skip to main content
10.5555/1981573guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
ICCOMP'10: Proceedings of the 14th WSEAS international conference on Computers: part of the 14th WSEAS CSCC multiconference - Volume I
2010 Proceeding
Publisher:
  • World Scientific and Engineering Academy and Society (WSEAS)
  • Stevens Point
  • Wisconsin
  • United States
Conference:
Corfu Island Greece July 23 - 25, 2010
ISBN:
978-960-474-201-1
Published:
23 July 2010

Reflects downloads up to 03 Jan 2025Bibliometrics
Abstract

No abstract available.

Article
Keynote lecture 1: optimizing the performance of scientific Java applications
Page 17

As part of its type-safety regime, the Java semantics require precise exception at runtime when programs attempt out-of-bound array accesses. In general, this requires a dynamic bounds check each time an array element is accessed, which limits the ...

Article
Plenary lecture 1: color pattern recognition for computer vision using conversion of the color space, neural classifiers and feature/decision fusion
Page 18

This lecture is an approach dedicated to the improvement of color pattern recognition performances for computer vision. Like humans, the artificial intelligence systems use color for pattern recognition. There are a lot of systems for pictorial content ...

Article
Plenary lecture 2: the maximum clique problem
Page 19

A clique is a subgraph in which all pairs of vertices are mutually adjacent. A maximum clique is a clique of the maximum size. Thus, a maximum clique stands for a maximum collection of objects which are mutually related in some specified criterion.

The ...

Article
Plenary lecture 3: fault diameters of graph products and bundles
Page 20

Fault tolerance and transrnission delay of networks are important concepts in network design. The notions are strongly related to connectivity and diameter of a graph, and have been studied by many authors. Wide diameter of a graph combines studying ...

Article
Plenary lecture 4: interpolation and design of geometric algorithms
Page 21

The aim of this talk is to present different interpolation schemes and their applications in the geometrical design of algorithms. Theoretical and computational aspects are discussed. We introduce new interpolation schemes and compare with the classical ...

Article
Plenary lecture 5: improvement research activity management in universities, by using ICT technology
Page 22

Nowadays, the universities realize that research area is the most important asset for future development. In this context, the European Union and all the EU member states are committed to develop a common European Research Area. In this lecture I ...

Article
Plenary lecture 6: semantic schema: a graph based mechanism for cooperating structures in knowledge representation
Page 23

A semantic schema S is a graph structure such that each arc is labeled by an element of a Peano algebra. Two kinds of computations can be defined in such a structure: a formal computation and a semantic computation. The result of a formal computation is ...

Article
Plenary lecture 7: digital video tamper and forgery detection techniques
Page 24

DIGITAL Image tampering or forgery has become major problem lately, due to ease of artificially synthesizing photographic fakes- for promoting a story by media channels and social networking websites. This is due to significant advances in computer ...

Article
Plenary lecture 8: uncertain knowledge expressing and processing
Page 25

Uncertainty exists almost everywhere in the whole world. Uncertain knowledge expressing and processing has become one of the most important key problems of artificial intelligence research. There are many kinds of uncertainties in knowledge, such as ...

Article
Plenary lecture 9: computationally recognizing causality in an imprecise world
Page 26

Causal reasoning perceptions play an essential role in human decision-making. Recognizing and developing causal relationships is essential for reasoning; it forms the basis for acting intelligentially in the world. Causal knowledge provides a deep ...

Article
Characteristics for a new preconditioner of linear systems
Pages 29–33

We propose to develope a preconditioner HC for solving the toeplitz T linear system,. Since toeplitz matrices have a nice structure, it has been researched in toeplitz matrix properties and developed precoditioners for the linear toeplitz system. In ...

Article
A study for eigenvalues problems of vibration modes on Dopplers
Pages 34–37

This paper is to analyze vibration modes in 3-dimension. To display it, it is required 3-dimensional shape information of measuring surface. It also is dependent on a range finder (distance measuring sensor) and is determined measuring distance. Among ...

Article
Optimizing geographical information system data by using an agent-based approach to data warehousing
Pages 38–45

This article introduces the Data Warehouse such as Analytical Database to support the Geographical Data and is able to present topologic and spatial analytics of data. The basis of the definition of Analytical Database is Multi Dimensional Model, hence ...

Article
A new way towards security in TCP/IP protocol suite
Pages 46–50

Internet Control Message Protocol is a protocol which is mainly used to provide information relating to errors on networked machines. Considering the few controls that IP protocol carries out, it not only allows errors to be corrected but also informs ...

Article
WRL: a wormhole-resistent localization scheme based on DV-hop for wireless sensor networks
Pages 51–56

In wireless sensor networks(WSNs), sensors' locations play a critical role in many applications. A number of localization schemes have been proposed to discover the locations of regular sensors based on a few beacon nodes, which are assumed to know ...

Article
Research on memory access vulnerability analysis technique in SCADA protocol implementation
Pages 57–62

SCADA systems play key roles in monitor and control of the critical infrastructures, the vulnerabilities existed in them may destroy the controlled critical infrastructures. This paper proposes an analysis method of memory access vulnerability in SCADA ...

Article
An integrated eHealth system using medical information standards
Pages 63–68

The information systems and the standardization of the transmission protocols became important components in the modern medical world. In order to ensure the integration of different medical software applications, the use of HL7-Health Level Seven ...

Article
Evaluation of life cycle functionality of Java platform
Pages 69–74

This paper at first describes future scenarios of using web services in (vehicle) embedded systems, viz. a car tracking service and an advertising service. Next the paper establishes requirements for the life cycle of services driven by the scenarios, ...

Article
Targeting cells to switch assignment of cellular mobile network using heuristic algorithm
Pages 75–80

In Cellular Mobile Networks, assigning of cells to switch is known as assignment problem. The conventional integer programming method could be used for solving this problem, but then, when the number of cells exceeds 35, the total computational data ...

Article
A strip-down database for modern information systems
Pages 81–88

In-depth study of mobile computing forms basis for mobile database design suited for advance enterprise systems. Paper investigates issues that need to be addressed in mobile database development suitable for mobile computing environment and then ...

Article
A software method for managing event logs to improve quality and dependability of business processes
Pages 89–94

In this paper, we propose a logging service on .NET environment that utilizes the business process management domain to improve business fault tolerance, fault avoidance and alert managers to undesirable effects. The purpose of logging business ...

Article
Host frame user interface and its architecture
Pages 95–102

User interface research has shown that the user's primary focus is the center of the screen. The periphery is available and often used to contain elements that are helpful but non-essential to the specific existing goals. Strong present examples of this ...

Article
Non axysimmetrical stability study of swirling flows using a projection algorithm
Pages 103–108

This paper reports a numerical investigation of the hydrodynamic instability of swirling flow with application in Francis hydraulic turbine. An L2 - projection algorithm is developed assessing both an analytical methodology and implementation using ...

Article
Application of neural networks to damage classification in composite structures
Pages 109–113

Smart classification software is designed to process data taken for damaged composite structures such as modern car bodies. This software is used in conjunction with Neural Networks algorithms to provide predictive models for impact damage in composite ...

Article
High performance parallel computing for FDTD numerical technique in electromagnetic calculations for SAR distribution inside human head
Pages 114–120

The interest in high performance computing (HPC) nowadays has increased the need of computational resources to solve large scale problems. The technological improvements over the past few years in areas such as microprocessors, memory, networks, and ...

Article
The determination of the guillotine restrictions for a rectangular cutting-stock pattern
Pages 121–126

We consider a two-dimensional rectangular Cutting-Stock problem in case of a cutting pattern with gaps. First we present two new graph representations of the cutting pattern, weighted graph of downward adjacency and weighted graph of rightward ...

Article
On the use of higher frame rate in the training phase of ASR
Pages 127–130

The number of observations which are the basis for parameter estimation plays an important role in the quality of acoustic models. HMM based automatic speech recognition (ASR) systems generally have to cope with an insufficient number of observations ...

Article
Using typed messages and message filters for the realization of pervasive applications
Pages 131–136

This paper presents a software framework, called HDS, that tries to simplify the realization of distributed and adaptive applications by merging the client-server and the multi-agent paradigms and by implementing all the interactions among the processes ...

Article
XML clustering by bit vector
Pages 137–142

XML is increasingly important in data exchange and information management. A large amount of efforts have been spent in developing efficient techniques for accessing, querying, and storing XML documents. In this paper, we propose a new method to cluster ...

Article
All minimum flows in networks
Pages 143–146

In this paper, we describe a method for determining all the minimum flows in a given network. The minimum flow algorithms developed until now determine only a minimum flow, but, usually, there is more than one minimum flow in a network. There are ...

Contributors
  • Technical University of Sofia
  • Technical University of Sofia
  • University of Belgrade

Recommendations