By Topic

Computer Research and Development, 2010 Second International Conference on

Date 7-10 May 2010

Filter Results

Displaying Results 1 - 25 of 188
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (221 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (25 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (89 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (147 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - xvii
    Request permission for commercial reuse | PDF file iconPDF (182 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2010, Page(s):xviii - xix
    Request permission for commercial reuse | PDF file iconPDF (67 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2010, Page(s): xx
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2010, Page(s):xxi - xxii
    Request permission for commercial reuse | PDF file iconPDF (92 KB)
    Freely Available from IEEE
  • A Guideline to Enforce Data Protection and Privacy Digital Laws in Malaysia

    Publication Year: 2010, Page(s):3 - 6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB) | HTML iconHTML

    In the Malaysian cyber law, no law has been enacted to protect the personal data of the people when a theft of personal data occurs. This paper will suggest a guideline for applying and enforcing the data protection and privacy digital laws in Malaysia. By enforcing the suggested guideline we achieve a means to process data strictly by commercial sectors for commercial activities in sectors of tou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast Traversal Algorithm for Detecting Object Interference Using Hierarchical Representation between Rigid Bodies

    Publication Year: 2010, Page(s):7 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB) | HTML iconHTML

    Searching for fast and efficient algorithm to perform collision detection between static and moving objects is always fundamental problems in virtual environment. Most of previous method seems trying to tackle the problems of involving specific geometric models colliding pairs with restricted rules and guidelines. For example, convex hull bounding-volume tends to solve the collision detection prob... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Algorithm for Calculating Adaptive Character Wordlength via Estimating Compressed File Size

    Publication Year: 2010, Page(s):12 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    In statistical compression algorithms, character word length of 8 bit is being used. Using an optimum character word length, b, where b>8, will improve compression ratio. There are different ways to calculate optimum character word length. In this paper we introduce a new algorithm named Estimated Compressed File Size (ECF) to find optimum character word length by estimating compressed file siz... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discovery of Patterns Using DataStream Engine

    Publication Year: 2010, Page(s):17 - 19
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (457 KB) | HTML iconHTML

    Data Stream Mining is the process of extracting knowledge structures from continuous, rapid data records. A data stream is an ordered sequence of instances in many applications of data stream mining can be read only once or a less number of times using limited computing and storage capabilities. The proposed system allows the user to select any type of mining algorithm desired. This makes the syst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WordNet Based Sindhi Text to Speech Synthesis System

    Publication Year: 2010, Page(s):20 - 24
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    The text-to-speech (TTS) synthesis technology enables machine to convert text into audible speech and used throughout the world to enhance the accessibility of the information. The important component of any TTS synthesis system is the database of sounds. In this study, three types of sound units i.e., phonemes, diphones and syllables are concatenated to produce natural sound for good quality Sind... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel Bipartite Graph Algorithm for Protein Structure Matching Using OpenMP

    Publication Year: 2010, Page(s):25 - 29
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (290 KB) | HTML iconHTML

    Current work on bipartite graph-based algorithm for protein tertiary structure matching shows that the algorithm demands heavy computation and extensive processing time during graph preparation and matching. In this work, we deployed multithreading approach using OpenMP to enhance the performance of the algorithm. The experiment on dual quad core machines shows that the speedup is 4.9 on 8 threads... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Watermark Embedder and Detector for Medical Images: The Requirements and Design

    Publication Year: 2010, Page(s):30 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (491 KB) | HTML iconHTML

    Watermarking had been proven to be able to protect medical images from unauthorized tampering and modification. Numerous watermarking schemes are available for different purposes depending on the security needs. Watermark embedding and detection process need to be performed in an efficient manner so that the operation of the health institution is not affected. This paper will focus on the developm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MPLS Assisted Handover in IP-Based Mobility Management Schemes: A Survey

    Publication Year: 2010, Page(s):34 - 38
    Cited by:  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (329 KB) | HTML iconHTML

    Mobility in IP-based wireless networks is basically handled by Mobile IP protocols which suffer from long handover latency and high signaling overhead, this latency is partly because of tunneling process between mobile node and mobility agents. MPLS (Multi Protocol Label switching) has been integrated into Mobile IP schemes to lessen the burden of IP packets tunneling in mobility domain. In this p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A User's Preference Based Method for Web Service Selection

    Publication Year: 2010, Page(s):39 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (371 KB) | HTML iconHTML

    Both criterion values and user's preference of criterion should be taken into account when selecting web services with same functionalities. Usually, user describes his/her preference of criterion using qualitative concept. But the quantitative value corresponding to qualitative concept is uncertain. Thus, the subjective weight acquired based on user's preference is uncertain. This paper provides ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building a Believable Agent for a 3D Boxing Simulation Game

    Publication Year: 2010, Page(s):46 - 50
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB) | HTML iconHTML

    This paper describes an approach used to build a practical AI solution for a 3D boxing simulation game. The features of the designed AI agent are based on our deliberate concentration on believability, i.e. human-likeness of agent's behavior. We show how learning by observation and case-based reasoning techniques can be used to create an AI decision-making system for an industrial-level computer g... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Grammars Controlled by Petri Nets with Place Capacities

    Publication Year: 2010, Page(s):51 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    A Petri net controlled grammar is a grammar equipped with a Petri net whose transitions are labeled with production rules and nonterminals of the grammar, and the associated language consists of all terminal strings which can be derived in the grammar and the the sequence of rules in every terminal derivation corresponds to some occurrence sequence of transitions of the Petri net which is enabled ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Aligning Data Records Using WordNet

    Publication Year: 2010, Page(s):56 - 60
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (585 KB) | HTML iconHTML

    Visual wrappers use visual information in addition to the DOM Tree properties in the extraction of data records. However, a closer look indicates that visual information can also be used to align data records into tabular form. In this paper, we propose a data alignment algorithm to align data records using DOM Tree properties and visual cue of data records. Our data alignment algorithm uses a reg... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CGLT: An Effective Computer-Based Learning Tool

    Publication Year: 2010, Page(s):61 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (602 KB) | HTML iconHTML

    Behavioral high-level hardware design tools are currently considered powerful and can largely facilitate the hardware development cycle as a whole. Modern hardware design tools can target high-density programmable logic devices, such as, Field Programmable Gate Arrays. Currently, hardware/software co-design is witnessing a growing focus on finding alternative methods that could further improve the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identifying Quality Factors within Data Warehouse

    Publication Year: 2010, Page(s):65 - 72
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB) | HTML iconHTML

    The popularity of data warehouses for data analysis has grown tremendously. Data warehouse systems have emerged as the core of management information systems. Data warehouse is part of a larger infrastructure that includes legacy data sources, external data sources, data acquisition software, a repository, analytical tools, and user interface. The difficulties of data warehouse implementations hav... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating DICOM Information Model with Risk Management Process Area of CMMI for Radiotherapy Applications

    Publication Year: 2010, Page(s):73 - 76
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (218 KB) | HTML iconHTML

    Digital Imaging and Communications in Medicine (DICOM) provides a standard to facilitate interoperability among medical devices from the perspective of hardware and software. Though DICOM is widely adopted by medical device manufacturers, it does not specify risk management details in developing medical device software. This paper hypothesizes that this shortage of DICOM can be complemented by the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Malaysian Address Semantic: The Process of Standardization

    Publication Year: 2010, Page(s):77 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (309 KB) | HTML iconHTML

    Mail delivery has always been problematic to the Malaysian postal services due to incomplete or incorrect postal addresses. To this effect, the Malaysian Standard Body known as SIRIM has developed the Malaysian Standard Address with the purpose of standardizing Malaysian postal addresses and hence reducing the problem of undelivered mail. This article presents the findings of a study aimed at inve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Per-Priority Flow Control (PPFC) for Enhancing Metro Ethernet QoS

    Publication Year: 2010, Page(s):83 - 87
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (305 KB) | HTML iconHTML

    This paper presents a novel scheme called per-priority flow control (PPFC) as an extension to the IEEE802.3x standard using a simple and efficient node buffer management strategy, where a physical channel was divided into several virtual channel based on the bandwidth value (QoS parameter) embedded into the IPv6 flow label field of each flow. Moreover, it investigates performance of new proposed p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.