The task force, in its initial period, works toward four major goals: Establishing critical resources (web page presence, informal meetings framework and plan for a large conference) in the field of Human Centered Com...
详细信息
The task force, in its initial period, works toward four major goals: Establishing critical resources (web page presence, informal meetings framework and plan for a large conference) in the field of Human Centered Computing. Forging and developing relationships with other organizations (ACM SIGCHI, IFIP TC13, IFIP TC14 and the associated world-wide national societiesof IFIP). This goal requires understanding of the unique role each organization could play. These activities and relationships will form the base for potential longer-term efforts. Developing a strategic research and development roadmap for HCC (basic and applied) and for its relationships with other relevant areas in technology. Exploring the role of standards related to HCC and their potential.
The paper suggests a software architecture to improve the accessibility to information from texts. This software combines techniques like: image processing, optical character recognition, machine translation, text ana...
详细信息
The paper suggests a software architecture to improve the accessibility to information from texts. This software combines techniques like: image processing, optical character recognition, machine translation, text analyze and text to speech. The application uses a scanner or a Web cam as an image input device, recognizes the text by using OCR, enables text translation by using Googlepsilas machine translation implementation, interpret the text as a future development and reads the text by using TTS technology. In this way the user can put the text information source into a scanner or under a Web cam and can hear the text translated and interpreted, if required. A functional prototype is presented and conclusions are issued.
Spatial resolution is an important parameter that allows an objective assessment of the imaging system performance. In remote sensing, Effective Instantaneous Field of View (EIFOV) is the most used parameter to measur...
详细信息
Spatial resolution is an important parameter that allows an objective assessment of the imaging system performance. In remote sensing, Effective Instantaneous Field of View (EIFOV) is the most used parameter to measure spatial resolution and enables comparison between different sensors. This paper describes a system named SPAREC 1.0 for automatic estimation of the spatial resolution for CBERS CCD Camera. The automatic system operates using four algorithms and consists of three main stages: in the first stage the user selects the sub-image from the original spectral band image of desired target. In the second stage he extracts the sub-image of the target and then in the third stage the system processes the sub-image to provide the estimated spatial resolution. The results obtained are comparable with pre-flight measurement and with the results obtained before the development of SPAREC 1.0.
In the study of quantitative cytology, the measurement of the DNA content in cell nuclear is the most important basis and necessary premise of cancer screening and diagnosis. Due to some unavoidable factors, certain e...
详细信息
In the study of quantitative cytology, the measurement of the DNA content in cell nuclear is the most important basis and necessary premise of cancer screening and diagnosis. Due to some unavoidable factors, certain errors may occur in the measurement of the DNA content through processing and analysis of the cell nuclei image. A new calibration approach based on morphology and SVR regression algorithm was proposed. Through spatial and optical calibration, the approach sufficiently utilized the information hidden in the images and features of the cell nucleus. The experiment showed that the approach could increase the measurement accuracy significantly, and show positive significance in improving the specificity and sensitivity of the pathological diagnosis.
An artificial immune system (AIS) is a biological inspiration of the human immune system and continues to emerge as a technique for a wide area of applications. This paper presents a model of AIS as it applies to a mu...
详细信息
An artificial immune system (AIS) is a biological inspiration of the human immune system and continues to emerge as a technique for a wide area of applications. This paper presents a model of AIS as it applies to a multi-agent formation problem, similar to predator and prey scenario. Successful multi-agent formations are discovered in conjunction with the artificial immune system's agents and their behaviors. The hierarchy of agents within the artificial immune system support; a system of systems (SoS) based development strategy. The AIS SoS model is implemented based on discrete event specification (DEVS) and simulated using the DEVSJAVA software framework. The resulting model and simulation demonstrates successfully created multi-agent formations of predator around a single prey.
To provide right service to the right customer at the right time and with reasonable price is the optimal goal of the service providers. Therefore in order to develop a competitive service system it is important to pa...
详细信息
To provide right service to the right customer at the right time and with reasonable price is the optimal goal of the service providers. Therefore in order to develop a competitive service system it is important to pay more attention on customerpsilas actual needs and the transformation of customerpsilas needs into the service system. With the experiences accumulated in developing and implementing some typical IT systems in manufacturing enterprises from past decade, ICES research center proposed SQFD, a lifecycle service quality assurance approach, to assist service providers to build better quality service system. SQFD not only adopted QFD approach in build-time service quality design, but also further extended it into run-time performance monitoring and evaluation, and bottom-up system optimization. As fundamental element of SQFD a model of service quality indicators is also presented in the paper.
Traffic information is undeniably essential to every one especially for commuters. With accurate and up to date traffic information, a better traveling plan can be made, which translates to reduction in time and energ...
详细信息
Traffic information is undeniably essential to every one especially for commuters. With accurate and up to date traffic information, a better traveling plan can be made, which translates to reduction in time and energy consumption. Consequently, overall society and environment can benefit from traffic information. This paper presents a study of impact of intelligent traffic information system (ITIS) on congestion saving in Bangkok. We propose to utilize both static and dynamic traffic information in order to find the least congested route. The results revealed that up to 75% congestion saving can be achieved with ITIS.
A build system breathes life into source code, as it configures and directs the construction of a software system from textual source code modules. Surprisingly, build languages and tools have not received considerabl...
详细信息
A build system breathes life into source code, as it configures and directs the construction of a software system from textual source code modules. Surprisingly, build languages and tools have not received considerable attention by academics and practitioners, making current build systems a mysterious and frustrating resource to work with. Our dissertation presents a conceptual framework with tool support to recover, analyze and refactor a build system. We demonstrate the applicability of our framework by analyzing the evolution of the Linux kernel build system and the introduction of AOSD technology in five legacy build systems. In all cases, we found that the build system is a complex software system of its own, trying to co-evolve in a synchronized way with the source code while working around shortcomings of the underlying build technology. Based on our findings, we hypothesize four conceptual reasons of co-evolution to guide future research in the area of build systems.
'Separation of concerns' in the field of software engineering has been an important issue for quite some time. And this issue is very much related to aspect oriented software development. This is so because as...
详细信息
'Separation of concerns' in the field of software engineering has been an important issue for quite some time. And this issue is very much related to aspect oriented software development. This is so because aspects happen to be certain concerns that get interleaved with the core-functionalities in such a way that they become inseparable. As a result of which the coder, who is supposed to be concerned only with the core-functionalities, is bound to take extra burden or botheration regarding the proper and accurate handling of aspects. This paper proposes a layered-runtime-architecture for the aspect oriented execution environment. The proposed model makes an effort towards separation of such interleaving concerns into separate layers of the execution environment, bringing about significant clarity, flexibility and extendibility in the whole system. The paper also presents a comparative study for the benefits that the new architecture brings about and also the limitations against existing practices.
Because of virus and worms which make use of vulnerability of computer systems, computer software is getting in trouble increasingly. Although there are opportunities to defend these attacks at an earlier stage, peopl...
详细信息
Because of virus and worms which make use of vulnerability of computer systems, computer software is getting in trouble increasingly. Although there are opportunities to defend these attacks at an earlier stage, people undergo several serious disturbances because many administrators and users didn't realize the essentiality of the patch management. The paper designs and implements a patch management system for vulnerability precaution protection which can efficiently repair vulnerabilities of computer systems in time. Developing a vulnerability management system needs two steps: constructing a vulnerability analysis database and implementing vulnerability management system (VMS) application software. The vulnerability analysis database is constructed based on CVE, Microsoft and others to report vulnerabilities in standard result forms by updating newest information, and is organized to be suitable to the distributed enterprise network. The VMS suggested in this paper can provide fast and more accurate vulnerability repair and proper guidelines to corresponding vulnerabilities.
暂无评论