Sciweavers

JDCTA
2008
74views more  JDCTA 2008»
13 years 11 months ago
Processing Logical Access Control Command in Computer System
Access control includes physical and logical access control. Physical access control protects the damage, theft and losing of assess. In this paper, we propose the method to prote...
Tsang-Yean Lee, Huey-Ming Lee, Wuu-Yee Chen, Heng-...
JDCTA
2008
128views more  JDCTA 2008»
13 years 11 months ago
Specifying a WS-ECA Working Framework for Ubiquitous Web Services in Object-Process Methodology
The Web Services-Event-Condition-Action (WSECA) framework is designed to enable the heterogeneous communication devices in Ubiquitous Computing Environments to achieve inter-opera...
Haining Lee, Jaeil Park, Peom Park, Dongmin Shin
JDCTA
2008
83views more  JDCTA 2008»
13 years 11 months ago
Translation from GDMO/ASN.1 to tML/Schema
For interoperation of heterogeneous management systems and integration of existing legacy applications in telecommunication network management systems, a translation from GDMO/ASN...
Wenli Dong
JDCTA
2008
87views more  JDCTA 2008»
13 years 11 months ago
M-Brochure
Tourism industry is one of the important sources of income in many countries. The appropriate and quick submission of primary information such as address of hotels to the tourists...
Mohammad Shirali-Shahreza
JDCTA
2008
88views more  JDCTA 2008»
13 years 11 months ago
A Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN
In WSNs, since the attacks, such as jamming or eavesdropping without physical access, easily occur, security is one of the important requirements for WSNs. The key pre-distributio...
Yoon-Su Jeong, Yong-Tae Kim, Gil-Cheol Park, Sang ...
JDCTA
2008
75views more  JDCTA 2008»
13 years 11 months ago
Design and Simulation of Novel Single-Input Sampling Instance Control Circuit
This paper proposes a novel single-input sampling instance control circuit used in primary-side controller of Switch Mode Power Supplies (SMPS) without optical-coupler and seconda...
Xiuxiu Dong, Tiejun Lu, Guicai Hu
JDCTA
2008
535views more  JDCTA 2008»
13 years 11 months ago
Steganography: DCT Coefficients Reparation Technique in JPEG Image
Due to the ever-growing usage of the computer, it has led to a rapid increment in the data that is being exchanged, published and stored in an assortment of digital form. This phe...
Chiew Kang Leng, Jane Labadin, Sarah Flora Samson ...
JDCTA
2008
115views more  JDCTA 2008»
13 years 11 months ago
Information Visualization Techniques and Decision Style: The Effects in Decision Support Environments
The importance of individual characteristics has been emphasized in the human computer interaction and information visualization (IV) literature. However, decision style, which is...
Nik Ghazali Nik Daud, Wan Adilah Wan Adnan, Nor La...
JDCTA
2008
107views more  JDCTA 2008»
13 years 11 months ago
A Rule Set Generation Technique for Better Decision Making
A rule set generation technique based on a generated decision tree is suggested for better decision making to compensate the weak point of decision trees
Hyontai Sug
JDCTA
2008
206views more  JDCTA 2008»
13 years 11 months ago
An Application Strategy for PLM in Construction Industry
There are many interests and researches among an industry as IT develops. It is important to use information effectively and adequately as applying IT to industry because IT provi...
Kyung-Min Min, Nam-Hyuk Ham, Ju-Hyung Kim, Yoon-Su...