Catálogo de publicaciones - libros

Compartir en
redes sociales


Innovations and Advanced Techniques in Computer and Information Sciences and Engineering

Tarek Sobh (eds.)

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

Circuits and Systems

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2007 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-1-4020-6267-4

ISBN electrónico

978-1-4020-6268-1

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer 2007

Cobertura temática

Tabla de contenidos

Configuring and Designing Replication in Active Directory

Hemant Kumar Arora

Active Directory is widely used across the various organizations for Windowstextregistered infrastructure authentication. Organizations may vary from very small having only one office to very large spread across the globe with various offices. Domain controllers are the heart of Active Directory and store its database. For Active Directory to function properly, its database should be consistent across all the domain controllers which is achieved using replication, hence Replication is integral part of Active Directory. For very small organizations or organizations that are well connected using high bandwidth network links, replication doesn’t create any major problem and happens smoothly without much of the configuration needed. But for the organizations which are very large and have a large number of small offices spread across the globe with limited connectivity, configuring replication is a very important and tough task. If the replication is not properly configured in such organizations, whole deployment of Active Directory may fail. Configuring replication involves mapping the Active Directory to the physical network of the organization which is achieved by configuring sites, subnets, site links and site link bridgeheads. This paper discusses the concept and need of replication in Active Directory and configuration and design of its replication for large organizations. This paper also discusses the best practices to configure replication among large organizations and illustrate it by demonstrating it for a dummy organization.

Pp. 225-230

Incremental Learning Algorithm for Speech Recognition

Hisham Darjazini; Qi Cheng; Ranjith Liyana-Pathirana

This paper presents an implementation of incremental learning neural networks algorithm for speech recognition. The algorithm has been investigated using the TIMIT speech samples and it has been shown to demonstrate high recognition accuracy.

Pp. 231-235

Manufacturing Process Modeling

Isidro Moctezuma-Cantorán; Manuel Valdés-Marrero; Jorge Ochoa-Somuano; Isaías May-Canché

This paper describes the development of a visual environment prototype that allows the manufacturing processes design and modeling using LAB (Besançon Automatics Laboratory) modeling. LAB models are used to perform design and modeling in four levels of detail, from abstract to concrete. To validate the relations within the model in a formal way, relations visual grammars are used. Finally, this paper describes an example of a manufacturing process.

Pp. 237-242

Architecture for Virtualization in Data Warehouse

J.A. Nasir; M. Khurram Shahzad

Conventional data warehouse (DW) due to structure of its schema and contents is unable to: a) support any dynamics in its source structure and contents b) unable to support hidden-subjects c) unable to provide data on-the-fly i.e. real-time data and populate hidden-subjects on their evolution. To handle these problems the concept of virtualization in DW is floated here. In this study we have proposed architecture of virtualization approach. According to this approach, conventional DW is replaced by: i) a storage component called data-store ii) a Synthetic warehouse (SWH). Data-store is a non-subjective, content consistent, time-variant and integrated storage. On the other hand, SWH is only a structure, with no instances attached. It acts as a schema source for analytical processing and is mapped to its data-store. Subjective conversion is expected to be done on-the-fly. We are hopeful that this architecture will qualify all the evaluation parameters of: i) scalability ii) hidden-subjective support iii) source dynamics.

Pp. 243-248

A Study of Software Protection Techniques

Jan M. Memon; Asma Khan; Amber Baig; Asadullah Shah

Software piracy and tampering is a well known threat the world is faced with. There have been a lot of attempts to protect software from reverse engineering and tampering. It appears as if there is an ongoing war between software developers and crackers, both parties want to get an upper hand over each other as the time passes. Some of the ample techniques of software protection are reviewed, including multi-block hashing scheme, hardware based solutions, checksums, obfuscation, guards, software aging, cryptographic techniques and watermarking. All of these techniques play their parts imparted on them to protect the software from malicious attacks.

Pp. 249-253

Code Characterization for Automatic User Interface Generation

Jaroslav Kadlec

—This paper presents extended taxonomy that can be used for better automatic user interface generation. Taxonomy is focused on code characterization allowing an artificial intelligence user interface generator to create user interface which is not limited by visual presentation of characterized data. This allows user interface to contain lots of various operation over characterized data creating rich and interactive user interfaces that could not be created with data characterization only.

Pp. 255-259

Lattice Cube Semantic Index Based Mining on XML Documents

Dr. A.M. Natarajan; K. Premalatha; A. Kogilavani

XML (eXtensible Markup Language) is fast becoming the de facto standard for information exchange over the Internet. As more and more sensitive information gets stored in the form of XML, sophisticated indexing schemes are required to speedup document storage and retrieval. XML documents can be hierarchically represented by elements. This paper describes a Lattice-map semantic indexing technique to cluster XML documents. To improve performance of information retrieval, documents can be indexed using Lattice-map technique. Similarity and Popularity operations are available in Lattice-map indexing technique and clustering algorithm is used for mining XML documents.

Pp. 261-266

Multiscale Contrast Enhancement for Compressed Digital Images with Block Artifacts Consideration

Kashif Iqbal; Asmatullah Chaudhry; Asifullah Khan; Ajmal Bangash

A simple and efficient algorithm is presented for contrast enhancement, of JPEG compressed images, in the Discrete Cosine Transform (DCT) domain. The algorithm enhances the DCT coefficients in accordance with their band importance. Since uniformly modifying all the frequency bands causes block artifacts, therefore, the low frequency bands are dealt with differently than the rest of the frequency bands. As the enhancement is done in the decompression stage, compressibility of the original image is not affected. Subjective and objective tests performed on various images validate the concept of multiscale contrast enhancement.

Pp. 267-272

An Aspect-Oriented Model to Monitor Misuse

K. Padayachee; J.H.P. Eloff

The efficacy of the aspect-oriented paradigm has been well established within several areas of software security as aspect-orientation facilitates the abstraction of these security-related tasks to reduce code complexity. The aim of this paper is to demonstrate that aspect-orientation may be used to monitor the information flows between objects in a system for the purposes of misuse detection. Misuse detection involves identifying behavior that is close to some previously defined pattern signature of a known intrusion.

Pp. 273-278

Ontology Development for E-Marketing Mix Model Mapping with Internet Consumers’ Decision-Making Styles

K. M. Sam; P. Lei; C. R. Chatwin.

Based on a literature review of E-Marketing mix and Internet consumers’ decision-making styles, we develop an ontology for e-marketing mix that is mapped with Internet Consumers’ decision-making styles. This ontology defines the concepts for the relationships between the E-Marketing mix model and the psychological factors of Internet consumers. Based on the understanding of Internet consumers’ decision-making styles, businesses can make use of their corresponding e-marketing mix to match with individual Internet consumers’ decision-making styles in order to attract more targeted Internet consumers. As a result, it can generate profitable and sustainable revenue streams.

Pp. 279-282