2010 International Conference on Educational and Information Technology最新文献

筛选
英文 中文
Research of the RRC layer IDLE State in TD-LTE TD-LTE中RRC层IDLE状态研究
2010 International Conference on Educational and Information Technology Pub Date : 2010-10-25 DOI: 10.1109/ICEIT.2010.5608354
Xingbing Cao, Lili Liu
{"title":"Research of the RRC layer IDLE State in TD-LTE","authors":"Xingbing Cao, Lili Liu","doi":"10.1109/ICEIT.2010.5608354","DOIUrl":"https://doi.org/10.1109/ICEIT.2010.5608354","url":null,"abstract":"Long Term Evolution system represents the latest developments in the direction of UMTS standard. Radio Resource Control layer protocol is an important component of LTE, and its IDLE state plays an important role in the LTE. This paper is established in a study of cell selection and reselection of RRC IDLE and state transitions. Mainly focuses on the design of MSC of cell selection and reselection process.","PeriodicalId":346498,"journal":{"name":"2010 International Conference on Educational and Information Technology","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132776718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Chinese problems analysis in JAVA language JAVA语言中文问题分析
2010 International Conference on Educational and Information Technology Pub Date : 2010-10-25 DOI: 10.1109/ICEIT.2010.5608452
Xianmin Wei
{"title":"Chinese problems analysis in JAVA language","authors":"Xianmin Wei","doi":"10.1109/ICEIT.2010.5608452","DOIUrl":"https://doi.org/10.1109/ICEIT.2010.5608452","url":null,"abstract":"This paper introduces the relationship between various encoding methods and JAVA, For various reasons such as the garbled from file and stream, from the Web application and from database application, the garbled reasons are dissected from the analysis, their own solutions are put forward.","PeriodicalId":346498,"journal":{"name":"2010 International Conference on Educational and Information Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133128176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on teaching reform of the computer science and technology major in local university 地方高校计算机科学与技术专业教学改革研究
2010 International Conference on Educational and Information Technology Pub Date : 2010-10-25 DOI: 10.1109/ICEIT.2010.5608373
Zeng-gang Xiong, Xue-wen Xia, Xue-min Zhang, Jianxin Chen
{"title":"Research on teaching reform of the computer science and technology major in local university","authors":"Zeng-gang Xiong, Xue-wen Xia, Xue-min Zhang, Jianxin Chen","doi":"10.1109/ICEIT.2010.5608373","DOIUrl":"https://doi.org/10.1109/ICEIT.2010.5608373","url":null,"abstract":"This paper aims to improve the core ability of the computer science and technology majors in local university. It does some researches on three aspects: the training system of the core abilities of the students of the computer science and technology major in local university; the teaching reform of the computer science and technology major, and the courses construction of the computer science and technology major. For this purpose the research is very instructive for students in local university.","PeriodicalId":346498,"journal":{"name":"2010 International Conference on Educational and Information Technology","volume":"398 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133235699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The architecture of an intrusion tolerant database system 入侵容忍数据库系统的体系结构
2010 International Conference on Educational and Information Technology Pub Date : 2010-10-25 DOI: 10.1109/ICEIT.2010.5607768
Z. Falahiazar, M. Rohani
{"title":"The architecture of an intrusion tolerant database system","authors":"Z. Falahiazar, M. Rohani","doi":"10.1109/ICEIT.2010.5607768","DOIUrl":"https://doi.org/10.1109/ICEIT.2010.5607768","url":null,"abstract":"With the ever increasing development and expansion of database use, protection of database against hazards, which threaten the integrity, availability and confidentiality of database, is inevitable. However, traditional mechanisms of database security is concentrated on protection or prevention. The main objective of an intrusion tolerant database system is such that even if a number of attacks penetrated inside information system, specified levels of availability, integrity and confidentiality are yet guaranteed. A key part of intrusion tolerant database system is intrusion detection which informs system about attacks. However, detection latency will result in damage spreading. Two novel techniques are used for containment of damage in intrusion tolerant database system: Attack isolation and multiphase damage Confinement. These techniques have been posed as general solutions and in real applications, they may cause outbreak of problems in integrity and availability. In this paper, we present a practical architecture for an intrusion tolerant database system with the aim of safeguarding integrity and availability in the presence of successful attacks through taking advantages of these two techniques.","PeriodicalId":346498,"journal":{"name":"2010 International Conference on Educational and Information Technology","volume":"256 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131861193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The registration of aerial infrared and visible images 航空红外和可见光图像的配准
2010 International Conference on Educational and Information Technology Pub Date : 2010-10-25 DOI: 10.1109/ICEIT.2010.5607665
Mingchao Sun, Bao Zhang, Jinghong Liu, Yongyang Wang, Quan Yang
{"title":"The registration of aerial infrared and visible images","authors":"Mingchao Sun, Bao Zhang, Jinghong Liu, Yongyang Wang, Quan Yang","doi":"10.1109/ICEIT.2010.5607665","DOIUrl":"https://doi.org/10.1109/ICEIT.2010.5607665","url":null,"abstract":"In order to solve the registration problem of different source image existed on aerial image fusion, algorithms based on Particle Swarm Optimization (PSO) are applied as search strategy in this paper, and Alignment Metric (AM) is used as judgment. This study has realized the different source image registration of infrared and visible light with high speed, high accuracy and high reliability. Basically, with little restriction of gray level properties, a new alignment measure is applied, which can efficiently measure the image registration extent and tolerate noise well. Even more, the intelligent optimization algorithm - Particle Swarm Optimization (PSO) is combined to improve the registration precision and rate of infrared and visible light. Experimental results indicate that, the study attains the registration accuracy of pixel level, and every registration time is cut down over 40 percent compared to traditional method. The match algorithm based on AM, solves the registration problem that greater differences between different source images are existed on gray and characteristic. At the same time, the adoption of combining the intelligent optimization algorithms significantly improves the searching efficiency and convergence speed of the algorithms, and the registration result has higher accuracy and stability, which builds up solid foundation for different source image fusion. The method in this paper has a magnificent effect, and is easy for application and very suitable for engineering use.","PeriodicalId":346498,"journal":{"name":"2010 International Conference on Educational and Information Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115379221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Developing enterprise archiecture with “model-evaluate-extend” approach 使用“模型-评估-扩展”方法开发企业架构
2010 International Conference on Educational and Information Technology Pub Date : 2010-10-25 DOI: 10.1109/ICEIT.2010.5607799
R. Davidrajuh, R. Davidrajuh
{"title":"Developing enterprise archiecture with “model-evaluate-extend” approach","authors":"R. Davidrajuh, R. Davidrajuh","doi":"10.1109/ICEIT.2010.5607799","DOIUrl":"https://doi.org/10.1109/ICEIT.2010.5607799","url":null,"abstract":"This paper proposes a simple yet robust approach for enterprise architecture development. The approach centers on the three most important phases of the enterprise architecture namely modeling, evaluation, and extension. This paper also identifies a set of resources (tools and frameworks) for this approach.","PeriodicalId":346498,"journal":{"name":"2010 International Conference on Educational and Information Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124285163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Computer-Supported Assessment of Software Verification Proofs 计算机支持的软件验证证明评估
2010 International Conference on Educational and Information Technology Pub Date : 2010-10-25 DOI: 10.1109/ICEIT.2010.5607766
Claus A. Usener, S. Gruttmann, Tim A. Majchrzak, H. Kuchen
{"title":"Computer-Supported Assessment of Software Verification Proofs","authors":"Claus A. Usener, S. Gruttmann, Tim A. Majchrzak, H. Kuchen","doi":"10.1109/ICEIT.2010.5607766","DOIUrl":"https://doi.org/10.1109/ICEIT.2010.5607766","url":null,"abstract":"Most conventional e-assessment systems are not suited for examining analytic, creative and constructive skills and the few existing ones have too limited functionality to appropriately support Computer Science assessments. On this account the e-assessment system EASy has been developed which e.g. provides relevant exercise modules for Computer Science tasks. Recently the system has been extended by a module for the computer-supported examination of software verification proofs based on the Hoare Logic. In this work we discuss this module and evaluate its applicability, usability and acceptance in terms of a lecture on Formal Specification.","PeriodicalId":346498,"journal":{"name":"2010 International Conference on Educational and Information Technology","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116366679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Region-based fusion of infrared and visible images using Bidimensional Empirical Mode Decomposition 基于二维经验模态分解的红外与可见光图像区域融合
2010 International Conference on Educational and Information Technology Pub Date : 2010-10-25 DOI: 10.1109/ICEIT.2010.5608352
W. Liang, Zhifang Liu
{"title":"Region-based fusion of infrared and visible images using Bidimensional Empirical Mode Decomposition","authors":"W. Liang, Zhifang Liu","doi":"10.1109/ICEIT.2010.5608352","DOIUrl":"https://doi.org/10.1109/ICEIT.2010.5608352","url":null,"abstract":"Region-based image fusion schemes have been studied a lot, but they are all based on some common decomposition, such as pyramid, wavelet and contourlet transform. In this paper, we present a novel region-based image fusion scheme using BEMD (Bidimensional Empirical Mode Decomposition) for infrared and visible images. BEMD is a new 2D signal analysis method extended from EMD and it decomposes the signal into a series of IMFs (Intrinsic Mode Functions) from finest to coarsest. Region segmentation is of vital importance in the fusion process. Real images are always intensity inhomogeneous, e.g. infrared and visible images, so we use an LBF (Local Binary Fitting) model which aims at segmenting intensity inhomogeneous images to extract our regions. Experiments show that the proposed fusion scheme works effectively compared with traditional fusion schemes.","PeriodicalId":346498,"journal":{"name":"2010 International Conference on Educational and Information Technology","volume":"626 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116467815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Descriptive model of peer-to-peer Botnet structures 点对点僵尸网络结构描述模型
2010 International Conference on Educational and Information Technology Pub Date : 2010-10-25 DOI: 10.1109/ICEIT.2010.5608400
J. Duan, Jian Jiao, Chunhe Xia, Shan Yao, Xiaojian Li
{"title":"Descriptive model of peer-to-peer Botnet structures","authors":"J. Duan, Jian Jiao, Chunhe Xia, Shan Yao, Xiaojian Li","doi":"10.1109/ICEIT.2010.5608400","DOIUrl":"https://doi.org/10.1109/ICEIT.2010.5608400","url":null,"abstract":"Peer-to-peer (P2P) Botnets, which are more resilient and robust than centralized botnets, have emerged as the peer-to-peer technology evolves. Better understanding of this new phenomenon will help researchers develop detection and mitigation methods. Most of existing work is case study of typical P2P botnets. In this paper, we focus on systematically analyzing structures of P2P botnets. We propose a descriptive model of P2P botnet structures, which consists of features of P2P bot, definitions of structures, and structural properties. Firstly, we detail two key functionalities of P2P bot, command-and-control (C&C) functionality and peer-to-peer (P2P) functionality, and give several features of P2P bot. And then, we define two structures of P2P botnets: C&C structure and P2P structure. To characterize these structures, we propose several properties and corresponding quantitative methods. Finally, we conduct experiments to verify our results.","PeriodicalId":346498,"journal":{"name":"2010 International Conference on Educational and Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117192570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
SA based software deployment reliability estimation: Problem space, challenges and strategies 基于SA的软件部署可靠性评估:问题空间、挑战和策略
2010 International Conference on Educational and Information Technology Pub Date : 2010-10-25 DOI: 10.1109/ICEIT.2010.5607510
Xihong Su, Hongwei Liu, Zhibo Wu, Decheng Zuo, Xiaozong Yang
{"title":"SA based software deployment reliability estimation: Problem space, challenges and strategies","authors":"Xihong Su, Hongwei Liu, Zhibo Wu, Decheng Zuo, Xiaozong Yang","doi":"10.1109/ICEIT.2010.5607510","DOIUrl":"https://doi.org/10.1109/ICEIT.2010.5607510","url":null,"abstract":"Software architecture (SA) has been widely advocated as an effective abstraction for modeling, implementing, and evolving complex software systems such as those in distributed, decentralized, heterogeneous, mobile, and pervasive environments. We intend to investigate two problems related to the domain of those environments: software deployment and reliability. Software deployment is a post-production activity that is performed for or by the customer of a piece of software. Though many approaches for Architecture-based reliability research, little work has been done in incorporating software deployment into architecture-based reliability estimation. Thus, this paper describes which information constitute SA based software deployment reliability model and how to obtain available information for the model. The system reliability estimation at an architectural level includes software deployment, architectural style and component replica.","PeriodicalId":346498,"journal":{"name":"2010 International Conference on Educational and Information Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124485020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信