for Journals by Title or ISSN
for Articles by Keywords
Followed Journals
Journal you Follow: 0
Sign Up to follow journals, search in your chosen journals and, optionally, receive Email Alerts when new issues of your Followed Journals are published.
Already have an account? Sign In to see the journals you follow.
Journal Cover International Journal of Information and Computer Science
  [2 followers]  Follow
  This is an Open Access Journal Open Access journal
   ISSN (Print) 2161-6450 - ISSN (Online) 2161-5381
   Published by Science and Engineering Publishing Company Homepage  [49 journals]
  • Research on Information Hiding and Synchronization Algorithm for Halftone

    • Abstract: Research on Information Hiding and Synchronization Algorithm for Halftone Image
      Pages 76-79
      Author Liuping FengPeng CaoLifang YuHou Sh
      In presswork scanning detection for anti-counterfeiting information, distortion or skew may make the image synchronize information lose and the anti-counterfeiting information can’t be extracted. On the research of information hiding with halftone dots shape, a synchronization scheme based on circle detection is proposed in this paper. The image is located by halftone round dots, and the positioning information is detected by the Hough transform. The image is adjusted to achieve the accurate extraction and restoration of the anti-counterfeiting information. Experiments show the algorithm has strong anti geometric attack capability. The research has good application prospect in the field of anti-counterfeiting printing, copyright authentication and products tracking.
      PubDate: 2015-0
  • New Method by only TOA for Multi-station Passive Location in Uncommon-view

    • Abstract: New Method by only TOA for Multi-station Passive Location in Uncommon-view
      Pages 72-75
      Author Qi FengTingjun LiQinjian WangHaibo ZhangYang Zhan
      For the performance that almost all the methods of the multiple stations passive location will be invalid in the uncommon-view, this paper proposes a new method using only the time of arrival (TOA) in this situation. This paper produces the TOA train of every net point and the one that is most like of the real train is the excellent. Then the paper analyzes how the components affect the location precision such as the TOA-error, the distribution of the stations, the distances between the substations and the main-station and the observation time. The result of the emulation proves that without the error of station address and the synchronous the location can realize the CRLB almost.
      PubDate: 2015-0
  • Research on the Improvement of Participation of Students in Computer
           Network Teaching

    • Abstract: Research on the Improvement of Participation of Students in Computer Network Teaching
      Pages 68-71
      Author Zheng LiuLan YaoYu Ya
      According to the problem that the students accept knowledge passively in traditional Computer Network Teaching which leads to little initiative they have to study, so it is hard to grasp and apply the knowledge flexibly, it is discussed on the improvement of participation of students in teaching in this paper. A teaching method center on students is presented by which the interesting about independent learning will be aroused. It is beneficial for students to comprehend the knowledge and improve their abilities of analyzing and resolving problems and also the abilities of flexible using of the knowledge.
      PubDate: 2015-0
  • A Novel Shortcut Tree Routing Method Based on Load-balanced in ZigBee
           Wireless Sensor Networks

    • Abstract: A Novel Shortcut Tree Routing Method Based on Load-balanced in ZigBee Wireless Sensor Networks
      Pages 61-67
      Author Zhixin LiZhangqing ZhuBo Xi
      ZigBee Tree Routing has two major problems; the first problem is its more hop-counts as compared to the reactive routing and another one is the hotspot problem. In this paper, we propose an improved routing algorithm called Load-balanced Shortcut Tree Routing (LSTR) which utilizes the information of neighbors within two hops. In LSTR, the intermediate or source node can find the optimal next hop node which has the smallest remaining hop-count to the destination within its transmission range. In the process of data transmitting, node’s depth, node’s residual energy and energy threshold are taken into account. The simulation result shows that this algorithm can transmit data efficiently, balance the energy of network and prolong network’s lifetime.
      PubDate: 2015-0
  • Technological Assemblages within Human Society

    • Abstract: Technological Assemblages within Human Society
      Pages 55-60
      Author Hongbo WeiYang JingMengjie Zhan
      With the rapid development of information, especially the mobile phone has become more irreplaceable, we discuss in what essential ways the mobile phone functions to human and the history of mobile phone and territorialization process, finally how it changes the society. We find that the iphone phenomenon demonstrates that there exist the negative aspects among human-technology assemblage. Anyway, the assemblage has provided a method of understanding the relation between human and technology, people should take the maximum advantage of it and pursue more convenient and healthy life.
      PubDate: 2015-0
  • Industrial Perspectives on the Impact of Object-Oriented Programming for

    • Abstract: Industrial Perspectives on the Impact of Object-Oriented Programming for SoftwareDevelopment
      Pages 47-54
      Author Bassey AkpanAmos Olagunj
      This study assessed the impact of object-oriented programming on the quality and reusability of software development. The degree to which object-oriented programming is prevalent over structured and other traditional programming in the software development phase at business organizations was investigated. This research examined the extent to which business organizations use object-oriented approach in software development. A number of professionals from the industries were surveyed to ascertain the relevance of advocating the incorporation of the object-oriented approach into computer science and information technology curriculums.
      PubDate: 2015-0
  • The Benefits of Object-oriented Methodology for Software Development

    • Abstract: The Benefits of Object-oriented Methodology for Software Development
      Pages 39-46
      Author Amos OlagunjuBassey Akpa
      This research investigated the relationship between the object-oriented programming approach and software productivity at business organizations. Information systems executives at business organizations rated the quality of software products implemented with the object-oriented approach relative to those software realized with the structured and other traditional approaches. The executives also appraised the object-oriented approach in terms of its reusability strategy and the time for software development. This paper details the inferential data analysis of the use of the object-oriented approach in enhancing software productivity.
      PubDate: 2015-0
  • Drop Points Placement Algorithms for Layered Network Planning

    • Abstract: Drop Points Placement Algorithms for Layered Network Planning
      Pages 34-38
      Author K. W. Pen
      Planning a network with hundreds of thousands nodes, multilayered approach is generally applied. It is natural to divide a large network, like nation-wide network into several county networks or smaller networks. It is not only for network planning, but also for managerial purposes. In such a way, multilayered networks are planned and constructed. In each smaller network, we must decide the location of hub, or drop point from upper layer view, for this smaller network. In order to reduce the cost of networks and enhance the signal quality, better placement of drop points means better network planning. In this paper, we proposed two placement algorithms for drop point placements in multilayer network planning. By comparing different placement algorithms, we proposed PA and GA placement algorithms for drop point placements. In computational experiments, the results show that adaptive placement algorithms, GA and PA, are better than Centroid and Near-HE algorithms unsurprisingly. Furthermore, comparing two adaptive placement algorithms, the computing time of PA algorithm is 61.5% less than GA algorithm in average. On the other hand, the network costs for PA algorithm is 5.42% higher than GA algorithm. By compromising the network cost and computing time of planning, we can get cost-efficient network planning in a reasonable time for multilayered networks.
      PubDate: 2015-0
  • Automatic Diagnosis with Constraint Solver

    • Abstract: Automatic Diagnosis with Constraint Solver
      Pages 30-33
      Author XueNong ZhangWei L
      A constraint-based model of diagnostic problem is proposed and the classical diagnostic problem can be transformed to a problem of constraint solving. Then, a depth first search with branch and bound approach to reduce the complexity of traveling through the diagnostic space is proposed. Its soundness and completeness is proved. And its complexity is also analyzed.
      PubDate: 2015-0
  • Practical Skills Training in Computer Education

    • Abstract: Practical Skills Training in Computer Education
      Pages 25-29
      Author Jun LiuLi H
      Practical skills training is more important than ever in current computer education. Since traditional teaching mode is hard to meet the requirements of IT enterprises, it is imperative to make teaching reform. We improve our experiment teaching by revising the experiment curriculum, and put forward an open experiment teaching model. We set up a training base in collaboration with industry and work out the operation and management of university-enterprise cooperation mechanisms, including the training base, teaching management, student management and teaching staff. It lays a solid foundation for the innovation of computer professional education.
      PubDate: 2015-0
  • A New Noise Mitigation Scheme in Power Line Communication Systems Based on
           the Principal Components Analyses

    • Abstract: A New Noise Mitigation Scheme in Power Line Communication Systems Based on the Principal Components Analyses
      Pages 19-24
      Author Jiang-Qian L
      Power Line Communication (PLC) systems suffer from too severe noise contamination in the channels. In the paper, a new scheme was proposed based on the principal components analyses (PCA) to mitigate noises in PLC channels. The scheme consists of four steps. In the first step, the PLC signal with one dimension is generalized to a data set with multiple dimensions (degrees). In order to de-correlate the new data set, generalized signals are whitened with Gaussian noises in the second step. For the uncorrelated data set, the PCA technology is applied to cancel noises in the transformed domain. As the last step, the PLC signals of interesting are recovered by applying the inverse transform matrix. The results from the simulated seismic signals and the measurements data verify the validity of the proposed scheme.
      PubDate: 2015-0
  • A Framework for Knowledge Sharing of Enterprise Resources

    • Abstract: A Framework for Knowledge Sharing of Enterprise Resources
      Pages 9-18
      Author Hamed FazlollahtabarBabak ShiraziAdel Porramezan Ganj
      In this paper, a framework is developed to manage knowledge sharing on enterprise resources. Enterprise resources are the key elements to progress business objectives. We propose a switch mechanism to handle knowledge sharing in a business. To integrate value chain in a business comprehensive data flow is significant where knowledge sharing is a structured for this process leading to better service provision for customers. Also, a knowledge development program is proposed to evaluate the proposed knowledge sharing switch. The validity of the proposed process is shown in a case study.
      PubDate: 2015-0
  • Shape Verification of Fused Deposition Modelling 3D Prints

    • Abstract: Shape Verification of Fused Deposition Modelling 3D Prints
      Pages 1-8
      Author Andrej CuparVojko PogačarZoran Stjepanovi
      In this article, the shape of fused deposition modelling (FDM) 3D printed testing objects is verified with 3D scanning technique. Leapfrog’s Creatr is used as a manufacturing device. The whole process of a materialization is explained – from preparation of a model to preparation of a printer. The study is meant to evaluate dimensional errors of printed parts and to give some advices on how to minimize them.
      PubDate: 2015-0
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-2015