By Topic

Advanced Science and Technology, 2009. AST '09. International e-Conference on

Date 7-9 March 2009

Filter Results

Displaying Results 1 - 25 of 29
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (2569 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (117 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - vi
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • Message from General Chair

    Publication Year: 2009, Page(s): vii
    Request permission for commercial reuse | PDF file iconPDF (76 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from Program Chair

    Publication Year: 2009, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (78 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2009, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (88 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2009, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (111 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2009, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (112 KB)
    Freely Available from IEEE
  • A Paradigm Solution to P2P Security Issues

    Publication Year: 2009, Page(s):3 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (329 KB) | HTML iconHTML

    File sharing is a common practice since the introduction of computer networks. It involves using technology that allows network users to share files that are stored on their individual computers. Peer-to-peer or simply P2P applications, such as those used to share multimedia files, are some of the most common forms of file-sharing technology. However, P2P applications are vulnerable to security ri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Comparison in Handmetric between Quaternion Euclidean Product Distance and Cauchy Schwartz Inequality Distance

    Publication Year: 2009, Page(s):8 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB) | HTML iconHTML

    This paper proposes a comparison in handmetrics between quaternion Euclidean product distance (QEPD) and Cauchy-Schwartz inequality distance (CSID), where "handmetrics" refers to biometrics on palmprint or finger texture. Previously, we proposed QEPD and CSID these two 2D wavelet decomposition based distances for palmprint authentication and face verification respectively. All two distances could ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fault Tolerance Honeypots Network for Securing E-government

    Publication Year: 2009, Page(s):13 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (551 KB) | HTML iconHTML

    One of the big challenges of E-government adoption among citizens is security. Numerous security approaches exist in E-commerce, and all of them are applicable to E-government. Usually government networks can communicate to each other better than business networks, because, most of them are connected for transferring information, but businesses are competitors and they don't disclose their sensiti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hybrid Documents Classification Based on SVM and Rough Sets

    Publication Year: 2009, Page(s):18 - 23
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (494 KB) | HTML iconHTML

    Standard machine learning techniques like support vector machines (SVM) and related large margin methods have been successfully applied for text classification. Unfortunately, the high dimensionality of input feature vectors impacts on the classification speed. The kernel parameters setting for SVM in a training process impacts on the classification accuracy. Feature selection is another factor th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Approach for Designing Indian Regional Language Based Raw-Text Extractor and Unicode Font-Mapping Tool

    Publication Year: 2009, Page(s):24 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (692 KB) | HTML iconHTML

    Extracting specific information from a collection of documents is called information extraction (IE). In general, the information on the a Web is well structured in HTML or XML format. And the work of IE from structured documents (in HTML or XML), basically uses learning techniques for pattern matching in the content. In this paper, we have proposed a novel approach for interactive information ext... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Conception Based Texts Classification Method

    Publication Year: 2009, Page(s):30 - 34
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (557 KB) | HTML iconHTML

    Text classification has been widely used to assist users with the discovery of useful information from the Internet. However, current text classification systems are based on the ldquoBag of Wordsrdquo (BOW) representation, which only accounts for term frequency in the documents, and ignores important semantic relationships between key terms. To overcome this problem, previous work attempted to en... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Variable Bandwidth Scheme for Predictive Control in Cellular Networks

    Publication Year: 2009, Page(s):35 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    A new variable bandwidth scheme (VBS) for channel resources predictive control and call admission control in cellular networks is presented in the paper. VBS mainly aims to the QoS enhancement of cellular networks. Compared with the time-based channel predictive control (TCPC) schemes, VBS has a good performance in call dropping probability (CDP) and call blocking probability (CBP). Moreover, cons... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TUPUX: An Estimation Tool for Incremental Software Development Projects

    Publication Year: 2009, Page(s):39 - 43
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (396 KB) | HTML iconHTML

    Effort estimation is still one of the most daunting, hard to apply tasks in any given software project. Although many current methodologies propose an incremental approach to software development, there are still few techniques that allow them to be applied efficiently. We developed TUPUX, an add-in component for StarUML that facilitates the planning and estimation, using Function Points, in softw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Artificial K-lines

    Publication Year: 2009, Page(s):44 - 47
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (383 KB) | HTML iconHTML

    We propose Artificial K-lines (AKL), a structure that can be used to capture knowledge through events associated by causality. The proposed structure is inspired by the theory of memory, proposed by Minsky over 25 years ago and which has since been continuously refined. Like Artificial Neural Networks (ANN), AKL facilitates learning by capturing knowledge based on training. Unlike, and perhaps com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Clustering Fuzzy Web Transactions with Rough k-Means

    Publication Year: 2009, Page(s):48 - 51
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (295 KB) | HTML iconHTML

    Time duration and presence of a Web page are two factors disclosing Web users' interest. The time duration on a web page is characterized as a fuzzy linguistic variable because it is easily understandable for people and the subtle difference between two durations is disregarded. Thus a Web access pattern is transformed as a fuzzy Web access pattern, which is a fuzzy vector that are composed of n f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Concept Based Query Expansion Using WordNet

    Publication Year: 2009, Page(s):52 - 55
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (362 KB) | HTML iconHTML

    Query expansion is a widely studied technique for improving information retrieval effectiveness. In this paper we proposed a new query expansion technique using the comprehensive thesaurus WordNet and its semantic relatedness measure modules. Word sense disambiguation are performed on original query sentence, yielding the concept of each term in the query. Based on those recovered concepts, expand... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mesh Smoothing for Parameterized Body Model with Loop Subdivision Algorithm

    Publication Year: 2009, Page(s):56 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (333 KB) | HTML iconHTML

    Mesh smoothing is a basic method for creating smooth surfaces out of coarse and lower resolution models. In order to smooth 3D geometrical body models, the paper proposed a mesh smoothing method of 3D body model based on the loop subdivision. A smooth surface can be expressed with subdivision surface that has higher resolution control mesh with subdivision rules. It can effectively improve the sho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RFID-Enable in the Real-Time Multi-experiment Training Center

    Publication Year: 2009, Page(s):60 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (286 KB) | HTML iconHTML

    This paper proposes a real-time web system based on RFID, B/S+C/S (Browser/Server + Client/Server) module and wireless communication named 433 MHz which are used to solve some crucial problems existed in multi-experiment training center such as real-time data collection, task tracking and agile training etc. After application in representative of training center in Guangdong University of Technolo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study of a Novel ADM Algorithm with Pre-processing for Performance Improvement

    Publication Year: 2009, Page(s):64 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (721 KB) | HTML iconHTML

    In this paper, a novel technique of a step-size adaptation algorithm for improving the signal-to-noise ratio (SNR) of Adaptive Delta Modulators (ADM) with one-bit quantization is presented. The two existing step-size algorithms--SONG and modified ABATE are discussed and also their performance comparison is made. For further improvement in the SNR with the proposed ADM includes an ADM with pre-proc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on Wave Calculation of an Air Cushion Surge Chamber

    Publication Year: 2009, Page(s):70 - 73
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (342 KB) | HTML iconHTML

    To constant flow, the varying rule between gaseous volume and pressure meets Boyle Gas Law. But, in transient process of water diversion system, kinetic characteristic of the gas in air cushion surge chamber has certain complexity when there is great fluctuation in surge chamber. Therefore, when computing surge of air cushion surge chamber, firstly, it is necessary that gaseous volume and pressure... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.