2010 Second International conference on Computing, Communication and Networking Technologies最新文献

筛选
英文 中文
Use of SMS in office environments 在办公环境中使用短信
G Kalaivani, Thasneem R Humaira, Year B E Iii
{"title":"Use of SMS in office environments","authors":"G Kalaivani, Thasneem R Humaira, Year B E Iii","doi":"10.1109/ICCCNT.2010.5592604","DOIUrl":"https://doi.org/10.1109/ICCCNT.2010.5592604","url":null,"abstract":"Investigations of Short Messaging System (SMS) or texting have been directed at private use and mostly the adolescent population. The present paper investigates SMS in a representative sample of office environments in a Scandinavian town. The results indicate that SMS messaging is not integrated into office work, that the messages are highly informal, mostly from the private sphere and from persons well known to the receiver. Different explanations of the infrequent use of SMS in the workplace, e.g. cost sharing between employer and employee, are proposed. One explanation ties the difference in popularity in the private and business spheres to technical aspects of the system and its user interface. This explanation is based upon the Gricean concept of conversational implicature and Clark's concept of common ground and is elaborated at length. This explanation suggests that SMS is an inherently informal communication system, ill suited to the business domain.","PeriodicalId":134352,"journal":{"name":"2010 Second International conference on Computing, Communication and Networking Technologies","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133217906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Technologies automated speech recognition approach to finger spelling 技术自动语音识别方法的手指拼写
I. Patel, Dr. Y. Srinivasa Rao
{"title":"Technologies automated speech recognition approach to finger spelling","authors":"I. Patel, Dr. Y. Srinivasa Rao","doi":"10.1109/ICCCNT.2010.5591724","DOIUrl":"https://doi.org/10.1109/ICCCNT.2010.5591724","url":null,"abstract":"This paper proposes an Automated Instrumentation system for Speech Recognition (AISR) to provide a two-way communication between deaf and vocal people. This system translates speech signal to American Sign Language. Words that correspond to signs from the American sign language dictionary calls a prerecorded American sign language (ASL) showing the sign that is played on the monitor of a portable computer. If the word does not have a corresponding sign in the sign language dictionary, it is finger spelled. This is done in real life by deaf for words that do not have specific signs like for proper names. Hidden Markov Model (HMM) is used for recognition of speech signal from the user and translated to cue symbols for vocally disabled people. The proposed task is a complementary work to the ongoing research work for recognizing the finger movement of a vocally disabled person, to speech signal called “Boltay Haath”. The proposed AISR system integrated with Boltay Haath system could eliminate the communication gap between the common man and vocally disabled people to extend in both ways","PeriodicalId":134352,"journal":{"name":"2010 Second International conference on Computing, Communication and Networking Technologies","volume":"438 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116147553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analysis of efficient wavelet based image compression techniques 基于小波的高效图像压缩技术分析
S. Raja, A. Suruliandi
{"title":"Analysis of efficient wavelet based image compression techniques","authors":"S. Raja, A. Suruliandi","doi":"10.1109/ICCCNT.2010.5591634","DOIUrl":"https://doi.org/10.1109/ICCCNT.2010.5591634","url":null,"abstract":"The objective of this paper is to implement the concept of wavelet based image compression to gray scale images using different techniques. The techniques involved in the comparison process are SPIHT, EZW and SOFM. These techniques are more efficient and provide a better quality in the image. In compression, wavelets have shown a good adaptability to a wide range of data, while being of reasonable complexity. This paper focuses important features of wavelet transform in compression of still images, including the extent to which the quality of image is degraded by the process of wavelet compression and decompression. The above techniques have been successfully used in many applications. The techniques are compared by using the performance parameters PSNR and MSE. Images obtained with those techniques yield very good results.","PeriodicalId":134352,"journal":{"name":"2010 Second International conference on Computing, Communication and Networking Technologies","volume":"448 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122599592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Isolated question words recognition from speech queries by using Artificial Neural Networks 利用人工神经网络从语音查询中分离疑问词识别
A. Sukumar, A. Shah, P. B. Anto
{"title":"Isolated question words recognition from speech queries by using Artificial Neural Networks","authors":"A. Sukumar, A. Shah, P. B. Anto","doi":"10.1109/ICCCNT.2010.5591733","DOIUrl":"https://doi.org/10.1109/ICCCNT.2010.5591733","url":null,"abstract":"Most of the research works in Information Extraction focus only on written language processing, in which a few are devoted to the study of Spoken Language Information Extraction. This paper discusses a novel technique for recognition of the isolated question words from Malayalam (one of the south Indian languages) speech query. We have created and analyzed a database consisting of 250 isolated question words. Discrete Wavelet Transform (DWT) is used for the feature extraction purpose and Artificial Neural Network (ANN) is used for classification and recognition. A recognition accuracy of 80% could be achieved from this experiment","PeriodicalId":134352,"journal":{"name":"2010 Second International conference on Computing, Communication and Networking Technologies","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123893697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Performance of joint admission and power control algorithms in Cognitive-CDMA Network 认知cdma网络中联合接纳和功率控制算法的性能
Sanjay Dhar Roy, Soumen Mondal, S. Kundu
{"title":"Performance of joint admission and power control algorithms in Cognitive-CDMA Network","authors":"Sanjay Dhar Roy, Soumen Mondal, S. Kundu","doi":"10.1109/ICCCNT.2010.5591655","DOIUrl":"https://doi.org/10.1109/ICCCNT.2010.5591655","url":null,"abstract":"In this paper, a simulation study has been carried out to evaluate performance of joint admission and power control (JAPC) algorithms in Cognitive — CDMA Networks. Performance has been evaluated for SU in an uplink scenario of CDMA network consisting primary user (PU) and secondary user (SU). A numbers of algorithms have been investigated. Long term fading has been assumed in addition to path loss in our model for evaluating performance of those algorithms. We propose a minimal signal strength removal algorithm (MSSRA) which is a low complexity algorithm. Performance of all these algorithms has been evaluated in terms of revenue and Blocking Probability in presence of PUs.","PeriodicalId":134352,"journal":{"name":"2010 Second International conference on Computing, Communication and Networking Technologies","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132518450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An efficient method for the detection of employed steganographic algorithm using Discrete Wavelet Transform 采用离散小波变换对所采用的隐写算法进行检测
S. Arivazhagan, W. Jebarani, M. Shanmugaraj
{"title":"An efficient method for the detection of employed steganographic algorithm using Discrete Wavelet Transform","authors":"S. Arivazhagan, W. Jebarani, M. Shanmugaraj","doi":"10.1109/ICCCNT.2010.5592577","DOIUrl":"https://doi.org/10.1109/ICCCNT.2010.5592577","url":null,"abstract":"Steganalysis, the art and science of deciphering a covert channel to find out any hidden messages is becoming increasingly difficult due to availability of good steganographic software. Image steganalysis, the problem dealt in this work focuses first in identifying the employed steganographic algorithm and using this information in deciphering any hidden data in cover images. Knowledge of the algorithm employed for embedding the secret data will provide a vital clue to the steganalyst in extracting the hidden message. In this work the stego images are decomposed into its approximation and detail sub bands and from the decomposed sub bands, co-occurrence and statistical features are derived. This leads to detection of steganographic algorithm which in turn leads to faster recovery of hidden/secret data.","PeriodicalId":134352,"journal":{"name":"2010 Second International conference on Computing, Communication and Networking Technologies","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130736667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Evaluation of Error Metrics for Image Registration of Multiple Images 多图像配准误差度量的评价
Prakash Duraisamny, Kamnesh Namnuduri, S. Jackson
{"title":"Evaluation of Error Metrics for Image Registration of Multiple Images","authors":"Prakash Duraisamny, Kamnesh Namnuduri, S. Jackson","doi":"10.1109/ICCCNT.2010.5635425","DOIUrl":"https://doi.org/10.1109/ICCCNT.2010.5635425","url":null,"abstract":"When two or more images of a scene are joined, one would like to know the accuracy of the joined image. In this paper we carry out a comparison of several different error metrics which are computed directly from the given images and their join (i.e., no \"ground truth\" value is assumed). We compare the error metrics by correlating them with a map registration error which we regard as a \"ground truth\" or \"gold standard.\" The goal is to have a notion of reliability of the different error metrics which will be valid when ground truth reference is not available. This analysis should be a useful tool for quantifying aspects of image registration algorithms and for tuning the parameters of the registration algorithm.","PeriodicalId":134352,"journal":{"name":"2010 Second International conference on Computing, Communication and Networking Technologies","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131092370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cooperative MIMO transmissions using threshold based MAC protocol in wireless sensor network 基于阈值MAC协议的无线传感器网络协同MIMO传输
J. Vidhya, S. Shobana, S. Divyanka, K. Alamelu, P. Dananjayan
{"title":"Cooperative MIMO transmissions using threshold based MAC protocol in wireless sensor network","authors":"J. Vidhya, S. Shobana, S. Divyanka, K. Alamelu, P. Dananjayan","doi":"10.1109/ICCCNT.2010.5591757","DOIUrl":"https://doi.org/10.1109/ICCCNT.2010.5591757","url":null,"abstract":"Sensor network requires robust and efficient communication protocols to maximise the network lifetime. Radio irregularity, channel fading and interference results in larger energy consumption and latency for packet transmission over wireless channel. Cooperative multi-input multi-output (MIMO) scheme can significantly improve the communication performance when incorporated in wireless sensor network (WSN). The medium access control (MAC) protocol designed for the network must be stable and should improve the performance gains of MIMO. Hence, this paper proposes a distributed threshold based MAC protocol for cooperative MIMO transmissions using space time block code (STBC). The protocol uses thresholding scheme that is updated dynamically based on queue length at the sending node to achieve lesser energy consumption and minimise latency ensuring stability of transmission queues at the nodes. STBC and code combining techniques are applied to utilise inherent spatial diversity in wireless cooperative MIMO systems. The performance of the proposed protocol is evaluated and compared with fixed group size cooperative MIMO MAC protocol with and without STBC coding. Results show that the proposed protocol outperforms point to point communication and MIMO MAC protocol that use fixed cooperative group size. For the proposed MAC protocol, STBC technique provides significant energy savings and minimises the packet delay by leveraging MIMO diversity gains.","PeriodicalId":134352,"journal":{"name":"2010 Second International conference on Computing, Communication and Networking Technologies","volume":"755 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116409788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extraction and quantification techniques for abnormality detection from medical thermographs in human 人体医用热像仪异常检测的提取和定量技术
N. Selvarasu, A. Nachiappan, N. Nandhitha
{"title":"Extraction and quantification techniques for abnormality detection from medical thermographs in human","authors":"N. Selvarasu, A. Nachiappan, N. Nandhitha","doi":"10.1109/ICCCNT.2010.5591808","DOIUrl":"https://doi.org/10.1109/ICCCNT.2010.5591808","url":null,"abstract":"Nowadays Infrared thermography is widely accepted as a medical diagnostic tool. Thermographs are acquired for the whole body or the region of interest. Thermographs are processed for abnormality detection and quantification. As temperature variations are not normally visible to naked eye it is necessary to develop and analyze the feature extraction algorithms for abnormality detection. This paper analyzes the performance of three feature extraction algorithms used for abnormality detection. The developed techniques are applied on Arthritis and stress fracture thermographs.","PeriodicalId":134352,"journal":{"name":"2010 Second International conference on Computing, Communication and Networking Technologies","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121935722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An optimal agent-based architecture for dynamic Web service discovery with QoS 用于具有QoS的动态Web服务发现的基于代理的最佳体系结构
T. Rajendran, P. Balasubramanie
{"title":"An optimal agent-based architecture for dynamic Web service discovery with QoS","authors":"T. Rajendran, P. Balasubramanie","doi":"10.1109/ICCCNT.2010.5591673","DOIUrl":"https://doi.org/10.1109/ICCCNT.2010.5591673","url":null,"abstract":"Web service is a new paradigm of using the Web. One of the fundamental supports of the web service vision is a brokerage system that enables services to be published to a searchable repository and later retrieved by potential users. Automated Web service discovery is a key challenge in Service Oriented Architecture (SOA) research. There exist many web services which exhibit similar functional characteristics. It is imperative to provide service consumers with facilities for discovering required web services according to their nonfunctional aspects like QoS. An important issue arising from Web Service applications is how to conveniently, accurately and efficiently retrieve services from large-scale and expanding service repositories. The QoS based web service discovery play an essential role in SOA because most of the applications want to use services that accurately meet their requirements. We propose the agent-based architecture for dynamic Web service discovery which facilitates the requester to specify his/her QoS requirements along with functional requirements. In this paper, we propose a novel approach for designing and developing an agent-based architecture and its QoS-based matching, ranking and selection algorithm for evaluating web services. The paper presents an optimal approach for finding the most suitable web service according to the consumer's requirements.","PeriodicalId":134352,"journal":{"name":"2010 Second International conference on Computing, Communication and Networking Technologies","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114198902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信