2007 International Conference on Computational Science and its Applications (ICCSA 2007)最新文献

筛选
英文 中文
Development of Integrated Missile System Design Framework Using Distributed Computing Environment 基于分布式计算环境的集成导弹系统设计框架开发
Seung-Jin Lee, Woohyun Kim, Jae-Woo Lee, Y. Byun
{"title":"Development of Integrated Missile System Design Framework Using Distributed Computing Environment","authors":"Seung-Jin Lee, Woohyun Kim, Jae-Woo Lee, Y. Byun","doi":"10.1109/ICCSA.2007.26","DOIUrl":"https://doi.org/10.1109/ICCSA.2007.26","url":null,"abstract":"In this study, framework is developed for integrated missile system design and optimization using distributed computing environment. Analysis tools, optimization tools, database, and CAD are integrated in the missile MDO framework. All components are integrated with middleware for distributed computing environment.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121113499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Publisher-side Event Filtering for QoS-Awareness in Ubiquitous Computing 面向普适计算qos感知的发布者端事件过滤
Kyungrae Cho, Sung-Keun Song, H. Youn
{"title":"Publisher-side Event Filtering for QoS-Awareness in Ubiquitous Computing","authors":"Kyungrae Cho, Sung-Keun Song, H. Youn","doi":"10.1109/ICCSA.2007.51","DOIUrl":"https://doi.org/10.1109/ICCSA.2007.51","url":null,"abstract":"In the ubiquitous computing environment a user may interact with a large number of devices. The publish'subscribe paradigm is suitable for the various applications by allowing the subscribers to declare their interests and receive only the notifications of interest. This paper propose a novel event filtering approach preventing waste in the space of the event queue of the event channel due to unwanted events and reducing the network load. Performance evaluation reveals that the proposed scheme displays significant improvement over the existing event service, Java messaging service (JMS) and Omnievent service in terms of event delivery time for various numbers of servers and data sizes.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128304351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Context-based Dynamic Channel Management for Efficient Event Service in Pervasive Computing 普适计算中基于上下文的高效事件服务动态通道管理
Young Kwon You, S. Han, Sung-Keun Song, H. Youn
{"title":"Context-based Dynamic Channel Management for Efficient Event Service in Pervasive Computing","authors":"Young Kwon You, S. Han, Sung-Keun Song, H. Youn","doi":"10.1109/ICCSA.2007.68","DOIUrl":"https://doi.org/10.1109/ICCSA.2007.68","url":null,"abstract":"In pervasive computing environment a number of distributed applications asynchronously exchange data using the event-based mechanism. The OMG defined CORBA Event Service for asynchronous messaging, which provides a flexible channel for asynchronous communication among the distributed and collocated objects. In the existing Event Service channels are created manually by the developers or users to process and disseminate the events. Also, the channel management is static which may cause bottleneck in some channels. In this paper, thus, we propose a dynamic context-based channel management scheme by efficiently combining name service with event service. It is embedded in the CALM(Component- based Autonomic Layered Middleware) developed by us, which has been implemented based on ORB. Computer simulation reveals that the proposed approach significantly reduces the event delivery and processing time of the existing omni Event Service and TIBCO.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134230246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Comparison of the Task Performances with the Multi-display Computer 任务性能与多显示计算机的比较
Keun-Sang Park, Young-deog Yun, Chang-Han Kim, S. Lee
{"title":"Comparison of the Task Performances with the Multi-display Computer","authors":"Keun-Sang Park, Young-deog Yun, Chang-Han Kim, S. Lee","doi":"10.1109/ICCSA.2007.44","DOIUrl":"https://doi.org/10.1109/ICCSA.2007.44","url":null,"abstract":"For this study we are going to apply a type of computer tasks which are used in an actual control room. Subjects are supposed to perform the primary task (typing task watching the main monitor) and the secondary task (clicking targets with the mouse, which appear randomly in the sub-monitor) at the same time. The secondary tasks were differentiated with three different task intensities. During the experiment, the primary and secondary tasks were measured and evaluated depending on the intensities of the subtasks and the locations of the sub-monitors. Followings are the conclusions which were obtained after the evaluation: 1) The higher the task intensity is, the lower the task performance. 2) Regardless of the task intensity, the task performance of the subtask is high in the center of the monitor. When the task intensity is low, the center section of the monitor becomes the starting point for searching. 3) When the task intensity is high, the task performance in the left section of the monitor becomes low.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116536752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Restructuring E-learning With Ontologies 利用本体重构电子学习
G. Kizilkaya, E. Torun, P. Aşkar
{"title":"Restructuring E-learning With Ontologies","authors":"G. Kizilkaya, E. Torun, P. Aşkar","doi":"10.1109/ICCSA.2007.76","DOIUrl":"https://doi.org/10.1109/ICCSA.2007.76","url":null,"abstract":"This paper examines the role of ontologies in the e-learning environments. A brief review of various ontologies is discussed in three areas: Learning design, learning content and learner profile. A new perspective for curriculum and instructional design is proposed.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126056659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Security Evaluation for Information Assurance 信息保障的安全评估
Yong-Tae Kim, G. Park, Tai-hoon Kim, Sang-ho Lee
{"title":"Security Evaluation for Information Assurance","authors":"Yong-Tae Kim, G. Park, Tai-hoon Kim, Sang-ho Lee","doi":"10.1109/ICCSA.2007.55","DOIUrl":"https://doi.org/10.1109/ICCSA.2007.55","url":null,"abstract":"In general, threat agents' primary goals may fall into three categories: unauthorized access, unauthorized modification or destruction of important information assets, and denial of authorized access. Security countermeasures are implemented to prevent threat agents from successfully achieving these goals. Because the general systems of today are composed of a number of components such as servers and clients, protocols, services, and so on, the possibility of success of attack may be increased. As though Systems connected to network have become more complex and wide, unfortunately, the researches for the systems are focused on the 'performance' or 'efficiency'. While most of the attention in system security has been focused on encryption technology and protocols for securing the data transaction, it is critical to note that a weakness (or security hole) in any one of the components may comprise whole system. Security engineering is needed for reducing security holes may be included in the Information systems. This paper proposes a method for securing the Information systems by evaluation of security functions of system component. This paper proposes Information system security evaluation and certification for achieving some level of assurance each owners of their Information systems want to get.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124156908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Energy Effective Time Synchronization inWireless Sensor Network 无线传感器网络能量有效时间同步
Youngtae Jo, Chongmyung Park, Joahyoung Lee, Inbum Jung
{"title":"Energy Effective Time Synchronization inWireless Sensor Network","authors":"Youngtae Jo, Chongmyung Park, Joahyoung Lee, Inbum Jung","doi":"10.1109/ICCSA.2007.43","DOIUrl":"https://doi.org/10.1109/ICCSA.2007.43","url":null,"abstract":"Advance in processor, memory and wireless communication technique have led to an increase of economical and small wireless sensor nodes. To provide the right responses quickly for the diverse events, wireless sensor nodes have cooperation with together. For successful cooperation, the time synchronization among sensor nodes is an important requirement for application execution. In wireless sensor networks, message packets are used for the time synchronization. However, the transmission of message packets dissipates the battery energy of wireless sensor nodes. Since wireless sensor nodes works on the limited battery capacity, the excessive use of message packets has a negative impact upon their lifetime. In this paper, reference interpolation protocol is proposed for reducing the number of message packets for the time synchronization. The proposed method performs time interpolation between the time of reference packets and the global time of the base station. The proposed method completes the synchronization operation with only two message packets. Due to the simple synchronization procedure, our method greatly reduces the number of synchronization messages. From the decrease in the transmission of message packets, the convergence time among wireless sensor nodes is shortened and the lifetime of wireless sensor nodes is also prolonged as much as the amount of saved battery energy.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130041693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A Topology Control Scheme for Avoiding Sensing Hole in Wireless Sensor Networks 一种无线传感器网络中避免传感孔的拓扑控制方案
Kyungjun Kim, Byung-Rae Cha
{"title":"A Topology Control Scheme for Avoiding Sensing Hole in Wireless Sensor Networks","authors":"Kyungjun Kim, Byung-Rae Cha","doi":"10.1109/ICCSA.2007.75","DOIUrl":"https://doi.org/10.1109/ICCSA.2007.75","url":null,"abstract":"One of the main challenges in wireless sensor networks is to maximize network life time and to minimize power consumption. We propose an energy efficient mechanism for selecting active node which involved in sensing operation in a given dense field. This mechanism can reduce the communication cost by decreasing the number of sensing nodes in highly dense area. Our simulation results show that our mechanism reduces the number of transmitted packets the maximum 60% in dense sensing area.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121440938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Development of a Database for Integrated Missile System Design in Web Services-based MDO Framework 基于Web服务的MDO框架下集成导弹系统设计数据库的开发
Jeong-Oog Lee, Seung-Jin Lee, Ho-Jun Lee, Jae-Woo Lee
{"title":"Development of a Database for Integrated Missile System Design in Web Services-based MDO Framework","authors":"Jeong-Oog Lee, Seung-Jin Lee, Ho-Jun Lee, Jae-Woo Lee","doi":"10.1109/ICCSA.2007.54","DOIUrl":"https://doi.org/10.1109/ICCSA.2007.54","url":null,"abstract":"In this study, a database has been developed for integrated missile system design. The framework is based on Web services and Globus toolkit. Various analysis tools, optimization tools, database, and CAD are integrated into the missile MDO framework. The DB has been designed in a way where all the design related data can be shared among various analysis tools and optimization tools so that the required information can be transferred quickly.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124513949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application and evaluation of edge detection system employing the ADD 基于ADD的边缘检测系统应用与评价
Jong Gu Lee, Eun Mi Kim, Cheol-Jung Yoo, Ok-Bae Chang
{"title":"Application and evaluation of edge detection system employing the ADD","authors":"Jong Gu Lee, Eun Mi Kim, Cheol-Jung Yoo, Ok-Bae Chang","doi":"10.1109/ICCSA.2007.64","DOIUrl":"https://doi.org/10.1109/ICCSA.2007.64","url":null,"abstract":"In order to detect and locate edge features precisely in real images we have developed an algorithm by introducing a nonlocal differentiation of intensity profiles called adaptive directional derivative (ADD), which is evaluated independently of varying ramp widths. In this paper, we first develop the edge detector system employing the ADD and then, the performance of the algorithm is illustrated by comparing the results to those from the Canny's edge detector.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130666070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信