By Topic

2008 International Conference on Advanced Computer Theory and Engineering

Date 20-22 Dec. 2008

Filter Results

Displaying Results 1 - 25 of 226
  • [Front cover]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (1520 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (19 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (108 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):v - xviii
    Request permission for commercial reuse | PDF file iconPDF (187 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2008, Page(s): xix
    Request permission for commercial reuse | PDF file iconPDF (74 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committees

    Publication Year: 2008, Page(s): xx
    Request permission for commercial reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • Committee Members

    Publication Year: 2008, Page(s):xxi - xxii
    Request permission for commercial reuse | PDF file iconPDF (81 KB)
    Freely Available from IEEE
  • Evaluating Quality of Software Systems by Design Patterns Detection

    Publication Year: 2008, Page(s):3 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (261 KB) | HTML iconHTML

    Software industry demands the development of products at a very fast rate with most effective solutions. For this reason most of the components are desired to be reused again and again. Use of design patterns can speed up the process of product development by providing the pre-tested footsteps to follow. Design patterns show their effectiveness from Design phase to maintenance. Design patterns can... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tranquility and Anxiety in E-Business – A Fuzzy Approach

    Publication Year: 2008, Page(s):8 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (298 KB) | HTML iconHTML

    In this paper a methodology is introduced to rank the products in the e-business system as per customers' choice. The buyers' choices, in general, are in linguistically or fuzzily defined terms. The representation of these terms in the e-business system is a difficult task. Fuzzy number is used here to represent the same. Another behavioral aspect of the customer in the e-business is their inclina... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reducing Aircraft Accidents: Can Intelligent Agent Paradigms Help?

    Publication Year: 2008, Page(s):13 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB) | HTML iconHTML

    It is suggested that at least 70% of aircraft accidents can be shown to have flight crew error as the major causal factor. These errors can be categorized into two domains, technical flight skill errors and non technical flight skill errors. This paper summarizes two intelligent agent paradigms, being developed by the KES/AERO research group, that operate within both the technical and non technica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital Archiving and Data Mining of Historic Document

    Publication Year: 2008, Page(s):19 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (521 KB) | HTML iconHTML

    The development of research methodologies innovative technologies as described in this paper allows real time archival data extraction and assessment while ensuring preservation. The system establishes a new standard for electronic preservation, retrieval and research of manuscript and other materials. It uses computer-assisted technology for initial handwriting recognition of manuscript sources. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Neural Control and Learning for Versatile, Adaptive, Autonomous Behavior of Walking Machines

    Publication Year: 2008, Page(s):24 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB) | HTML iconHTML

    This article presents two different types of walking machines: an insect-like robot and a biped robot which have been developed during last years. Both walking machines are attractive in the way that they now combine three key aspects: versatility, adaptivity, and autonomy. Versatility in this sense means a variety of reactive behaviors, while adaptivity implies to online learning capabilities, an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Telecollaboration for eBusiness Sustainability

    Publication Year: 2008, Page(s):29 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (185 KB) | HTML iconHTML

    eBusiness is not a new phenomenon and many of the eBusiness technologies are readily available for mid-sized and large organisations. However, "telecollaboration (TC) for eBusiness sustainability" is a new concept for workplace managers that include a wide array of interconnected business concepts, and activities involved in evaluating the collaborative opportunities whilst managing the eBusiness ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of Random Forest in Predicting Fault-Prone Classes

    Publication Year: 2008, Page(s):37 - 43
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (226 KB) | HTML iconHTML

    There are available metrics for predicting fault prone classes, which may help software organizations for planning and performing testing activities. This may be possible due to proper allocation of resources on fault prone parts of the design and code of the software. Hence, importance and usefulness of such metrics is understandable, but empirical validation of these metrics is always a great ch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Why Computers Are Not Displaying Intelligence

    Publication Year: 2008, Page(s):44 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    Despite sincere efforts amongst the machine intelligence community across the globe, development of humanlike intelligent machines remains a distant goal. Why machine intelligence continued to remain elusive so far? What went wrong? Is there any need to have a re look at the entire effort? Should we redefine the goal of machine intelligence? Are nanotechnology & advanced level computation like... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Artificial Neural Network Modeling for Efficient Photovoltaic System Design

    Publication Year: 2008, Page(s):50 - 56
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB) | HTML iconHTML

    Efficiency and certainty of payback have not yet attained desired level for solar photovoltaic energy systems. Despite huge development in prediction of solar radiation data, a clear disconnect in extraction and effective engineering utilization of pertinent information from such data is acting as a major roadblock towards penetration of this emerging technology. It is crucial to identify and opti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic Segmentation and Labeling for Spontaneous Standard Malay Speech Recognition

    Publication Year: 2008, Page(s):59 - 63
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (183 KB) | HTML iconHTML

    In this paper, we proposed an automatically segmenting and transcribing spontaneous speech signal without the use of manually annotated speech database. The spontaneous speech signal is first segmented into syllable-like units by considering short-term energy as a magnitude spectrum of some arbitrary signal. Similar syllable segments are then grouped together using an unsupervised incremental clus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quantum-Based Fixed Priority Scheduling

    Publication Year: 2008, Page(s):64 - 68
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (197 KB) | HTML iconHTML

    Fixed priority schedulers are widely used for real-time systems, and there were efforts to improve the schedulability. For example, preemption threshold scheduling increases the schedulability by introducing non-preemptiveness during task execution. In this paper, we study another scheduling model that can improve the schedulability of tasks: quantum-based scheduling. When quantum-based scheduling... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Evaluation of Virtual Private Network Protocols in Windows 2003 Environment

    Publication Year: 2008, Page(s):69 - 73
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    Virtual private network (VPN) is a technology that provides secure communication for data as it transits through insecure regions of information technology infrastructure. With prolific development of the Internet, businesses nowadays implement VPN tunnels using different protocols that guarantee data authenticity and security between multiple sites connected using public telecommunication infrast... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Channel Coordination with Manufacturer's Revenue Sharing Contract

    Publication Year: 2008, Page(s):74 - 78
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (419 KB) | HTML iconHTML

    This paper investigates supply chain coordination by adapting revenue sharing, where two upstream suppliers sell their substitutable products through a common retailer, who faces a stochastic price dependent demand. Each supplier could offer either a revenue sharing contract or a conventional wholesale price contract. We analyze the impact of retailer's share of channel cost and the substitution f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bargaining-Based E-Content Pricing for 3G Data Services

    Publication Year: 2008, Page(s):79 - 83
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (370 KB) | HTML iconHTML

    As 3G era arrives, data services, such as streaming media and high-speed downloading, become the main source of telecom operators' income. The e-content value of data services varies a lot in different market environments or to different people, but with the traditional fixed pricing scheme we can not charge the data services dynamically. This paper proposes a novele-content pricing model which in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing a Customized Test Data Generator for Effective Testing of a Large Database

    Publication Year: 2008, Page(s):84 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (566 KB) | HTML iconHTML

    Business houses are investing heavily on new generation databases so as to gain competitive edge. As with any development project, a data warehouse also needs testing. The complexity and size of data warehouse systems make comprehensive testing both "more difficult and more necessary". The fact, queries that perform satisfactorily on small datasets may fail miserably in the real life environment. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Personalized Trust-Based Approach for Service Selection in Internetwares

    Publication Year: 2008, Page(s):89 - 93
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (281 KB) | HTML iconHTML

    Internetware is an abstract of the distributed software system in the open and dynamic Internet which is generally integrated by large numbers of autonomous and heterogeneous software services of various functions. The reliability of the service which acts as a component in Internetware inevitably has an effect on the collaboration in the system and users' satisfaction on the whole system. So pick... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Interface Vocabulary and Users' Understanding in Integrated Iranian Library Software

    Publication Year: 2008, Page(s):94 - 100
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    The purpose was to survey vocabulary readability of Simorgh (SIM) and Pars Azerakhsh (PAZ) OPACs in two university libraries of Iran. The population included undergraduate and post graduate (except PhD.) students in Ferdowsi (to examine the SIM OPAC) and Shiraz (to examine the PAZ OPAC) universities. Data gathered by a questionnaire from 380 persons of whom 275 (145 of 200 from Ferdowsi and 130 of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.