2010 13th International Conference on Computer and Information Technology (ICCIT)最新文献

筛选
英文 中文
A cross layer framework for WLANs: Joint radio propagation and MAC protocol 无线局域网的跨层框架:联合无线电传播和MAC协议
2010 13th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723912
N. Sarkar
{"title":"A cross layer framework for WLANs: Joint radio propagation and MAC protocol","authors":"N. Sarkar","doi":"10.1109/ICCITECHN.2010.5723912","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723912","url":null,"abstract":"This paper proposes a cross-layer design (CLD) framework called channel-aware buffer unit multiple access (C-BUMA) for improving wireless local area network (WLAN) performance. In the framework, the radio propagation (i.e. PHY layer) is combined with the medium access control (MAC) protocol for packet transmissions. By sharing channel information with the MAC protocol, the approach reduced unnecessary packet transmissions and hence improved system performance. Through performance evaluation, we demonstrate that our CLD can significantly improve network throughput and packet delay. The proposed C-BUMA is simple and can easily be implemented in 802.11 networks without changing hardware infrastructure and no additional costs. In this paper we describe C-BUMA and present two algorithms for the implementation of the framework.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121988835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An efficient seeded tree alignment algorithm for finding the similarity score of two RNA secondary structures 一种有效的种子树比对算法,用于寻找两个RNA二级结构的相似性评分
2010 13th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723822
M. Rahman, A. K. Mia
{"title":"An efficient seeded tree alignment algorithm for finding the similarity score of two RNA secondary structures","authors":"M. Rahman, A. K. Mia","doi":"10.1109/ICCITECHN.2010.5723822","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723822","url":null,"abstract":"This paper presents an efficient O(n3) time algorithm for solving the seeded tree alignment problem that finds the similarity score of two RNA secondary structures. In the seeded tree alignment problem, a large tree, representing an RNA secondary structure, is converted into a small tree known as seeded tree. After conversion, a comparison operation is being placed to find the similarity score of necessary seed pair of two seeded trees and finally the overall trees. The algorithm is more efficient than the best known algorithm that needs O(n3.5) time.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117208071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of wireless sensor networks in forest fire detection under uncertainty 不确定条件下无线传感器网络在森林火灾探测中的应用
2010 13th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723853
Sanchita Mal-Sarkar, I. Sikder, V. Konangi
{"title":"Application of wireless sensor networks in forest fire detection under uncertainty","authors":"Sanchita Mal-Sarkar, I. Sikder, V. Konangi","doi":"10.1109/ICCITECHN.2010.5723853","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723853","url":null,"abstract":"This paper proposes a soft computing approach to manage uncertainty and rule discovery by reasoning over inconsistent, incomplete and fragmentary information using dominance-based rough set theories. A methodological and computational basis is illustrated in a sensor network application scenario of a forest fire detection system.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117216832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A composition technique of multiple switching functions based on BDD 一种基于BDD的多开关函数组合技术
2010 13th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723880
Md. Sayem Chowdury, G. M. Rokibul Hasan, K. H. Talukder
{"title":"A composition technique of multiple switching functions based on BDD","authors":"Md. Sayem Chowdury, G. M. Rokibul Hasan, K. H. Talukder","doi":"10.1109/ICCITECHN.2010.5723880","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723880","url":null,"abstract":"Binary Decision Diagram has a great impact on the Boolean function manipulation for its compressed and canonical presentation. In switching function organization ROBDD (Reduced Ordered Binary Decision Diagram) with a fixed variable ordering plays a significant role for its distinctiveness. Combination of multiple functions using switching operations has more redundant states. For removing these redundant states we apply ROBDD in this joining process. In this paper, we presented the way of combining n number of functions using ROBDD with a fixed variable ordering. In our proposed method at first, we compute each function's ROBDD over Shannon's expression. Then switching operations are going to be performed over these functions and ROBDD of the combinations of these functions are also computed. By this method, appearance of redundant states will be less. To construct an understandable and simple method, some examples have been used.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124781695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spatial data mining on literacy rates and educational establishments in Bangladesh 关于孟加拉国识字率和教育机构的空间数据挖掘
2010 13th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723890
A. K. M. Zahiduzzaman, Mohammed Nahyan Quasem, Mridul Khan, R. Rahman
{"title":"Spatial data mining on literacy rates and educational establishments in Bangladesh","authors":"A. K. M. Zahiduzzaman, Mohammed Nahyan Quasem, Mridul Khan, R. Rahman","doi":"10.1109/ICCITECHN.2010.5723890","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723890","url":null,"abstract":"Data mining is the process of extracting non-trivial patterns from large volume of data. It generates insight and turns the data into valuable information. A critical yet common flaw when performing data mining is to ignore the geographic locations from where the data is taken. When this geospatial attribute of the data is taken into consideration, the process is known to be geospatial data mining. This task essentially deals with the detection of spatial patterns in the data, the formulation of hypotheses and the assessment of descriptive or predictive spatial models. Spatial data mining could provide interesting and useful information to government, environmentalists and relevant decision makers' in the assessment of the relative performance of a particular geographic area. The results could also be used for causal analysis by domain experts. In our research we perform spatial data mining using literacy rates and the number of educational establishments. The data is from the 64 well defined administrative units of Bangladesh known as Zilas. This paper contains a summary of the theory, methodology and detailed analysis of results. We compare the results found by spatial model with classical regression model. The results demonstrate that spatial lag model outperforms the classical model in different perspectives.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125027760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Robust synchronization technique for mobile DTV broadcasting system 移动数字电视广播系统的鲁棒同步技术
2010 13th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723857
M. J. Rahman, Xianbin Wang, S. Park, H. Kim
{"title":"Robust synchronization technique for mobile DTV broadcasting system","authors":"M. J. Rahman, Xianbin Wang, S. Park, H. Kim","doi":"10.1109/ICCITECHN.2010.5723857","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723857","url":null,"abstract":"Synchronization is considered an important design issue for the implementation of digital television (DTV) receiver, specially for proper reception of multipath distorted signal at low signal to noise ratio (SNR). This challenge is more pronounced in complex multipath channel scenarios and for high mobility applications in presence of carrier frequency offset (CFO). In this paper, time domain correlation technique based on multiple PN-511 sequences is proposed to improve the synchronization performance of DTV broadcasting system that is robust against multipath impairments and CFO. Due to self-resolving capability of the multipath components, proposed synchronization algorithm provides better performance than conventional single PN-511 based algorithm in complex multipath channel. Since only the received adjacent PN-511 sequences are considered in the correlation process, the proposed technique is robust against CFO as well. In addition, the proposed technique provides higher peak-to-noise ratio (PNR), therefore this technique can be effectively used at low SNR conditions. Further, maximum likelihood (ML) estimation for multiple PN-511 based algorithm is carried out to evaluate the feasibility of the proposed algorithm.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128256350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mining classification rules via an apriori approach 通过先验方法挖掘分类规则
2010 13th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723889
S. M. Monzurur Rahman, M.R.A. Kotwal, Xinghuo Yu
{"title":"Mining classification rules via an apriori approach","authors":"S. M. Monzurur Rahman, M.R.A. Kotwal, Xinghuo Yu","doi":"10.1109/ICCITECHN.2010.5723889","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723889","url":null,"abstract":"Classification rules are the interest of most data miners to summarize the discrimination ability of classes present in data. A classification rule is an assertion, which discriminates the concepts of one class from other classes. The most classification rules mining algorithm aims to providing a single solution where multiple solutions exist. Moreover, it does not guarantee the optimal solution and user has not any control over the classification error rate. In this paper, we addressed these problems inherent in mostly used classification algorithms. A solution has been proposed to solve these problems and it has been tested with experimental data.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132071912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Construction of a multi-level Hierarchical Quasi-Cyclic matrix with layered permutation for partially-parallel LDPC decoders 部分并行LDPC译码器的多层分层排列拟循环矩阵的构造
2010 13th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723842
Vikram Arkalgud Chandrasetty, S. M. Aziz
{"title":"Construction of a multi-level Hierarchical Quasi-Cyclic matrix with layered permutation for partially-parallel LDPC decoders","authors":"Vikram Arkalgud Chandrasetty, S. M. Aziz","doi":"10.1109/ICCITECHN.2010.5723842","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723842","url":null,"abstract":"Implementation of partially-parallel (Low-Density Parity-Check) LDPC decoders using unstructured random matrices is very complex and requires huge hardware resources. To alleviate the complexity and minimize resource requirements, structured LDPC matrices are used. This paper presents a novel technique for constructing a multi-level Hierarchical Quasi-Cyclic (HQC) structured matrix for LDPC decoders. A unique multi-level structure of the proposed matrix provides flexibility in generating different code lengths and code rates for various applications such as WiMAX, WLAN and DVB-S2. In addition, different combinations of permuted sub-matrices are inserted in layers, to provide virtual randomness in the LDPC matrix. Simulations results show that the HQC matrices generated using the proposed technique have a marginal loss of less than 0.1 dB at a bit error rate (BER) performance of 10−5, compared to unstructured random matrices. The proposed matrix therefore provides BER performance close to random matrices while significantly reducing hardware resource requirements.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126823165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Sensor Proxy Mobile IPv6 (SPMIPv6) - A framework of mobility supported IP-WSN 传感器代理移动IPv6 (SPMIPv6)——一个支持IP-WSN的移动框架
2010 13th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723872
Md. Motaharul Islam, M. M. Hassan, E. Huh
{"title":"Sensor Proxy Mobile IPv6 (SPMIPv6) - A framework of mobility supported IP-WSN","authors":"Md. Motaharul Islam, M. M. Hassan, E. Huh","doi":"10.1109/ICCITECHN.2010.5723872","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723872","url":null,"abstract":"IP based Wireless Sensor Networks (IP-WSN) are gaining importance for its broad range of applications in health-care, home automation, environmental monitoring, security & safety and industrial automation. In all of these applications mobility in sensor network with special attention to energy efficiency is a major issue to be addressed. Host based mobility management protocol is inherently unsuitable for energy inefficient IPWSN. So network-based mobility management protocol can be an alternative to the mobility supported IP-WSN. In this paper we propose a mobility supported IP-WSN protocol based on PMIPv6 called Sensor Proxy Mobile IPv6 (SPMIPv6). We present its architecture, message formats and also analyze its performance considering signaling cost and mobility cost. Our analyses show that the proposed scheme reduces the signaling cost by 67% and 60% as well as reduces mobility cost by 55% and 60% with comparison to MIPv6 and PMIPv6 respectively.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134179531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A multivalued storage system using memristor 一种使用忆阻器的多值存储系统
2010 13th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723881
Faisal Mohsin
{"title":"A multivalued storage system using memristor","authors":"Faisal Mohsin","doi":"10.1109/ICCITECHN.2010.5723881","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723881","url":null,"abstract":"For many years the only known passive circuit elements were resistor, inductor and capacitor. In 1971, Leon Chua showed using argument that there should exist another passive element which he named memristor. It is basically a resistor whose resistance increases when current flows through it from one direction and decreases when current flows from the other direction. After 37 years researchers of HP became able to build world's first working memristor and surprised the electronics community. Chua proved that the characteristics of a memristor cannot be simulated using resistor, capacitor and inductor only and hence it is a fundamental element. Many new types of circuits can be built using memristor in it. But as it is a very new element so the no. of circuits is only a few. As memristor can have many resistance levels, we can use some discrete value as different logic level and thus can use in multivalued logic system. In this paper a method has been shown to achieve those different levels. Using this method we can use an array of memristor for making a non-volatile multivalued data storage system‥","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133759884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信