2010 13th International Conference on Computer and Information Technology (ICCIT)最新文献

筛选
英文 中文
An agent-based cooperative communication method in wireless sensor network for port logistics 港口物流无线传感器网络中基于agent的协同通信方法
2010 13th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723907
Haosong Gou, Md. Kafil Uddin, M. Hossen
{"title":"An agent-based cooperative communication method in wireless sensor network for port logistics","authors":"Haosong Gou, Md. Kafil Uddin, M. Hossen","doi":"10.1109/ICCITECHN.2010.5723907","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723907","url":null,"abstract":"Cooperative communication has been considered as a promising method for benefiting the advantages from MIMO (multiple-input multiple-output) system for single antenna mobiles in the wireless network, and many important milestones in this area have been achieved, leading to a flurry of research activity. Especially, cooperative communication in wireless sensor networks (WSNs) has gained so much interest due to the limitations of WSNs. This paper proposes a new cooperative communication method for WSNs in port logistics according to the observation of real application in port. In our proposed method, we use some fixed agents to help the sensor nodes to gain more efficient communication in the network. The simulation results and analysis show that our method achieves a good performance in enhancing the transmission and energy efficiency, resulting in improvement of the communication performance of the whole network.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122827464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optical encryption system employing orthogonal code and multiple reference-based joint transform correlation 采用正交码和基于多参考的联合变换相关的光学加密系统
2010 13th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723903
M. Islam, M. Karim
{"title":"Optical encryption system employing orthogonal code and multiple reference-based joint transform correlation","authors":"M. Islam, M. Karim","doi":"10.1109/ICCITECHN.2010.5723903","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723903","url":null,"abstract":"The paper proposes a new technology to ensure enhanced security of personal identification information or binary images through the use of encryption and multiplexing processes. Orthogonal codes are employed to encrypt the given input images so that multiple encoded images can then be mixed together to save storage space or transmission bandwidth. The multiplexed and encoded image is further encrypted employing multiple reference-based joint transform correlation. The address code is fed into four channels after performing phase shifting on them by different amount. The input image is introduced to the channels to obtain joint power spectra (JPS) signals through Fourier transformation. The resultant signals are phase-shifted and then combined to form a modified JPS signal which is then inverse Fourier transformed to yield the final and highly secure encrypted image. At the receiver, the image is Fourier transformed and multiplied by the address code used in encryption. Inverse Fourier transformation yields the multiplexed and encoded image which is then decoded using orthogonal codes. The proposed technique enhances the security performance by implementing orthogonal coding and nonlinear encryption algorithms so that no unauthorized access to or interception of information is possible. Performance of the technique is evaluated through computer simulation.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125442187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Session management protocol for virtual classroom in teleteaching 远程教学中虚拟课堂的会话管理协议
2010 13th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723879
Pallab Biswas, V. Nair, Soumen Nandi, S. Biswas, Amit Biswas, Animesh Dutta
{"title":"Session management protocol for virtual classroom in teleteaching","authors":"Pallab Biswas, V. Nair, Soumen Nandi, S. Biswas, Amit Biswas, Animesh Dutta","doi":"10.1109/ICCITECHN.2010.5723879","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723879","url":null,"abstract":"Classroom teaching has always been a face to face interaction between students and teachers and here in the proposed system we would like to preserve this aspect of teaching with help of information and communication technology. We like to bring this quality along with the concept of geographical independence in a distributed system. Teleteaching as in any collaborative system is difficult to model. Before any implementation we need to model the system. Here we have used ontology to create a level of abstraction which broadly defines a model and the dependencies of activities, thus, making the system easy to interact and modify.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125577114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Theoretical maximum throughput of IEEE 802.11e EDCA mechanism IEEE 802.11e EDCA机制的理论最大吞吐量
2010 13th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723927
N. M. Shafiul Kabir Chowdhury, Md. Shahriar Hussain, Farruk Ahmed
{"title":"Theoretical maximum throughput of IEEE 802.11e EDCA mechanism","authors":"N. M. Shafiul Kabir Chowdhury, Md. Shahriar Hussain, Farruk Ahmed","doi":"10.1109/ICCITECHN.2010.5723927","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723927","url":null,"abstract":"The goal of this paper is to validate a formulae, originally derived to calculate the throughout upper bound of the IEEE 802.11 networks, over a single Access Point (AP) based WLAN system combined with the IEEE 802.11e EDCA mechanism. In this paper some important assumptions are made to keep the formulae very simple. The most important assumption is that, the AP is providing service to client nodes with only one type of Access Category (AC) traffic at an instant. Comparing both the theoretically achieved maximum throughput and simulation results, for different access categories (ACs) and for different packet sizes we observed that the formulae is pretty much accurate except for only one test case.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121130518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A low cost realization of quantum double qutrit multiplier using ion-trap scheme 离子阱方案低成本实现量子双量程倍增器
2010 13th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723820
Faisal Mohsin
{"title":"A low cost realization of quantum double qutrit multiplier using ion-trap scheme","authors":"Faisal Mohsin","doi":"10.1109/ICCITECHN.2010.5723820","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723820","url":null,"abstract":"In this paper, we have shown a new design for double qutrit multiplier for quantum computer. This multiplier can be an essential part of quantum arithmetic logic unit (ALU). This proposal is based on ion-trap scheme of quantum computer, which is practically realizable using current technology.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122194495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Shared key vulnerability in IEEE 802.16e: Analysis & solution IEEE 802.16e共享密钥漏洞分析与解决方案
2010 13th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723926
A.K.M. Nazmus Sakib, M. M. S. Kowsar
{"title":"Shared key vulnerability in IEEE 802.16e: Analysis & solution","authors":"A.K.M. Nazmus Sakib, M. M. S. Kowsar","doi":"10.1109/ICCITECHN.2010.5723926","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723926","url":null,"abstract":"As a promising broadband wireless technology, WiMAX has many salient advantages over such as: high data rates, quality of service, scalability, security and mobility. Many sophisticated authentication and encryption techniques have been embedded into WiMAX but it still facing a lot of challenging situations. This paper shows different security vulnerabilities found in IEEE 802.16e and gives possible solutions to eliminate them. These vulnerabilities are the possibilities to forge key messages in Multi- and Broadcast operation, some unauthenticated messages which are susceptible to forgery and the unencrypted management communication which reveals important management information. We modify DH key exchange protocol to fit it into mobile WiMAX network as well as eliminate existing weakness in original DH key exchange protocol.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114632825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Performance comparison of Selection Combining diversity receivers for different modulation schemes in OFDM system OFDM系统中不同调制方案的选择组合分集接收机性能比较
2010 13th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723922
Nadia Nowshin, A. Arifuzzman, Md. Anwar Hossain, M. Tarique
{"title":"Performance comparison of Selection Combining diversity receivers for different modulation schemes in OFDM system","authors":"Nadia Nowshin, A. Arifuzzman, Md. Anwar Hossain, M. Tarique","doi":"10.1109/ICCITECHN.2010.5723922","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723922","url":null,"abstract":"This paper deals with the performance analysis (i.e., Symbol Error Rate) of M-ary Phase-shift-keying (M-PSK) and M-ary Quadrature Amplitude Modulation (M-QAM) to transmit information using Selection Combining (SC) diversity technique over flat Rayleigh communication channel with Orthogonal Frequency Division Multiplexing (OFDM). It is well known that the multipath fading phenomenon is an inherent characteristic of wireless channel. In this paper, it is shown how selection combining diversity scheme enhances reliability in wireless communication by minimizing the channel fluctuations due to fading. The simulation results show that the Signal-to-Noise Ration (SNR) varies between M-PSK and M-QAM but better SNR gain achieved as the number of receiving antenna increases like for two, three and four receiving antennas around 20–27 dB, 22–30 dB, 23–31 dB diversity gains are found respectively.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130030720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An encoding technique for design and optimization of combinational logic circuit 一种用于组合逻辑电路设计与优化的编码技术
2010 13th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723860
D. Bhadra, T. A. Tarique, S. U. Ahmed, M. Shahjahan, K. Murase
{"title":"An encoding technique for design and optimization of combinational logic circuit","authors":"D. Bhadra, T. A. Tarique, S. U. Ahmed, M. Shahjahan, K. Murase","doi":"10.1109/ICCITECHN.2010.5723860","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723860","url":null,"abstract":"A neural representation of combinational logic circuit is proposed, called ‘Logical Neural Network’ (LNN). LNN is a feed-forward neural network (NN) where the weights of the network indicate the connections of digital circuit. The logic operations of the circuit such as AND, OR, NOR etc are performed with the neurons of LNN. A modification of Simple Genetic Algorithm (mSGA) is applied to design and optimize the LNN for a given truth table. The proposed technique is experimentally studied on four bit parity checker, two bit multiplexer, two bit full adder, full subtractor, and two bit multiplier circuits. LNN is compared with conventional ‘Cell Array’ method. LNN outperforms the Cell Array method in terms of number of required gates.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"2419 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130770312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Efficient computation for k-dominant skyline queries with domination power index 具有支配权指数的k-支配天际线查询的高效计算
2010 13th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723888
Md. Anisuzzaman Siddique, Y. Morimoto
{"title":"Efficient computation for k-dominant skyline queries with domination power index","authors":"Md. Anisuzzaman Siddique, Y. Morimoto","doi":"10.1109/ICCITECHN.2010.5723888","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723888","url":null,"abstract":"Skyline queries have recently attracted a lot of attention for its intuitive query formulation. It can act as a filter to discard sub-optimal objects. However, a major drawback of skyline is that, in datasets with many dimensions, the number of skyline objects becomes large and no longer offer any interesting insights. To solve the problem, recently k-dominant skyline queries have been introduced, which can reduce the number of skyline objects by relaxing the definition of the dominance. This paper addresses the problem of k-dominant skyline objects for high dimensional dataset. We propose algorithms for k-dominant skyline computation. Through extensive experiments with real and synthetic datasets, we show that our algorithms can efficiently compute k-dominant skyline queries.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"07 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134009736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimization of control parameter of Differential Evolution algorithm for efficient design of FIR filter 差分进化算法控制参数的优化,以实现FIR滤波器的高效设计
2010 13th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723867
S. Chattopadhyay, S. K. Sanyal, A. Chandra
{"title":"Optimization of control parameter of Differential Evolution algorithm for efficient design of FIR filter","authors":"S. Chattopadhyay, S. K. Sanyal, A. Chandra","doi":"10.1109/ICCITECHN.2010.5723867","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723867","url":null,"abstract":"Modern signal processing applications invoke various evolutionary algorithms in different areas such as aerodynamic shape optimization, pattern recognition, digital filter design, automated mirror design etc. Presently, Differential Evolution (DE) algorithm has proved to be quite efficient in these areas. Digital filters of various kinds can be designed using this particular evolutionary technique. In this paper, we have studied the effect of an important control parameter namely, the Weighting Factor, on the convergence speed of the DE algorithm, associated with the efficient design of low-pass FIR filter being used subsequently as a pulse-shaping filter in a QPSK modulated system. Finally, the optimized value of the Weighting Factor for this specific design problem has been suggested. Experimentally measured Eye diagrams confirm the optimized value.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133814981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信