Increase in emphasis on risk management allows for better enterprise IT risk management. Early risk identification and assessment ensures effective risk management steps are formulated. The formulation and sustenance ...
详细信息
ISBN:
(纸本)9781424455379
Increase in emphasis on risk management allows for better enterprise IT risk management. Early risk identification and assessment ensures effective risk management steps are formulated. The formulation and sustenance of an IT risk management framework is one of the critical and challenging tasks of modern corporate enterprise risk management. The existence of a risk assessment tool allows for effective risk measurement. This paper presents an enterprise level IT risk assessment framework and a tool that is based on the framework which organizes IT risks into five categories: infrastructure development and support, operations and maintenance of business process, office level support, software development and outsourcing management. The approach helps assess and identify IT risks at the enterprise level.
This paper describes an approach used to build and optimize a practical AI solution for a 3D boxing simulation game. The two main features of the designed AI agent are believability (human-likeness of agent39;s beha...
详细信息
ISBN:
(纸本)9781424455379
This paper describes an approach used to build and optimize a practical AI solution for a 3D boxing simulation game. The two main features of the designed AI agent are believability (human-likeness of agent's behavior) and effectiveness (agent's capability to reach own goals). We show how learning by observation and case-based reasoning techniques are used to create believable behavior. Then we employ reinforcement learning to optimize agent's behavior, turning the agent into a strong opponent, acting in a commercial-level game environment. The used knowledge representation scheme supports high maintainability, important for game developers.
This paper presents an FPGA implementation of Advance Encryption Standard (AES), using Minimal Instruction Set computer (MISC) with Harvard Architecture. With simple logic components and a minimum set of fundamental i...
详细信息
ISBN:
(纸本)9781424455379
This paper presents an FPGA implementation of Advance Encryption Standard (AES), using Minimal Instruction Set computer (MISC) with Harvard Architecture. With simple logic components and a minimum set of fundamental instructions, the MISC using Harvard Architecture enables the AES encryption in severely constraint hardware environment, with lesser execution clock cycles. The MISC architecture was verified using the Handel-C hardware description language and implemented on a Xilinx Spartan3 FPGA. The implementation uses two separate block RAMs and occupied only 1 % of the total available chip area.
this paper shows the design and implementation of a video capturing and processing system, which can collect plate-profile information and process image in the spatial domain. Strategy of buffer storage is used in the...
详细信息
ISBN:
(纸本)9781424455379
this paper shows the design and implementation of a video capturing and processing system, which can collect plate-profile information and process image in the spatial domain. Strategy of buffer storage is used in the collecting part;read and write two SRAM at the same time to improve the data throughput. In the processing part using Synchronous FIFO to implement sliding window whose function is to filter image in spatial domain. In the tests, using this system to process plate-profile information gets good result;frame rate can reach 25fps, also meet the need of real-time requirements and have much more obvious advantages than processing image by software programming.
An ETC system based on RFID technology uses radio wave to identify cars passing through the toll collection site and automatically debits toll rate from the car owner39;s pre-paid account RFID technology and its app...
详细信息
ISBN:
(纸本)9781424455379
An ETC system based on RFID technology uses radio wave to identify cars passing through the toll collection site and automatically debits toll rate from the car owner's pre-paid account RFID technology and its application in highway ETC system is analyzed in this paper. SNMP is a kind of protocol that has been widely used in network management system for many years. Because of its easy use and strong expansibility, SNMP is suitable for network management of system. After introducing the basic knowledge of SNMP, this paper studies how to use SNMP to manage the RFID readers and the toll collection workstations remotely.
Healthcare services are becoming vital and growing immensely with the passage of time, and so is the use of informationtechnology in every aspect of life. information and communication technologies are essential part...
详细信息
ISBN:
(纸本)9781424455379
Healthcare services are becoming vital and growing immensely with the passage of time, and so is the use of informationtechnology in every aspect of life. information and communication technologies are essential parts of any health care or life critical solution available in this era-the era of informationtechnology. Quality is one of the major issues that are currently being faced. For healthcare and life critical solutions, quality can not be compromised. The use of informationtechnology in healthcare potentially improves quality. This paper discusses the parameters of quality in healthcare, and how informationtechnology ensures quality based on these parameters in some major domains of healthcare;Healthcare information Management, Emergency Medical Services, Ubiquitous Healthcare and Distributed Diagnosis & Home Healthcare. A framework has also been presented, integrating the four domains, which ensures quality in the provided services satisfying the quality parameters discussed in the paper.
Search engine is very important for searching image over the Internet. Recently, there are many search engine techniques which narrow down the real image requirement of uses. This paper proposed a new protocol: a spec...
详细信息
ISBN:
(纸本)9781424455379
Search engine is very important for searching image over the Internet. Recently, there are many search engine techniques which narrow down the real image requirement of uses. This paper proposed a new protocol: a specific image search protocol, named the information Searching Protocol for Color Image (ISPCI). This protocol allows users to enter a part of a required URL with a partial image for searching image. Additionally, the ISPCI works with a color using regions' color pair relationship for image indexing. The result of the search is a short list of URLs that relevant to the entering search URL and a partial image.
This paper aims to develop the system of powerful computer laboratory class by simulation the ideal learning procedure, teachers and their students can keep in touch with each other in 2-way and immediately communicat...
详细信息
ISBN:
(纸本)9781424455379
This paper aims to develop the system of powerful computer laboratory class by simulation the ideal learning procedure, teachers and their students can keep in touch with each other in 2-way and immediately communication on Internet. This system can enhance the learning of computer laboratory class powerfully in 3 aspects: controlling, teaching, and evaluating on computer network technology with client/server using TCP/IP protocol. Socket programming is used to make the interaction between each computer. This system benefits both instructors and students in coming up to the powerful computer laboratory class. There are many useful functions in this system, verifying the class attendance, monitoring of students behavior, interaction with students while teaching, examining and evaluation the outcomes of students. The results of the experiment by using this system in computer laboratory class, found that it can achieve by the goal of system.
This paper highlights software reuse technology and classifies. The emphasis of the paper presents the model of component and Studies COTS. As the result, this paper points out component reuse is fine granularity39;...
详细信息
ISBN:
(纸本)9781424455379
This paper highlights software reuse technology and classifies. The emphasis of the paper presents the model of component and Studies COTS. As the result, this paper points out component reuse is fine granularity's reuse in construction software system. But during building "system in system" process, it's impossible that developers do everything starting from scratch. COTS(Commercial off the shelf) software should be selected since COTS software has more coarse granularity than component does. Software reuse has been becoming more important under network environment because the applications based on Internet are increasingly popular. Software reuse can be implemented by agent-oriented methodology under network environment. Agent can search and match components autonomously on internet.
The automatic generation of malicious behavior pattern based on system call trace is important to malware detection. This paper studied the existing generation method of malicious behavior specification. In order to r...
详细信息
ISBN:
(纸本)9781424455379
The automatic generation of malicious behavior pattern based on system call trace is important to malware detection. This paper studied the existing generation method of malicious behavior specification. In order to reduce the complexity of pattern generation, it constructs graph which vertex label is unique, and uses these graphs to mine the pattern. To address the issue of limitation of the minimal contrast subgraph mining method, it uses multiple positive and negative samples, and proposes a mining method to mine distinguishing patterns based on mutual information. It designs the overall framework of mining process, and gives the mining algorithm. Finally, validation results demonstrate the effectiveness.
暂无评论