to find the glint error for different scatterers. The radar will move in such a direction so as to nullify the glint angle error produced by the scattering surface of the target.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126195468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using engineering Economy techniques with group topsis method for best project selection 运用工程经济学技术,结合群最优法进行最佳方案选择
2009 2nd IEEE International Conference on Computer Science and Information Technology Pub Date : 2009-11-02 DOI: 10.1109/ICCSIT.2009.5234426
M. Mojahed, J. Dodangeh
{"title":"Using engineering Economy techniques with group topsis method for best project selection","authors":"M. Mojahed, J. Dodangeh","doi":"10.1109/ICCSIT.2009.5234426","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234426","url":null,"abstract":"Selecting projects are an important problem, yet often difficult task. It is complicated because there is usually more than one dimension for measuring the impact of each project and especially when there is more than one decision maker. This paper considers a real application of project selection for Telecommunication projects with using the opinion of experts by one of the group decision making model, it is called TOPSIS method. There are five kinds of criteria that they are include qualitative, quantitative, negative and positive criteria have been considered and also two of them are Net Present Value and Benefit-Cost Analysis that they are engineering economic techniques for selecting the best one amongst five projects and ranking them. We have also used from six expert's opinion in Cable Network. Finally the introduced method is used in a case study (Telecommunication sector) and extracted results from it are analyzed from different points of view.[12]","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131780364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Research of embedded auto test system based on PXI bus for telemeter 基于PXI总线的汽车遥测嵌入式测试系统的研究
2009 2nd IEEE International Conference on Computer Science and Information Technology Pub Date : 2009-09-11 DOI: 10.1109/ICCSIT.2009.5234524
Z. Yanjun
{"title":"Research of embedded auto test system based on PXI bus for telemeter","authors":"Z. Yanjun","doi":"10.1109/ICCSIT.2009.5234524","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234524","url":null,"abstract":"The article introduced the structure and technology method of the auto test system based on PXI bus, for the core equipment of the aircraft telemetry system, requiring high work reliability. The article detailed the key technology about PCM decoding, data recording and real-time display. The validation of the final technology index was realized by computer making real time analysis and post analysis to the data. At present, the system was validated adequately in actual project application; it will be to enhance test efficiency of the corresponding domain.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124275964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Near range path navigation using LGMD visual neural networks 基于LGMD视觉神经网络的近距离路径导航
2009 2nd IEEE International Conference on Computer Science and Information Technology Pub Date : 2009-09-11 DOI: 10.1109/ICCSIT.2009.5234439
Shigang Yue, F. Rind
{"title":"Near range path navigation using LGMD visual neural networks","authors":"Shigang Yue, F. Rind","doi":"10.1109/ICCSIT.2009.5234439","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234439","url":null,"abstract":"In this paper, we proposed a method for near range path navigation for a mobile robot by using a pair of biologically inspired visual neural network - lobula giant movement detector (LGMD). In the proposed binocular style visual system, each LGMD processes images covering a part of the wide field of view and extracts relevant visual cues as its output. The outputs from the two LGMDs are compared and translated into executable motor commands to control the wheels of the robot in real time. Stronger signal from the LGMD in one side pushes the robot away from this side step by step; therefore, the robot can navigate in a visual environment naturally with the proposed vision system. Our experiments showed that this bio-inspired system worked well in different scenarios.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116780653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Enterprise Content Management (ECM): Needs, challenges and recommendations 企业内容管理(ECM):需求、挑战和建议
2009 2nd IEEE International Conference on Computer Science and Information Technology Pub Date : 2009-09-11 DOI: 10.1109/ICCSIT.2009.5234541
M. Usman, A. W. Muzaffar, Abdul Rauf
{"title":"Enterprise Content Management (ECM): Needs, challenges and recommendations","authors":"M. Usman, A. W. Muzaffar, Abdul Rauf","doi":"10.1109/ICCSIT.2009.5234541","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234541","url":null,"abstract":"Availability of information, agility of business process, interoperability of diverse business functions and conformity of the legal requirements are few of the critical success factors for enterprises to survive in the modern and competing global market space. Enterprises while striving to achieve these critical success factors are further exposed to the complexity of massive volumes of variant data and information, which exists in a broad array of formats. Complex and extended business processes spanning across the business functions and partners around the globe, need for integration and interoperability, fulfillment of compliance to legal and regulatory requirements. Enterprise content management (ECM) answers the above questions and offers the capabilities to efficiently and effectively manage the challenges imposed by the demanding business requirements of the modern world. The study in-hand reviews and analyzes the existing literature on enterprise content management domain. In order to conduct a structured literature review, three broader areas of considerations for ECM are identified i.e. business needs & drivers, challenges and recommendations. The review inhand aims at consolidating valuable domain knowledge and research work accomplished in the recent years for the benefits of the industry and academia.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117345778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
How to integrate mobile technologies with an eLearnig system 如何将移动技术与电子学习系统相结合
2009 2nd IEEE International Conference on Computer Science and Information Technology Pub Date : 2009-09-11 DOI: 10.1109/ICCSIT.2009.5234692
Koich Nakajima, Masumi Hori
{"title":"How to integrate mobile technologies with an eLearnig system","authors":"Koich Nakajima, Masumi Hori","doi":"10.1109/ICCSIT.2009.5234692","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234692","url":null,"abstract":"Mobile learning has become a useful method of learning and teaching in Japan. We present in this paper how to integrate mobile devices such as cell phones, iPod Touch and iPhone, portable game devices and other peripheral tools with an eLearning system to enhance students' mobile learning at both on and off-campus activities.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121063067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A survey on wireless security protocols (WEP, WPA and WPA2/802.11i) 无线安全协议(WEP、WPA和WPA2/802.11i)调查
2009 2nd IEEE International Conference on Computer Science and Information Technology Pub Date : 2009-09-11 DOI: 10.1109/ICCSIT.2009.5234856
Arash Habibi Lashkari, M.M.S. Danesh, Behrang Samadi
{"title":"A survey on wireless security protocols (WEP, WPA and WPA2/802.11i)","authors":"Arash Habibi Lashkari, M.M.S. Danesh, Behrang Samadi","doi":"10.1109/ICCSIT.2009.5234856","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234856","url":null,"abstract":"Wireless technology has been gaining rapid popularity for some years. Adaptation of a standard depends on the ease of use and level of security it provides. In this case, contrast between wireless usage and security standards show that the security is not keeping up with the growth paste of end user's usage. Current wireless technologies in use allow hackers to monitor and even change the integrity of transmitted data. Lack of rigid security standards has caused companies to invest millions on securing their wireless networks. There are three major types of security standards in wireless. In our previous papers which registered in ICFCC 2009 Malaysia and ICCDA 2009 Singapore [1] [2], we explained the structure of WEP and WPA as first and second wireless security protocols and discussed all their versions, problems and improvements. Now, we try to explain WPA2 versions, problems and enhancements that have done solve the WPA major weakness. Finally we make a comparison among WEP and WPA and WPA2 as all wireless security protocols in Wi-Fi technology. In the next phase we hope that we will publish a complete comparison among wireless security techniques by add the WiMax security technique and make a whole comparison among all security protocols in this area.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127257146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 171
Network security infrastructure management 网络安全基础设施管理
2009 2nd IEEE International Conference on Computer Science and Information Technology Pub Date : 2009-09-11 DOI: 10.1109/ICCSIT.2009.5234673
Kittichote Rojanakul, Hu Liang
{"title":"Network security infrastructure management","authors":"Kittichote Rojanakul, Hu Liang","doi":"10.1109/ICCSIT.2009.5234673","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234673","url":null,"abstract":"IT Infrastructure is a core asset to many organizations Internet is a global communication medium. The stability and security of network is very important. A well establish a secure infrastructure would help your network safe from intrusion from any source any place. Protection of resources is an important aspect of any computer system. Harnessing and configuring security policy is an important role to safeguard network infrastructure.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125188963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computer modeling of local-overall interactive buckling on cut-T struts t型支板局部-整体相互作用屈曲的计算机模拟
2009 2nd IEEE International Conference on Computer Science and Information Technology Pub Date : 2009-09-11 DOI: 10.1109/ICCSIT.2009.5234585
X. Peng, Chen Lin
{"title":"Computer modeling of local-overall interactive buckling on cut-T struts","authors":"X. Peng, Chen Lin","doi":"10.1109/ICCSIT.2009.5234585","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234585","url":null,"abstract":"In order to study the interactive action of local and overall buckling, a test program of cut-t struts was performed. Based on that, a nonlinear finite element model for interaction between local and overall buckling on singly symmetric section is made by using the general finite element software ANSYS. In the model, factors such as initial imperfections, geometric and material nonlinearity are considered. By comparison of theoretical results, experimental and calculated results using different element type, it was shown that the phenomenon of interactive buckling is evident. The distortional buckling and local buckling should be taken into account when overall buckling is under analysis. These three buckling are not suitable to study separately. The thin-walled struts, which were designed under the principle of equal-stability, are sensitive to the initial imperfection. Some conclusions, which are useful for construction design, are also introduced.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126150322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on 3D dimension automatic projection and quick update 三维尺寸自动投影与快速更新的研究
2009 2nd IEEE International Conference on Computer Science and Information Technology Pub Date : 2009-09-11 DOI: 10.1109/ICCSIT.2009.5234875
Heng An, Fangfang Li, G. Yan, Yi Lei
{"title":"Research on 3D dimension automatic projection and quick update","authors":"Heng An, Fangfang Li, G. Yan, Yi Lei","doi":"10.1109/ICCSIT.2009.5234875","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234875","url":null,"abstract":"A dimension classification method that classifies the 3D dimension to sketch dimension, feature dimension and real dimension is proposed for the problem of slow update process when dimension automatic projection. By matching the 3D dimension and the related elements of model, the dimension automatic projection and quick update when projecting 3D model to 2D view is realized in this paper. The dimension classification, association and update mechanism are introduced in details. An application of projecting the 3D dimension of a shell part based on the interface of CAXASOLID is displayed to support the overall approach. Finally, the trends of dimension automatic projection are summarized.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114946160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信