2010 13th International Conference on Computer and Information Technology (ICCIT)最新文献

筛选
英文 中文
On the design of quaternary comparators 四元比较器的设计
2010 13th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723862
I. Jahangir, A. Das
{"title":"On the design of quaternary comparators","authors":"I. Jahangir, A. Das","doi":"10.1109/ICCITECHN.2010.5723862","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723862","url":null,"abstract":"Quaternary logic requires a dedicated comparator circuit besides the usual add/sub unit which may not be optimal due to several reasons. In this paper, we have thoroughly discussed various alternative expressions for equality operator which serves as the basis for quaternary comparator. Then we have derived the necessary equations for single qudit comparator and extended it to serial multi qudit comparator. We have also shown the equations and design of single stage parallel comparator where restriction of fan-in is sacrificed for constant speed. We have ended our discussion with the design of a logarithmic stage parallel comparator which can compute the comparator output within log2(n) time delay for n qudits.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114292439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Chaotic dynamics of supervised neural network 监督神经网络的混沌动力学
2010 13th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723893
S. U. Ahmed, M. Shahjahan, K. Murase
{"title":"Chaotic dynamics of supervised neural network","authors":"S. U. Ahmed, M. Shahjahan, K. Murase","doi":"10.1109/ICCITECHN.2010.5723893","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723893","url":null,"abstract":"It is important to study the neural network (NN) when it falls into chaos, because brain dynamics involve chaos. In this paper, the several chaotic behaviors of supervised neural networks using Hurst Exponent (H), fractal dimension (FD) and bifurcation diagram are studied. The update rule for NN trained with back-propagation (BP) algorithm absorbs the function of the form x(1-x) which is responsible for exhibiting chaos in the output of the NN at increased learning rate. The H is computed with the time series obtained from the output of NN. One can comment on the classification of the network from the values of Hs. The chaotic dynamics for two bit parity, cancer, and diabetes problems are examined. The result is validated with the help of bifurcation diagram. It is found that the values of H are repositioned marginally depending on the size of NN. The effect of the size of NN on chaos is also investigated.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129757954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel method for the synthesis of odd base quantum full adder 合成奇基量子全加法器的新方法
2010 13th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723859
Faisal Mohsin
{"title":"A novel method for the synthesis of odd base quantum full adder","authors":"Faisal Mohsin","doi":"10.1109/ICCITECHN.2010.5723859","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723859","url":null,"abstract":"For various reasons in recent years the interest in building quantum computers has increased gradually. To do the calculations in quantum computer we need quantum arithmetic logic unit (ALU). The building block of quantum ALU is quantum adder. In quantum computer multivalued logic is possible. In this paper a generalized circuit has been proposed to build odd base multivalued quantum full adder. A novel approach has been taken to minimize the total no. of gates. Muthukrishnan-Stroud gates and quantum shift gates have been combined to achieve the minimal circuit.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126938715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Quantum Evolutionary Algorithm based on Particle Swarm theory in multiobjective problems 多目标问题中基于粒子群理论的量子进化算法
2010 13th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723823
Md. Kowsar Hossain, Md. Amjad Hossain, M. Hashem, Md. Mohsin Ali
{"title":"Quantum Evolutionary Algorithm based on Particle Swarm theory in multiobjective problems","authors":"Md. Kowsar Hossain, Md. Amjad Hossain, M. Hashem, Md. Mohsin Ali","doi":"10.1109/ICCITECHN.2010.5723823","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723823","url":null,"abstract":"Quantum Evolutionary Algorithm (QEA) is an optimization algorithm based on the concept of quantum computing and Particle Swarm Optimization (PSO) algorithm is a population based intelligent search technique. Both these techniques have good performance to solve optimization problems. PSEQEA combines the PSO with QEA to improve the performance of QEA and it can solve single objective optimization problem efficiently and effectively. In this paper, PSEQEA is studied to solve multi-objective Optimization (MO) problems. Some well-known non-trivial functions are used to observe the performance of PSEQEA to detect the Pareto optimal points and the shape of the Pareto front using both Fixed Weighted Aggregation method and Adaptive Weighted Aggregation method. Moreover, Vector Evaluated PSEQEA (VEPSEQEA) borrows concept from Schaffer's Vector Evaluated Genetic Algorithm (VEGA) that can also cope with MO problems. Simulation results show that PSEQEA and VEPSEQEA perform better than PSO and VEPSO to discover the Pareto frontier.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126672350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Development of mobile phone based surveillance system 基于手机的监控系统开发
2010 13th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723909
Badrun Nahar, Md Liakot Ali
{"title":"Development of mobile phone based surveillance system","authors":"Badrun Nahar, Md Liakot Ali","doi":"10.1109/ICCITECHN.2010.5723909","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723909","url":null,"abstract":"In today's world, ensuring security for important locations is a burning issue. Different surveillance methodologies such as alarm system, CCTV, PC based video system are used to ensure this security. But using all these systems, it is not possible for a person to monitor the security of his or her desired location when they are outside. Now-a-days anybody can communicate with anyone at anytime around the globe with the help of mobile phone technology. By keeping the technological facility of mobile phone in mind, a mobile phone based surveillance system has been described in this paper. This paper will give a solution for the security of corporate houses as well as corporate personnel. In this system there are server and client end. Server will store images being captured by the webcam of an important location. Then based on clients request sending from their mobile phone to the server, clients will be able to view the images from their mobile phone that is stored in the server. Clients are also able to move the webcam by sending control instruction from their mobile phone to view the images of their desired position. The developed system has been tested first using the GUI (emulator) designed by NetBeans IDE. It has also been tested using different mobile phones to see the images in real time and it provides the true sense of real mobility and security by accessing the desired location from the mobile phone anytime anywhere whenever wishes. This surveillance system can also be implemented for other handheld devices like PDA.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133118819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Performance of sub-carrier mapping in single carrier FDMA systems under radio mobile channels 无线移动信道下单载波FDMA系统的子载波映射性能
2010 13th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723850
M. Rana
{"title":"Performance of sub-carrier mapping in single carrier FDMA systems under radio mobile channels","authors":"M. Rana","doi":"10.1109/ICCITECHN.2010.5723850","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723850","url":null,"abstract":"Single carrier-frequency division multiple access (SC-FDMA) utilizes single carrier modulation at the transmitter and frequency domain equalization at the receiver. It has almost similar performance and essentially the same overall structure of an orthogonal frequency division multiple access (OFDMA) system with low peak to average power ratio (PAPR). Recently, the SC-FDMA has drawn great attention as an attractive alternative to OFDMA, in the uplink communications where lower PAPR greatly benefits the mobile terminal in terms of manufacturing cost as well as transmit power efficiency. Such power efficiency can provide considerable performance improvements in future wireless communication networks. This article outlines the basic principles of SC-FDMA systems with different types of sub-carrier mapping schemes. Simulation results demonstrate the performance of different sub-carrier mapping schemes under ideal and pedestrian channel condition.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132188813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
SQL Tunnelling through HTTP SQL通过HTTP隧道
2010 13th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723851
Thomas Kvamme, S. Ahmed
{"title":"SQL Tunnelling through HTTP","authors":"Thomas Kvamme, S. Ahmed","doi":"10.1109/ICCITECHN.2010.5723851","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723851","url":null,"abstract":"A novel SQL Tunnelling system to allow communication with an SQL database is developed by utilising the standard Internet protocol HTTP. The communication with the database is allowed by a client interacting with a Web Service running on a standard off-the-shelf HTTP Server. With this tunnelling system, access to a database can be provided without providing access to the database native communication port. This can be useful if a database application needs to be made available on insecure networks, such as Internet, or if firewalls between client and server does not accept anything other than the normal HTTP communications.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"20 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132287197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Subscribers fluctuations of different cell operators based on different offers 不同手机运营商的用户波动取决于不同的报价
2010 13th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723886
G. M. M. Bashir, Md. Golam Rabiul Alam, Mahabub Sikder, Md. Milon Gazi
{"title":"Subscribers fluctuations of different cell operators based on different offers","authors":"G. M. M. Bashir, Md. Golam Rabiul Alam, Mahabub Sikder, Md. Milon Gazi","doi":"10.1109/ICCITECHN.2010.5723886","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723886","url":null,"abstract":"In this paper the authors have shown the ebb and flow of subscribers of different cell operators in Bangladesh based on their call rate, network, and other external facilities and suggests a new approach for the constituency of these operators to find out how all the operators can ensure customer satisfaction. Performance of a cellular system mainly depends on circuit merits (CM) of voice quality, service quality, special feature such as call waiting, voice stored box, automatic roaming and other opportunities. In the recent year cellular communication has been explored tremendously in Bangladesh. Existing six mobile operators plays a vital role in our social and economical life. So every operator should be careful about their call rate, network & other external facilities.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121568331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A stable clustering method for efficient geographic routing in Mobile Ad-Hoc Networks 移动Ad-Hoc网络中高效地理路由的稳定聚类方法
2010 13th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723915
Md.Mosaddek Khan, M. Mamun-Or-Rashid
{"title":"A stable clustering method for efficient geographic routing in Mobile Ad-Hoc Networks","authors":"Md.Mosaddek Khan, M. Mamun-Or-Rashid","doi":"10.1109/ICCITECHN.2010.5723915","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723915","url":null,"abstract":"The Routing Approaches in Mobile Ad-hoc Network have almost entered the saturated arena. But still there are available options of perfection in this meadow. The task of improving the clustering technique is one of the fields which is under rated as a research topic for further improvement of routing. Clustering based MANET routing protocols, which are popular in terms of efficiency, simplicity and usability mostly use circular based clustering techniques. And the election of cluster head is done through the use conventional approaches. This particular paper is mainly focused to launch a new-fangled clustering technique through which it is possible to improve the routing performance of existing protocols. Another important aspect of this paper is to provide a cluster head selection algorithm which can effectively maintain the clusters and provides more stability. Proposed clustering idea is useful for geographically related nodes effectively in different turf of routing. To maintain the clusters and their stability, it provides a new idea to select cluster head within the cluster, also the election of secondary cluster head for avoiding further election immediately after the unavailability of primary cluster head. This idea is evaluated in network simulator and it outperforms the existing clustering techniques.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"57 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125829795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-objective optimisation for multi-drug chemotherapy scheduling 多药化疗方案的多目标优化
2010 13th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723902
S. Algoul, M. Alam, M. A. Hossain, M. Majumder
{"title":"Multi-objective optimisation for multi-drug chemotherapy scheduling","authors":"S. Algoul, M. Alam, M. A. Hossain, M. Majumder","doi":"10.1109/ICCITECHN.2010.5723902","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723902","url":null,"abstract":"This paper presents a multi-drug chemotherapy scheduling method for cancer treatment using multi-objective optimisation technique. Cancer cells, very often, grows resistance to a drug if it is administered alone for a long time and drug resistance eventually causes failure to treatment in most cases. The adaptation of multi-drug treatment in cancer increases the drug performance by reducing the drug resistance. But care must be taken to design the multi-drug scheduling so as to equilibrium the drug beneficial and adverse side effects of the treatment. Conventional clinical methods can hardly find optimum dosages of drugs that can kill maximum cancerous cells with minimum toxic side effects. This is because of the inherent conflict between the cell killing and the toxic side effects in case of cancer. This paper presents a novel method of multi-drug scheduling using multi-objective genetic algorithm (MOGA) that can trading-off between the cell killing and toxic side effects during the whole period of treatment. A close-loop control method, namely Integral-Proportional-Derivative (I-PD) is designed to control dosages of drugs to be infused to the patient's body and MOGA is used to find suitable/acceptable parameters of the controller. A cell compartments model is developed and used to describe the effects of the drugs on different type of cells, plasma drug concentration and toxic side effects. Results show that drug scheduling obtained through the proposed method can reduce the tumour size more than 99% with relatively lower toxic side effects. Moreover, the drug dosage and drug concentration remain at low level throughout the whole period.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127652371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信