2012 15th International Conference on Computer and Information Technology (ICCIT)最新文献

筛选
英文 中文
Electrical load forecasting using echo state network 基于回声状态网络的电力负荷预测
2012 15th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509763
M. Jubayer, Alam Rabin, Md. Safayet Hossain, Md. Solaiman Ahsan, Md Abu, Shahab Mollah, Enamul Kabir, M. Shahjahan
{"title":"Electrical load forecasting using echo state network","authors":"M. Jubayer, Alam Rabin, Md. Safayet Hossain, Md. Solaiman Ahsan, Md Abu, Shahab Mollah, Enamul Kabir, M. Shahjahan","doi":"10.1109/ICCITECHN.2012.6509763","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509763","url":null,"abstract":"An algorithm for half hourly electrical load forecasting based on echo state neural networks (ESN) is proposed in this paper. Electrical load forecasting is one of the most challenging real life time series prediction problems. This demands a dynamic network. ESN is a new epitome for using recurrent neural networks (RNNs) with a simpler training method. Several versions of ESN are discussed. The load profile is treated as time series signal. The forecasting performance of ESN is analysed on the basis of its key parameters. ESN is compared with feed forward neural network (FNN) and Bagged Regression trees. Simulation results demonstrate that the proposed ESN algorithms can obtain more accurate forecasting results than the FNN and Bagged Regression trees.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124535602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and performance analysis of ultra wideband Inverted-F antenna for Wi-Fi, WiMAX, WLAN and military applications 用于Wi-Fi、WiMAX、WLAN和军事应用的超宽带倒f天线设计与性能分析
2012 15th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509732
Fahim Rashid, Md. Mashud Mustafiz, M. K. Ghosh, S. Hossain
{"title":"Design and performance analysis of ultra wideband Inverted-F antenna for Wi-Fi, WiMAX, WLAN and military applications","authors":"Fahim Rashid, Md. Mashud Mustafiz, M. K. Ghosh, S. Hossain","doi":"10.1109/ICCITECHN.2012.6509732","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509732","url":null,"abstract":"In this manuscript a modified Inverted-F antenna (IFA) is designed to serve the purposes of mobile WiMAX, Wi-Fi, WLAN as well as military applications. The main intension of this work is to propose an ultra wideband antenna for multi-serving purposes with good return loss characteristics, high gain as well as impedance matched and good radiation characteristics. An ultra wideband antenna (modified double IFL antenna) is proposed which bandwidth is 2.16 GHz (3.34–5.5 GHz) serving for WiMAX (3.4–3.6 GHz), Wi-Fi (5.15–5.35 GHz), WLAN (5.15–5.35 GHz) and military (4.4–4.8 GHz) applications. The proposed antenna is of good gain and good radiation characteristics. As the dimension of the proposed antenna is very small, the antenna is promising to be embedded within the different portable devices employing Wi-Fi/ mobile WiMAX applications.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117263921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Night mode face recognition using adaptively weighted sub-pattern PCA 基于自适应加权子模式PCA的夜间模式人脸识别
2012 15th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509708
Md. Zahangir Alom, Arif Khan, Rubel Biswas, Mumit Khan
{"title":"Night mode face recognition using adaptively weighted sub-pattern PCA","authors":"Md. Zahangir Alom, Arif Khan, Rubel Biswas, Mumit Khan","doi":"10.1109/ICCITECHN.2012.6509708","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509708","url":null,"abstract":"The face recognition problem is made difficult by the great variability in head rotation and tilt, lighting intensity and angle, facial expression, aging, partial occlusion (e.g. Wearing Hats, scarves, glasses etc.), etc. Principal components from the face space are used for face recognition to reduce dimensionality of database images. However, this paper discusses on adaptively weighted sub-pattern PCA (Aw-SpPCA) based face recognition system for dark images that have captured at night. It is really difficult to capture good quality picture at night for lacking of light source with traditional acquisition devices like camera or mobile phone. The computational photographic concepts have been applied to enhance the quality of the capture images at night automatically. Multi-scale retinex color restorations (MSRCR) technique has been applied for overcome this problem. Moreover, for recognition phase of this propose method, unlike PCA based on a whole image pattern, Aw-SpPCA operates directly on its sub patterns partitioned from an original whole pattern and separately extracts features from them. Aw-SpPCA can adaptively compute the contributions of each part and then endows them to a classification task in order to enhance the robustness to both expression and illumination variations. Experimental results show that the proposed method is competitive.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115220402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Synthesizing fault tolerant safety critical systems 综合容错安全关键系统
2012 15th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2012-12-01 DOI: 10.4304/jcp.9.8.1809-01816
Seemanta Saha, M. S. Sadi
{"title":"Synthesizing fault tolerant safety critical systems","authors":"Seemanta Saha, M. S. Sadi","doi":"10.4304/jcp.9.8.1809-01816","DOIUrl":"https://doi.org/10.4304/jcp.9.8.1809-01816","url":null,"abstract":"To keep pace with today's nano-technology, safety critical embedded systems are becoming less tolerant to errors. Research into techniques to cope with errors in these systems has mostly focused on transformational approach, replication of hardware devices, parallel program design, component based design and/or information redundancy. It would be better to tackle the issue early in the design process that a safety critical system never fails to satisfy its strict dependability requirements. A novel method is outlined in this paper that proposes an efficient approach to synthesize safety critical systems. The proposed method outperforms dominant existing work by introducing the technique of run time detection and completion of proper execution of the system in presence of faults.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123470002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Obstacles invariant navigation of an autonomous robot based on GPS 基于GPS的自主机器人障碍物不变性导航
2012 15th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509782
Md. Abdullah Al Ahasan, S. A. Hossain, Ahsan Ullah Siddiquee, Md. Mahbubur Rahman
{"title":"Obstacles invariant navigation of an autonomous robot based on GPS","authors":"Md. Abdullah Al Ahasan, S. A. Hossain, Ahsan Ullah Siddiquee, Md. Mahbubur Rahman","doi":"10.1109/ICCITECHN.2012.6509782","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509782","url":null,"abstract":"Robotics has a momentous features and application in our daily life. It can make our life faster easier and comfortable. Many researchers around the world are trying to develop an effective robotic system for household or industrial equipment management purposes. Global positioning System (GPS) is good for reaching high accuracy techniques to track the equipment current position. Motivating from this works in this paper we proposed the design and development of a prototype system which is based on GPS navigation and IR sensor for detecting and avoiding obstacle in dynamic context. As per the initial experimentation, we found out that the proposed approach of obstacle avoiding mechanism is appealing and useful to the user. Some of the potential applications of the proposed system include household appliances or hospital apparatus movement and children guidance.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115705442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A novel 3-Layer user authentication system for remote accessibility 一种新型的三层远程访问用户认证系统
2012 15th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509709
M. Hasan, Prof. Dr. Kamruddin Nur
{"title":"A novel 3-Layer user authentication system for remote accessibility","authors":"M. Hasan, Prof. Dr. Kamruddin Nur","doi":"10.1109/ICCITECHN.2012.6509709","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509709","url":null,"abstract":"User authentication through password matching is an age-old issue. It has been popularly being used in the computing world for its simplicity, flexibility and remote accessibility. Although people later developed and deployed some other authentication systems like Biometrics Authentication and Token-Based Authentication; despite proving higher degree of security, they all suffer from an orthodox problem-remote accessibility to an Internet-Based System. Again, for remote access, the general trend of using textual passwords is not guaranteed to be highly secured and, most often, they are seen breached by the intruders using some common password breaking algorithms. Hence, a more reliable, robust, secured and allover simple authentication system for remote accessibility is yet needed in digital world. In this paper, we propose a 3-Layer user authentication system for remote access of Internet-based systems that is guaranteed to be more secured, robust and reliable as compared to its existing counterparts. Besides, the proposed system ensures flexibility, reduced complexity and simplicity as well.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124906461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Resolving scalability issue to ontology instance matching in Semantic Web 解决语义Web中本体实例匹配的可扩展性问题
2012 15th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509778
Rudra Pratap Deb Nath, Hanif Seddiqui, Masaki Aono
{"title":"Resolving scalability issue to ontology instance matching in Semantic Web","authors":"Rudra Pratap Deb Nath, Hanif Seddiqui, Masaki Aono","doi":"10.1109/ICCITECHN.2012.6509778","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509778","url":null,"abstract":"Ontology instance matching is a key interoperability enabler across heterogeneous data sources in the Semantic Web and a useful maneuver in some classical data integration tasks dealing with the semantic heterogeneous assignments. Though most of the research has been conducted on ontology schema level matching so far, with the introduction of Linked Open Data (LOD) and social networks, research on ontology matching is shifting from ontology schema or concept level to instance level. Since heterogeneous sources of massive ontology instances grow sharply day-by-day, scalability has become a major research issue in ontology instance matching of semantic knowledge bases. In this paper, we propose an efficient method by grouping instances of knowledge base into several sub-groups to address the scalability issue. Then, our instance matcher, which considers the semantic specification of properties associated to instances in the matching strategy, works by comparing an instance within a classification group of one knowledge base against the instances of same sub-group of other knowledge base to achieve interoperability. A novel approach for measuring the influence of properties in the matching process is also presented. The experiment and evaluation depicts satisfactory results in terms of effectiveness and scalability over baseline methods.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123103764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Color image segmentation using visible color difference and canny edge detector 利用可见色差和canny边缘检测器进行彩色图像分割
2012 15th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509727
A. G. Kibria, M. Islam
{"title":"Color image segmentation using visible color difference and canny edge detector","authors":"A. G. Kibria, M. Islam","doi":"10.1109/ICCITECHN.2012.6509727","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509727","url":null,"abstract":"This paper presents an improved version for the JSEG color image segmentation algorithm integrating visible color difference and canny edge detector to measure the boundary of the region. This method resolves the major inherent problem in JSEG caused by varying illumination using visible color difference and canny edge detector with JSEG segmented image. Experiments on natural color of Berkeley Segmentation Dataset are presented which show improved results in comparison with the classical JSEG and Fractal-JSEG algorithm.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129774119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Trust model simulation for supply chain management 供应链管理信任模型仿真
2012 15th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509744
S. A. Hossain, Y. Ouzrout
{"title":"Trust model simulation for supply chain management","authors":"S. A. Hossain, Y. Ouzrout","doi":"10.1109/ICCITECHN.2012.6509744","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509744","url":null,"abstract":"A supply chain management (SCM) is the management of network having interconnected business nodes which spans all movements of services and goods from the point of origin to the point of consumption through chaining the services within the network. In the context of SCM within PLM, Trust modeling is an important and crucial aspect from the perspective of sustainability of the supply chain and to gain efficient performance in management of product life cycle. In the supply chain, the more we trust, the more we exchange information on demand and on forecast of the last customer so as with the level of stock and on the forecast of the suppliers. In this work, we attempted to model the Trust in SCM for using Agent Modeling Language (AML) and proposed a Multi Agent System (MAS) SCM model of trust in supply chain management. The proposed model is implemented using Java Agent Development Environment (JADE) and the simulation results demonstrated the impact of trust in supply chain along with the evolution of trust.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129795646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A comprehensive tool for text categorization and text summarization in bioinformatics 生物信息学中文本分类和文本摘要的综合工具
2012 15th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509764
Mustofa Kamal, Kazi Zakia Sultana
{"title":"A comprehensive tool for text categorization and text summarization in bioinformatics","authors":"Mustofa Kamal, Kazi Zakia Sultana","doi":"10.1109/ICCITECHN.2012.6509764","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509764","url":null,"abstract":"The work focuses on the integration of text categorization and text summarization tasks based on some existing algorithms. We primarily employ the method for bioinformatics literatures to categorize them in relevant domains of bioinformatics and then get a summarized overview of each of the documents in the domain. For text categorization we have chosen three different and core domains of bioinformatics: Protein-Protein Interaction, Disease-Drug Relevance and Pathway-Process Involvement. The method uses TF-IDF based technology for the categorization task and then after categorization it summarizes the key contents of each document using some existing features. The system plays important role in automatically reducing review spaces for the researchers as they do not need to manually select their relevant texts. It also saves time by providing ranked and significantly relevant lines of the documents. Our method outperforms other existing summarization tools in the sense that it optimizes summarization by first categorizing the documents on the basis of TF-IDF technology and then avoids redundant information by properly ranking the sentences using existing score.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127888229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信