By Topic

Computer Sciences and Convergence Information Technology, 2009. ICCIT '09. Fourth International Conference on

Date 24-26 Nov. 2009

Filter Results

Displaying Results 1 - 25 of 332
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (437 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (78 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (166 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (131 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - xxvii
    Request permission for commercial reuse | PDF file iconPDF (206 KB)
    Freely Available from IEEE
  • Welcome Messages from the Conference Chairs

    Publication Year: 2009, Page(s):xxviii - xxxii
    Request permission for commercial reuse | PDF file iconPDF (142 KB) | HTML iconHTML
    Freely Available from IEEE
  • List of Conference Chairs

    Publication Year: 2009, Page(s):xxxiii - xxxiv
    Request permission for commercial reuse | PDF file iconPDF (128 KB)
    Freely Available from IEEE
  • International Committee Lists

    Publication Year: 2009, Page(s):xxxv - xliii
    Request permission for commercial reuse | PDF file iconPDF (93 KB)
    Freely Available from IEEE
  • A Development of Software Component Framework for Robotic Services

    Publication Year: 2009, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1350 KB) | HTML iconHTML

    Robot software components, which can be accessed through their interface, are reusable and replaceable software modules used in composing robotic services. Using robot software components in developing a robot, developers can expect shortening of developing times, reduction of maintenance cost and improvement of program reusability, because interoperability among components is guaranteed. We have ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Framework for Dynamic Evolution Based on Reflective Aspect-Oriented Software Architecture

    Publication Year: 2009, Page(s):7 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    An increasingly important requirement for software system is the capability to evolve dynamically at runtime according to the users' requirements and computing environments. From the angle of software architecture, in this paper, a framework of supporting dynamic evolution based on reflective aspect-oriented software architecture-RAOSA is proposed and software architecture is reified as an explici... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multiagent System for Touristic Travel Planning

    Publication Year: 2009, Page(s):11 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (355 KB) | HTML iconHTML

    This paper presents the progress in the development of a multiagent system for the tourism sector, whose objective is to give support to the tourists before and during his travel. Are presented the changes between an earlier and a stable version of the system, also is described the scenario that corresponds to the creation of a new itinerary and some diagrams designed with the PASSI methodology ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multi-hop Routing Protocol Based on Fixed Radio Wave in Wireless Sensor Network

    Publication Year: 2009, Page(s):15 - 19
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (282 KB) | HTML iconHTML

    Recently, in order to improve the energy efficiency of WSN(Wireless Sensor Network), widely research have been carried on. But, up to the present, all presented methods are based on direct communication between CH (cluster head) and sink node, and based on the assumption that node can intelligent regulate signal energy according to the distance between nodes. So it's hard to implement those method... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Approach for the Quantitative Evaluation of Storm Disasters

    Publication Year: 2009, Page(s):20 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (221 KB) | HTML iconHTML

    This paper has put forward the concept of storm magnitude and disaster intensity and designed a kind of new method by quantitative calculation. Storm magnitude is the quantitative index that describes the scale of a storm, and disaster intensity of storm is the quantitative index to describe the loss caused by a storm flood. Both indices have many theoretical and practical advantages with definabl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Dynamic Heartbeat Detection for Grid Membership Management

    Publication Year: 2009, Page(s):23 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (317 KB) | HTML iconHTML

    Grid is one of the currently and most actively developing concepts in the IT community, which nodes can dynamically enter and quit system. So, there are some real problems about nodes membership management in grid environments, especially, when considering asynchronous wide-area networks conditions, where messages may be delayed indefinitely and nodes may fail. Heartbeat detection is one of basic ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Elimination-Based A* Approach to Image Retrieval

    Publication Year: 2009, Page(s):28 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (305 KB) | HTML iconHTML

    In this paper, we present methodology to Content Based Image Retrieval (CBIR), focusing on developing an efficient image retrieval methodology. This scheme include: a new indexing method based on fuzzy logic to incorporate color, texture, and shape information into a region based approach to improving the retrieval effectiveness and robustness, a novel hierarchical indexing structure and the corre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Robot Motion Authoring Using Finger-Robot Interaction

    Publication Year: 2009, Page(s):34 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB) | HTML iconHTML

    This paper proposes a robot motion authoring using finger-robot interaction. The proposed method is a user-friendly method that easily authors (creates and controls) robot motion according to the number of fingers. The effectiveness of the proposed motion authoring method was verified based on motion authoring simulation of an industrial robot. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Test Automation of a Full Software Stack on Virtual Hardware-Based Simulator

    Publication Year: 2009, Page(s):37 - 39
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1210 KB) | HTML iconHTML

    This paper presents a S/W test automation for mobile device by using a hardware emulation-based simulator and an event manager. The hardware emulation provides a virtual hardware which enables the entire S/W stack for smartphone to run on execution environment isolated from host operating system. The event manager can capture and playback all events generated from the virtual hardware and the emul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Alliance-Based Distributed Web Service Discovery Method

    Publication Year: 2009, Page(s):40 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB) | HTML iconHTML

    In order to avoid the single-point-failure problem in centralized Web service publication and search mechanisms, an alliance-based Web service discovery method for unstructured P2P network was proposed in this paper. A service alliance is composed of web services with same functional properties. By using of the alliance-information-list, service requests could be spread rapidly through out the all... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Application of Inspection in Product Security Based on Distributed and Real-Time System

    Publication Year: 2009, Page(s):44 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (553 KB) | HTML iconHTML

    VI is an instrument based on computer, the application of which is one of the hottest topics in computer applications development and research fields. Remote inspection is the most emergent problem in the product security inspection laboratory. The application of networked VI becomes necessary and feasible. In this paper, we developed a Distributed Real-time Online Inspection System to control VI ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Application Plan of Ubiquitous Technology Elements for Sustainable Pro-environmental Architecture

    Publication Year: 2009, Page(s):49 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3343 KB) | HTML iconHTML

    Ubiquitous as ubiquitous IT comprehending ubiquitous computing and ubiquitous network should consider environmental matters that the human race of 21st century is confronting. This is one of the solutions for composing architectural environment which is sustainable and pro-environmental. The applicable architectural technologies of ubiquitous is smart-display, environmental adjustment s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Effective Document Search Technique by Semantic Relationship Approach

    Publication Year: 2009, Page(s):53 - 58
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (716 KB) | HTML iconHTML

    Office applications are becoming a major pillar of today's organizations since they are used to edit a vast amount of digital documents. Finding these office documents in large databases that fit users' needs is becoming increasingly important. Traditional search tools that employ keyword and phrase matching between the query and search index alone tend to offer high recall and low precision. The ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Approach for Building Compressed Full-Text Index for Structured Data

    Publication Year: 2009, Page(s):59 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (321 KB) | HTML iconHTML

    The self-index is a kind of highly compressed, self-contained full-text index. It is designed for indexing plain texts in order to reduce its permanent storage, as well as to enhance searching performance. Apart from being a sequence of characters, usually the text has specific internal structure. The data record, as a basic model of structured data, is therefore employed to represent and organize... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An RFID Middleware Business Process Integration Framework Based on EPC Modeling and Complex Event Processing

    Publication Year: 2009, Page(s):64 - 69
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (657 KB) | HTML iconHTML

    Integrating RFID to enterprise business process is now becoming an important aspect in RFID research field. The conventional business process integrating method can hardly meet the need of RFID business applications. In this paper, we introduce an RFID middleware business process integration framework based on EPC modeling and complex event processing. This framework allows users to rapidly model ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic Synthesis of Quantum Teleportation Circuit

    Publication Year: 2009, Page(s):70 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    Quantum teleportation is a typical quantum circuit. We choose it as a benchmark circuit for the problem of quantum circuit synthesis. Genetic algorithm is introduced to synthesis the circuit. A simple coding scheme and the corresponding fitness function are proposed. The algorithm is implemented using Matlab's GA toolbox, and an optimized circuit structure is obtained. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Carrier Sorting Plan and Rate of Letter in Postal Logistic

    Publication Year: 2009, Page(s):75 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (946 KB) | HTML iconHTML

    It is important to have the accuracy sorting plan for the save of postman work time and the fast delivery of the receipt mail. It's also very important to plan the proper carrier sorting plan at the situation where the number of pocket of letter sorting machine [LSM] is less than the number of postal code or the number of carrier. This paper describes the method for the carrier sorting plan and so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.