Search Results - "2010 3rd International Conference on Computer Science and Information Technology"

Refine Results
  1. 1

    An improved Sobel edge detection by Wenshuo Gao, Xiaoguang Zhang, Lei Yang, Huizhong Liu

    “…This paper proposes a method which combines Sobel edge detection operator and soft-threshold wavelet de-noising to do edge detection on images which include…”
    Get full text
    Conference Proceeding
  2. 2

    Towards a Load Balancing in a three-level cloud computing network by Shu-Ching Wang, Kuo-Qin Yan, Wen-Pin Liao, Shun-Sheng Wang

    “…Network bandwidth and hardware technology are developing rapidly, resulting in the vigorous development of the Internet. A new concept, cloud computing, uses…”
    Get full text
    Conference Proceeding
  3. 3

    Wireless electric board based on an ARM-based embedded system by Di Wu, Yang Zhang, Baoding Zhou

    “…Using chalk is not only laborious, but it also produces a lot of chalk dust, polluting the air and adversely affecting the health of the students and teachers…”
    Get full text
    Conference Proceeding
  4. 4

    The study and application of the IOT technology in agriculture by Ji-chun Zhao, Jun-feng Zhang, Yu Feng, Jian-xin Guo

    “…In recent years, greenhouse technology in agriculture is to automation, information technology direction with the IOT (internet of things) technology rapid…”
    Get full text
    Conference Proceeding
  5. 5

    Multi-threshold image segmentation based on two-dimensional Tsallis by Xu Dong, Tang Xu-dong

    “…Image multi-threshold segmentation method based on two-dimensional Tsallis entropy is proposed by utilizing Tsallis entropy. The improved particle swarm…”
    Get full text
    Conference Proceeding
  6. 6

    A novel potential field method for obstacle avoidance and path planning of mobile robot by Lei Tang, Songyi Dian, Gangxu Gu, Kunli Zhou, Suihe Wang, Xinghuan Feng

    “…This paper presents a novel artificial potential field method for obstacle avoidance and path planning of mobile robots. By analyzing the shortcoming of the…”
    Get full text
    Conference Proceeding
  7. 7

    Trust management in privacy - Preserving information system by Kun Peng, Feng Bao

    “…In many information management applications, sensitive information must be stored as a record and be retrieved when necessary. When the record is stored in a…”
    Get full text
    Conference Proceeding
  8. 8

    Design and implementation of UPnP protocol-based integrated home media and power control system by Xiaodong Wang, Xiangqian Ding, Haiyong Zheng

    “…This paper designs and implements an automatic network system utilizing UPnP, wireless network and power line carrier technology. We connect home media device…”
    Get full text
    Conference Proceeding
  9. 9

    A taxonomy of Botnet detection techniques by Zeidanloo, H R, Shooshtari, M J Z, Amoli, P V, Safari, M, Zamani, M

    “…Among the diverse forms of malware, Botnet is the most widespread and serious threat which occurs commonly in today's cyber attacks. Botnets are collections of…”
    Get full text
    Conference Proceeding
  10. 10

    An implementation of on-line management of livelock type feature interaction in NGN by Lu, Yiqin, Yang, Xiaodong, Fang, Fang, Wang, Shuoran

    “…Under the competition pressure and driven by the technology development, the number of value-added services will increase very rapidly to improve the ARPU…”
    Get full text
    Conference Proceeding
  11. 11

    Hardware/software co-design to secure crypto-chip from side channel analysis at design time by Jianbo Yao, Tao Zhang

    “…Side channel analysis (SCA) is a powerful physical cryptanalysis. In common industrial practice, the SCA security evaluation is performed after the devices are…”
    Get full text
    Conference Proceeding
  12. 12

    Research on host-level security situational awareness by Zhou Ti, Wang Xiao-fei, Feng Li, Wang Jing

    “…Situational assessment is significant for host-level security. Most existing approaches are generally limited to network security that is different from…”
    Get full text
    Conference Proceeding
  13. 13

    A quasi quantum secure direct communication protocol with authentication by Chen Zuning, Qin Zheng, Wang Xianhui

    “…The quantum communication is a new-style communication scheme based on quantum mechanics. It arouses much interest recently. In this paper, a novel quantum…”
    Get full text
    Conference Proceeding
  14. 14

    Research in P2P-PKI trust model by Jiang Haowei, Tan Yubo

    “…Study of P2P instability, acts of random nodes and so on. P2P application process makes a large number of nodes in the phenomenon of cheating. Some security…”
    Get full text
    Conference Proceeding
  15. 15

    Analysis of the performance of reputation query in different frameworks by Hua Sun, Huiqun Yu, Nianhua Yang, Li Li

    “…Reputation of the entities is very important for other entities to evaluate the trustworthiness of them. This paper analyzes the efficiency of the query in…”
    Get full text
    Conference Proceeding
  16. 16

    Shape matching and object recognition using shape contexts by Salve, S G, Jondhale, K C

    “…This paper presents my work on computing shape models that are computationally fast and invariant basic transformations like translation, scaling and rotation…”
    Get full text
    Conference Proceeding
  17. 17

    Spectral measure of robustness for Internet topology by Jun Wu, Hong-zhong Deng, Yue-jin Tan

    “…The natural connectivity as a novel robustness measure of complex networks is proposed. The natural connectivity has a clear physical meaning and a simple…”
    Get full text
    Conference Proceeding
  18. 18

    Qos monitoring for web services by Time Series Forecasting by Zadeh, Mahmod Hosein, Seyyedi, M A

    “…In Service Oriented Architecture, Quality of Service (Qos) represents an important issue which is often considered when selecting and composing services. For…”
    Get full text
    Conference Proceeding
  19. 19

    Improved tree model for arabic speech recognition by Hammami, Nacereddine, Bedda, Mouldi

    “…This paper introduces a fast learning method for a graphical probabilistic model for discrete speech recognition based on spoken Arabic digit recognition by…”
    Get full text
    Conference Proceeding
  20. 20

    Edge based technique to estimate number of clusters in k-means color image segmentation by Patil, R V, Jondhale, K C

    “…K-Means algorithm is an unsupervised clustering algorithm that classifies the input data points into multiple classes based on their inherent distance from…”
    Get full text
    Conference Proceeding