Md. Shohrab Hossain, Mohammed Atiquzzaman, W. Ivancic
{"title":"Performance analysis of NEMO using city section mobility model","authors":"Md. Shohrab Hossain, Mohammed Atiquzzaman, W. Ivancic","doi":"10.1109/ICCITECHN.2010.5723911","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723911","url":null,"abstract":"Mobile networks can be formed in bus, train, aircrafts, satellites with a wide variety of on-board IP-enable devices and Network Mobility (NEMO) protocols are required to support uninterrupted services to ongoing sessions. Node mobility has a direct impact on the performance evaluation of various NEMO protocols. However, most of the analysis on mobility protocols used random waypoint mobility model which does not always represent real-world movement patterns in city streets. In this paper, we have used city section mobility model, a realistic street mobility model, to analyze the performance of the basic network-mobility protocol. We have used ns-2 simulation to compare the performance of NEMO using city section and random waypoint models. Results have been obtained for average throughput, packet drop probability, end-to-end delay, handoff frequency, and signaling overhead and show significant deviation between the mobility models. Our analysis thus can help in estimating the various performance metrics of mobile network deployed in city streets.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133920362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed memory caching for the fail safe computation to improve the Grid performance","authors":"S. Ismail, Alam Shumon, M. Amin","doi":"10.1109/ICCITECHN.2010.5723854","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723854","url":null,"abstract":"Grid computing organizes geographically distributed resources under a single platform and let the users access this combined power. In this paper we have discussed the application of distributed memory caching system in the Grid computing environment to improve its computational environment. For our experiment, we used Alchemi, a .net based Grid computing framework and Memcached, a distributed memory caching technique. We completed couple of experiments in this environment and they demonstrated two very important outcomes. One of the outcomes outlined that distributed memory caching technique can provide fail safe computation for the Grid environment. The second result represented the reduction of the total computational time of the Grid applications. Based on the results of these current experiments and also previous experiments completed in our distributed computing laboratory we have proposed a new technique for the Grid computing environment that can provide performance improvement as well as the fail safe Grid computing environment.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129690880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spatio-temporal template discovery using rough set theory","authors":"Sanchita Mal-Sarkar, I. Sikder, V. Konangi","doi":"10.1109/ICCITECHN.2010.5723833","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723833","url":null,"abstract":"Real-time stream data is characterized by spatial and temporal variability and is subject to unbounded or constantly evolving entities. The challenge is how to aggregate these unbounded data streams at different spaces and times to provide effective decisions making in real-time. This paper proposes a rough set-based sliding window framework for stream data aggregation. Based on current data streams, it identifies interesting spatio-temporal patterns, and generates rough set If … Then decision rules. Proposed formalism has been tested on sea surface temperature data from NOAA's TAO/TRITON project. Such a pattern-based data aggregation scheme has the potential to significantly reduce data communications in decision making.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115494541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PAIZM-CPC: Enhancement of spectrum co-existence in wireless networks","authors":"Md. Akbar Hossain, S. Haque","doi":"10.1109/ICCITECHN.2010.5723920","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723920","url":null,"abstract":"Next generation wireless networks will be heterogeneous, where several primary users (PU e.g. licensed users) and secondary users (SU e.g. unlicensed users) can operate in the same dynamic and reconfigurable networks at a given time. The major challenge in this heterogeneous radio environment is to enable the coexistence between PU and SU which will further improve the efficient use of radio spectrum. Most of the existing coexistence techniques encounter with challenges due to lack of a priori knowledge about the primary system. Therefore Cognitive pilot channel (CPC) is a proposed approach which could enhance the coexistence by conveying some priori information. However, to achieve a peaceful coexistence it is essential to adopt a mitigation technique according to the CPC information. There is no algorithm has been described so far to integrate the CPC information with existing mitigation technique. In this paper, we proposed a novel power adaptation and integrated zone model (PAIZM) CPC algorithm for peaceful coexistence in heterogeneous networks. Moreover we have implemented and evaluated the PAIZM-CPC model as a coexistence enabler. The results show an enhancement compared with the existing coexistence techniques.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"256 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121333392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance limitations in fiber Bragg grating based optical add-drop multiplexer due to crosstalk","authors":"M. Mahiuddin, M. S. Islam","doi":"10.4304/jnw.7.3.450-455","DOIUrl":"https://doi.org/10.4304/jnw.7.3.450-455","url":null,"abstract":"Wavelength division multiplexing (WDM) optical networks are attracting more and more attention because of their ability to provide increased capacity and flexibility. Optical add-drop multiplexer (OADM) become key components for add or drop wavelengths in high bit rate optical networks. Crosstalk in OADM degrades the performance of WDM system. In this article, we have developed a fiber Bragg-grating based OADM with low crosstalk. We have also developed analytical models for relative intensity noise (RIN), bit error rate (BER) and power penalty to study the performance limitations of this OADM. Results show that crosstalk, RIN and BER of the proposed OADM are lower and provide better performance than the existing OADMs.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"324 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123503213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Iqbal, M. I. Monir, S.M.R. Osmani, F. Chowdhury, A. K. Chowdhury, Kingshuk Dhar
{"title":"A novel strategy to discover Internet gateways in mobile ad hoc networks","authors":"S. Iqbal, M. I. Monir, S.M.R. Osmani, F. Chowdhury, A. K. Chowdhury, Kingshuk Dhar","doi":"10.1109/ICCITECHN.2010.5723914","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723914","url":null,"abstract":"Integrating nodes in a MANET to the Internet require either a connection to the Internet or they can connect to the Internet through the Internet gateways or servers. For the second case a node in a MANET has to find out the gateway or server to connect to the fixed nodes in the Internet. End to end packet delay and throughput are strongly dependent on the time needed to discover the gateways. A source node in a MANET can discover a gateway either by broadcasting a gateway discovery message or it may depend on periodic gateway advertisement messages from the gateways. The first one is renowned as reactive gateway discovery strategy and with this one a gateway in a MANET may receive the same gateway discovery message from different intermediate nodes. This paper presents a novel solution for connecting nodes in ad hoc network to the Internet. Here a gateway sends separate reply to the requestor for each request message having the same Broadcast ID it receives from that source in stead of sending only one unicast reply to the requestor. The AODV routing protocol has been used for routing in the MANET domain. We investigated our new strategy of gateway discovery in NS-2. Simulation results show that our one has better performance having lower delay and fewer packets drop.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122455145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secret data communication in a degraded practical multiple input multiple output multiple eavesdropper channel","authors":"M. Islam","doi":"10.1109/ICCITECHN.2010.5723925","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723925","url":null,"abstract":"In this paper, a Gaussian multiple input multiple output multiple eavesdropper (MIMOME) channel is considered where a transmitter communicates to a receiver in the presence of an eavesdropper. We present a technique for determining the secrecy capacity of the multiple input multiple output (MIMO) channel under Gaussian noise. We transform the degraded MIMOME channel into multiple single input multiple output (SIMO) Gaussian wire-tap channels and then use scalar approach to convert it into two equivalent multiple input single output (MISO) channels. The secrecy capacity model is then developed for the condition where the channel state information (CSI) for main channel only is known to the transmitter. The results show that the secret communication is possible when the eavesdropper channel noise is greater than a cutoff noise level. The outage probability is also analyzed of secrecy capacity is also analyzed. The effect of fading and outage probability is also analyzed.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123459305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Developing an efficient search suggestion generator, ignoring spelling error for high speed data retrieval using Double Metaphone Algorithm","authors":"A. K. Mandal, M. D. Hossain, M. Nadim","doi":"10.1109/ICCITECHN.2010.5723876","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723876","url":null,"abstract":"Finding desire information from a large text database is one of the most important issues of modern information processing systems. In this regard different types of searching techniques are used. Though some of them are vary useful, they frequently fail to show appropriate performance when a user enters misspelled data as searching keyword. In this paper we have developed an efficient search suggestion generator using Phonetic algorithm namely, Double Metaphone Algorithm. Here we use a technique to reduce total searching comparisons by creating an index on a specific field, we have defined it as keyCode field, in a table of our database where all of the values of Code field are produced by that algorithm acted on records. Results show that generator not only quickly finds the required information but provides possible search suggestion avoiding the misspelled words entered as search key.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"36 13","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120929406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new approach of Extendable Multicast Routing Protocol in Mobile Ad Hoc Networks","authors":"M. Rahman, S. Mondal, S. K. Ghosh, M. Rahman","doi":"10.1109/ICCITECHN.2010.5723840","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723840","url":null,"abstract":"Multicasting is a challenging task that facilitates group communication among the nodes using the most efficient strategy to deliver the messages over each link of the network. In spite of significant research achievements in recent years, efficient and extendable multicast routing in Mobile Ad Hoc Networks (MANETs) is still a difficult issue. To enhance performance and to enable scalability we have proposed a domain-based Extendable Multicast Routing Protocol (EMRP) for hierarchical multicasting in MANET environments. In the proposed technique, each domain has a sub-source that reduces the path length between the original source and intended receiver which solute the scalability issue. We have analyzed the performance with respect to a variety of parameters for different mobility speed and group sizes. Results obtained through simulations demonstrate enhanced performance in packet delivery ratio and end-to-end delay of the proposed technique as compared to the existing ones.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122725036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Canny filter and DWT in fingerprint detection a new approach","authors":"N. Begum, M. Alam, M. I. Islam","doi":"10.1109/ICCITECHN.2010.5723865","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723865","url":null,"abstract":"Fingerprint detection is one of the most important applications of image processing in a security system. Recent literature deals with fingerprint detection based on pattern recognition, moment based image recognition and discrete wavelet transform (DWT). Among them DWT based analysis requires the least amount of memory space which considers only wavelet coefficient of an image in matching with preserved coefficient. This paper proposes a new approach, which combines image filtering and color inversion in enhancement of contrast along with two dimensional DWT to get the matrix of the image. Finally four statistical parameters: cross correlation coefficient, skewness, kurtosis and convolution of approximate coefficient of one dimensional DWT are compared in detection of fingerprint of a person.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127227100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}