首页 > 最新文献

International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II最新文献

英文 中文
A toolkit for automatically constructing outdoor radio maps 一个用于自动构建室外无线电地图的工具包
Kay Connelly, Yong Liu, Daniel Bulwinkle, Adam Miller, Ian Bobbitt
Outdoor location systems based on wireless access point (WAP) signal strength must either know the exact location of the WAPs in order to use a triangulation algorithm, or must construct a radio-map of the signal strengths. While the radio-map technique increases accuracy and can accommodate a wireless network that is not owned by any one entity, conventional methods for constructing a radio-map are labor-intensive and impractical in such environments. We introduce a toolkit for automatically constructing outdoor radio-maps. Our toolkit can easily be carried by delivery personnel and security guards during their normal work duties to obtain signal readings. The scattered data readings are then fed into an interpolation algorithm to construct a more complete grid that can be used as the radio-map.
基于无线接入点(WAP)信号强度的户外定位系统要么必须知道WAP的确切位置,以便使用三角测量算法,要么必须构建信号强度的无线电图。虽然无线电地图技术提高了准确性,并且可以适应不属于任何一个实体的无线网络,但在这种环境中,构建无线电地图的传统方法是劳动密集型的,而且不切实际。我们介绍了一个用于自动构建室外无线电地图的工具包。派送人员和保安员在正常工作时,可方便地携带我们的工具包,以获取信号读数。然后将分散的数据读数输入一个插值算法,以构建一个更完整的网格,该网格可以用作无线电地图。
{"title":"A toolkit for automatically constructing outdoor radio maps","authors":"Kay Connelly, Yong Liu, Daniel Bulwinkle, Adam Miller, Ian Bobbitt","doi":"10.1109/ITCC.2005.48","DOIUrl":"https://doi.org/10.1109/ITCC.2005.48","url":null,"abstract":"Outdoor location systems based on wireless access point (WAP) signal strength must either know the exact location of the WAPs in order to use a triangulation algorithm, or must construct a radio-map of the signal strengths. While the radio-map technique increases accuracy and can accommodate a wireless network that is not owned by any one entity, conventional methods for constructing a radio-map are labor-intensive and impractical in such environments. We introduce a toolkit for automatically constructing outdoor radio-maps. Our toolkit can easily be carried by delivery personnel and security guards during their normal work duties to obtain signal readings. The scattered data readings are then fed into an interpolation algorithm to construct a more complete grid that can be used as the radio-map.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116893950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Virtual classroom for interactive synchronous education 面向互动同步教育的虚拟课堂
S. Çakir, H. H. Basak
The World Wide Web provides new opportunities for distance education over the Internet. The Web, when combined with other network tools can be used to create a virtual classroom to bring together a community of learners for interactive education. In the paper we purpose the moving some of educational instructions of the Institute of Science Dokuz Eylul University at the WWW. This objective is achieved by investigating the use of emerging network technologies for training full time students and part time students. This research uses the electronic educational materials already available on the Web; and it evaluates the effectiveness of various collaborative tools.
万维网为因特网上的远程教育提供了新的机会。当网络与其他网络工具相结合时,可以用来创建一个虚拟教室,将学习者社区聚集在一起进行互动教育。本文的目的是将多库兹埃鲁尔大学科学研究所的一些教育说明搬到万维网上。这一目标是通过调查使用新兴的网络技术来培训全日制和非全日制学生来实现的。本研究使用网络上已有的电子教育材料;并评估了各种协作工具的有效性。
{"title":"Virtual classroom for interactive synchronous education","authors":"S. Çakir, H. H. Basak","doi":"10.1109/ITCC.2005.292","DOIUrl":"https://doi.org/10.1109/ITCC.2005.292","url":null,"abstract":"The World Wide Web provides new opportunities for distance education over the Internet. The Web, when combined with other network tools can be used to create a virtual classroom to bring together a community of learners for interactive education. In the paper we purpose the moving some of educational instructions of the Institute of Science Dokuz Eylul University at the WWW. This objective is achieved by investigating the use of emerging network technologies for training full time students and part time students. This research uses the electronic educational materials already available on the Web; and it evaluates the effectiveness of various collaborative tools.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116952787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Load-balancing strategy of multi-gateway for ad hoc Internet connectivity 自组网Internet连接的多网关负载均衡策略
Jin H. Zhao, Xiao Yang, Hong W. Liu
Mobile ad hoc networks (MANET) are autonomous, infrastructureless networks that support multi-hop communication through IP routing. MANET and Internet have many differences. These differences are not only the structure and topology of the networks, but also communication patterns of nodes in both networks. Therefore, it is a challenging problem for MANET to access to the Internet due to these differences. There are many kinds of accessing mode such as single fix gateway or multi-gateway, where load-balancing is the most important problem. In this paper, we propose the dynamic gateway concept that acts as an interface between MANET and the Internet. These dynamic gateways can use mobile IP and DSDV protocol when they communicate with the Internet and interact with MANET, respectively. The dynamic gateway is used to solve the load-balancing problem. Several simulation experimental results in the dynamic gateway environment show that the performance of network has been improved.
移动自组织网络(MANET)是自主的、无基础设施的网络,支持通过IP路由进行多跳通信。MANET和Internet有许多不同之处。这些差异不仅在于网络的结构和拓扑结构,还在于两个网络中节点的通信模式。因此,由于这些差异,MANET接入互联网是一个具有挑战性的问题。单网关和多网关的访问模式有很多种,其中负载均衡是最重要的问题。在本文中,我们提出了动态网关的概念,作为MANET和Internet之间的接口。这些动态网关分别在与Internet通信和与MANET交互时使用移动IP和DSDV协议。动态网关用于解决负载均衡问题。在动态网关环境下的多个仿真实验结果表明,该方法提高了网络的性能。
{"title":"Load-balancing strategy of multi-gateway for ad hoc Internet connectivity","authors":"Jin H. Zhao, Xiao Yang, Hong W. Liu","doi":"10.1109/ITCC.2005.184","DOIUrl":"https://doi.org/10.1109/ITCC.2005.184","url":null,"abstract":"Mobile ad hoc networks (MANET) are autonomous, infrastructureless networks that support multi-hop communication through IP routing. MANET and Internet have many differences. These differences are not only the structure and topology of the networks, but also communication patterns of nodes in both networks. Therefore, it is a challenging problem for MANET to access to the Internet due to these differences. There are many kinds of accessing mode such as single fix gateway or multi-gateway, where load-balancing is the most important problem. In this paper, we propose the dynamic gateway concept that acts as an interface between MANET and the Internet. These dynamic gateways can use mobile IP and DSDV protocol when they communicate with the Internet and interact with MANET, respectively. The dynamic gateway is used to solve the load-balancing problem. Several simulation experimental results in the dynamic gateway environment show that the performance of network has been improved.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117211137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Dihedral angle based dimensionality reduction for protein structural comparison 基于二面角的蛋白质结构降维比较
N. Kandiraju, S. Dua, S. Conrad
Structural comparison of proteins is considered as one of the highly focused research areas in the field of bioinformatics. Structural similarity estimation techniques using singular geometric parameters derived from spatial coordinates of protein structural atoms have been reported previously, but it is also ascertained that a single geometric parameter based structural estimation can result in misconstrued classification and functional interpretation. In this paper we propose a novel geometric parameters based comparison protocol that uses previously unexplored pair of dihedral angles NC/sub a/NC/sub a/ and NCNC for similarity search. An orthonormal transformation is employed on the two-dimensional distribution for feature extraction and selective feature-space is represented in an indexing schema later used for similarity calibration. The results demonstrate the success of this dimensionality reduction based similarity measure in performing a rapid and length-independent similarity analysis of the protein structures.
蛋白质结构比较一直是生物信息学研究的热点之一。先前已经报道了使用基于蛋白质结构原子空间坐标的单一几何参数的结构相似性估计技术,但也确定了基于单一几何参数的结构估计可能导致错误的分类和功能解释。在本文中,我们提出了一种新的基于几何参数的比较协议,该协议使用以前未开发的二面角对NC/sub a/NC/sub a/和NCNC进行相似性搜索。在二维分布上采用标准正交变换进行特征提取,选择特征空间用索引模式表示,用于相似性校准。结果表明,这种基于降维的相似性度量在执行蛋白质结构的快速和长度无关的相似性分析方面取得了成功。
{"title":"Dihedral angle based dimensionality reduction for protein structural comparison","authors":"N. Kandiraju, S. Dua, S. Conrad","doi":"10.1109/ITCC.2005.131","DOIUrl":"https://doi.org/10.1109/ITCC.2005.131","url":null,"abstract":"Structural comparison of proteins is considered as one of the highly focused research areas in the field of bioinformatics. Structural similarity estimation techniques using singular geometric parameters derived from spatial coordinates of protein structural atoms have been reported previously, but it is also ascertained that a single geometric parameter based structural estimation can result in misconstrued classification and functional interpretation. In this paper we propose a novel geometric parameters based comparison protocol that uses previously unexplored pair of dihedral angles NC/sub a/NC/sub a/ and NCNC for similarity search. An orthonormal transformation is employed on the two-dimensional distribution for feature extraction and selective feature-space is represented in an indexing schema later used for similarity calibration. The results demonstrate the success of this dimensionality reduction based similarity measure in performing a rapid and length-independent similarity analysis of the protein structures.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127510263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Design and implementation of a unique blood-vessel detection algorithm towards early diagnosis of diabetic retinopathy 针对糖尿病视网膜病变早期诊断的独特血管检测算法的设计与实现
S. Dua, N. Kandiraju, H. Thompson
Diabetic retinopathy (DR), a major complication of diabetes and the leading cause of new cases of blindness among adults, can be cured by the early and precise detection of the disease. An important aspect of DR is the micro-vascular changes that cause detectable changes in the appearance of retinal blood vessels. In this paper, we propose a new blood-vessel detection technique in retinal images, based on the regional recursive hierarchical decomposition using quadtrees and post-filtration of edges. We exploit the fact that in retinal images, the blood vessels appear as focal and/or penumbral blurred edges, which can be characterized by an estimable intensity gradient, which also serves in dismissing false alarms to a large extent. Our technique provides information on retinal blood vessel morphology that can be calibrated to normal expected blood vessel diameters and which can detect fine blood vessel anomalies that characterize the blood vessel pathology and hence aid early detection of diabetic retinopathy.
糖尿病视网膜病变(DR)是糖尿病的一个主要并发症,也是成年人失明新病例的主要原因,通过早期和精确发现这种疾病可以治愈。DR的一个重要方面是引起视网膜血管外观可检测变化的微血管变化。本文提出了一种基于四叉树区域递归分层分解和边缘后处理的视网膜图像血管检测新方法。我们利用这样一个事实,即在视网膜图像中,血管出现为焦点和/或半影模糊的边缘,这可以通过一个可估计的强度梯度来表征,这也有助于在很大程度上消除假警报。我们的技术提供了视网膜血管形态的信息,可以校准到正常的预期血管直径,并且可以检测血管病理特征的精细血管异常,从而帮助早期发现糖尿病视网膜病变。
{"title":"Design and implementation of a unique blood-vessel detection algorithm towards early diagnosis of diabetic retinopathy","authors":"S. Dua, N. Kandiraju, H. Thompson","doi":"10.1109/ITCC.2005.120","DOIUrl":"https://doi.org/10.1109/ITCC.2005.120","url":null,"abstract":"Diabetic retinopathy (DR), a major complication of diabetes and the leading cause of new cases of blindness among adults, can be cured by the early and precise detection of the disease. An important aspect of DR is the micro-vascular changes that cause detectable changes in the appearance of retinal blood vessels. In this paper, we propose a new blood-vessel detection technique in retinal images, based on the regional recursive hierarchical decomposition using quadtrees and post-filtration of edges. We exploit the fact that in retinal images, the blood vessels appear as focal and/or penumbral blurred edges, which can be characterized by an estimable intensity gradient, which also serves in dismissing false alarms to a large extent. Our technique provides information on retinal blood vessel morphology that can be calibrated to normal expected blood vessel diameters and which can detect fine blood vessel anomalies that characterize the blood vessel pathology and hence aid early detection of diabetic retinopathy.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126036739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Recognition and extraction high precision digital road map 高精度数字地图的识别与提取
Mang Chen, Yuncai Liu
This paper presents a system of high precision road navigation map generation from CAD geographical map. First, get road curb line; then, pairing two road curb line built road, and computing road central line built road navigation vector; last, detecting intersection create intersection vector. By extensive experiments, the system has shown good efficiency and robustness.
介绍了一种基于CAD地形图的高精度道路导航地图生成系统。首先,弄清楚道路路缘线;然后,配对两条道路的路边线所建道路,并计算道路中心线所建道路的导航向量;最后,检测交点,生成交点向量。经过大量的实验,该系统具有良好的效率和鲁棒性。
{"title":"Recognition and extraction high precision digital road map","authors":"Mang Chen, Yuncai Liu","doi":"10.1109/ITCC.2005.239","DOIUrl":"https://doi.org/10.1109/ITCC.2005.239","url":null,"abstract":"This paper presents a system of high precision road navigation map generation from CAD geographical map. First, get road curb line; then, pairing two road curb line built road, and computing road central line built road navigation vector; last, detecting intersection create intersection vector. By extensive experiments, the system has shown good efficiency and robustness.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123282209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Analyzing relations among software patterns based on document similarity 基于文档相似度的软件模式关系分析
A. Kubo, H. Washizaki, A. Takasu, Y. Fukazawa
In software development, many kinds of knowledge are shared and reused as software patterns. However, the relation analysis among software patterns by hand is difficult on the large scale. In this paper, we propose a technique for the automatic relation analysis among the patterns. Our technique is based on a new pattern model to treat various patterns, and utilizes exiting text processing techniques to extract patterns from documents and to calculate the strength of pattern relations. As a result of experiments, the system that implements our technique has extracted appropriate relations among patterns without information on relations described in original pattern documents. Moreover, our system has the ability to suggest relations among patterns that the author has not noticed.
在软件开发中,许多类型的知识作为软件模式被共享和重用。然而,大规模地手工分析软件模式之间的关系是困难的。本文提出了一种模式间自动关联分析技术。我们的技术基于一种新的模式模型来处理各种模式,并利用现有的文本处理技术从文档中提取模式并计算模式关系的强度。实验结果表明,实现该技术的系统在没有原始模式文档中描述的关系信息的情况下,提取了模式之间的适当关系。此外,我们的系统具有提示作者未注意到的模式之间的关系的能力。
{"title":"Analyzing relations among software patterns based on document similarity","authors":"A. Kubo, H. Washizaki, A. Takasu, Y. Fukazawa","doi":"10.1109/ITCC.2005.87","DOIUrl":"https://doi.org/10.1109/ITCC.2005.87","url":null,"abstract":"In software development, many kinds of knowledge are shared and reused as software patterns. However, the relation analysis among software patterns by hand is difficult on the large scale. In this paper, we propose a technique for the automatic relation analysis among the patterns. Our technique is based on a new pattern model to treat various patterns, and utilizes exiting text processing techniques to extract patterns from documents and to calculate the strength of pattern relations. As a result of experiments, the system that implements our technique has extracted appropriate relations among patterns without information on relations described in original pattern documents. Moreover, our system has the ability to suggest relations among patterns that the author has not noticed.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123694239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Towards an intrusion detection system for pervasive computing environments 面向普适计算环境的入侵检测系统
Pradeep Kannadiga, Mohammad Zulkernine, Sheikh Iqbal Ahamed
A pervasive computing environment consists of numerous casually accessible, frequently mobile, embedded, handheld devices capable of sensing the environment around it and reacting intelligently to simplify user activities. These devices are distributed everywhere at office, homes, stores, classroom, and are often connected to ad-hoc network and the Internet providing access from anywhere and anytime. Access control mechanisms can sometimes fail to provide complete security to these pervasive computing devices as witnessed in infrastructure based networks. The addition of pervasive computing devices to infrastructure based networks makes the problem of intrusion detection even harder. In this paper, the challenges and characteristics of intrusion detection in pervasive computing devices are discussed along with a mobile agents-based solution for both for a network environment made up of infrastructure based network and pervasive computing devices.
普适计算环境由许多可随意访问的、经常移动的嵌入式手持设备组成,这些设备能够感知周围的环境并做出智能反应,以简化用户活动。这些设备分布在办公室、家庭、商店、教室的任何地方,并且经常连接到自组织网络和Internet,提供随时随地的访问。访问控制机制有时无法为这些普适计算设备提供完全的安全性,这在基于基础设施的网络中是显而易见的。向基于基础设施的网络添加普及计算设备使得入侵检测问题更加困难。本文讨论了普适计算设备中入侵检测面临的挑战和特点,并针对由基础设施网络和普适计算设备组成的网络环境提出了一种基于移动代理的入侵检测解决方案。
{"title":"Towards an intrusion detection system for pervasive computing environments","authors":"Pradeep Kannadiga, Mohammad Zulkernine, Sheikh Iqbal Ahamed","doi":"10.1109/ITCC.2005.279","DOIUrl":"https://doi.org/10.1109/ITCC.2005.279","url":null,"abstract":"A pervasive computing environment consists of numerous casually accessible, frequently mobile, embedded, handheld devices capable of sensing the environment around it and reacting intelligently to simplify user activities. These devices are distributed everywhere at office, homes, stores, classroom, and are often connected to ad-hoc network and the Internet providing access from anywhere and anytime. Access control mechanisms can sometimes fail to provide complete security to these pervasive computing devices as witnessed in infrastructure based networks. The addition of pervasive computing devices to infrastructure based networks makes the problem of intrusion detection even harder. In this paper, the challenges and characteristics of intrusion detection in pervasive computing devices are discussed along with a mobile agents-based solution for both for a network environment made up of infrastructure based network and pervasive computing devices.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125521318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Measuring software processes performance based on the fuzzy multi agent measurements 基于模糊多智能体度量的软件过程性能度量
M. Seyyedi, M. Teshnehlab, F. S. Aliee
The present article discusses and presents a new comprehensive approach aimed at measuring the maturity and quality of software processes. This method has been designed on the basis of software Capability Maturity Model (SW-CMM) and the multi-level fuzzy inference model and is used as a measurement and analysis tool. Among the most important characteristics of this method one can mention simple usage, accuracy, quantitative measures and comparability. Fuzzy logic-based tools are designed to provide such functions.
本文讨论并提出了一种新的综合方法,旨在度量软件过程的成熟度和质量。该方法是在软件能力成熟度模型(SW-CMM)和多层次模糊推理模型的基础上设计的,并作为一种度量和分析工具。这种方法最重要的特点是使用简单、准确、定量测量和可比性。基于模糊逻辑的工具就是为了提供这些功能而设计的。
{"title":"Measuring software processes performance based on the fuzzy multi agent measurements","authors":"M. Seyyedi, M. Teshnehlab, F. S. Aliee","doi":"10.1109/ITCC.2005.190","DOIUrl":"https://doi.org/10.1109/ITCC.2005.190","url":null,"abstract":"The present article discusses and presents a new comprehensive approach aimed at measuring the maturity and quality of software processes. This method has been designed on the basis of software Capability Maturity Model (SW-CMM) and the multi-level fuzzy inference model and is used as a measurement and analysis tool. Among the most important characteristics of this method one can mention simple usage, accuracy, quantitative measures and comparability. Fuzzy logic-based tools are designed to provide such functions.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126767773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Finding colluders in card games 在纸牌游戏中发现共谋者
C. Vallve-Guionnet
In card games, two or more players can act as colluders: they exchange information in order to collectively win the game. Electronic games (e-gaming) are supposed to be played under secure e-gaming protocols. Hence some tricks cannot be performed: card exchange, knowledge of opponent cards without their consent, shuffling and dealing the deck for one's own benefit, etc. Therefore, if two or more players collude, all they can do is exchange information. In the real world, other players can usually discover such colluders but, in a virtual world, colluders can use several ways to collude: cellular phones, instant messaging software,... they could even be seating next to each other while playing. In this paper, several methods to detect collusion in virtual card games are described.
在纸牌游戏中,两个或两个以上的玩家可以扮演共谋者的角色:他们交换信息以共同赢得游戏。电子游戏应该在安全的电子游戏协议下进行。因此有些技巧是不能使用的:换牌、未经对方同意就知道对方的牌、为了自己的利益而洗牌和发牌等等。因此,如果两个或更多玩家串通,他们所能做的就是交换信息。在现实世界中,其他玩家通常可以发现这样的串通者,但在虚拟世界中,串通者可以通过多种方式串通:手机、即时通讯软件……他们甚至可以在玩的时候坐在一起。本文介绍了几种检测虚拟纸牌游戏串通的方法。
{"title":"Finding colluders in card games","authors":"C. Vallve-Guionnet","doi":"10.1109/ITCC.2005.153","DOIUrl":"https://doi.org/10.1109/ITCC.2005.153","url":null,"abstract":"In card games, two or more players can act as colluders: they exchange information in order to collectively win the game. Electronic games (e-gaming) are supposed to be played under secure e-gaming protocols. Hence some tricks cannot be performed: card exchange, knowledge of opponent cards without their consent, shuffling and dealing the deck for one's own benefit, etc. Therefore, if two or more players collude, all they can do is exchange information. In the real world, other players can usually discover such colluders but, in a virtual world, colluders can use several ways to collude: cellular phones, instant messaging software,... they could even be seating next to each other while playing. In this paper, several methods to detect collusion in virtual card games are described.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116111405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1