2012 15th International Conference on Computer and Information Technology (ICCIT)最新文献

筛选
英文 中文
Performance of decode and forward MIMO relaying for wireless uplink 无线上行链路的解码和转发MIMO中继性能
2012 15th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509777
M. Kamruzzaman
{"title":"Performance of decode and forward MIMO relaying for wireless uplink","authors":"M. Kamruzzaman","doi":"10.1109/ICCITECHN.2012.6509777","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509777","url":null,"abstract":"In this paper, performance of relay assisted wireless link is evaluated in the presence of rayleigh fading where mobile handset is equipped with single transmit antenna, relay is equipped with multiple transmit and receive antennas, and destination has multiple receive antennas. Data are modulated using QPSK or 16 QAM or 64 QAM modulator at handset and send to relay which combined and decode the incoming signal using Maximum Likelihood decoding and further encode the symbols using STBC, and the encoded data are split into n streams which are simultaneously transmitted using n transmit antennas of relay. It is observed that relay with 2 transmit antennas and 2,3,4,5 and 6 receive antennas provides 13 dB, 11 dB, 9 dB, 6 dB and 5 dB gains respectively compared to direct link at 10−5. And there are around 1.5 dB to 6 dB gains for increasing number of receiving antennas of relay from 2 to 3 or 3 to 4 but there are very little gains for increasing number of receiving antennas of relay from 4 to 5 or 5 to 6.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128317371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Analysis of Proxy Mobile IPv6: A network-based mobility solution 代理移动IPv6分析:基于网络的移动解决方案
2012 15th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509795
Md. Shohrab Hossain, Mohammed Atiquzzaman
{"title":"Analysis of Proxy Mobile IPv6: A network-based mobility solution","authors":"Md. Shohrab Hossain, Mohammed Atiquzzaman","doi":"10.1109/ICCITECHN.2012.6509795","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509795","url":null,"abstract":"Terminal-based mobility protocols require mobile devices to participate in mobility signaling that consumes lots of processing power and memory. Network-based mobility protocol, such as, Proxy Mobile IPv6, solves this problem by excluding low-end mobile devices from signaling requirement. In this paper, we have explained Proxy Mobile IPv6 architecture along with its detailed signaling diagram. We have identified the major advantages and limitations of this protocol. We have also performed the signaling cost analysis of its key mobility entities to obtain the amount of overhead on them. Results show interesting relationships among various network parameters, such as, network size, mobility rate, traffic rate. Our critical analysis can help researchers better understand the strengths and weaknesses of this protocol and our signaling analysis can be used by network engineers to estimate the resource requirements of its entities in actual deployment.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123777254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Agent based framework for providing security to data storage in cloud 基于代理的框架,为云中的数据存储提供安全性
2012 15th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509712
M. Islam, M. Habiba
{"title":"Agent based framework for providing security to data storage in cloud","authors":"M. Islam, M. Habiba","doi":"10.1109/ICCITECHN.2012.6509712","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509712","url":null,"abstract":"Cloud system framework must ensure appropriate security for data storages along with satisfied timing constrain and performance. Usually, data in cloud are very dynamic and different types of data demand different level of security. Hence, if different cloud data storages can be provided with different level of security, managing data will be more flexible and efficient; the performance of system will increase as well. Therefore, in order to ensure adequate security for different data storages in cloud, we have proposed a three tier security framework. We have analyzed the performance with respect to overhead for different security services such as confidentiality, integrity and authenticity and showed that data classification according to different level of security enhances the performance of the system that provides security services to the data in cloud.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132592798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
A Location Based Advertisement scheme using OpenStreetMap 基于OpenStreetMap的位置广告方案
2012 15th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509801
Md. Rashidujjaman Rifat, Shubrami Moutushy, H. Ferdous
{"title":"A Location Based Advertisement scheme using OpenStreetMap","authors":"Md. Rashidujjaman Rifat, Shubrami Moutushy, H. Ferdous","doi":"10.1109/ICCITECHN.2012.6509801","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509801","url":null,"abstract":"Location Based Advertisement (LBA) has become today's most personal and direct marketing channel that provides customers more relevant information, personalized message, targeted offer about products and allows marketers to reach a specific target audience by creating campaigns. Location-based advertising (LBA) is a new form of advertising that integrates mobile advertising with location based services (LBS) to provide location-specific advertisements on consumer's devices. With the help of LBA, it is possible to target population at the right place and the right time. By taking advantage of a consumer's real world position, location based advertising delivers relevant ads for products and services. In this paper the features and usability of the application, “Location Based Intelligent Advertisement using OpenStreetMap” are explained and how this type of OpenStreetMap (OSM) based LBS application is effective for Bangladesh is discussed. The application helps the registered shop owners to introduce the offers to a consumer who is in close proximity to make them take those final steps to enter his store and let the consumer know what is around him with audio and map support. Additional feature of this application is for visually impaired people so that they can shop easily. We also focus on the benefits of using an open source map over a commercial one in this respect.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131965274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Issues in implementing electronic governance: Bangladesh perspective 实施电子治理的问题:孟加拉国的观点
2012 15th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509710
S. Rajon, Md. Mahbubur Rahman
{"title":"Issues in implementing electronic governance: Bangladesh perspective","authors":"S. Rajon, Md. Mahbubur Rahman","doi":"10.1109/ICCITECHN.2012.6509710","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509710","url":null,"abstract":"This paper focuses on various approaches of implementing electronic governance in developing countries and explores the specific factors related to the challenges and opportunities in implementing electronic governance. Since, the models for implementation of electronic governance greatly varies because of certain technical and socio-economic aspects, it is essential to analyze the features related to implementing electronic governance not as a whole rather on a specific basis. As a developing country with lots of limitations like extreme shortage of resources, limitations in financing, absence of proper development planning, lack of skilled human resources, unavailability of stable and fair democracy and more importantly, a number of unavoidable circumstances including natural disasters, it is a must to analyze the concerns. In this paper, we especially present the adaptability of e-governance in the prime sectors of government for developing countries. Moreover, we provide specific recommendations for implementing e-governance in the most feasible, cost-effective, and efficient manner. Analyzing the conducted survey result through statistical procedures also derives a couple of significant factors in implementing e-governance. This paper also aims to point the possible solutions in handling the barriers to implement electronic governance. The supporting framework for integrating the overall socio-economic activities under the information and communication technology framework is also conveyed in this paper.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134531704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Human authentication process using finger knuckle surface with artificial Neural Networks based on a hybrid feature selection method 基于人工神经网络的人体指关节面认证过程混合特征选择方法
2012 15th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509771
Mobarakol Islam, M. Hasan, M. M. Farhad, T. R. Tanni
{"title":"Human authentication process using finger knuckle surface with artificial Neural Networks based on a hybrid feature selection method","authors":"Mobarakol Islam, M. Hasan, M. M. Farhad, T. R. Tanni","doi":"10.1109/ICCITECHN.2012.6509771","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509771","url":null,"abstract":"An improved human authentication process using knuckle surface for personal identification has shown promising results. The texture pattern produced by the finger knuckle bending is highly unique and makes the surface a distinctive biometric identifier. In this paper we proposed a new approach for efficient and more secure personal identification using knuckle surface. A specific data acquisition device is constructed to capture the finger knuckle surface images, and then an efficient finger knuckle print algorithm is presented with trained neural network. The finger back surface images from each of the users are normalized to minimize the scale, translation and rotational variations in the knuckle images. The main attraction of this proposed method is that a hybrid feature selection method of Lempel-Ziv Feature Selection and Principle Component Analysis is used for feature extraction and an artificial Neural Network based on Scaled Conjugate Gradient is used for the recognition. The experimental results from the proposed approach are promising and confirm. Compared with the other existing finger-back surface based biometric systems, the proposed system is more efficient and can achieve higher recognition rate in real time.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132292820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance analysis of a coherent chaos-shift keying technique 相干混沌移键控技术的性能分析
2012 15th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509721
Md. Zahid Hasan, Iftekhar Idris, A. F. M. Nokib Uddin, M. Shahjahan
{"title":"Performance analysis of a coherent chaos-shift keying technique","authors":"Md. Zahid Hasan, Iftekhar Idris, A. F. M. Nokib Uddin, M. Shahjahan","doi":"10.1109/ICCITECHN.2012.6509721","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509721","url":null,"abstract":"The transmission of binary information by using chaotic switching named as chaos-shift keying (CSK) with the generation of chaos using cubic map is presented. A system has been proposed for calculating the analytical bit-error rate (BER) of a coherent chaos-shift keying (CSK) digital communication system under an additive white Gaussian noise environment with the consideration of ideal synchronization at the receivers. The bit-error rate of the CSK system is compared with the conventional modulation techniques like ASK, FSK, and PSK. Generating the chaos with the simple cubic map, it is shown that the performance of coherent CSK system can be improved with the variations of the initial conditions of chaos generation. The bit-error rate of the CSK system is improved for both single-user and multiple-user environment.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130648876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Composite pattern matching in time series 时间序列的复合模式匹配
2012 15th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509784
A. Salekin, Md. Mustafizur Rahman, Raihanul Islam
{"title":"Composite pattern matching in time series","authors":"A. Salekin, Md. Mustafizur Rahman, Raihanul Islam","doi":"10.1109/ICCITECHN.2012.6509784","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509784","url":null,"abstract":"For last few years many research have been taken place to recognize various meaningful patterns from time series data. These researches are based on recognizing basic time series patterns. Most of these works used template based, rule based and neural network based techniques to recognize basic patterns. But in time series there exist many composite patterns comprise of simple basic patterns. In this paper we propose two novel approaches of recognizing composite patterns from time series data. In our proposed approach we use combination of template based and rule based approaches and neural network and rule based approaches to recognize these composite patterns.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114106851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Android mobile application: Remote monitoring of blood pressure Android移动应用:远程监测血压
2012 15th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509753
Md. Kamrul Hasan, Nova Ahmed, A. Islam
{"title":"Android mobile application: Remote monitoring of blood pressure","authors":"Md. Kamrul Hasan, Nova Ahmed, A. Islam","doi":"10.1109/ICCITECHN.2012.6509753","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509753","url":null,"abstract":"There has been an exponential increase in health care costs in the last decade. Seniors have to make frequent visits to their doctor to get their vital signs measured. There is a huge market for non-invasive methods of measurement of these vital signs. The objective of this paper is to design and implement a reliable, cheap, low powered, non-intrusive, and accurate system that can be worn on a regular basis and monitors the vital signs and displays the output to the user's cell phone. This paper specifically deals with the signal conditioning and data acquisition of vital sign: blood pressure. Blood pressure combines the methodologies of Electrocardiography to continuously monitor the systolic and diastolic blood pressure. Here remote monitoring of a patient's blood pressure (BP) is described. The data is transferred to a central monitoring station using a wireless sensor network for displaying and storing.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114223537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An efficient grid algorithm for faster clustering using K medoids approach 一种基于K介质的快速聚类网格算法
2012 15th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509704
G. M. Daiyan, F. Abid, Md. Ataur Rahman Khan, A. Tareq
{"title":"An efficient grid algorithm for faster clustering using K medoids approach","authors":"G. M. Daiyan, F. Abid, Md. Ataur Rahman Khan, A. Tareq","doi":"10.1109/ICCITECHN.2012.6509704","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509704","url":null,"abstract":"Clustering is the methodology to separate similar objects of data set in one cluster and dissimilar objects of data set in another cluster. K means and K medoids are most widely used Clustering algorithms for selecting group of objects for data sets. k means clustering has less time complexity than k medoids method, but k means clustering method suffers from extreme values. So, we have focused our view to k medoids clustering method. Conventional k-medoids clustering algorithm suffers from many limitations. We have done analysis on these limitations such as the problem of finding natural clusters, the dependency of output on the order of input data. In this paper we have proposed a new algorithm named Grid Multidimensional K medoids which is designed to overcome the above limitations and provide a faster clustering than K medoids.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116289885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信