Catálogo de publicaciones - libros
Innovations and Advanced Techniques in Computer and Information Sciences and Engineering
Tarek Sobh (eds.)
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
Circuits and Systems
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No detectada | 2007 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-1-4020-6267-4
ISBN electrónico
978-1-4020-6268-1
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2007
Información sobre derechos de publicación
© Springer 2007
Cobertura temática
Tabla de contenidos
Configuring and Designing Replication in Active Directory
Hemant Kumar Arora
Active Directory is widely used across the various organizations for Windowstextregistered infrastructure authentication. Organizations may vary from very small having only one office to very large spread across the globe with various offices. Domain controllers are the heart of Active Directory and store its database. For Active Directory to function properly, its database should be consistent across all the domain controllers which is achieved using replication, hence Replication is integral part of Active Directory. For very small organizations or organizations that are well connected using high bandwidth network links, replication doesn’t create any major problem and happens smoothly without much of the configuration needed. But for the organizations which are very large and have a large number of small offices spread across the globe with limited connectivity, configuring replication is a very important and tough task. If the replication is not properly configured in such organizations, whole deployment of Active Directory may fail. Configuring replication involves mapping the Active Directory to the physical network of the organization which is achieved by configuring sites, subnets, site links and site link bridgeheads. This paper discusses the concept and need of replication in Active Directory and configuration and design of its replication for large organizations. This paper also discusses the best practices to configure replication among large organizations and illustrate it by demonstrating it for a dummy organization.
Pp. 225-230
Incremental Learning Algorithm for Speech Recognition
Hisham Darjazini; Qi Cheng; Ranjith Liyana-Pathirana
This paper presents an implementation of incremental learning neural networks algorithm for speech recognition. The algorithm has been investigated using the TIMIT speech samples and it has been shown to demonstrate high recognition accuracy.
Pp. 231-235
Manufacturing Process Modeling
Isidro Moctezuma-Cantorán; Manuel Valdés-Marrero; Jorge Ochoa-Somuano; Isaías May-Canché
This paper describes the development of a visual environment prototype that allows the manufacturing processes design and modeling using LAB (Besançon Automatics Laboratory) modeling. LAB models are used to perform design and modeling in four levels of detail, from abstract to concrete. To validate the relations within the model in a formal way, relations visual grammars are used. Finally, this paper describes an example of a manufacturing process.
Pp. 237-242
Architecture for Virtualization in Data Warehouse
J.A. Nasir; M. Khurram Shahzad
Conventional data warehouse (DW) due to structure of its schema and contents is unable to: a) support any dynamics in its source structure and contents b) unable to support hidden-subjects c) unable to provide data on-the-fly i.e. real-time data and populate hidden-subjects on their evolution. To handle these problems the concept of virtualization in DW is floated here. In this study we have proposed architecture of virtualization approach. According to this approach, conventional DW is replaced by: i) a storage component called data-store ii) a Synthetic warehouse (SWH). Data-store is a non-subjective, content consistent, time-variant and integrated storage. On the other hand, SWH is only a structure, with no instances attached. It acts as a schema source for analytical processing and is mapped to its data-store. Subjective conversion is expected to be done on-the-fly. We are hopeful that this architecture will qualify all the evaluation parameters of: i) scalability ii) hidden-subjective support iii) source dynamics.
Pp. 243-248
A Study of Software Protection Techniques
Jan M. Memon; Asma Khan; Amber Baig; Asadullah Shah
Software piracy and tampering is a well known threat the world is faced with. There have been a lot of attempts to protect software from reverse engineering and tampering. It appears as if there is an ongoing war between software developers and crackers, both parties want to get an upper hand over each other as the time passes. Some of the ample techniques of software protection are reviewed, including multi-block hashing scheme, hardware based solutions, checksums, obfuscation, guards, software aging, cryptographic techniques and watermarking. All of these techniques play their parts imparted on them to protect the software from malicious attacks.
Pp. 249-253
Code Characterization for Automatic User Interface Generation
Jaroslav Kadlec
—This paper presents extended taxonomy that can be used for better automatic user interface generation. Taxonomy is focused on code characterization allowing an artificial intelligence user interface generator to create user interface which is not limited by visual presentation of characterized data. This allows user interface to contain lots of various operation over characterized data creating rich and interactive user interfaces that could not be created with data characterization only.
Pp. 255-259
Lattice Cube Semantic Index Based Mining on XML Documents
Dr. A.M. Natarajan; K. Premalatha; A. Kogilavani
XML (eXtensible Markup Language) is fast becoming the de facto standard for information exchange over the Internet. As more and more sensitive information gets stored in the form of XML, sophisticated indexing schemes are required to speedup document storage and retrieval. XML documents can be hierarchically represented by elements. This paper describes a Lattice-map semantic indexing technique to cluster XML documents. To improve performance of information retrieval, documents can be indexed using Lattice-map technique. Similarity and Popularity operations are available in Lattice-map indexing technique and clustering algorithm is used for mining XML documents.
Pp. 261-266
Multiscale Contrast Enhancement for Compressed Digital Images with Block Artifacts Consideration
Kashif Iqbal; Asmatullah Chaudhry; Asifullah Khan; Ajmal Bangash
A simple and efficient algorithm is presented for contrast enhancement, of JPEG compressed images, in the Discrete Cosine Transform (DCT) domain. The algorithm enhances the DCT coefficients in accordance with their band importance. Since uniformly modifying all the frequency bands causes block artifacts, therefore, the low frequency bands are dealt with differently than the rest of the frequency bands. As the enhancement is done in the decompression stage, compressibility of the original image is not affected. Subjective and objective tests performed on various images validate the concept of multiscale contrast enhancement.
Pp. 267-272
An Aspect-Oriented Model to Monitor Misuse
K. Padayachee; J.H.P. Eloff
The efficacy of the aspect-oriented paradigm has been well established within several areas of software security as aspect-orientation facilitates the abstraction of these security-related tasks to reduce code complexity. The aim of this paper is to demonstrate that aspect-orientation may be used to monitor the information flows between objects in a system for the purposes of misuse detection. Misuse detection involves identifying behavior that is close to some previously defined pattern signature of a known intrusion.
Pp. 273-278
Ontology Development for E-Marketing Mix Model Mapping with Internet Consumers’ Decision-Making Styles
K. M. Sam; P. Lei; C. R. Chatwin.
Based on a literature review of E-Marketing mix and Internet consumers’ decision-making styles, we develop an ontology for e-marketing mix that is mapped with Internet Consumers’ decision-making styles. This ontology defines the concepts for the relationships between the E-Marketing mix model and the psychological factors of Internet consumers. Based on the understanding of Internet consumers’ decision-making styles, businesses can make use of their corresponding e-marketing mix to match with individual Internet consumers’ decision-making styles in order to attract more targeted Internet consumers. As a result, it can generate profitable and sustainable revenue streams.
Pp. 279-282