2009 12th International Conference on Computers and Information Technology最新文献

筛选
英文 中文
Variable rate Steganography in gray scale digital images using neighborhood pixel information 利用邻域像素信息的灰度数字图像可变速率隐写
2009 12th International Conference on Computers and Information Technology Pub Date : 2009-12-01 DOI: 10.1109/ICCIT.2009.5407128
Moazzam Hossain, Sadia Al Haque, Farhana Sharmin
{"title":"Variable rate Steganography in gray scale digital images using neighborhood pixel information","authors":"Moazzam Hossain, Sadia Al Haque, Farhana Sharmin","doi":"10.1109/ICCIT.2009.5407128","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407128","url":null,"abstract":"In order to improve the security by providing the stego image with imperceptible quality, three different steganographic methods for gray level images are presented in this paper. Four Neighbors, Diagonal Neighbors and Eight Neighbors methods are employed in our scheme. These methods utilize a pixel's dependency on its neighborhood and psycho visual redundancy to ascertain the smooth areas and edged areas in the image. In smooth areas we embed three bits of secret information. In the edged areas, variable rate bits are embedded. From the experimental results it is seen that the proposed methods achieve a much higher visual quality as indicated by the high Peak Signal-to-Noise Ratio (PSNR) in spite of hiding a larger number of secret bits in the image. In addition, to embed this large amount of secret information, at most only half of the total number of pixels in an image is used. Moreover, extraction of the secret information is independent of original cover image.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131661069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
Hybrid Real-coded Quantum Evolutionary Algorithm based on particle swarm theory 基于粒子群理论的混合实编码量子进化算法
2009 12th International Conference on Computers and Information Technology Pub Date : 2009-12-01 DOI: 10.1109/ICCIT.2009.5407175
Md. Amjad Hossain, Md. Kowsar Hossain, M. Hashem
{"title":"Hybrid Real-coded Quantum Evolutionary Algorithm based on particle swarm theory","authors":"Md. Amjad Hossain, Md. Kowsar Hossain, M. Hashem","doi":"10.1109/ICCIT.2009.5407175","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407175","url":null,"abstract":"This paper proposes a Hybrid Real-coded Quantum Evolutionary Algorithm (HRCQEA) for optimizing complex functions on the basis of the concept of quantum computing such as qubits and superposition of states and Particle Swarm Optimization (PSO). It combines PSO with Real-coded Quantum Evolutionary Algorithm (RCQEA) to improve the performance of RCQEA. The main idea of HRCQEA is to embed the evolutionary equation of PSO in the evolutionary operator of RCQEA. In HRCQEA, each triploid chromosome represents a particle and the position of the particle is updated using Complementary Double Mutation Operator (CDMO) and Quantum Rotation Gate (QRG), which can make the balance between exploration and exploitation. Discrete Crossover (DC) is employed to expand the search space and Hill-climbing selection (HCS) helps to accelerate the convergence speed. Simulation results of four benchmark complex functions with high dimensions show that HRCQEA performs better than other algorithms in terms of ability to discover of global optimum.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123279631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Process centric work breakdown structure for easing Software Project management challenges: Business case analysis example 缓解软件项目管理挑战的以过程为中心的工作分解结构:业务案例分析示例
2009 12th International Conference on Computers and Information Technology Pub Date : 2009-12-01 DOI: 10.1109/ICCIT.2009.5407291
S. Islam, M. Rokonuzzaman
{"title":"Process centric work breakdown structure for easing Software Project management challenges: Business case analysis example","authors":"S. Islam, M. Rokonuzzaman","doi":"10.1109/ICCIT.2009.5407291","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407291","url":null,"abstract":"Software Project management involves coordinating various aspects of a project in order to bring forth a positive result. There have been increasing challenges faced by Project Managers. The major challenges of project management include unrealistic deadlines, communication deficit, uncertain dependencies, failure to manage risk, not well-defined vision and goals, and invisibility of the final product. Meeting these challenges is very difficult and in many cases they are not met which eventually leads to the project failure. This situation is even worse where project dispersion is higher. Different studies reveal that an IT project is more likely to be unsuccessful than successful and 7 out of 10 IT projects fail in some respect. The process centric work breakdown structure (WBS) can play a very vital role in this regard to improve the situations significantly. Instead of hierarchical work breakdown structures as a tree, the process centric WBS takes whole software production process and splits whole process into smaller process units which take right set of inputs with the right set of standar, put right set of practices in place that eventualy produce the work products with expected standards and quality. This process centric work breakdown structure helps project Managers plan, estimate, monitor and control the project activities in greater accuracy and efficiency. In this article, Business Case Analysis phase of software projects has been taken as an example to demonstrate how process centric WBS can help for easing project management challenges.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116701127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Constructing SURF visual-words for pornographic images detection 构建用于色情图像检测的SURF视觉词
2009 12th International Conference on Computers and Information Technology Pub Date : 2009-12-01 DOI: 10.1109/ICCIT.2009.5407272
Yizhi Liu, Hongtao Xie
{"title":"Constructing SURF visual-words for pornographic images detection","authors":"Yizhi Liu, Hongtao Xie","doi":"10.1109/ICCIT.2009.5407272","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407272","url":null,"abstract":"Pornographic images detection is necessary for us to filter out objectionable information on the Internet. Bag-of-visual-words (BoVW) based pornographic images detection is promising because it can compensate the defect of the traditional approach. However, there are many choices to construct visual-words which are crucial to the tradeoff between the speed and the performance. We propose a novel method of constructing SURF (speeded up robust features) visual-words in skin regions and combining it with color moments. The results show that the performance of SURF visual-words is better than that of SIFT (scale-invariant feature transform) visual-words and our method is more effective to detect pornographic images than many existing methods.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122447203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Using an old technique in a new technology — A novel method for defining the scope of ISs in BPM projects 在新技术中使用旧技术——在BPM项目中定义业务集成范围的新方法
2009 12th International Conference on Computers and Information Technology Pub Date : 2009-12-01 DOI: 10.1109/ICCIT.2009.5407290
Morteza Alaeddini, A. Kardan
{"title":"Using an old technique in a new technology — A novel method for defining the scope of ISs in BPM projects","authors":"Morteza Alaeddini, A. Kardan","doi":"10.1109/ICCIT.2009.5407290","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407290","url":null,"abstract":"Nowadays, using business process management (BPM) systems is so prevalent through the world, so that deploying information systems (IS) based on this technology has become one of the application development methods in the new age of software engineering. Due to acquisition and using this technology in many organizations without awareness or program, that is the main reason which would fail this type of projects, we are looking for an efficient method in order to grain information systems, based on organization's business processes for the sake of defining the scope of their related software development projects, in the shortest time and with the lowest cost. We have started our scientific researches on this field in a few projects with the nature of information technology (IT) planning and gained noteworthy results that one of them is described in this paper as a case study. This new method will be used as the first step in defining project portfolios according to BPM approach, and in some actions like enterprise architecture (EA) or IT/IS planning.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131361289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Realization of systolic array using ternary reversible gates 用三元可逆门实现收缩阵列
2009 12th International Conference on Computers and Information Technology Pub Date : 2009-12-01 DOI: 10.1109/ICCIT.2009.5407141
Naushin Nower, A. Chowdhury
{"title":"Realization of systolic array using ternary reversible gates","authors":"Naushin Nower, A. Chowdhury","doi":"10.1109/ICCIT.2009.5407141","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407141","url":null,"abstract":"Multi valued logic synthesis is a very promising and affluent research area at present because of allowing designers to build much more efficient computers than the existing classical ones. Ternary logic synthesis research has got impetus in the recent years. Many existing literature are mainly perceptive to the realization of efficient ternary reversible processors. This research is based on the design of a reversible systolic array, which is one of the best examples of parallel processing, using micro level ternary Toffoli gate. General architecture of the ternary reversible systolic array multiplier is shown along with example. Lower bound for the garbage outputs produced in the proposed design and the quantum cost of the entire circuit is calculated here to prove the compactness of the design.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128000915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance evaluation of MIMO system incorporating water filling model and minimum eigenvalue constraints 考虑充水模型和最小特征值约束的MIMO系统性能评价
2009 12th International Conference on Computers and Information Technology Pub Date : 2009-12-01 DOI: 10.1109/ICCIT.2009.5407320
Nur Afroza Khurshid, M. Islam, M. Amin
{"title":"Performance evaluation of MIMO system incorporating water filling model and minimum eigenvalue constraints","authors":"Nur Afroza Khurshid, M. Islam, M. Amin","doi":"10.1109/ICCIT.2009.5407320","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407320","url":null,"abstract":"In this paper, both equal power and water filling models are simulated for comparison of their performance in a multiple-input multiple-output environment. The effects of fast fading and the shadowing effects have been incorporated in the models. Minimum eigenvalue required for successful transmission for individual link is evaluated from the probability density functions of eigenvalue and equivalent uncoupled multiple-input multiple-output link. Impact of the number of antenna elements of an array on the minimum eigenvalue of an uncoupled channel is analyzed based on probability density function of eigenvalue of the channel matrix. The analysis shows that the cutoff eigenvalue decreases with increase in the number of antenna elements and signal to noise ratio of the received signal.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131846299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of meandering probe fed microstrip patch antenna for wireless communication system 无线通信系统中弯曲探针馈电微带贴片天线的设计
2009 12th International Conference on Computers and Information Technology Pub Date : 2009-12-01 DOI: 10.1109/ICCIT.2009.5407296
M. Islam, M. Shakib, N. Misran
{"title":"Design of meandering probe fed microstrip patch antenna for wireless communication system","authors":"M. Islam, M. Shakib, N. Misran","doi":"10.1109/ICCIT.2009.5407296","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407296","url":null,"abstract":"A wideband, low cross-polarization patch antenna fed by meandering probe is presented in this paper. The patch antenna consists of inverted patch structure with air-filled dielectric, slotted patch and meandering probe. The composite effect of integrating these techniques and by introducing the proposed patch, offer a low profile, broadband, high gain, and low cross-polarization level. The results for the VSWR and co-and cross-polarization patterns are presented. The antenna operating the band of 1.84–2.29 GHz shows an impedance bandwidth (2∶1 VSWR) of 22% and a gain of 10.6 dBi with a gain variation of 1.02 dBi. Good radiation characteristics, including cross-polarization level in xz- and yz-plane are −50dB and −23 dB respectively, have been obtained.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"66 SP1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114121011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis and design of individual Tax return systems in Bangladesh 孟加拉国个人纳税申报制度的分析与设计
2009 12th International Conference on Computers and Information Technology Pub Date : 2009-12-01 DOI: 10.1109/ICCIT.2009.5407302
M. Hossain, A. A. Khan, S. Majumdar, R. Ahmed
{"title":"Analysis and design of individual Tax return systems in Bangladesh","authors":"M. Hossain, A. A. Khan, S. Majumdar, R. Ahmed","doi":"10.1109/ICCIT.2009.5407302","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407302","url":null,"abstract":"Proper analysis and good design are essential for the successful implementation of any computer aided system. The sensitivity of the Tax return system amplifies the significance of analysis and design by many fold. Developed countries have achieved high tax return rates by introducing simple, Internet-based, computer-aided Tax return systems. Valuable insights can be gained by analyzing the tax re- turn systems of the developed countries, which can serve as a base for designing an effective tax return system for an underdeveloped country. In this work we analyze the relative merits and demerits of individual tax return systems in United Kingdom (UK), Canada and Bangladesh. Based on this analysis we propose a design for automating individual tax return system for the National Board of Revenue, Bangladesh.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117159551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An adoption-diffusion model for RFID applications in Bangladesh 孟加拉国RFID应用的采用-扩散模型
2009 12th International Conference on Computers and Information Technology Pub Date : 2009-12-01 DOI: 10.1109/ICCIT.2009.5407152
M. A. Hossain, M. Quaddus
{"title":"An adoption-diffusion model for RFID applications in Bangladesh","authors":"M. A. Hossain, M. Quaddus","doi":"10.1109/ICCIT.2009.5407152","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407152","url":null,"abstract":"Radio Frequency Identification (RFID) technology is at its early stage of adoption in Bangladesh with a few business applications and pilot studies. It is expected that the next stage will be the organizational adoption and diffusion in more applications inspired by business cases. Eventually, the adoption will drive this technology into ‘extended use’ stage provided that the adopters and users are ‘satisfied’. At this moment the RFID initiative is discrete in Bangladesh and do not have any long-term strategy leading into implementation-to-diffusion process. Without having a clear strategy to achieve large scale diffusion discrete RFID adoption may not inspire the process in reaching the full potential of RFID. This study, therefore, investigates the factors influencing the adoption diffusion of RFID and its extended use process; and then proposes a conceptual framework. The framework is an objective integration of innovation-diffusion theory and expectation-confirmation theory, with some logical modifications. It posits that while adoption of RFID is important but the long-term viability of RFID and its ultimate success depends on its continued and extended use, which is judged against ‘satisfaction’ and ‘performance’ derived from RFID. The implications of the framework in the context of Bangladesh are discussed.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"272 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123125222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信