Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711039
Koun-Tem Sun, Hsin-Te Chan, Kai-Min Chan
After analyzing previous researchers' researches, most of them focused on “how to improve teachers' evaluation capability on students' search capability.” In terms of the recording of search portfolio, none of them is complete. Taking the above understanding into consideration, this study combined web 2.0 concept and using the learning portfolio records of internet searching hoping to construct an on-line learning system that can “comprehensively record,” “completely share” and “actively present” the learning portfolio. Subjects of this research are fourth grade primary school students. It is proven by the experiment that no matter the teacher or the student, they all can record the complete search process and observe others' portfolio data in full. For teachers, they can explore students' search behavior in a more complete sense. For students, it is proven by experiment result analysis that observation-based learning is helpful for students search results.
{"title":"Research on the application of a Web2.0 concept-based internet search portfolio platform","authors":"Koun-Tem Sun, Hsin-Te Chan, Kai-Min Chan","doi":"10.1109/ICCIT.2010.5711039","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711039","url":null,"abstract":"After analyzing previous researchers' researches, most of them focused on “how to improve teachers' evaluation capability on students' search capability.” In terms of the recording of search portfolio, none of them is complete. Taking the above understanding into consideration, this study combined web 2.0 concept and using the learning portfolio records of internet searching hoping to construct an on-line learning system that can “comprehensively record,” “completely share” and “actively present” the learning portfolio. Subjects of this research are fourth grade primary school students. It is proven by the experiment that no matter the teacher or the student, they all can record the complete search process and observe others' portfolio data in full. For teachers, they can explore students' search behavior in a more complete sense. For students, it is proven by experiment result analysis that observation-based learning is helpful for students search results.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126803553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711070
Soonwook Hwang, Sehoon Lee, Sangdo Lee, Jincheol B. Kim, Vincent Breton, J. Salzemann, Hanh Thi Thanh Nguyen, Doman Kim
WISDOM is an international initiative to deploy large-scale in-silico docking on a public grid infrastructure in an attempt to find potential drugs against neglected or emerging diseases such as Malaria and Avian Flu. Within the framework of the WISDOM initiative, large-scale deployments of in silico docking have been done on production grid infrastructures, demonstrating the relevance of large scale grids for high throughput virtual screening from scientific and grid deployment perspective. However, from the usability point of view, there still seems to be a lot to be done in order to be able to get the grid-enabled large-scale virtual screening approach handier for non-experts of grid computing. To address this issue, we have developed an intuitive and easy-to-use grid-enabled virtual screening tool called Drugscreener-G (DSG), aiming to help scientists in drug discovery including biologists and biochemists to more easily carryout large-scale deployment of molecular docking on grids without having to know details of grid middleware services and tools. With the help of DSG, scientists can easily have access to the PDB database, download and view the 3D structure of target proteins of their interest, launch and manage millions of in-silico docking simulations on the Grid. To facilitate the analysis of docking results, visualization and molecular modeling tools such as Jmol and Chimera have been integrated into DSG as well. The DSG client tool is now being used and tested by biologists in Chonnam National University, one of long-time partners of the WISDOM collaboration. With the help of tools like DSG, their long-time dream of large-scale virtual screening on their own at any time with any help from grid experts is to be made realized in the near future.
{"title":"A grid-enabled problem solving environment for in-silico screening in drug discovery","authors":"Soonwook Hwang, Sehoon Lee, Sangdo Lee, Jincheol B. Kim, Vincent Breton, J. Salzemann, Hanh Thi Thanh Nguyen, Doman Kim","doi":"10.1109/ICCIT.2010.5711070","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711070","url":null,"abstract":"WISDOM is an international initiative to deploy large-scale in-silico docking on a public grid infrastructure in an attempt to find potential drugs against neglected or emerging diseases such as Malaria and Avian Flu. Within the framework of the WISDOM initiative, large-scale deployments of in silico docking have been done on production grid infrastructures, demonstrating the relevance of large scale grids for high throughput virtual screening from scientific and grid deployment perspective. However, from the usability point of view, there still seems to be a lot to be done in order to be able to get the grid-enabled large-scale virtual screening approach handier for non-experts of grid computing. To address this issue, we have developed an intuitive and easy-to-use grid-enabled virtual screening tool called Drugscreener-G (DSG), aiming to help scientists in drug discovery including biologists and biochemists to more easily carryout large-scale deployment of molecular docking on grids without having to know details of grid middleware services and tools. With the help of DSG, scientists can easily have access to the PDB database, download and view the 3D structure of target proteins of their interest, launch and manage millions of in-silico docking simulations on the Grid. To facilitate the analysis of docking results, visualization and molecular modeling tools such as Jmol and Chimera have been integrated into DSG as well. The DSG client tool is now being used and tested by biologists in Chonnam National University, one of long-time partners of the WISDOM collaboration. With the help of tools like DSG, their long-time dream of large-scale virtual screening on their own at any time with any help from grid experts is to be made realized in the near future.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121090534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711221
Shirly Lee, Hyotaek Lim, Hoon-Jae Lee
The emerging of ubiquitous technology has transformed mobile device such as PDA and smart phone from a device once considered as a luxury to a daily requirements device. This trend has lead the increasing of mobile data storage demand. In year 2008, Internet Advanced Technology Attachment (iATA) has been introduce by Yu-Shu They et al as one of the alternate solution to resolve the mobile devices' storage limitation issues. With iATA, mobile users are able to access their valuable data through the network anytime anywhere as is the storage device attached to them locally. However data safety is always a concern to the user in iATA environment as data transmission in iATA done via open TCP/IP network without adopting any security defense. The mobile user does not only wish to access their data ubiquity but they also can't let go the security of their data. In this paper, we focus on how to provide data authentication and confidentiality for iATA protocol. Taking consideration of the mobile devices' limited resources, we propose a lightweight secure data mechanism with the combination of nested hash function and NLM-128.In the propose mechanism we use nested hash function to provide data authentication, subsequently encrypt the message and the hash code with NLM-128 cipher to ensure the data confidentiality.
{"title":"Secure data mechanism for iATA Protocol","authors":"Shirly Lee, Hyotaek Lim, Hoon-Jae Lee","doi":"10.1109/ICCIT.2010.5711221","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711221","url":null,"abstract":"The emerging of ubiquitous technology has transformed mobile device such as PDA and smart phone from a device once considered as a luxury to a daily requirements device. This trend has lead the increasing of mobile data storage demand. In year 2008, Internet Advanced Technology Attachment (iATA) has been introduce by Yu-Shu They et al as one of the alternate solution to resolve the mobile devices' storage limitation issues. With iATA, mobile users are able to access their valuable data through the network anytime anywhere as is the storage device attached to them locally. However data safety is always a concern to the user in iATA environment as data transmission in iATA done via open TCP/IP network without adopting any security defense. The mobile user does not only wish to access their data ubiquity but they also can't let go the security of their data. In this paper, we focus on how to provide data authentication and confidentiality for iATA protocol. Taking consideration of the mobile devices' limited resources, we propose a lightweight secure data mechanism with the combination of nested hash function and NLM-128.In the propose mechanism we use nested hash function to provide data authentication, subsequently encrypt the message and the hash code with NLM-128 cipher to ensure the data confidentiality.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121202141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711072
C. Sinthanayothin, W. Bholsithi, N. Pichitchaiphan
Software plus Services might be the next step in the evolution of computing. Software plus Services is a concept that Software as a Service (SaaS) complements the traditional packaged software running on both client and server by services adding value. CephSmileV2 is dental application software for 2D cephalometric analysis, dental model analysis and focusing on orthodontics treatment planning and applied to simulate changes on the facial profile after receiving treatment. CephSmileV2 could be used to analyze craniofacial growth changes that lead to skeletal discrepancies and to study the cause of malocclusions. Since CephSmileV2 is intended to be sell as services or so called CephSmile plus Services, therefore, the implementation of the program to enable access to the web database is developed. There are two main steps for developing the CephSmile Plus Services. First step is the development of CephSmile V2 Program, which six main features have been developed as follows: Lateral Cephalometric Analysis, Superimposition, Orthodontic Treatment Simulation, PA Cephalometric Analysis, 3D Skull Simulation from 2D x-ray views and Dental Model Analysis. Second step is the implementation of CephSmile Plus Services, which divided in to two main steps: First step is the development of web database which is designed using PHP and MySQL. Second step is the further developing on the CephSmile V2 program to connect to the database via the network follow REST guideline using GET and POST methods. The result shows that CephSmileV2 can be used as a diagnostic tool for orthodontics treatment and simulation which requires username/password to login to database. The result also demonstrates the details of login user to use the CephSmile V2 program in term of amount of hours, amount of usages, functions that user has been accessing. Also the administrator is allowed to create the user account and setup the capabilities of user level in different packages: gold, silver, platinum and titanium packages. It is concluded that CephSmile plus Services can be provided to the orthodontist community as software plus services.
软件加服务可能是计算发展的下一步。软件加服务是一个概念,软件即服务(SaaS)通过服务增值来补充在客户端和服务器上运行的传统打包软件。cepphsmilev2是一款牙科应用软件,主要用于二维头颅测量分析、牙科模型分析和专注于正畸治疗计划,用于模拟接受治疗后面部轮廓的变化。cepphsmilev2可用于分析颅面生长变化导致的骨骼差异,并研究错咬合的原因。由于CephSmileV2打算作为服务或所谓的CephSmile plus services出售,因此,开发了允许访问web数据库的程序的实现。开发cepphsmile Plus服务有两个主要步骤。第一步是开发cepphsmile V2程序,该程序开发了六个主要功能:侧位头测量分析、叠加、正畸治疗模拟、PA头测量分析、2D x线视图三维颅骨模拟和牙齿模型分析。第二步是cepphsmile Plus Services的实现,主要分为两个步骤:第一步是web数据库的开发,使用PHP和MySQL进行设计。第二步是进一步开发cepphsmile V2程序,使用GET和POST方法通过遵循REST准则的网络连接到数据库。结果表明,CephSmileV2可以作为正畸治疗和模拟的诊断工具,需要用户名/密码登录数据库。结果还显示了登录用户使用CephSmile V2程序的时间、使用次数、访问过的功能等详细信息。此外,管理员还可以创建用户帐户,并在不同的包中设置用户级别的功能:金、银、白金和钛包。结论CephSmile plus Services可以作为软件+服务提供给正畸社区。
{"title":"Dental application: The steps toward the implementation of the CephSmile plus Services","authors":"C. Sinthanayothin, W. Bholsithi, N. Pichitchaiphan","doi":"10.1109/ICCIT.2010.5711072","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711072","url":null,"abstract":"Software plus Services might be the next step in the evolution of computing. Software plus Services is a concept that Software as a Service (SaaS) complements the traditional packaged software running on both client and server by services adding value. CephSmileV2 is dental application software for 2D cephalometric analysis, dental model analysis and focusing on orthodontics treatment planning and applied to simulate changes on the facial profile after receiving treatment. CephSmileV2 could be used to analyze craniofacial growth changes that lead to skeletal discrepancies and to study the cause of malocclusions. Since CephSmileV2 is intended to be sell as services or so called CephSmile plus Services, therefore, the implementation of the program to enable access to the web database is developed. There are two main steps for developing the CephSmile Plus Services. First step is the development of CephSmile V2 Program, which six main features have been developed as follows: Lateral Cephalometric Analysis, Superimposition, Orthodontic Treatment Simulation, PA Cephalometric Analysis, 3D Skull Simulation from 2D x-ray views and Dental Model Analysis. Second step is the implementation of CephSmile Plus Services, which divided in to two main steps: First step is the development of web database which is designed using PHP and MySQL. Second step is the further developing on the CephSmile V2 program to connect to the database via the network follow REST guideline using GET and POST methods. The result shows that CephSmileV2 can be used as a diagnostic tool for orthodontics treatment and simulation which requires username/password to login to database. The result also demonstrates the details of login user to use the CephSmile V2 program in term of amount of hours, amount of usages, functions that user has been accessing. Also the administrator is allowed to create the user account and setup the capabilities of user level in different packages: gold, silver, platinum and titanium packages. It is concluded that CephSmile plus Services can be provided to the orthodontist community as software plus services.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116648868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711216
Jian Wu, Jianming Hu, Jianbo Sun
Departure headway distribution is significant for intelligent traffic control and traffic simulations. Jilin, an ordinary large city, is selected in this paper to study the departure headway distributions. Experimental results show that the log-laplace distribution model fits headway data better for free flow traffic condition, while the log-logistic distribution model is more suitable on the peak hours. The existed studies of departure headway distributions in extremely large cities, e.g. Beijing are different from those obtained in this paper. The results are useful for traffic signal optimization, since signal timing algorithms should be modified for different city scales as well as different traffic conditions.
{"title":"Departure headway distribution modeling for ordinary large cities based on video information","authors":"Jian Wu, Jianming Hu, Jianbo Sun","doi":"10.1109/ICCIT.2010.5711216","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711216","url":null,"abstract":"Departure headway distribution is significant for intelligent traffic control and traffic simulations. Jilin, an ordinary large city, is selected in this paper to study the departure headway distributions. Experimental results show that the log-laplace distribution model fits headway data better for free flow traffic condition, while the log-logistic distribution model is more suitable on the peak hours. The existed studies of departure headway distributions in extremely large cities, e.g. Beijing are different from those obtained in this paper. The results are useful for traffic signal optimization, since signal timing algorithms should be modified for different city scales as well as different traffic conditions.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131415089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a security paradigm named self-existent mechanism of access control. The most distinct character is that it runs absolutely independent from program executing environment, even without cooperation of OS. That is to say, it has a unique structure to assure that computing is controlled under a secure mechanism that cannot be penetrated by software like virus, Trojan and other malicious programs. This paper explains its principle, and describes how to accomplish such control over general computers. Also, this paper gives advice to the design of microprocessor to make this control mechanism to work better.
{"title":"Access control through self-existent mechanism","authors":"Xiaoxia Zheng, Fangyong Hou, Hongjun He, Nong Xiao","doi":"10.1109/ICCIT.2010.5711212","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711212","url":null,"abstract":"This paper proposes a security paradigm named self-existent mechanism of access control. The most distinct character is that it runs absolutely independent from program executing environment, even without cooperation of OS. That is to say, it has a unique structure to assure that computing is controlled under a secure mechanism that cannot be penetrated by software like virus, Trojan and other malicious programs. This paper explains its principle, and describes how to accomplish such control over general computers. Also, this paper gives advice to the design of microprocessor to make this control mechanism to work better.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133501187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711158
L. Lihua, Su Yikun
To improve the efficiency of cost control in the high speed railway construction phase, we set up the model of earned value and install FBCWS index, through the contrast between FBCWS index and ACWP' index, we improve the efficiency of cost control in construction stage, so that we can do the better in the direction and control before costs incurred and make the construction cost control management more scientifically and effectively in the construction phase of high-speed rail project.
{"title":"The control model of engineering cost in construction phase of high-speed railway","authors":"L. Lihua, Su Yikun","doi":"10.1109/ICCIT.2010.5711158","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711158","url":null,"abstract":"To improve the efficiency of cost control in the high speed railway construction phase, we set up the model of earned value and install FBCWS index, through the contrast between FBCWS index and ACWP' index, we improve the efficiency of cost control in construction stage, so that we can do the better in the direction and control before costs incurred and make the construction cost control management more scientifically and effectively in the construction phase of high-speed rail project.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134530999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711176
Shih-Chun Chou, J. Stu, Yuting Lin
E-book reader, as an evolutionary artifact for digital reading, has caught attention all over the world. In this customer-centered era, understanding why users adopt and continue using e-book readers (e.g. eReaders and digital devices equipped with reader software) become essential design issues for related scholars and practitioners. However, critical design factors are still obscure due to the rapid pace of development and innovation in information technology. In this paper, we employ two methods including customer observation and individual depth interview to disclosure user behavioral intention toward the latest e-book readers. This research found that potential adopter intention to adopt is solely determined by normative pressures, whereas user intention is solely determined by attitude, which refers to the perception of content enrichment, reading servicisation, and device personalization. Grounded on our result and discoveries, not only researchers could have guidance in developing e-book theories in the future, but also service providers could have driving forces in advancing e-book readers.
{"title":"Determinants of e-book readers adoption and continuation: A comparison of pre-adoption and post-adoption beliefs","authors":"Shih-Chun Chou, J. Stu, Yuting Lin","doi":"10.1109/ICCIT.2010.5711176","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711176","url":null,"abstract":"E-book reader, as an evolutionary artifact for digital reading, has caught attention all over the world. In this customer-centered era, understanding why users adopt and continue using e-book readers (e.g. eReaders and digital devices equipped with reader software) become essential design issues for related scholars and practitioners. However, critical design factors are still obscure due to the rapid pace of development and innovation in information technology. In this paper, we employ two methods including customer observation and individual depth interview to disclosure user behavioral intention toward the latest e-book readers. This research found that potential adopter intention to adopt is solely determined by normative pressures, whereas user intention is solely determined by attitude, which refers to the perception of content enrichment, reading servicisation, and device personalization. Grounded on our result and discoveries, not only researchers could have guidance in developing e-book theories in the future, but also service providers could have driving forces in advancing e-book readers.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125174583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711113
Kullapat Theera-angkananon, P. Bhattarakosol
Internet is a global system of interconnected computer networks that helps users reach to all digital data, such as multimedia files. So, this leads to plagiarization, violation of copyrights and data over the Internet. Thus, the digital intellectual property becomes a big issue of the Internet sharing system. Various techniques have been proposed to protect these violations; unfortunately, they became the hackers' stimuli in breaking the protection mechanisms. Therefore, this paper proposes a protection mechanism, Byte Encoding Protection (BENPro), for preventing an audio file, such as mp3 format from copying and distributing by illegal distributors. The aim of this paper is that the protection mechanism cannot be recognized from hackers and users. The result of this experiment indicates that most users believe that the defects occur from the transfer mechanism rather than the protection mechanism. Thus, the protection of IP is maintained as expected.
{"title":"BENPro: A blinding protection method in digital right management","authors":"Kullapat Theera-angkananon, P. Bhattarakosol","doi":"10.1109/ICCIT.2010.5711113","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711113","url":null,"abstract":"Internet is a global system of interconnected computer networks that helps users reach to all digital data, such as multimedia files. So, this leads to plagiarization, violation of copyrights and data over the Internet. Thus, the digital intellectual property becomes a big issue of the Internet sharing system. Various techniques have been proposed to protect these violations; unfortunately, they became the hackers' stimuli in breaking the protection mechanisms. Therefore, this paper proposes a protection mechanism, Byte Encoding Protection (BENPro), for preventing an audio file, such as mp3 format from copying and distributing by illegal distributors. The aim of this paper is that the protection mechanism cannot be recognized from hackers and users. The result of this experiment indicates that most users believe that the defects occur from the transfer mechanism rather than the protection mechanism. Thus, the protection of IP is maintained as expected.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132364644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711071
W. Bholsithi, Natthawadee Phichitchaiphan, C. Sinthanayothin
Dental cast models along with dental identification data have been extensively applied in cephalometric analysis and dental identification. However, the lack of database to handle both dental cast models along with dental identification data has prevent the researchers and dentists from making an access into the dental information for further dental researches. The solution is to create the online dental model database to collect both 2D and 3D dental cast images with the search function from the information of both dentists who collect the dental model images and other dentists who are database users. Furthermore, the online dental database has facilities to record the dental identification data from individual teeth and the overall dental structure in details useful for dealing with the missing persons by matching the postmortem dental artifacts with the dental records from dental model and dental identification data.
{"title":"Online dental information database for dental identification system","authors":"W. Bholsithi, Natthawadee Phichitchaiphan, C. Sinthanayothin","doi":"10.1109/ICCIT.2010.5711071","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711071","url":null,"abstract":"Dental cast models along with dental identification data have been extensively applied in cephalometric analysis and dental identification. However, the lack of database to handle both dental cast models along with dental identification data has prevent the researchers and dentists from making an access into the dental information for further dental researches. The solution is to create the online dental model database to collect both 2D and 3D dental cast images with the search function from the information of both dentists who collect the dental model images and other dentists who are database users. Furthermore, the online dental database has facilities to record the dental identification data from individual teeth and the overall dental structure in details useful for dealing with the missing persons by matching the postmortem dental artifacts with the dental records from dental model and dental identification data.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132649435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}