{"title":"A cross layer framework for WLANs: Joint radio propagation and MAC protocol","authors":"N. Sarkar","doi":"10.1109/ICCITECHN.2010.5723912","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723912","url":null,"abstract":"This paper proposes a cross-layer design (CLD) framework called channel-aware buffer unit multiple access (C-BUMA) for improving wireless local area network (WLAN) performance. In the framework, the radio propagation (i.e. PHY layer) is combined with the medium access control (MAC) protocol for packet transmissions. By sharing channel information with the MAC protocol, the approach reduced unnecessary packet transmissions and hence improved system performance. Through performance evaluation, we demonstrate that our CLD can significantly improve network throughput and packet delay. The proposed C-BUMA is simple and can easily be implemented in 802.11 networks without changing hardware infrastructure and no additional costs. In this paper we describe C-BUMA and present two algorithms for the implementation of the framework.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121988835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient seeded tree alignment algorithm for finding the similarity score of two RNA secondary structures","authors":"M. Rahman, A. K. Mia","doi":"10.1109/ICCITECHN.2010.5723822","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723822","url":null,"abstract":"This paper presents an efficient O(n3) time algorithm for solving the seeded tree alignment problem that finds the similarity score of two RNA secondary structures. In the seeded tree alignment problem, a large tree, representing an RNA secondary structure, is converted into a small tree known as seeded tree. After conversion, a comparison operation is being placed to find the similarity score of necessary seed pair of two seeded trees and finally the overall trees. The algorithm is more efficient than the best known algorithm that needs O(n3.5) time.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117208071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of wireless sensor networks in forest fire detection under uncertainty","authors":"Sanchita Mal-Sarkar, I. Sikder, V. Konangi","doi":"10.1109/ICCITECHN.2010.5723853","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723853","url":null,"abstract":"This paper proposes a soft computing approach to manage uncertainty and rule discovery by reasoning over inconsistent, incomplete and fragmentary information using dominance-based rough set theories. A methodological and computational basis is illustrated in a sensor network application scenario of a forest fire detection system.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117216832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Md. Sayem Chowdury, G. M. Rokibul Hasan, K. H. Talukder
{"title":"A composition technique of multiple switching functions based on BDD","authors":"Md. Sayem Chowdury, G. M. Rokibul Hasan, K. H. Talukder","doi":"10.1109/ICCITECHN.2010.5723880","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723880","url":null,"abstract":"Binary Decision Diagram has a great impact on the Boolean function manipulation for its compressed and canonical presentation. In switching function organization ROBDD (Reduced Ordered Binary Decision Diagram) with a fixed variable ordering plays a significant role for its distinctiveness. Combination of multiple functions using switching operations has more redundant states. For removing these redundant states we apply ROBDD in this joining process. In this paper, we presented the way of combining n number of functions using ROBDD with a fixed variable ordering. In our proposed method at first, we compute each function's ROBDD over Shannon's expression. Then switching operations are going to be performed over these functions and ROBDD of the combinations of these functions are also computed. By this method, appearance of redundant states will be less. To construct an understandable and simple method, some examples have been used.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124781695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. K. M. Zahiduzzaman, Mohammed Nahyan Quasem, Mridul Khan, R. Rahman
{"title":"Spatial data mining on literacy rates and educational establishments in Bangladesh","authors":"A. K. M. Zahiduzzaman, Mohammed Nahyan Quasem, Mridul Khan, R. Rahman","doi":"10.1109/ICCITECHN.2010.5723890","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723890","url":null,"abstract":"Data mining is the process of extracting non-trivial patterns from large volume of data. It generates insight and turns the data into valuable information. A critical yet common flaw when performing data mining is to ignore the geographic locations from where the data is taken. When this geospatial attribute of the data is taken into consideration, the process is known to be geospatial data mining. This task essentially deals with the detection of spatial patterns in the data, the formulation of hypotheses and the assessment of descriptive or predictive spatial models. Spatial data mining could provide interesting and useful information to government, environmentalists and relevant decision makers' in the assessment of the relative performance of a particular geographic area. The results could also be used for causal analysis by domain experts. In our research we perform spatial data mining using literacy rates and the number of educational establishments. The data is from the 64 well defined administrative units of Bangladesh known as Zilas. This paper contains a summary of the theory, methodology and detailed analysis of results. We compare the results found by spatial model with classical regression model. The results demonstrate that spatial lag model outperforms the classical model in different perspectives.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125027760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust synchronization technique for mobile DTV broadcasting system","authors":"M. J. Rahman, Xianbin Wang, S. Park, H. Kim","doi":"10.1109/ICCITECHN.2010.5723857","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723857","url":null,"abstract":"Synchronization is considered an important design issue for the implementation of digital television (DTV) receiver, specially for proper reception of multipath distorted signal at low signal to noise ratio (SNR). This challenge is more pronounced in complex multipath channel scenarios and for high mobility applications in presence of carrier frequency offset (CFO). In this paper, time domain correlation technique based on multiple PN-511 sequences is proposed to improve the synchronization performance of DTV broadcasting system that is robust against multipath impairments and CFO. Due to self-resolving capability of the multipath components, proposed synchronization algorithm provides better performance than conventional single PN-511 based algorithm in complex multipath channel. Since only the received adjacent PN-511 sequences are considered in the correlation process, the proposed technique is robust against CFO as well. In addition, the proposed technique provides higher peak-to-noise ratio (PNR), therefore this technique can be effectively used at low SNR conditions. Further, maximum likelihood (ML) estimation for multiple PN-511 based algorithm is carried out to evaluate the feasibility of the proposed algorithm.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128256350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mining classification rules via an apriori approach","authors":"S. M. Monzurur Rahman, M.R.A. Kotwal, Xinghuo Yu","doi":"10.1109/ICCITECHN.2010.5723889","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723889","url":null,"abstract":"Classification rules are the interest of most data miners to summarize the discrimination ability of classes present in data. A classification rule is an assertion, which discriminates the concepts of one class from other classes. The most classification rules mining algorithm aims to providing a single solution where multiple solutions exist. Moreover, it does not guarantee the optimal solution and user has not any control over the classification error rate. In this paper, we addressed these problems inherent in mostly used classification algorithms. A solution has been proposed to solve these problems and it has been tested with experimental data.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132071912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Construction of a multi-level Hierarchical Quasi-Cyclic matrix with layered permutation for partially-parallel LDPC decoders","authors":"Vikram Arkalgud Chandrasetty, S. M. Aziz","doi":"10.1109/ICCITECHN.2010.5723842","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723842","url":null,"abstract":"Implementation of partially-parallel (Low-Density Parity-Check) LDPC decoders using unstructured random matrices is very complex and requires huge hardware resources. To alleviate the complexity and minimize resource requirements, structured LDPC matrices are used. This paper presents a novel technique for constructing a multi-level Hierarchical Quasi-Cyclic (HQC) structured matrix for LDPC decoders. A unique multi-level structure of the proposed matrix provides flexibility in generating different code lengths and code rates for various applications such as WiMAX, WLAN and DVB-S2. In addition, different combinations of permuted sub-matrices are inserted in layers, to provide virtual randomness in the LDPC matrix. Simulations results show that the HQC matrices generated using the proposed technique have a marginal loss of less than 0.1 dB at a bit error rate (BER) performance of 10−5, compared to unstructured random matrices. The proposed matrix therefore provides BER performance close to random matrices while significantly reducing hardware resource requirements.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126823165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sensor Proxy Mobile IPv6 (SPMIPv6) - A framework of mobility supported IP-WSN","authors":"Md. Motaharul Islam, M. M. Hassan, E. Huh","doi":"10.1109/ICCITECHN.2010.5723872","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723872","url":null,"abstract":"IP based Wireless Sensor Networks (IP-WSN) are gaining importance for its broad range of applications in health-care, home automation, environmental monitoring, security & safety and industrial automation. In all of these applications mobility in sensor network with special attention to energy efficiency is a major issue to be addressed. Host based mobility management protocol is inherently unsuitable for energy inefficient IPWSN. So network-based mobility management protocol can be an alternative to the mobility supported IP-WSN. In this paper we propose a mobility supported IP-WSN protocol based on PMIPv6 called Sensor Proxy Mobile IPv6 (SPMIPv6). We present its architecture, message formats and also analyze its performance considering signaling cost and mobility cost. Our analyses show that the proposed scheme reduces the signaling cost by 67% and 60% as well as reduces mobility cost by 55% and 60% with comparison to MIPv6 and PMIPv6 respectively.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134179531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A multivalued storage system using memristor","authors":"Faisal Mohsin","doi":"10.1109/ICCITECHN.2010.5723881","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723881","url":null,"abstract":"For many years the only known passive circuit elements were resistor, inductor and capacitor. In 1971, Leon Chua showed using argument that there should exist another passive element which he named memristor. It is basically a resistor whose resistance increases when current flows through it from one direction and decreases when current flows from the other direction. After 37 years researchers of HP became able to build world's first working memristor and surprised the electronics community. Chua proved that the characteristics of a memristor cannot be simulated using resistor, capacitor and inductor only and hence it is a fundamental element. Many new types of circuits can be built using memristor in it. But as it is a very new element so the no. of circuits is only a few. As memristor can have many resistance levels, we can use some discrete value as different logic level and thus can use in multivalued logic system. In this paper a method has been shown to achieve those different levels. Using this method we can use an array of memristor for making a non-volatile multivalued data storage system‥","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133759884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}