Journal of information technology & software engineering最新文献

筛选
英文 中文
A Literature Survey on Caching and Prefetching Techniques in MANET MANET中缓存和预取技术的文献综述
Journal of information technology & software engineering Pub Date : 2016-10-31 DOI: 10.4172/2165-7866.1000190
Shashidhara Dn, rappa Dn
{"title":"A Literature Survey on Caching and Prefetching Techniques in MANET","authors":"Shashidhara Dn, rappa Dn","doi":"10.4172/2165-7866.1000190","DOIUrl":"https://doi.org/10.4172/2165-7866.1000190","url":null,"abstract":"Mobile Ad-hoc Networks (MANET) is an emerging area of research over the past decades. Most current work is centered with different enhancements. This paper discusses to enhance the access of image data in MANETs. Mobile adhoc network consists of mobile nodes that can move freely in an open environment. Communicating nodes in a Mobile Adhoc Network usually interact with other intermediate nodes to establish communication channels. A number of challenges like caching, adopting prefetching technique, open peer-to-peer network architecture, stringent resource constraints, shared wireless medium, dynamic network topology etc are to be addressed in MANET. As MANET is quickly spreading for the property of its capability in forming temporary network without the aid of any established infrastructure or centralized administration, Access rate of image data or Query latency has become a primary concern in MANETs. In this paper focus is on data caching and adopting efficient prefetching techniques to improve or enhance the access rate of data there by reducing the query latency","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"6 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2016-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2165-7866.1000190","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70696105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Prospects and Challenges of Mobile Learning Implementation: A Case Study 移动学习实施的前景与挑战:一个案例研究
Journal of information technology & software engineering Pub Date : 2016-10-10 DOI: 10.4172/2165-7866.1000189
R. Alhajri
{"title":"Prospects and Challenges of Mobile Learning Implementation: A Case Study","authors":"R. Alhajri","doi":"10.4172/2165-7866.1000189","DOIUrl":"https://doi.org/10.4172/2165-7866.1000189","url":null,"abstract":"Mobile learning is a new learning landscape that offers opportunity for collaborative, personal, informal, and students’ centered learning environment. In implementing any learning system such as mobile learning environment, it is important to understand challenges that affect its implementations in a particular culture. Additionally, learners’ and instructors’ expectations are deemed necessary for consideration. However, there is a lack of studies on this aspect, particularly in the context of Kuwait HE institutions. This research presents opportunities and prospects of m-learning, and discusses challenges and implications facing its implementation. The authors of this paper conducted a study in Kuwait HE to examine both students’ and instructors’ perceptions and attitudes toward this trend of learning, to evaluate its effectiveness, and to investigate cultural and social challenges that affect the implementation of m-learning in Kuwait HE. A questionnaire was administered to 499 students and 110 Instructors from different higher educational institutions in Kuwait. The results reveal that students and instructors have positive perceptions of m-learning, and believe that m-learning enhances the teaching and the learning process. The study reports some social and cultural issues that may act as barriers to m-learning implementation.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"6 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2016-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2165-7866.1000189","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70695964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Range Front Structural Geometries and Décollement related Tectonics: An example from Sothern Surghar Range, Trans-Indus Ranges, NW Pakistan 山脉前缘构造几何与与三角洲有关的构造:以巴基斯坦西北部苏尔海山脉南部、印度河山脉为例
Journal of information technology & software engineering Pub Date : 2016-08-30 DOI: 10.4172/2165-7866.1000188
I. Alam
{"title":"Range Front Structural Geometries and Décollement related Tectonics: An example from Sothern Surghar Range, Trans-Indus Ranges, NW Pakistan","authors":"I. Alam","doi":"10.4172/2165-7866.1000188","DOIUrl":"https://doi.org/10.4172/2165-7866.1000188","url":null,"abstract":"Structural reassessment is described for the eastern and southeastern flank of the north-south oriented segment of Surghar Range, representing the sub-Himalayan frontal structural signatures of northwest Pakistan. Acquisition of outcrop data and structural mapping in the area revealed that the Surghar Range is delimited by a prominent frontal thrust fault which is laterally extended from Kurrum River of Dera Tang in the south to KaIabagh Fault System in the east. Structural geometries describe the presence of an east to southeast vergent thin-skinned fold-and-thrust system developed in the Paleozoic-Mesozoic sequence overlying by a thick overstrain of the Cenozoic rocks. The north-south oriented segment of the range displays tectonics structures developed in response to the coordination of fold-andthrust system. These variant tectonic structures, probably controlled by the east-west directed compressional regime. The study area has been mapped right of Dera Tang in the south to Malla Khel in the north. This segment is comprised of approximately NW-SE oriented thrust fault laterally extended along the range front exploiting different horizons for exhumation at surface. Three different kinds of structures have been developed from south to north as force folding including fault propagation and fault bend folds and transverse strike-slip faults to frontal thrust in the vicinity of Sirkai. A number of anticlinal structures have been mapped in this segment where Siwalik rocks are well exposed at both limbs but the same rocks observed omitted from the fore limbs of some other anticlines. Low to moderate uplifting and strikeslip tectonics are the significant structural style of the southern north-south segment while high uplifting, concentric overturned folding and thrust faulting are the dominant structural mechanism of the northern terminus of this segment. The strike-slip faults observed terminated against the Surghar Thrust in the vicinity of Sirkia. Maturity in tectonic progression, structural growth, maximum crustal telescoping and unearthing of older rock sequences observed from south to north in the mapped area. Chronologically the tectonic phase of transpressional regime observed younger or concurrent as proportional to compressional regime in the region. In general the faulting phase of both regimes is not older than Plio-Pleistocene to sub-Holocene.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"6 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2016-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70695916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Thermodynamic and Quantum Mechanical Limitations of Electronic Computation 电子计算的热力学和量子力学限制
Journal of information technology & software engineering Pub Date : 2016-08-30 DOI: 10.4172/2165-7866.1000187
Fayez Fok Al Adeh
{"title":"Thermodynamic and Quantum Mechanical Limitations of Electronic Computation","authors":"Fayez Fok Al Adeh","doi":"10.4172/2165-7866.1000187","DOIUrl":"https://doi.org/10.4172/2165-7866.1000187","url":null,"abstract":"The role of entropy and uncertainty in electronic computations is used to derive a fundamental thermodynamic equation. The thermodynamic limitations of electronic computations are expressed in terms of macroscopic disorder, while quantum mechanical limitations are formulated through uncertainty relationships. Electronic computations are described quantum-mechanically, and hence provide a reasonable argument in favour of the wave interpretation of quantum mechanics.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"6 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2016-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70695856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Art and multimedia 艺术与多媒体
Journal of information technology & software engineering Pub Date : 2016-08-29 DOI: 10.4172/2165-7866.C1.004
Y. Kawaguchi
{"title":"Art and multimedia","authors":"Y. Kawaguchi","doi":"10.4172/2165-7866.C1.004","DOIUrl":"https://doi.org/10.4172/2165-7866.C1.004","url":null,"abstract":"","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2016-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70697684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Flow as you have never seen it 你从未见过的心流
Journal of information technology & software engineering Pub Date : 2016-08-29 DOI: 10.4172/2165-7866.C1.005
R. Laramee
{"title":"Flow as you have never seen it","authors":"R. Laramee","doi":"10.4172/2165-7866.C1.005","DOIUrl":"https://doi.org/10.4172/2165-7866.C1.005","url":null,"abstract":"T paper introduces the fuzzy PID control method for outer loop voltage of bidirectional DC-DC converter. In recent years, with the rapid development of new energy technology, bidirectional DC-DC converter has been widely used in the new energy vehicles. Bidirectional DC-DC converter is a kind of strongly nonlinear system. How to make the converter system work steadily and fast is a hot research area. A bidirectional DC-DC converter is a strongly nonlinear system. The traditional PID control is known for its simple algorithm and easy design, but the parameters cannot do well in dynamic performance and static performance, which affect the final control effect. Taking the Boost converter as an example, a PI control for the voltage inner loop and a Fuzzy PID control for the voltage outer loop was proposed to improve disadvantages of the traditional PID control. And the Boost simulation experiment was built in Matlab/Simulink. The simulation results show that compared with the traditional PID control, this control method can effectively solve the nonlinear problems of bidirectional DC-DC converter, improve the response of bidirectional DC-DC converter, and reduce the output voltage fluctuation.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2016-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70697697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Monitor Student’s Presence in Classroom 监督学生在课堂上的表现
Journal of information technology & software engineering Pub Date : 2016-08-25 DOI: 10.4172/2165-7866.1000185
Suryavanshi, Sankpal Lj
{"title":"Monitor Student’s Presence in Classroom","authors":"Suryavanshi, Sankpal Lj","doi":"10.4172/2165-7866.1000185","DOIUrl":"https://doi.org/10.4172/2165-7866.1000185","url":null,"abstract":"The real time face detection and recognition is now a days a subject of interest in various daily applications like crowd identification, video conference, security measure, image analysis etc. This topic has brought attention of researchers because the human face is a dynamic object and has a high degree of variability in their appearances, which make face detection a difficult problem in computer vision. Many technique are being proposed, ranging from simple edge based algorithm to composite high level approaches utilizing advanced pattern recognition methods. The algorithms presented in this paper are Viola-Jones algorithm (Haar Cascade Classifier) and PCA (classified as either feature based and image based) and are discussed in terms of technical approach and performance. The objective of this paper is to find out a way to monitor student’s presence in classroom using EmguCV (Computer vision Library and wrapper class of Open CV) and send important notification to parents to keep track of their child from remote location. This technology used to monitor their children and by this way teachers are trying to guard children’s behaviors in order to reduce teachers’ difficulties of classroom management, instead of helping children to learn effectively.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"6 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2016-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2165-7866.1000185","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70695779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Online Food Court Ordering System 网上美食广场订餐系统
Journal of information technology & software engineering Pub Date : 2016-08-10 DOI: 10.4172/2165-7866.1000183
K. SainathReddy, Chaitanya Kgk, M. Abhinav, Feiroz Khan Th
{"title":"An Online Food Court Ordering System","authors":"K. SainathReddy, Chaitanya Kgk, M. Abhinav, Feiroz Khan Th","doi":"10.4172/2165-7866.1000183","DOIUrl":"https://doi.org/10.4172/2165-7866.1000183","url":null,"abstract":"Increased demand of restaurant-goers generated the need for much attention for the hospitality industry. \u0000 Providing much option with ease of ordering and delivering is the need of the hours. Technological interference has \u0000 become mandatory to improve the quality of the service and business in this industry. Evidences are already existed \u0000 for partial automation of food ordering process in the country; most of these technologies implemented are based on \u0000wireless technologies. \u0000This manuscript reports implementation and integration of web based technology for restaurants. A dynamic \u0000 database utility system was designed to fetch all the information from a centralised database. User utility was given \u0000 importance during the development of this interface and efficiency, accuracy was the priority for better results and \u0000 services and to reduce the majority of the human error. It was observed that this system was successful in \u0000 overcoming the shortcomings found in the previously developed similar systems. Moreover, this system was very \u0000cost effective in development as well as during use.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"6 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2016-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2165-7866.1000183","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70695697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Feature-based three-dimensional registration for repetitive geometry in machine vision. 机器视觉中基于特征的重复几何三维配准。
Journal of information technology & software engineering Pub Date : 2016-08-01 Epub Date: 2016-08-26 DOI: 10.4172/2165-7866.1000184
Yuanzheng Gong, Eric J Seibel
{"title":"Feature-based three-dimensional registration for repetitive geometry in machine vision.","authors":"Yuanzheng Gong,&nbsp;Eric J Seibel","doi":"10.4172/2165-7866.1000184","DOIUrl":"https://doi.org/10.4172/2165-7866.1000184","url":null,"abstract":"<p><p>As an important step in three-dimensional (3D) machine vision, 3D registration is a process of aligning two or multiple 3D point clouds that are collected from different perspectives together into a complete one. The most popular approach to register point clouds is to minimize the difference between these point clouds iteratively by Iterative Closest Point (ICP) algorithm. However, ICP does not work well for repetitive geometries. To solve this problem, a feature-based 3D registration algorithm is proposed to align the point clouds that are generated by vision-based 3D reconstruction. By utilizing texture information of the object and the robustness of image features, 3D correspondences can be retrieved so that the 3D registration of two point clouds is to solve a rigid transformation. The comparison of our method and different ICP algorithms demonstrates that our proposed algorithm is more accurate, efficient and robust for repetitive geometry registration. Moreover, this method can also be used to solve high depth uncertainty problem caused by little camera baseline in vision-based 3D reconstruction.</p>","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"6 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2165-7866.1000184","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"34805874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Server Side Protection against Cross Site Request Forgery using CSRF Gateway 使用CSRF网关防止跨站点请求伪造的服务器端保护
Journal of information technology & software engineering Pub Date : 2016-06-30 DOI: 10.4172/2165-7866.1000182
Jaya Gupta, S. Gola
{"title":"Server Side Protection against Cross Site Request Forgery using CSRF Gateway","authors":"Jaya Gupta, S. Gola","doi":"10.4172/2165-7866.1000182","DOIUrl":"https://doi.org/10.4172/2165-7866.1000182","url":null,"abstract":"The E-Commerce and Social Media has become the new identity for millions of users across the globe. Ease of services for Shopping, Travel, Internet Banking, Social Media, chat and collaboration Apps etc. have become part of one’s life where these identities have name, media content, confidential notes, business projects and credit cards. Convenience and connections brings the ease of connectivity and services so does come the concerns related to unauthorized usage and fraudulent transactions that could be lead to loss of money, time, emotions and even life. Web defacement, fake accounts, account hijacking, account lock and unavailability of services has become a common online news and distress for many. There are different Web Attacks and exploits that have sprung up with time and usage for different type of illegal actions performed everyday online. Cross Site Request Forgery Attack is one of the Web top 10 exploited attacks for the past 5 years (Source OSWAP) which can maliciously exploit online services, where unauthorized actions are performed by the fraudulent user on behalf of a trusted and authenticated account for website. It forces the victim user to perform some unauthorized activity on behalf of attacker request. This research work focuses on a new Hybrid strategy that will enhance the server side protection against CSRF attacks. CSRF Gateway, is the proposed solution which provides the Server Side protection against Cross Site Request Forgery (CSRF) Attack.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"6 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2016-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2165-7866.1000182","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70696026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信