International Conference in IT & Application最新文献

筛选
英文 中文
Keynote 4: Can Parallel Software Catch up with Parallel Hardware? Trends in Automatic Parallelization 主题演讲4:并行软件能赶上并行硬件吗?自动并行化的趋势
International Conference in IT & Application Pub Date : 2005-07-04 DOI: 10.1109/ICITA.2005.170
M. Guo
{"title":"Keynote 4: Can Parallel Software Catch up with Parallel Hardware? Trends in Automatic Parallelization","authors":"M. Guo","doi":"10.1109/ICITA.2005.170","DOIUrl":"https://doi.org/10.1109/ICITA.2005.170","url":null,"abstract":"Summary form only given. Supercomputers have to be proved powerful for various fields including the development of advanced technologies such as large-scale scientific and engineering computing, new material manufacture, nuclear fusion simulation, and automotive design. On October 20, 2004, NEC Corporation announced the availability of their new supercomputer 'SX-8' the world's most powerful vector supercomputer with a peak processing performance of 65TFLOPS. In last few years, the hardware of supercomputers has undergone rapid development - from Earth simulator to SX-8, only goes through 3 years - the peak performance of SX-8 exceeds 1.8 times over Earth simulator. However, the parallel software - especially parallel programming tools - is still underdevelopment. We still use MPI, high performance Fortran and OpenMP mostly for our parallel programming tasks. In fact, these languages and libraries are difficult to use for most of scientific and engineering users. In this talk, we outlook some of the existing parallel language and automatic parallelization tools and also, we address the potential technologies of automatic parallelization. Finally, we summarize how parallel software to make effort to catch up with the development of supercomputer hardware.","PeriodicalId":388442,"journal":{"name":"International Conference in IT & Application","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124473789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Keynote 2: Trust and Reputation Relationships in Service-Oriented Environments 主题演讲2:面向服务环境中的信任和声誉关系
International Conference in IT & Application Pub Date : 2005-07-04 DOI: 10.1109/ICITA.2005.168
E. Chang, T. Dillon, F. Hussain
{"title":"Keynote 2: Trust and Reputation Relationships in Service-Oriented Environments","authors":"E. Chang, T. Dillon, F. Hussain","doi":"10.1109/ICITA.2005.168","DOIUrl":"https://doi.org/10.1109/ICITA.2005.168","url":null,"abstract":"Trust and trustworthiness plays a major role in conducting business on the Internet in service-oriented environments. In defining trust for service-oriented environments, one needs to capture the notation of service level, service agreement, context and timeslots. The same applies for reputation which is the opinion of the third party agents which is used in determining the trust and trustworthiness. Because of the complexity of the issues, and the fact that the trust and reputation are essentially concerns with the relationships, it is important to clearly define the notion of the trust relationships and notion of the reputation relationships. In this paper, therefore, we clear these definitions and we introduce a graphical notation for representing these relationships.","PeriodicalId":388442,"journal":{"name":"International Conference in IT & Application","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127884796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
Keynote 3: Digital Inpainting - Survey and Multilayer Image Inpainting Algorithms 主题演讲3:数字图像绘制-测量和多层图像绘制算法
International Conference in IT & Application Pub Date : 2005-07-04 DOI: 10.1109/ICITA.2005.169
T. Shih, Rong-Chi Chang
{"title":"Keynote 3: Digital Inpainting - Survey and Multilayer Image Inpainting Algorithms","authors":"T. Shih, Rong-Chi Chang","doi":"10.1109/ICITA.2005.169","DOIUrl":"https://doi.org/10.1109/ICITA.2005.169","url":null,"abstract":"Digital inpainting uses spatial or frequency information to restore partially damaged/removed photos and artworks. Digital image inpainting is an interesting new research topic in multimedia computing and image processing since 2000. This talk covers the most recent contributions in digital image inpainting and image completion, as well as concepts in video inpainting. In addition to a quick survey, the presentation covers several algorithms. Most restoration algorithms consider a picture as a single layer. The talk covers a new approach, which divides a Chinese painting into several layers. Each layer is inpainted separately. A layer fusion mechanism then finds the optimal inpaint among layers, which are restored layer-by-layer. We apply the algorithm on Chinese and western drawing. The result shows a high PSNR value as well as a high user satisfaction. The demonstration of our work is available at :http://www.mine.tku.edu.tw/demos/inpaint.","PeriodicalId":388442,"journal":{"name":"International Conference in IT & Application","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116684887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Models of the Sea Mixed Waves in Navigating Radar Simulator 导航雷达模拟器中海面混合波的模型
International Conference in IT & Application Pub Date : 2005-07-04 DOI: 10.1109/ICITA.2005.181
Dan Liu, Xiangjian He
{"title":"Models of the Sea Mixed Waves in Navigating Radar Simulator","authors":"Dan Liu, Xiangjian He","doi":"10.1109/ICITA.2005.181","DOIUrl":"https://doi.org/10.1109/ICITA.2005.181","url":null,"abstract":"The sea mixed wave models of Radar simulators in existence only use the random number produced by computer to simulate simply ..donýt use the statistic discipline and mathematical model, the effect of simulation is not good, the fidelity of radar echo image is affected. The echo intensity of the sea mixed wave accords with Weibull distribution is discovered through researching on the statistic rule of the sea mixes wave. The inverse function of Weibullýs probability distribution function has been used to random numbers with Weibull distribution. The shape parameter and intensity parameter of Weibull distribution is given combined with the experimental accumulation and the distributing circumstance of real radarýs sea mixed wave under different range and sea situation.","PeriodicalId":388442,"journal":{"name":"International Conference in IT & Application","volume":"17 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131687993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Network Monitoring Tool - PickPacket 网络监控工具- PickPacket
International Conference in IT & Application Pub Date : 2005-07-04 DOI: 10.1109/ICITA.2005.274
B. Pande, D. Gupta, D. Sanghi, S. Jain
{"title":"The Network Monitoring Tool - PickPacket","authors":"B. Pande, D. Gupta, D. Sanghi, S. Jain","doi":"10.1109/ICITA.2005.274","DOIUrl":"https://doi.org/10.1109/ICITA.2005.274","url":null,"abstract":"The extensive use of computers and networks for exchange of information has also had ramifications on the growth and spread of crime through their use. Law enforcement agencies need to keep up with the emerging trends in these areas for crime detection and prevention. Among the several needs of such agencies is the need to monitor, detect and analyze undesirable network traffic. However, the monitoring, detecting, and analysis of this traffic may be against the goal of maintaining privacy of individuals whose network communications are being monitored. PickPacket is a network monitoring tool that handles the conflicting issues of network monitoring and privacy through its judicious use. PickPacket has four components - \"the PickPacket configuration file generator\" for assisting the user in setting up the parameters for capturing packets, the \"PickPacket packet filter\" for capturing packets, the \"PickPacket post-processor\" for analyzing packets, and the \"PickPacket data viewer\" for showing the captured data to the user. This paper briefly describes PickPacket","PeriodicalId":388442,"journal":{"name":"International Conference in IT & Application","volume":"19 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125914451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Keynote 1: Grid Computing: Opportunities for Bioinformatics Research 主题演讲1:网格计算:生物信息学研究的机遇
International Conference in IT & Application Pub Date : 2005-07-04 DOI: 10.1109/ICITA.2005.167
Albert Y. Zomaya
{"title":"Keynote 1: Grid Computing: Opportunities for Bioinformatics Research","authors":"Albert Y. Zomaya","doi":"10.1109/ICITA.2005.167","DOIUrl":"https://doi.org/10.1109/ICITA.2005.167","url":null,"abstract":"Summary form only given. Over the past few years, the popularity of the Internet has been growing by leaps and bounds. However, there comes a time in the life of a technology, as it matures, where questions about its future need to be answered. The Internet is no exception to this case. Often called the \"next big thing\" in global Internet technology, grid computing is viewed as one of the top candidates that can shape the future of the Internet. Grid computing takes collective advantage of the vast improvements in microprocessor speeds, optical communications, raw storage capacity, World Wide Web and the Internet that have occurred over the last five years. Grid technology leverages existing resources and delays the need to purchase new infrastructure. With demand for computer power in industries like the life sciences and health informatics almost unlimited, grids ability to deliver greater power at less cost gives the technology tremendous potential. Ultimately, the grid must be evaluated in terms of the applications, business value, and scientific results that it delivers, not its architecture. Biology provides some of the most important, as well as most complex, scientific challenges of our times. These problems include understanding the human genome, discovering the structure and functions of the proteins that the genes encode, and using this information efficiently for drug design. Most of these problems are extremely intensive from a computational perspective. One of the principal design goals for the grid framework is the effective logical separation of the complexities of programming a massively parallel machine from the complexities of bioinformatics computations through the definition of appropriate interfaces. Encapsulation of the semantics of the bioinformatics computations methodologies means that the application can track the evolution of the machine architecture and explorations of various parallel decomposition schemes can take place with minimal intervention from the domain experts or the end users. For example, understanding the physical basis of protein function is a central objective of molecular biology. Proteins function through internal motion and interaction with their environment. An understanding of protein motion at the atomic level has been pursued since the earliest simulations of their dynamics. When simulations can connect to experimental results, the microscopic examinations of the different processes (via simulation) acquire more credibility and the simulation results can then help interpret the experimental data. Improvements in computational power and simulation methods facilitated by the grid framework could to lead to important progress in studies of protein structure, thermodynamics, and kinetics. This talk reviews the state of play and shows how grid technology can change the competitive landscape.","PeriodicalId":388442,"journal":{"name":"International Conference in IT & Application","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128890675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Design and Implement of Virtual Instrument Based on Computing Technique and USB Platform 基于计算技术和USB平台的虚拟仪器的设计与实现
International Conference in IT & Application Pub Date : 1900-01-01 DOI: 10.1109/ICITA.2005.270
Guangfan Shi, Guangming Yan, Jigang Li, Guanran Wang, Zeguo Cheng
{"title":"The Design and Implement of Virtual Instrument Based on Computing Technique and USB Platform","authors":"Guangfan Shi, Guangming Yan, Jigang Li, Guanran Wang, Zeguo Cheng","doi":"10.1109/ICITA.2005.270","DOIUrl":"https://doi.org/10.1109/ICITA.2005.270","url":null,"abstract":"most of the traditional measuring instrument were designed and implemented by complicate hardware circuit. It made the product very expensive, thin functional and terrible big body, which limited the usage and precision of the instrument. Nowadays more and more new powerful measuring instruments are made for more accurate measurement, the kernel of most instruments are made of special computer with appropriative software and hardware, so the price is higher than before, can't be accepted by common users. In order to solve the antinomy, we bring out a challenging solution, this solution is based on PC-personal computer, the most popular computing devices in the world, we make good use of the computing technique and universal serial bus platform with bits of hardware, user can acquire a modern measuring instrument which is powerful, flexible and low price. Because this kind of instrument hasn't specific physical status, most of its functions are implemented by software with good algorithms; it has a favorable price compared with other instrument. We called it virtual instrument. With this foundation, we made our instrument have the ability to learn by the method of engineering mathematics, and made a progress in system measure range and measurement accuracy. In the laboratory, we made a virtual measure instrument to implement a transistor measuring system, and get a notable result. Proof by facts, this solution has a good value for spreading. I. INTRODUCTION ACING the huge manufacturing industry of electronic products and designing industry of electronic products, the measurement and testament of electronic units become more and more important. Most of the traditional methods build their measuring environment by mass of analog electronic circuits, they have to build different measuring environment for different target units, it made the traditional instrument with big body, high price and limited functions. The high-end measuring instruments are equipped with special computers with adaptive software and hardware, though they have powerful functions, but their terrible prices make us far away from them. In order to solve the antinomy, with the fast development of the computing technique, we explore a new path to make modern measuring instrument: the virtual instrument based on computing","PeriodicalId":388442,"journal":{"name":"International Conference in IT & Application","volume":"1299 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127438580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The Related Matter-Elements in Extension Detecting and Application 可拓检测中的相关物元及其应用
International Conference in IT & Application Pub Date : 1900-01-01 DOI: 10.1109/ICITA.2005.275
Yongquan Yu, Ying Huang, Minghui Wang
{"title":"The Related Matter-Elements in Extension Detecting and Application","authors":"Yongquan Yu, Ying Huang, Minghui Wang","doi":"10.1109/ICITA.2005.275","DOIUrl":"https://doi.org/10.1109/ICITA.2005.275","url":null,"abstract":"Extension detecting is a new technology for the measurement problem. It is proposed in order to solve the problem that cannot be detected. The related matter-elements are the very important elements that are the detectable matter-elements in the processing of extension detecting. The way to choice the key related matter-elements are also given in this paper, the key related matter-elements is the basic of extension detecting. It must use the key related matter-element to detect the undetectable physical quantity. This paper provides the basic principle of extension detecting and presents corresponding implement methods for the related matter-element processing.","PeriodicalId":388442,"journal":{"name":"International Conference in IT & Application","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121521027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design and Implementation of Negotiation Agent of Dynamic Supply Chain 动态供应链谈判代理的设计与实现
International Conference in IT & Application Pub Date : 1900-01-01 DOI: 10.1109/ICITA.2005.112
Xiaohong Li, D. Yang, Zhiyong Feng
{"title":"Design and Implementation of Negotiation Agent of Dynamic Supply Chain","authors":"Xiaohong Li, D. Yang, Zhiyong Feng","doi":"10.1109/ICITA.2005.112","DOIUrl":"https://doi.org/10.1109/ICITA.2005.112","url":null,"abstract":"In this article, we point to dynamic supply chain, and emphatically make a thorough study on commercial negotiation system and the design-&-realization of its functions by introducing intelligent agent technology and giving full play to multi-agent system's independence. According to the typical stages of business transaction, we establish a multi-agent software framework for business negotiation, and show the relevant negotiation glossary and ontology description. We define the negotiation rules, describe the negotiation process by DFA, and realize an independent negotiation process.","PeriodicalId":388442,"journal":{"name":"International Conference in IT & Application","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123305884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Extension Control Algorithm Using Extension Set in Control System 控制系统中利用可拓集的可拓控制算法
International Conference in IT & Application Pub Date : 1900-01-01 DOI: 10.1109/ICITA.2005.140
Ying Huang, Yongquan Yu, Ling Zhang
{"title":"Extension Control Algorithm Using Extension Set in Control System","authors":"Ying Huang, Yongquan Yu, Ling Zhang","doi":"10.1109/ICITA.2005.140","DOIUrl":"https://doi.org/10.1109/ICITA.2005.140","url":null,"abstract":"This paper introduces the related basic concepts of extension control, the structure of canonical extension control extension set of character status of basic extension controller, and general extension control algorithm, gives the related error analysis for the extension domain of basic extension controller, and presents a improved extension control algorithm by adopting dependent degree and status distance.","PeriodicalId":388442,"journal":{"name":"International Conference in IT & Application","volume":"51 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114128061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信