Search Results - "2010 3rd International Conference on Computer Science and Information Technology"
-
1
An improved Sobel edge detection
Published in 2010 3rd International Conference on Computer Science and Information Technology (01-07-2010)“…This paper proposes a method which combines Sobel edge detection operator and soft-threshold wavelet de-noising to do edge detection on images which include…”
Get full text
Conference Proceeding -
2
Towards a Load Balancing in a three-level cloud computing network
Published in 2010 3rd International Conference on Computer Science and Information Technology (01-07-2010)“…Network bandwidth and hardware technology are developing rapidly, resulting in the vigorous development of the Internet. A new concept, cloud computing, uses…”
Get full text
Conference Proceeding -
3
Wireless electric board based on an ARM-based embedded system
Published in 2010 3rd International Conference on Computer Science and Information Technology (01-07-2010)“…Using chalk is not only laborious, but it also produces a lot of chalk dust, polluting the air and adversely affecting the health of the students and teachers…”
Get full text
Conference Proceeding -
4
The study and application of the IOT technology in agriculture
Published in 2010 3rd International Conference on Computer Science and Information Technology (01-07-2010)“…In recent years, greenhouse technology in agriculture is to automation, information technology direction with the IOT (internet of things) technology rapid…”
Get full text
Conference Proceeding -
5
Multi-threshold image segmentation based on two-dimensional Tsallis
Published in 2010 3rd International Conference on Computer Science and Information Technology (01-07-2010)“…Image multi-threshold segmentation method based on two-dimensional Tsallis entropy is proposed by utilizing Tsallis entropy. The improved particle swarm…”
Get full text
Conference Proceeding -
6
A novel potential field method for obstacle avoidance and path planning of mobile robot
Published in 2010 3rd International Conference on Computer Science and Information Technology (01-07-2010)“…This paper presents a novel artificial potential field method for obstacle avoidance and path planning of mobile robots. By analyzing the shortcoming of the…”
Get full text
Conference Proceeding -
7
Trust management in privacy - Preserving information system
Published in 2010 3rd International Conference on Computer Science and Information Technology (01-07-2010)“…In many information management applications, sensitive information must be stored as a record and be retrieved when necessary. When the record is stored in a…”
Get full text
Conference Proceeding -
8
Design and implementation of UPnP protocol-based integrated home media and power control system
Published in 2010 3rd International Conference on Computer Science and Information Technology (01-07-2010)“…This paper designs and implements an automatic network system utilizing UPnP, wireless network and power line carrier technology. We connect home media device…”
Get full text
Conference Proceeding -
9
A taxonomy of Botnet detection techniques
Published in 2010 3rd International Conference on Computer Science and Information Technology (01-07-2010)“…Among the diverse forms of malware, Botnet is the most widespread and serious threat which occurs commonly in today's cyber attacks. Botnets are collections of…”
Get full text
Conference Proceeding -
10
An implementation of on-line management of livelock type feature interaction in NGN
Published in 2010 3rd International Conference on Computer Science and Information Technology (01-07-2010)“…Under the competition pressure and driven by the technology development, the number of value-added services will increase very rapidly to improve the ARPU…”
Get full text
Conference Proceeding -
11
Hardware/software co-design to secure crypto-chip from side channel analysis at design time
Published in 2010 3rd International Conference on Computer Science and Information Technology (01-07-2010)“…Side channel analysis (SCA) is a powerful physical cryptanalysis. In common industrial practice, the SCA security evaluation is performed after the devices are…”
Get full text
Conference Proceeding -
12
Research on host-level security situational awareness
Published in 2010 3rd International Conference on Computer Science and Information Technology (01-07-2010)“…Situational assessment is significant for host-level security. Most existing approaches are generally limited to network security that is different from…”
Get full text
Conference Proceeding -
13
A quasi quantum secure direct communication protocol with authentication
Published in 2010 3rd International Conference on Computer Science and Information Technology (01-07-2010)“…The quantum communication is a new-style communication scheme based on quantum mechanics. It arouses much interest recently. In this paper, a novel quantum…”
Get full text
Conference Proceeding -
14
Research in P2P-PKI trust model
Published in 2010 3rd International Conference on Computer Science and Information Technology (01-07-2010)“…Study of P2P instability, acts of random nodes and so on. P2P application process makes a large number of nodes in the phenomenon of cheating. Some security…”
Get full text
Conference Proceeding -
15
Analysis of the performance of reputation query in different frameworks
Published in 2010 3rd International Conference on Computer Science and Information Technology (01-07-2010)“…Reputation of the entities is very important for other entities to evaluate the trustworthiness of them. This paper analyzes the efficiency of the query in…”
Get full text
Conference Proceeding -
16
Shape matching and object recognition using shape contexts
Published in 2010 3rd International Conference on Computer Science and Information Technology (01-07-2010)“…This paper presents my work on computing shape models that are computationally fast and invariant basic transformations like translation, scaling and rotation…”
Get full text
Conference Proceeding -
17
Spectral measure of robustness for Internet topology
Published in 2010 3rd International Conference on Computer Science and Information Technology (01-07-2010)“…The natural connectivity as a novel robustness measure of complex networks is proposed. The natural connectivity has a clear physical meaning and a simple…”
Get full text
Conference Proceeding -
18
Qos monitoring for web services by Time Series Forecasting
Published in 2010 3rd International Conference on Computer Science and Information Technology (01-07-2010)“…In Service Oriented Architecture, Quality of Service (Qos) represents an important issue which is often considered when selecting and composing services. For…”
Get full text
Conference Proceeding -
19
Improved tree model for arabic speech recognition
Published in 2010 3rd International Conference on Computer Science and Information Technology (01-07-2010)“…This paper introduces a fast learning method for a graphical probabilistic model for discrete speech recognition based on spoken Arabic digit recognition by…”
Get full text
Conference Proceeding -
20
Edge based technique to estimate number of clusters in k-means color image segmentation
Published in 2010 3rd International Conference on Computer Science and Information Technology (01-07-2010)“…K-Means algorithm is an unsupervised clustering algorithm that classifies the input data points into multiple classes based on their inherent distance from…”
Get full text
Conference Proceeding