2012 15th International Conference on Computer and Information Technology (ICCIT)最新文献

筛选
英文 中文
On acyclic colorings of graphs 关于图的无环着色
2012 15th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509751
Abu Reyan Ahmed, Md. Mazharul Islam, M. S. Rahman
{"title":"On acyclic colorings of graphs","authors":"Abu Reyan Ahmed, Md. Mazharul Islam, M. S. Rahman","doi":"10.1109/ICCITECHN.2012.6509751","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509751","url":null,"abstract":"An acyclic coloring of a graph G is a coloring of the vertices of G, where no two adjacent vertices of G receive the same color and no cycle of G contains vertices of only two colors. An acyclic k-coloring of a graph G is an acyclic coloring of G using k colors. In this paper we show the necessary and sufficient condition of acyclic coloring of a complete k-partite graph. Then we derive the minimum number of colors for acyclic coloring of such graphs. We also show that a complete k-partite graph G having n<inf>1</inf>, n<inf>2</inf>,…, n<inf>k</inf> vertices in its Ρ<inf>1</inf>,Ρ<inf>2</inf>,…, P<inf>k</inf> partition respectively is acyclically (2k − 1)-colorable using ∑<inf>i≠j, i, j≤k</inf> n<inf>i</inf>n<inf>j</inf> + n<inf>max</inf> + (k−1) − ∑<sup>k−1</sup><inf>i=0</inf> (k−i)n<inf>i+1</inf> division vertices, where n<inf>max</inf> = max(n<inf>1</inf>, n<inf>2</inf>,…, n<inf>k</inf>). Finally we show that there is an infinite number of cubic planar graphs which are acyclically 3-colorable.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115438620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Multiband fractal square Koch antenna design for UHF/SHF application 用于超高频/超高频的多波段分形方形科赫天线设计
2012 15th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509730
Dilara Khatun, M. Shahjahan
{"title":"Multiband fractal square Koch antenna design for UHF/SHF application","authors":"Dilara Khatun, M. Shahjahan","doi":"10.1109/ICCITECHN.2012.6509730","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509730","url":null,"abstract":"There exists various types of antennas for various purposes, but the interest in this area is increasing day by day. There have been ever growing demands for antenna designs that possess the highly desirable properties: compact size, low profile, multi-band, wide bandwidth, high gain, improved SWR etc. Fractal antennas can be used to meet these demands. This paper represents the analysis and design of multiband square Koch fractal dipole antenna, where it is shown that as the iterations are increased, the band of frequencies also increase. The designed antenna has operating frequencies for first iteration are of 496 MHz and 1430 MHz, and for second iteration are of 460 MHz, 1248 MHz, 1926 MHz and 4390 MHz with acceptable bandwidth, which has useful applications in UHF/SHF. The radiation characteristics, SWR, reflection-coefficient, input impedance and gain of the proposed antenna are described with 4NEC2 Software package. Here, the antenna is placed in the XY-plane for the first iteration and in YZ-plane for the second iteration.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115738158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Human authentication process using finger knuckle surface with artificial Neural Networks based on a hybrid feature selection method 基于人工神经网络的人体指关节面认证过程混合特征选择方法
2012 15th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509771
Mobarakol Islam, M. Hasan, M. M. Farhad, T. R. Tanni
{"title":"Human authentication process using finger knuckle surface with artificial Neural Networks based on a hybrid feature selection method","authors":"Mobarakol Islam, M. Hasan, M. M. Farhad, T. R. Tanni","doi":"10.1109/ICCITECHN.2012.6509771","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509771","url":null,"abstract":"An improved human authentication process using knuckle surface for personal identification has shown promising results. The texture pattern produced by the finger knuckle bending is highly unique and makes the surface a distinctive biometric identifier. In this paper we proposed a new approach for efficient and more secure personal identification using knuckle surface. A specific data acquisition device is constructed to capture the finger knuckle surface images, and then an efficient finger knuckle print algorithm is presented with trained neural network. The finger back surface images from each of the users are normalized to minimize the scale, translation and rotational variations in the knuckle images. The main attraction of this proposed method is that a hybrid feature selection method of Lempel-Ziv Feature Selection and Principle Component Analysis is used for feature extraction and an artificial Neural Network based on Scaled Conjugate Gradient is used for the recognition. The experimental results from the proposed approach are promising and confirm. Compared with the other existing finger-back surface based biometric systems, the proposed system is more efficient and can achieve higher recognition rate in real time.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132292820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Location Based Advertisement scheme using OpenStreetMap 基于OpenStreetMap的位置广告方案
2012 15th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509801
Md. Rashidujjaman Rifat, Shubrami Moutushy, H. Ferdous
{"title":"A Location Based Advertisement scheme using OpenStreetMap","authors":"Md. Rashidujjaman Rifat, Shubrami Moutushy, H. Ferdous","doi":"10.1109/ICCITECHN.2012.6509801","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509801","url":null,"abstract":"Location Based Advertisement (LBA) has become today's most personal and direct marketing channel that provides customers more relevant information, personalized message, targeted offer about products and allows marketers to reach a specific target audience by creating campaigns. Location-based advertising (LBA) is a new form of advertising that integrates mobile advertising with location based services (LBS) to provide location-specific advertisements on consumer's devices. With the help of LBA, it is possible to target population at the right place and the right time. By taking advantage of a consumer's real world position, location based advertising delivers relevant ads for products and services. In this paper the features and usability of the application, “Location Based Intelligent Advertisement using OpenStreetMap” are explained and how this type of OpenStreetMap (OSM) based LBS application is effective for Bangladesh is discussed. The application helps the registered shop owners to introduce the offers to a consumer who is in close proximity to make them take those final steps to enter his store and let the consumer know what is around him with audio and map support. Additional feature of this application is for visually impaired people so that they can shop easily. We also focus on the benefits of using an open source map over a commercial one in this respect.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131965274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Agent based framework for providing security to data storage in cloud 基于代理的框架,为云中的数据存储提供安全性
2012 15th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509712
M. Islam, M. Habiba
{"title":"Agent based framework for providing security to data storage in cloud","authors":"M. Islam, M. Habiba","doi":"10.1109/ICCITECHN.2012.6509712","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509712","url":null,"abstract":"Cloud system framework must ensure appropriate security for data storages along with satisfied timing constrain and performance. Usually, data in cloud are very dynamic and different types of data demand different level of security. Hence, if different cloud data storages can be provided with different level of security, managing data will be more flexible and efficient; the performance of system will increase as well. Therefore, in order to ensure adequate security for different data storages in cloud, we have proposed a three tier security framework. We have analyzed the performance with respect to overhead for different security services such as confidentiality, integrity and authenticity and showed that data classification according to different level of security enhances the performance of the system that provides security services to the data in cloud.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132592798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Issues in implementing electronic governance: Bangladesh perspective 实施电子治理的问题:孟加拉国的观点
2012 15th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509710
S. Rajon, Md. Mahbubur Rahman
{"title":"Issues in implementing electronic governance: Bangladesh perspective","authors":"S. Rajon, Md. Mahbubur Rahman","doi":"10.1109/ICCITECHN.2012.6509710","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509710","url":null,"abstract":"This paper focuses on various approaches of implementing electronic governance in developing countries and explores the specific factors related to the challenges and opportunities in implementing electronic governance. Since, the models for implementation of electronic governance greatly varies because of certain technical and socio-economic aspects, it is essential to analyze the features related to implementing electronic governance not as a whole rather on a specific basis. As a developing country with lots of limitations like extreme shortage of resources, limitations in financing, absence of proper development planning, lack of skilled human resources, unavailability of stable and fair democracy and more importantly, a number of unavoidable circumstances including natural disasters, it is a must to analyze the concerns. In this paper, we especially present the adaptability of e-governance in the prime sectors of government for developing countries. Moreover, we provide specific recommendations for implementing e-governance in the most feasible, cost-effective, and efficient manner. Analyzing the conducted survey result through statistical procedures also derives a couple of significant factors in implementing e-governance. This paper also aims to point the possible solutions in handling the barriers to implement electronic governance. The supporting framework for integrating the overall socio-economic activities under the information and communication technology framework is also conveyed in this paper.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134531704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance analysis of a coherent chaos-shift keying technique 相干混沌移键控技术的性能分析
2012 15th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509721
Md. Zahid Hasan, Iftekhar Idris, A. F. M. Nokib Uddin, M. Shahjahan
{"title":"Performance analysis of a coherent chaos-shift keying technique","authors":"Md. Zahid Hasan, Iftekhar Idris, A. F. M. Nokib Uddin, M. Shahjahan","doi":"10.1109/ICCITECHN.2012.6509721","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509721","url":null,"abstract":"The transmission of binary information by using chaotic switching named as chaos-shift keying (CSK) with the generation of chaos using cubic map is presented. A system has been proposed for calculating the analytical bit-error rate (BER) of a coherent chaos-shift keying (CSK) digital communication system under an additive white Gaussian noise environment with the consideration of ideal synchronization at the receivers. The bit-error rate of the CSK system is compared with the conventional modulation techniques like ASK, FSK, and PSK. Generating the chaos with the simple cubic map, it is shown that the performance of coherent CSK system can be improved with the variations of the initial conditions of chaos generation. The bit-error rate of the CSK system is improved for both single-user and multiple-user environment.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130648876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Composite pattern matching in time series 时间序列的复合模式匹配
2012 15th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509784
A. Salekin, Md. Mustafizur Rahman, Raihanul Islam
{"title":"Composite pattern matching in time series","authors":"A. Salekin, Md. Mustafizur Rahman, Raihanul Islam","doi":"10.1109/ICCITECHN.2012.6509784","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509784","url":null,"abstract":"For last few years many research have been taken place to recognize various meaningful patterns from time series data. These researches are based on recognizing basic time series patterns. Most of these works used template based, rule based and neural network based techniques to recognize basic patterns. But in time series there exist many composite patterns comprise of simple basic patterns. In this paper we propose two novel approaches of recognizing composite patterns from time series data. In our proposed approach we use combination of template based and rule based approaches and neural network and rule based approaches to recognize these composite patterns.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":"8 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114106851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Android mobile application: Remote monitoring of blood pressure Android移动应用:远程监测血压
2012 15th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509753
Md. Kamrul Hasan, Nova Ahmed, A. Islam
{"title":"Android mobile application: Remote monitoring of blood pressure","authors":"Md. Kamrul Hasan, Nova Ahmed, A. Islam","doi":"10.1109/ICCITECHN.2012.6509753","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509753","url":null,"abstract":"There has been an exponential increase in health care costs in the last decade. Seniors have to make frequent visits to their doctor to get their vital signs measured. There is a huge market for non-invasive methods of measurement of these vital signs. The objective of this paper is to design and implement a reliable, cheap, low powered, non-intrusive, and accurate system that can be worn on a regular basis and monitors the vital signs and displays the output to the user's cell phone. This paper specifically deals with the signal conditioning and data acquisition of vital sign: blood pressure. Blood pressure combines the methodologies of Electrocardiography to continuously monitor the systolic and diastolic blood pressure. Here remote monitoring of a patient's blood pressure (BP) is described. The data is transferred to a central monitoring station using a wireless sensor network for displaying and storing.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":"194 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114223537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An efficient grid algorithm for faster clustering using K medoids approach 一种基于K介质的快速聚类网格算法
2012 15th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509704
G. M. Daiyan, F. Abid, Md. Ataur Rahman Khan, A. Tareq
{"title":"An efficient grid algorithm for faster clustering using K medoids approach","authors":"G. M. Daiyan, F. Abid, Md. Ataur Rahman Khan, A. Tareq","doi":"10.1109/ICCITECHN.2012.6509704","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509704","url":null,"abstract":"Clustering is the methodology to separate similar objects of data set in one cluster and dissimilar objects of data set in another cluster. K means and K medoids are most widely used Clustering algorithms for selecting group of objects for data sets. k means clustering has less time complexity than k medoids method, but k means clustering method suffers from extreme values. So, we have focused our view to k medoids clustering method. Conventional k-medoids clustering algorithm suffers from many limitations. We have done analysis on these limitations such as the problem of finding natural clusters, the dependency of output on the order of input data. In this paper we have proposed a new algorithm named Grid Multidimensional K medoids which is designed to overcome the above limitations and provide a faster clustering than K medoids.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":"76 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116289885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信