首页 > 最新文献

2009 Second International Conference on Computer and Electrical Engineering最新文献

英文 中文
On-line Colour Image Compression Based on Pipelined Architecture 基于流水线结构的在线彩色图像压缩
Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.206
A. Halder, D. Kole, S. Bhattacharjee
This paper reports a pipelined architecture that can support on-line compression/decompression of image data. Spatial and spectral redundancy of an image data file is detected and removed with a simple and elegant scheme that can be easily implemented on a pipelined hardware. The scheme provides the user with the ability of trading off the image quality with the compression ratio. The basic theory of byte error correcting code (ECC) is employed in this work to compress a pixel row with reference to its adjacent row. A simple scheme is developed to encode pixel rows of a color image.
本文报道了一种支持图像数据在线压缩/解压缩的流水线架构。用一种简单优雅的方案检测和去除图像数据文件的空间和光谱冗余,该方案可以很容易地在流水线硬件上实现。该方案为用户提供了在图像质量和压缩比之间进行权衡的能力。本文利用字节纠错码(ECC)的基本理论,根据相邻行压缩像素行。提出了一种简单的彩色图像像素行编码方案。
{"title":"On-line Colour Image Compression Based on Pipelined Architecture","authors":"A. Halder, D. Kole, S. Bhattacharjee","doi":"10.1109/ICCEE.2009.206","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.206","url":null,"abstract":"This paper reports a pipelined architecture that can support on-line compression/decompression of image data. Spatial and spectral redundancy of an image data file is detected and removed with a simple and elegant scheme that can be easily implemented on a pipelined hardware. The scheme provides the user with the ability of trading off the image quality with the compression ratio. The basic theory of byte error correcting code (ECC) is employed in this work to compress a pixel row with reference to its adjacent row. A simple scheme is developed to encode pixel rows of a color image.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"1 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114018373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Solving Cryptarithmetic Problems Using Parallel Genetic Algorithm 用并行遗传算法求解密码问题
Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.25
Reza Abbasian, M. Mazloom
Cryptarithmetic is a class of constraint satisfaction problems which includes making mathematical relations between meaningful words using simple arithmetic operators like ‘plus’ in a way that the result is conceptually true, and assigning digits to the letters of these words and generating numbers in order to make correct arithmetic operations as well. A simple way to solve such problems is by depth first search (DFS) algorithm which has a big search space even for quite small problems. In this paper we proposed a solution to this problem with genetic algorithm and then optimized it by using parallelism. We also showed that the algorithm reaches a solution faster and in a smaller number of iterations than similar algorithms.
密码学是一类约束满足问题,它包括使用简单的算术运算符,如“加号”,在有意义的单词之间建立数学关系,使结果在概念上是正确的,并为这些单词的字母分配数字,并生成数字,以便进行正确的算术运算。解决这类问题的一种简单方法是采用深度优先搜索(deep first search, DFS)算法,该算法即使对于相当小的问题也有很大的搜索空间。本文提出了用遗传算法解决该问题的方法,并利用并行性对其进行了优化。我们还表明,该算法比类似的算法更快,迭代次数更少。
{"title":"Solving Cryptarithmetic Problems Using Parallel Genetic Algorithm","authors":"Reza Abbasian, M. Mazloom","doi":"10.1109/ICCEE.2009.25","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.25","url":null,"abstract":"Cryptarithmetic is a class of constraint satisfaction problems which includes making mathematical relations between meaningful words using simple arithmetic operators like ‘plus’ in a way that the result is conceptually true, and assigning digits to the letters of these words and generating numbers in order to make correct arithmetic operations as well. A simple way to solve such problems is by depth first search (DFS) algorithm which has a big search space even for quite small problems. In this paper we proposed a solution to this problem with genetic algorithm and then optimized it by using parallelism. We also showed that the algorithm reaches a solution faster and in a smaller number of iterations than similar algorithms.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125595742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A New Mathematical Approach for Synthesis of State Based Models from Scenario Based Models 基于状态的模型与基于场景的模型综合的一种新的数学方法
Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.64
Y. G. Bonab, A. Isazadeh
Model Driven Development and Use Case Driven Development methodologies have inspired the proposal of a variety of software engineering approaches that synthesize state based models from scenario-based models. Solving the problem of synthesis for open reactive systems is an inherently difficult problem. In various settings the problem is undecidable, and even in more restricted settings when it becomes decidable, the time and space requirements of the synthesis algorithm may be too large to be practical for large systems. This research presents a new approach to define algorithms of synthesis technique. This approach is based on an ordered sequence of stage for executing the scenarios. It is important to consider the executing stages of a scenario as a sequence. This gives a lot of information about execution of a scenario. Many synthesis approaches address the running stages of a scenario as a single stage. The mathematical foundation presented for this ordered sequence is based on RUN in Live Sequence Chart method presented by Harel. We believe that our mathematical foundation would significantly reduce the complexity of synthesis technique. We show that our approach have some advantages over those of others’; in particular, our mathematical basis to define algorithms for constructing synthesis technique is very efficient.
模型驱动开发和用例驱动开发方法激发了各种软件工程方法的建议,这些方法从基于场景的模型中综合了基于状态的模型。解决开放反应体系的合成问题本身就是一个难题。在各种情况下,问题是不可确定的,甚至在更有限的情况下,当它变得可确定时,综合算法的时间和空间要求可能太大,无法适用于大型系统。本研究提出了一种定义合成技术算法的新方法。此方法基于执行场景的有序阶段序列。将场景的执行阶段视为一个序列是很重要的。这提供了关于场景执行的大量信息。许多综合方法将场景的运行阶段作为单个阶段来处理。该有序序列的数学基础是基于Harel提出的Live sequence Chart方法中的RUN。我们相信,我们的数学基础将大大降低合成技术的复杂性。我们表明,我们的方法比其他方法有一些优势;特别是,我们的数学基础,以定义算法构造综合技术是非常有效的。
{"title":"A New Mathematical Approach for Synthesis of State Based Models from Scenario Based Models","authors":"Y. G. Bonab, A. Isazadeh","doi":"10.1109/ICCEE.2009.64","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.64","url":null,"abstract":"Model Driven Development and Use Case Driven Development methodologies have inspired the proposal of a variety of software engineering approaches that synthesize state based models from scenario-based models. Solving the problem of synthesis for open reactive systems is an inherently difficult problem. In various settings the problem is undecidable, and even in more restricted settings when it becomes decidable, the time and space requirements of the synthesis algorithm may be too large to be practical for large systems. This research presents a new approach to define algorithms of synthesis technique. This approach is based on an ordered sequence of stage for executing the scenarios. It is important to consider the executing stages of a scenario as a sequence. This gives a lot of information about execution of a scenario. Many synthesis approaches address the running stages of a scenario as a single stage. The mathematical foundation presented for this ordered sequence is based on RUN in Live Sequence Chart method presented by Harel. We believe that our mathematical foundation would significantly reduce the complexity of synthesis technique. We show that our approach have some advantages over those of others’; in particular, our mathematical basis to define algorithms for constructing synthesis technique is very efficient.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126597792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Application of Virtual Reality Technology in Teaching and Training 虚拟现实技术在教学与培训中的应用研究
Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.22
Shuang Li
With the development of educational technology, more and more modern science and technology begins to be applied in teaching and training. Based on introduction of the definition and characters of virtual reality (VR) technology, the VR technology was introduced into the field of teaching and training. The application circumstance of VR in teaching and training was also discussed. Using VR technology, some kind of communication vehicle operation training system was designed. The key problems for operation environment construction, modeling and system running of the teaching and training system were also provided. The research not only offer novel idea for the construction of communication equipment operation training system, but also provide reference for the application of VR technology in others fields.
随着教育技术的发展,越来越多的现代科学技术开始应用于教学和培训。在介绍虚拟现实技术的定义和特点的基础上,将虚拟现实技术引入教学培训领域。讨论了虚拟现实技术在教学和培训中的应用情况。利用虚拟现实技术,设计了一种通信车辆操作训练系统。提出了教学实训系统运行环境建设、建模和系统运行的关键问题。该研究不仅为通信设备操作培训体系的构建提供了新的思路,也为VR技术在其他领域的应用提供了参考。
{"title":"Research on Application of Virtual Reality Technology in Teaching and Training","authors":"Shuang Li","doi":"10.1109/ICCEE.2009.22","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.22","url":null,"abstract":"With the development of educational technology, more and more modern science and technology begins to be applied in teaching and training. Based on introduction of the definition and characters of virtual reality (VR) technology, the VR technology was introduced into the field of teaching and training. The application circumstance of VR in teaching and training was also discussed. Using VR technology, some kind of communication vehicle operation training system was designed. The key problems for operation environment construction, modeling and system running of the teaching and training system were also provided. The research not only offer novel idea for the construction of communication equipment operation training system, but also provide reference for the application of VR technology in others fields.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131052630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Research of Face Recognition Based on Locally Linear Embedding 基于局部线性嵌入的人脸识别研究
Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.130
Cuihong Zhou, Gelan Yang
Image data taken with various capturing devices are usually multidimensional and therefore they are not very suitable for accurate classification normally expecting to operate only on a small set of relevant features. Locally Linear Embedding is an effective nonlinear dimensionality reduction method for exploring the intrinsic characteristics of high dimensional data. In this paper, novel Local linear embedding for face classification is proposed. We modify the LLE algorithm by preserving more geometrical knowledge of the high-dimensional data, then combining with simple classifiers such as the nearest mean classifier. Experimental simulations are shown to yield remarkably good classification results in high dimension face image sequence.
使用各种捕获设备拍摄的图像数据通常是多维的,因此它们不太适合用于准确分类,通常期望仅对一小部分相关特征进行操作。局部线性嵌入是探索高维数据内在特征的一种有效的非线性降维方法。本文提出了一种新的局部线性嵌入人脸分类方法。我们通过保留更多高维数据的几何知识来改进LLE算法,然后结合最接近均值分类器等简单分类器。实验仿真结果表明,该方法对高维人脸图像序列具有很好的分类效果。
{"title":"Research of Face Recognition Based on Locally Linear Embedding","authors":"Cuihong Zhou, Gelan Yang","doi":"10.1109/ICCEE.2009.130","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.130","url":null,"abstract":"Image data taken with various capturing devices are usually multidimensional and therefore they are not very suitable for accurate classification normally expecting to operate only on a small set of relevant features. Locally Linear Embedding is an effective nonlinear dimensionality reduction method for exploring the intrinsic characteristics of high dimensional data. In this paper, novel Local linear embedding for face classification is proposed. We modify the LLE algorithm by preserving more geometrical knowledge of the high-dimensional data, then combining with simple classifiers such as the nearest mean classifier. Experimental simulations are shown to yield remarkably good classification results in high dimension face image sequence.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130721097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A 0.6v Ultra-High-Gain Ultra-Low-Power CMOS LNA at 1.5GHz in 0.18µm Technology 一种0.18µm工艺下1.5GHz的0.6v超高增益超低功耗CMOS LNA
Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.190
E. Kargaran, H. Kargaran, H. Nabovati
This paper describes a CMOS LNA utilizing a folded cascade architecture for GPS front-end receiver in a TSMC 0.18-µm process. The Major Problem in the LNAs with folded cascade architecture is low reversing isolation. In this paper this parameter is improved by adding a transistor. The power gain and the minimal Noise Figure (NF) are two important factors for the circuits. Besides those factors, good linearity, input impedance matching, low supply voltage and the lower power consumption are also desired. The proposed LNA achieves a small signal gain of 23.1 dB. The LNA acquires an NF of 2.1 dB with an input return loss of -14dB and an output return loss of -14 dB. Total Power consumption is only 2.6mW from a 0.6v supply voltage.
本文介绍了一种采用折叠级联结构的CMOS LNA,用于TSMC 0.18µm工艺的GPS前端接收器。折叠级联结构的rna存在的主要问题是反向隔离度低。本文通过增加一个晶体管来改善这个参数。功率增益和最小噪声系数是影响电路性能的两个重要因素。除了这些因素外,还需要良好的线性度,输入阻抗匹配,低电源电压和低功耗。该LNA可实现23.1 dB的小信号增益。LNA的NF值为2.1 dB,输入回波损耗为-14dB,输出回波损耗为-14dB。总功耗仅为2.6mW从0.6v供电电压。
{"title":"A 0.6v Ultra-High-Gain Ultra-Low-Power CMOS LNA at 1.5GHz in 0.18µm Technology","authors":"E. Kargaran, H. Kargaran, H. Nabovati","doi":"10.1109/ICCEE.2009.190","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.190","url":null,"abstract":"This paper describes a CMOS LNA utilizing a folded cascade architecture for GPS front-end receiver in a TSMC 0.18-µm process. The Major Problem in the LNAs with folded cascade architecture is low reversing isolation. In this paper this parameter is improved by adding a transistor. The power gain and the minimal Noise Figure (NF) are two important factors for the circuits. Besides those factors, good linearity, input impedance matching, low supply voltage and the lower power consumption are also desired. The proposed LNA achieves a small signal gain of 23.1 dB. The LNA acquires an NF of 2.1 dB with an input return loss of -14dB and an output return loss of -14 dB. Total Power consumption is only 2.6mW from a 0.6v supply voltage.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132900829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Compatibility and Replaceability Analysis of Timed Web Services Protocols 定时Web服务协议的兼容性和可替代性分析
Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.106
Emad Elabd, E. Coquery, Mohand-Said Hacid
Nowadays, most enterprises use web services as a framework for facilitating application-to-application interaction within and across them. Describing behaviour of web services is becoming more and more important. This behaviour can be described by timed business protocols representing the possible sequences of message exchanges. Studying the behaviour of web services by analyzing their timed business protocols is the main contribution of this work. This paper introduces notions of compatibility and replaceability w.r.t. timed business protocols together with the corresponding verification algorithms.
现在,大多数企业使用web服务作为框架,以促进应用程序到应用程序之间的交互。描述web服务的行为变得越来越重要。这种行为可以通过表示可能的消息交换序列的定时业务协议来描述。通过分析web服务的定时业务协议来研究它们的行为是这项工作的主要贡献。本文介绍了定时业务协议的兼容性和可替换性的概念以及相应的验证算法。
{"title":"Compatibility and Replaceability Analysis of Timed Web Services Protocols","authors":"Emad Elabd, E. Coquery, Mohand-Said Hacid","doi":"10.1109/ICCEE.2009.106","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.106","url":null,"abstract":"Nowadays, most enterprises use web services as a framework for facilitating application-to-application interaction within and across them. Describing behaviour of web services is becoming more and more important. This behaviour can be described by timed business protocols representing the possible sequences of message exchanges. Studying the behaviour of web services by analyzing their timed business protocols is the main contribution of this work. This paper introduces notions of compatibility and replaceability w.r.t. timed business protocols together with the corresponding verification algorithms.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133172177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Designing a Framework for Distributing Serial Applications 设计一个分发串行应用程序的框架
Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.224
V. Rafe
The idea is to separate application programs from the various aspects of concurrency, distribution and its communication infrastructure. Automatic Distribution of computationally intensive object oriented programs is one of the active research areas. In this paper, a method for distributing application programs over a network is presented. We use a genetic clustering algorithm to detect mostly connected classes, in a class dependency graph. Each cluster may be deployed in a station across a network and communicate with the other stations via CORBA middleware. Something that distinguishes our environment from the existing ones is the support for automatic exploitation of inherent concurrency in inter-object communications and for non-blocking interactions between objects in different clusters over CORBA event channels.
其思想是将应用程序从并发性、分布及其通信基础设施的各个方面分离出来。计算密集型面向对象程序的自动分布是一个活跃的研究领域。本文提出了一种在网络上分发应用程序的方法。我们使用遗传聚类算法来检测类依赖图中连接最多的类。每个集群可以部署在跨网络的站点中,并通过CORBA中间件与其他站点通信。我们的环境与现有环境的不同之处在于,它支持自动利用对象间通信中的固有并发性,支持通过CORBA事件通道在不同集群中的对象之间进行非阻塞交互。
{"title":"Designing a Framework for Distributing Serial Applications","authors":"V. Rafe","doi":"10.1109/ICCEE.2009.224","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.224","url":null,"abstract":"The idea is to separate application programs from the various aspects of concurrency, distribution and its communication infrastructure. Automatic Distribution of computationally intensive object oriented programs is one of the active research areas. In this paper, a method for distributing application programs over a network is presented. We use a genetic clustering algorithm to detect mostly connected classes, in a class dependency graph. Each cluster may be deployed in a station across a network and communicate with the other stations via CORBA middleware. Something that distinguishes our environment from the existing ones is the support for automatic exploitation of inherent concurrency in inter-object communications and for non-blocking interactions between objects in different clusters over CORBA event channels.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127808580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of Communicating Fixed and Variable Instruction Set Processors 通信固定和可变指令集处理器的设计与实现
Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.238
V. Sklyarov, I. Skliarova, J. F. Lima
The paper describes a computational system that is composed of a special-purpose processor augmented by an application-targeted coprocessor with variable instruction set. The primary objective is to form the processor architecture in such a way that is the most appropriate to a selected scope of applications and to optimize instructions of the coprocessor for a particular application. As an example the scope of combinatorial search algorithms was examined and experiments were carried out and analyzed with the relevant system implemented in FPGAs.
本文描述了一种由专用处理器和可变指令集的专用协处理器组成的计算系统。主要目标是以最适合选定应用范围的方式形成处理器体系结构,并为特定应用优化协处理器的指令。以组合搜索算法为例,研究了组合搜索算法的适用范围,并进行了实验分析,并在fpga上实现了相应的系统。
{"title":"Design and Implementation of Communicating Fixed and Variable Instruction Set Processors","authors":"V. Sklyarov, I. Skliarova, J. F. Lima","doi":"10.1109/ICCEE.2009.238","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.238","url":null,"abstract":"The paper describes a computational system that is composed of a special-purpose processor augmented by an application-targeted coprocessor with variable instruction set. The primary objective is to form the processor architecture in such a way that is the most appropriate to a selected scope of applications and to optimize instructions of the coprocessor for a particular application. As an example the scope of combinatorial search algorithms was examined and experiments were carried out and analyzed with the relevant system implemented in FPGAs.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131262842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Managing Malware in Higher Learning Institutions 高校恶意软件管理
Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.93
Z. Ismail, Christine Simfukwe
"Malware" is an umbrella term that describes a variety of Internet-borne threats, including viruses, spyware,Trojan horses, spam, bots and more. This sophisticated and evolving security threat puts all businesses at risk, no matter how big or small. Malware creates unique challenges to Higher Learning Institutions (HLI) in protecting their information assets. This is largely due to the fact that HLI Information Technology (IT) departments must balance between enabling a highly collaborative, non-restrictive environment and ensuring the confidentiality, integrity, and availability of data and computing resources. HLIs can proactively defend the network to reduce the risks associated with this threat by assessing the vulnerabilities and threats present in their networks and implementing appropriate multilayer security. A multilayer approach involves applying countermeasures at every layer of the computer network, from the perimeter routers and firewalls to users' personal computers in order to increase network security. The goal of this study is to propose a framework for network security protection against malware to increase the level of protection using non technical countermeasures.
“恶意软件”是一个总称,描述了各种互联网传播的威胁,包括病毒、间谍软件、特洛伊木马、垃圾邮件、机器人等等。这种复杂且不断发展的安全威胁将所有企业置于风险之中,无论大小。恶意软件给高等教育机构(HLI)在保护其信息资产方面带来了独特的挑战。这主要是由于HLI信息技术(IT)部门必须在启用高度协作、非限制性环境和确保数据和计算资源的机密性、完整性和可用性之间取得平衡。hli可以主动防御网络,通过评估其网络中存在的漏洞和威胁并实现适当的多层安全性来降低与此威胁相关的风险。多层方法包括在计算机网络的每一层应用对策,从外围路由器和防火墙到用户的个人计算机,以增加网络安全性。本研究的目标是提出一个针对恶意软件的网络安全保护框架,以提高使用非技术对策的保护水平。
{"title":"Managing Malware in Higher Learning Institutions","authors":"Z. Ismail, Christine Simfukwe","doi":"10.1109/ICCEE.2009.93","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.93","url":null,"abstract":"\"Malware\" is an umbrella term that describes a variety of Internet-borne threats, including viruses, spyware,Trojan horses, spam, bots and more. This sophisticated and evolving security threat puts all businesses at risk, no matter how big or small. Malware creates unique challenges to Higher Learning Institutions (HLI) in protecting their information assets. This is largely due to the fact that HLI Information Technology (IT) departments must balance between enabling a highly collaborative, non-restrictive environment and ensuring the confidentiality, integrity, and availability of data and computing resources. HLIs can proactively defend the network to reduce the risks associated with this threat by assessing the vulnerabilities and threats present in their networks and implementing appropriate multilayer security. A multilayer approach involves applying countermeasures at every layer of the computer network, from the perimeter routers and firewalls to users' personal computers in order to increase network security. The goal of this study is to propose a framework for network security protection against malware to increase the level of protection using non technical countermeasures.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124107685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2009 Second International Conference on Computer and Electrical Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1