SDIWC Digital Library
The aim of SDIWC digital library is to deliver a free full text access to published papers of SDIWC and other organizations. If you want to include the papers of your conference or journal, please contact us. The inclusion is Free.
The Fourth International Conference on Digital Information Processing and Communications (ICDIPC2014)
-
THE APPLICATION OF WAVELET THRESHOLD DE-NOISING IN MOBILE OXYGEN SATURATION MONITORING SOFTWARE
Oxygen saturation is an important parameter of human body. It needs to be monitored on many occasions. In this thesis, based on theories of reflective pulse oxygen saturation of non-invasive ...Authors: Tang Ning, Xu Zhenzhen
Year Published: Mar. 2014 | 1-5 | ICDIPC2014 -
Software Testing of Mobile Applications: Techniques and Challenges
Mobile phones have become an integral part of people's lives, for this reason the tech giants are trying to Innovation and development of high quality applications that meet needs of the people ...Authors: Amer S. Alharthi
Year Published: Mar. 2014 | 6-10 | ICDIPC2014 -
Pressure Vessel Design Using the Dynamic Self-adaptive Harmony Search Algorithm
Solving constrained engineering problems using metaheuristic algorithms is now a common trend whereby finding optimal solutions for such problems is regarded of high value in many industrial ...Authors: Ali Kattan, Reem Alrawi
Year Published: Mar. 2014 | 11-16 | ICDIPC2014 -
A Comparison of Architectural Constraints for Feedforward Neural Diversity Machines
This paper is a follow-up study on an earlier introductory paper on Neural Diversity Machines (NDM). NDMs are a subclass of Hybrid Artificial Neural Networks (HANNs), which are digital ...Authors: Obrien Sim, Tomas Maul, Chris Roadknight
Year Published: Mar. 2014 | 17-22 | ICDIPC2014 -
Botnets: From IRC To Android
This paper outlines the evolution of botnets from IRC to Android. It begins by detailing the two malware that started the botnet ball rolling: the Pretty Park worm and the SubSeven Trojan ...Authors: Desmond Lobo, Sarunya Lertputtarak
Year Published: Mar. 2014 | 23-27 | ICDIPC2014 -
Cloud To Cloud: Enabling Content Transfer among Personal Cloud Instances
With increasing globalization, it has become essential to share digital content with various parties. Meanwhile, it is important to preserve confidentiality and have control over how a ...Authors: Buddhiprabha Erabadda, Visitha Baddegama, Gihan Dias
Year Published: Mar. 2014 | 28-34 | ICDIPC2014 -
Search Engine Development: Adaptation from Supervised Learning Methodology
This paper reports a generic search engine development using a supervised learning methodology. This learning method has become apparently important due to the growth rate of data which has ...Authors: Mohd Noah A. Rahman, Afzaal H. Seyal, Siti Aminah Maidin
Year Published: Mar. 2014 | 35-42 | ICDIPC2014 -
Different Notions Lead Difficulties of Making Information System Modernization Decisions
If organizational purposes or functions changes then usually we are concerned with information system modernization. However, there are difficulties of making information system modernization ...Authors: Miia-Maarit Saarelainen, Virpi Hotti
Year Published: Mar. 2014 | 43-52 | ICDIPC2014 -
Discipline-free and standard-based requirements for IT top management
Over one million organizations have implemented ISO 9001:2008. Therefore, it is assumed that top management can make a commitment to requirements if they are mapped with ISO 9001:2008. In this ...Authors: Virpi Hotti
Year Published: Mar. 2014 | 53-59 | ICDIPC2014 -
The Large-Scale Information Technology Project for Police Stations in Thailand
This study investigates the nationwide implementation of an information technology project conducted for the Royal Thai Police. In an attempt to enhance efficiency and transparency, the Royal ...Authors: Danuvasin Charoen
Year Published: Mar. 2014 | 60-71 | ICDIPC2014 -
CUCB-MAC: Channel Usage and Collision Based Medium Access Control Protocol for Cognitive Radio Networks
Cognitive Radio Networks (CRNs) allow their unlicensed users named Secondary Users (SUs) to share and access licensed wireless spectrum band without any kind of interference with its original ...Authors: Dina Tarek, Amira Kotb, Sanaa El Ola Hanafy
Year Published: Mar. 2014 | 72-85 | ICDIPC2014 -
A Study of Diversity Combining Methods for Wireless Image Transmission System
In this paper, we propose a wireless image transmission system under partial band noise jamming (PBNJ). To increase the transmission efficiency, we adopt the compressed image to our system. In ...Authors: Li-Der Jeng, Yuan-Hsiang Chang, Shih-Wei Chen
Year Published: Mar. 2014 | 86-92 | ICDIPC2014 -
Complexity Reduction for RS Coded SFH/MFSK System under PBNJ
Although soft-decision decoding of Reed-Solomon (RS) code can improve the decoding performance significantly, the complexity of the system is still very high. Therefore, to reduce the ...Authors: Li-Der Jeng, Shing-Hung Chen
Year Published: Mar. 2014 | 93-100 | ICDIPC2014 -
Image Transmission for Low-Density Parity Check Coded System under PBNJ
The research of Reed-Solomon code (RS) for slow frequency-hopping systems have been extensively studied in recent years. Previous studies has considered to combine error correction coding with ...Authors: Li-Der Jeng, Yuan-Hsiang Chang, Tsung-Hua Lee
Year Published: Mar. 2014 | 101-106 | ICDIPC2014 -
Indoor Next Location Prediction with Wi-Fi
Indoor Location Intelligence is a novel application that relates indoor localization technology to business data to allow for better decision making for retail businesses. In this context, ...Authors: Boon-Khai Ang, Daniel Dahlmeier, Ziheng Lin, Jian Huang, Mun-Lie Seeto, Hendy Shi
Year Published: Mar. 2014 | 107-113 | ICDIPC2014 -
Construct a Mobile Device Enabled Ubiquitous E-learning Environment in Cloud
In this paper, we propose how to provide the ubiquitous e-learning capability from an e-learning cloud. By utilizing a smart mobile application combined with the Quick Response Code mechanism, we can ...Authors: Wei-Ting Yeh, Chao-Tung Yang
Year Published: Mar. 2014 | 114-120 | ICDIPC2014 -
Degree of Diffusion in Real Complex Networks
A measure of information diffusion in real complex networks is the degree of diffusion. In this work, we assess the effect of information diffusion of seven different directed and undirected real ...Authors: Maytham Safar, Khaled Mahdi
Year Published: Mar. 2014 | 121-132 | ICDIPC2014 -
A Design of U-Health System on Smart Phone Using ISO/IEEE 11073 PHD Standard
In these days, U-Health indicates that health care and medical services can be applied in real-time with the support of wired and wireless communication technology. It has emerged to give solutions ...Authors: Dokyeong Lee, Gihyun Bang, Sejin Han, Deokjai Choi
Year Published: Mar. 2014 | 133-138 | ICDIPC2014 -
Monitoring Human Blood Pressure for U-Healthcare Using ISO/IEEE PHD standard
In the world, our society is faced up to aging populations. Thus, the demands of health care services, the increase of medical costs, along with problems caused by the lack of medical ...Authors: Gi Hyun Bang, Do Kyeong Lee, Deok Jai Choi
Year Published: Mar. 2014 | 139-144 | ICDIPC2014 -
Academic Timetable Generation Using Abandoned and Reborn Solution Mechanism PSO
One of the challenging heuristic problems is that how to generate an academic timetable. Many searching methods have already been applied to take care of the problem but yet some drawbacks exist. The ...Authors: Paulus Mudjihartono
Year Published: Mar. 2014 | 145-151 | ICDIPC2014 -
Nearest Group Queries with Non-Spatial Constraints
A k nearest group (kNG) search finds k closest groups of objects from multiple data sources, where each group consists of one object from each data source. In this paper, we extend the kNG ...Authors: GiWoong Nam, DongEun Kim, Hee Yong Youn, Ung-Mo Kim
Year Published: Mar. 2014 | 152-158 | ICDIPC2014 -
Distributed Processing of Range Queries with Non-Spatial Selections
In this paper, we focus on the problem of processing spatial range queries with non-spatial selections. In order to process range queries with non-spatial selections, we first introduce a baseline ...Authors: DongEun Kim, HaRim Jung, GiWoong Nam, Hee Yong Youn, Ung-Mo Kim
Year Published: Mar. 2014 | 159-165 | ICDIPC2014 -
Service Support in IT Governance, IT Management and Enterprise Architecture Context
IT decision making is supported by the different kind of frameworks for IT governance, IT management and enterprise architecture. Two main governance principles, conformance and performance, can ...Authors: Antti Lahtela, Virpi Hotti, Harri Salomaa
Year Published: Mar. 2014 | 166-172 | ICDIPC2014