2012 15th International Conference on Computer and Information Technology (ICCIT)最新文献

筛选
英文 中文
Time and space efficient algorithm for consumer's priority product management 基于时间和空间的消费者优先级产品管理算法
2012 15th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509793
M. N. Al-Ameen, Mehrab Shahriar, A. Billah
{"title":"Time and space efficient algorithm for consumer's priority product management","authors":"M. N. Al-Ameen, Mehrab Shahriar, A. Billah","doi":"10.1109/ICCITECHN.2012.6509793","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509793","url":null,"abstract":"In this highly competitive free market economy, the test or interest of a certain consumer plays a momentous role for the business organizations to select appropriate products to be advertised to him through the online store or their website. In other words, business organizations need to be proficient in advertising their products to attract the potential consumers. To achieve the goal, organizations have to keep track of the consumers' buying habit to figure out the priority products. Thus the consumers' priority product management is a candidate for high degree of attention. In this paper, we have developed and analyzed the algorithm for consumers' priority product management with minimum time and space complexity. We use the concept of balanced binary search tree in this case to attain efficient time complexity. For reducing space requirement, we have proposed merging algorithm that incorporates with the balanced binary search tree, to achieve the optimal performances. We have simulated for 1 million test cases and our results show that the algorithm achieves a high memory saving index with logarithmic time complexity in each working round.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115785078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
UMTS and WiMAX handover performance comparison UMTS和WiMAX切换性能比较
2012 15th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509794
A. Chowdhury, M. Gregory
{"title":"UMTS and WiMAX handover performance comparison","authors":"A. Chowdhury, M. Gregory","doi":"10.1109/ICCITECHN.2012.6509794","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509794","url":null,"abstract":"Convergence of telecommunications, Internet, entertainment, and information technologies is an important driver for the seamless provisioning of multimedia services across different network types. The emergence of various radio access technologies and wireless data communication networks has revolutionized the entire telecommunications industry. By and large, 3G UMTS has become a major wireless cellular technology and IEEE 802.16 WiMAX has been widely accepted as a convenient alternative to the conventional mobile communication networks. In mobile communication systems, handoff/handover controls are critical to ensure a seamless migration as devices move from place-to-place. This paper analyzes the performance of the existing types of handover applied in the third generation mobile networks and compares them with handover used in WiMAX.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116165220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
TCP performance enhancement over IEEE 802.11 基于IEEE 802.11的TCP性能增强
2012 15th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509788
M. M. S. Kowsar, Mominul Islam
{"title":"TCP performance enhancement over IEEE 802.11","authors":"M. M. S. Kowsar, Mominul Islam","doi":"10.1109/ICCITECHN.2012.6509788","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509788","url":null,"abstract":"Transmission Control protocol (TCP) establishes a connection between two host computers in a virtual network and exchanges streams of data. TCP ensures that transfer of data and packets will be delivered in the same order as they were sent. The network topology is designed in a wireless network environment which is IEEE 802.11. TCP is a connection-oriented, end-to-end reliable protocol which is existing in our network topology. In this simulation the total number of nodes is 10. Reno, New Reno are generally used in a network topologies to control congestion. But in these cases Packet Delivery Fraction (PDF) is not sufficient, delay is high, packet loss is also high as it takes longer time to detect and recover packet loss. In order to improve retransmission scheme we propose an updated version of New Reno. It does not have to wait for 3 duplicate acknowledgements, thus it can retransmit faster and doesn't reduce the window size too much prematurely. For evaluating this performance we use NS-2.34 which is the most suitable network simulator in wired and wireless network environment.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124506507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Bringing DSpace-based digital libraries into mobile devices 将基于dspace的数字图书馆带入移动设备
2012 15th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509810
I. B. da Rosa, I. Shmorgun, S. Sousa, Veronika Rogalevits, D. Lamas
{"title":"Bringing DSpace-based digital libraries into mobile devices","authors":"I. B. da Rosa, I. Shmorgun, S. Sousa, Veronika Rogalevits, D. Lamas","doi":"10.1109/ICCITECHN.2012.6509810","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509810","url":null,"abstract":"Digital libraries (DLs) have revolutionized the access to library materials. Very often they are even the best alternative. However, in some regions where computer and Internet access are a real issue, the usage of mobile devices for accessing such libraries seem to be a good alternative. This paper presents a design of an alternative mechanism for accessing DSpace-based digital libraries on mobile phones. Such mechanism can be particularly relevant for developing countries, where there are serious problems with the traditional publishing and distribution mechanisms and where computer penetration rate is very low.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122002574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Gender effect cannonicalization for Bangla ASR 孟加拉ASR的性别效应规范化
2012 15th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509701
Md. Asfak-Ur-Rahman, Mohammed Rokibul Alam Kotwal, Foyzul Hassan, S. Ahmmed, M. N. Huda
{"title":"Gender effect cannonicalization for Bangla ASR","authors":"Md. Asfak-Ur-Rahman, Mohammed Rokibul Alam Kotwal, Foyzul Hassan, S. Ahmmed, M. N. Huda","doi":"10.1109/ICCITECHN.2012.6509701","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509701","url":null,"abstract":"This paper presents a Bangla (widely used as Bengali) automatic speech recognition system (ASR) by suppressing gender effects. Gender characteristic plays an important role on the performance of ASR. If there is a suppression process that represses the decrease of differences in acoustic-likelihood among categories resulted from gender factors, a robust ASR system can be realized. In the proposed method, we have designed a new ASR incorporating the Local Features (LFs) instead of standard mel frequency cepstral coefficients (MFCCs) as an acoustic feature for Bangla by suppressing the gender effects, which embeds three HMM-based classifiers for corresponding male, female and geneder-independent (GI) characteristics. In the experiments on Bangla speech database prepared by us, the proposed system has achieved a significant improvement of word correct rates (WCRs), word accuracies (WAs) and sentence correct rates (SCRs) in comparison with the method that incorporates Standard MFCCs.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124055726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Adaptive array antenna for WLAN: A smart approach to beam switching through phase shifting in feed network 无线局域网自适应阵列天线:一种通过馈电网络相移实现波束交换的智能方法
2012 15th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509786
Md Mirazur Rahman, S. Dey, N. Saha
{"title":"Adaptive array antenna for WLAN: A smart approach to beam switching through phase shifting in feed network","authors":"Md Mirazur Rahman, S. Dey, N. Saha","doi":"10.1109/ICCITECHN.2012.6509786","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509786","url":null,"abstract":"The WLAN is operated in some high traffic area where the radiation beam produced by the antenna is to be utilized with optimum efficiency. The aim of those antennas is to produce some directive and switched beams rather than producing Omni-directional pattern since these beam patterns are considered to be wastage in some non-used or low traffic areas. Hence, the antenna systems producing the directive and switched beams should be highly preferred for the WLAN application. A smart antenna array system performs the adaptive beam forming by focusing the beam in the desired direction and creating nulls in other directions to avoid the interference and the wasting of the beams. This is performed by the operating the phase shifting in its feed network and different ports. This paper investigates the performance of the different array patterns with different phase shifting for the optimum performance of the WLAN applications in a high congested indoor environment.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115965917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
iClassroom: Toward a low cost interactive classroom 课堂:走向低成本的互动课堂
2012 15th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509739
M A Rahman, V K Sarker, K A Sayeed
{"title":"iClassroom: Toward a low cost interactive classroom","authors":"M A Rahman, V K Sarker, K A Sayeed","doi":"10.1109/ICCITECHN.2012.6509739","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509739","url":null,"abstract":"Use of computer technology in modern student centred leaning is playing a vital role. Works are going on in the developed countries in building interactive teaching tools which will give more degrees of freedom to both the teachers and the students in the learning process. In this process, classroom itself can play an important role. So we have developed an interactive classroom. iClassroom is a low-cost classroom system with an interactive whiteboard and an automatic attendance taking system mainly for developing regions. The classroom additionally provides the control panel for electrical devices present in the classroom.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117136811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BER performance analysis of M-ary modulation techniques in an outdoor environment with MLSE equalizer over fading channels 室外环境下MLSE均衡器调制技术在衰落信道上的误码率性能分析
2012 15th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509742
T. Ahmed, M. M. Ali, M. Sarkar
{"title":"BER performance analysis of M-ary modulation techniques in an outdoor environment with MLSE equalizer over fading channels","authors":"T. Ahmed, M. M. Ali, M. Sarkar","doi":"10.1109/ICCITECHN.2012.6509742","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509742","url":null,"abstract":"In this paper, we consider a communication system that uses M-ary phase shift keying (MPSK), M-ary quadrature amplitude modulation (MQAM), M-ary differential phase shift keying (MDPSK) and M-ary pulse amplitude modulation (MPAM) to transmit information over a Rayleigh and Ricean fading channel perturbed by additive white Gaussian noise (AWGN). We model the fading channel using Jakes Doppler power spectrum and AJakes Doppler power spectrum. The performance of these different modulation techniques is analyzed in terms of bit error rate (BER) for single and multipath Rayleigh fading channel in outdoor environment by MATLAB simulation. For the simulation of fading channel the different property values e.g. path delays, average path gains, maximum Doppler shifts, Doppler spectrum parameters etc are chosen properly to a reflect realistic fading channels. In all the cases, our analysis shows that MQAM performs better and the system performance increases with the use of maximum likelihood sequence estimation (MLSE) equalizer over Rayleigh and Ricean Fading channels.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128154024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Remote-touch: Augmented reality based marker tracking for smart home control 远程触摸:基于增强现实的智能家居控制标记跟踪
2012 15th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509774
Ahmed Mohmmad Ullah, Md. Rashedul Islam, Sayeda Farzana Aktar, S. A. Hossain
{"title":"Remote-touch: Augmented reality based marker tracking for smart home control","authors":"Ahmed Mohmmad Ullah, Md. Rashedul Islam, Sayeda Farzana Aktar, S. A. Hossain","doi":"10.1109/ICCITECHN.2012.6509774","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509774","url":null,"abstract":"People of physical limitations like old age people, physically disabled people, and autistic people face a lot of challenges to accomplish their daily tasks. It is hard for them to operate regular appliances (like fan, light, opening or closing the window) which may seem very casual for us who are physically blessed. Now a days touch based controlling has greater psychological impact on human mind. Touch uses the user's imagination power more. Driven by these key thinking, we have thought of a home appliance controlling system — touch based smart home which augments the users real life experience. In this paper we describe the development of a prototype that uses the augmented reality based on touch controlling system to control the daily home appliances in a smart home. We have used a smart phone to design the user interface, QR code to track appliances, web service to communicate between the central controlling system and a client app (the smart phone), through X10 to control the appliances physically.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125038362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
A Greedy Approach in Path Selection for DFS Based Maze-map Discovery Algorithm for an autonomous robot 基于DFS的自主机器人迷宫地图发现算法路径选择中的贪心方法
2012 15th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509798
Md. Sazzad Mahmud, Ujjal Sarker, M. Islam, H. Sarwar
{"title":"A Greedy Approach in Path Selection for DFS Based Maze-map Discovery Algorithm for an autonomous robot","authors":"Md. Sazzad Mahmud, Ujjal Sarker, M. Islam, H. Sarwar","doi":"10.1109/ICCITECHN.2012.6509798","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509798","url":null,"abstract":"This research addresses the map discovery issue for an autonomous robot in an unknown maze. Breadth First Search (BFS) and Depth First Search (DFS) algorithm can be used to do it. Here, we proposed three variants of DFS to discover the map of unknown maze. We implemented Greedy Approach in Path Selection for DFS Based Maze-map Discovery Algorithm which is one of the variants of DFS based approaches. Performance analysis with standard DFS shows that this algorithm produces better result in terms of number of movements and number of rotations. However, we also found that this performance improvement is dependent on certain parameters like the starting position of the robot, presence of boxed pattern in the maze, number of walls, etc.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124688962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信