2010 13th International Conference on Computer and Information Technology (ICCIT)最新文献

筛选
英文 中文
Speech segmentation using divergence algorithm with Zero Crossing property 具有过零特性的散度语音分割算法
2010 13th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723906
M. Salam, D. Mohamad, S. Salleh
{"title":"Speech segmentation using divergence algorithm with Zero Crossing property","authors":"M. Salam, D. Mohamad, S. Salleh","doi":"10.1109/ICCITECHN.2010.5723906","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723906","url":null,"abstract":"Divergence algorithm is a statistical segmentation approach which finds segmentation point via detection of abrupt changes without any previous information of the acoustic signal. The approach could get high match of segmentation but also gives a lot of false segmentation points. This work introduced a property based on the usage of Zero Crossing Rate (ZCR) in enhancing segmentation by divergence algorithm. The work starts via optimizing divergence algorithm segmentation performance via parameters tuning. Then the proposed property based on ZCR is applied to divergence algorithm to reduce insertion points. The results of tuning divergence parameters achieved match rate of 99.4% at time tolerance of 0.09 seconds with 69% insertion rate occurrences in comparisons to reference points. The result in applying the introduced ZCR property to divergence algorithm shows that tuning of some ZCR property parameters could reduce insertion between 4% to 45%. However, it would also reduce the match rate. Nevertheless, the method could reduced insertion rate by 5.5% while maintaining match rate of 99.4%.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116348534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Multitaper spectrum: A promising method in spectrum sensing cognitive radio 多锥度频谱:一种很有前途的频谱感知认知无线电方法
2010 13th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723918
A. Al-Mamun, M. R. Ullah
{"title":"Multitaper spectrum: A promising method in spectrum sensing cognitive radio","authors":"A. Al-Mamun, M. R. Ullah","doi":"10.1109/ICCITECHN.2010.5723918","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723918","url":null,"abstract":"Cognitive radio (CR) has been proposed as a promising and effective technology to improve radio spectrum utilization. The primary objective of the CR is to handle the non-interference rules with any primary users (PUs). Highly sensitive and optimal spectrum sensing detectors are required in order to avoid harmful interference to PUs. Multitaper spectrum seems to be the most appealing one for spectrum sensing CR because of its accurate identification and estimation and low computational complexity. Mulitaper uses small set of tapers and multiple orthogonal prototype filters to reduce the variance. The Fourier transform of a Slepian sequence, originally known as discrete prolate spheroidal sequences (DPSS), gives maximum energy density inside a given bandwidth and less spectral leakage with better specifications has been investigated in this paper and shows that no other window in signal processing can satisfy this property.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128716966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Character recognition using wavelet compression 小波压缩字符识别
2010 13th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723900
Hayder Ali, Y. Ali, Eklas Hossain, S. Sultana
{"title":"Character recognition using wavelet compression","authors":"Hayder Ali, Y. Ali, Eklas Hossain, S. Sultana","doi":"10.1109/ICCITECHN.2010.5723900","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723900","url":null,"abstract":"The objective of this project is to build a character recognition system, which is able to recognize printed and handwritten character from A to Z. the typical optical character recognition systems, regardless the character's nature, are based mainly on three stages, preprocessing, features extraction, and discrimination. Each stage has its own problems and effects on the system efficiency which is the time consuming and the recognition errors. In order to avoid these difficulties this project presents new construction of character recognition tool using the technique similar to that is used in image compression such as wavelet compression or JPEG compression. Wavelet compression is chosen as the technique implemented for this project. Wavelet compression technique extracted the important coefficient from the images. The Euclidean distance between the coefficient of the test images and training images is computed. Character is considered recognized if the Euclidean distance calculated is smaller than the Global threshold value of 258. This character recognition system also has 18.81% of false rejection rate and 21.88% for false acceptance rate.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123163602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performance evaluation of AODVH: An Ad hoc networking scheme for hybrid nodes AODVH的性能评估:一种混合节点的Ad hoc网络方案
2010 13th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723848
Yasmin Jahir, Mohammed Atiquzzaman, H. Refai, P. Lopresti
{"title":"Performance evaluation of AODVH: An Ad hoc networking scheme for hybrid nodes","authors":"Yasmin Jahir, Mohammed Atiquzzaman, H. Refai, P. Lopresti","doi":"10.1109/ICCITECHN.2010.5723848","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723848","url":null,"abstract":"Mobile Ad hoc networks (MANETs) are composed of a collection of independent nodes usually connected by low bandwidth Radio Frequency (RF) links which are challenging for transmitting video and high bandwidth applications for rescue workers in emergency situations. Earlier we proposed a routing protocol, called AODVH to use for high bandwidth communication for search and rescue operations in a disaster area which consists of hybrid nodes using Free Space Optical (FSO) and RF links, with FSO being the primary link and RF as backup in the case of failure of “FSO only” paths. The objective of this paper is to evaluate the performance of AODVH using ns-2 simulations with varying network size and compare with three other Ad hoc routing protocols. We also implemented and tested AODVH in the laboratory using a testbed consisting of Linux based Ad hoc nodes. Results show that AODVH performs better in terms of packet loss, end-to-end delay, overhead, packet delivery ratio, route discovery frequency and throughput when compared to with the other three protocols.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122847420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Subscribers fluctuations of different cell operators based on different offers 不同手机运营商的用户波动取决于不同的报价
2010 13th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723886
G. M. M. Bashir, Md. Golam Rabiul Alam, Mahabub Sikder, Md. Milon Gazi
{"title":"Subscribers fluctuations of different cell operators based on different offers","authors":"G. M. M. Bashir, Md. Golam Rabiul Alam, Mahabub Sikder, Md. Milon Gazi","doi":"10.1109/ICCITECHN.2010.5723886","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723886","url":null,"abstract":"In this paper the authors have shown the ebb and flow of subscribers of different cell operators in Bangladesh based on their call rate, network, and other external facilities and suggests a new approach for the constituency of these operators to find out how all the operators can ensure customer satisfaction. Performance of a cellular system mainly depends on circuit merits (CM) of voice quality, service quality, special feature such as call waiting, voice stored box, automatic roaming and other opportunities. In the recent year cellular communication has been explored tremendously in Bangladesh. Existing six mobile operators plays a vital role in our social and economical life. So every operator should be careful about their call rate, network & other external facilities.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121568331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A safe system with safe logistics support for Chittagong Port 为吉大港提供安全后勤保障的安全系统
2010 13th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723882
Md. Kafil Uddin, M. Kamal Hossen
{"title":"A safe system with safe logistics support for Chittagong Port","authors":"Md. Kafil Uddin, M. Kamal Hossen","doi":"10.1109/ICCITECHN.2010.5723882","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723882","url":null,"abstract":"This paper presents a prototype implementation of an intelligent system called safe system that monitors container security in the port logistics. Logistics supports in the port require safe container status. The main focus of our contribution is to design a system that supports RFID (Radio Frequency Identification) Readers of all types (such as Reader Protocol complaint and vendor provided Readers), real time monitoring of sensing information and notify management about the status of the container in harbor logistics.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134575163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-objective optimisation for multi-drug chemotherapy scheduling 多药化疗方案的多目标优化
2010 13th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723902
S. Algoul, M. Alam, M. A. Hossain, M. Majumder
{"title":"Multi-objective optimisation for multi-drug chemotherapy scheduling","authors":"S. Algoul, M. Alam, M. A. Hossain, M. Majumder","doi":"10.1109/ICCITECHN.2010.5723902","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723902","url":null,"abstract":"This paper presents a multi-drug chemotherapy scheduling method for cancer treatment using multi-objective optimisation technique. Cancer cells, very often, grows resistance to a drug if it is administered alone for a long time and drug resistance eventually causes failure to treatment in most cases. The adaptation of multi-drug treatment in cancer increases the drug performance by reducing the drug resistance. But care must be taken to design the multi-drug scheduling so as to equilibrium the drug beneficial and adverse side effects of the treatment. Conventional clinical methods can hardly find optimum dosages of drugs that can kill maximum cancerous cells with minimum toxic side effects. This is because of the inherent conflict between the cell killing and the toxic side effects in case of cancer. This paper presents a novel method of multi-drug scheduling using multi-objective genetic algorithm (MOGA) that can trading-off between the cell killing and toxic side effects during the whole period of treatment. A close-loop control method, namely Integral-Proportional-Derivative (I-PD) is designed to control dosages of drugs to be infused to the patient's body and MOGA is used to find suitable/acceptable parameters of the controller. A cell compartments model is developed and used to describe the effects of the drugs on different type of cells, plasma drug concentration and toxic side effects. Results show that drug scheduling obtained through the proposed method can reduce the tumour size more than 99% with relatively lower toxic side effects. Moreover, the drug dosage and drug concentration remain at low level throughout the whole period.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127652371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cognitive change in women's empowerment in rural Bangladesh 孟加拉国农村妇女赋权的认知变化
2010 13th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723869
Zebunnessa Laizu, J. Armarego, F. Sudweeks
{"title":"Cognitive change in women's empowerment in rural Bangladesh","authors":"Zebunnessa Laizu, J. Armarego, F. Sudweeks","doi":"10.1109/ICCITECHN.2010.5723869","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723869","url":null,"abstract":"Rural women in Bangladesh have limited access to resources and public spheres due to socio-cultural restrictions. Women suffer from severe discrimination, due partly to a lack of access to information. Information and communication and technologies (ICT) are tools that potentially can reach rural women and address their knowledge and information needs. Considering this scenario, the aim of this paper is to examine the situation of rural women using ICT tools provided by non-government and government organizations, and investigate whether access to ICT has changed their lives in terms of socio-economic development. Using a structured questionnaire, data was collected from women in villages where two different ICT projects have been introduced. The change in women's awareness, skills and knowledge of the wider environment on various issues (including health, education, legal rights) is described. These cognitive changes were compared in women with ICT intervention and women who did not use ICT. The overall cognitive awareness of the women indicates more changes among women with ICT intervention than without. Therefore, ICT intervention in rural villages in Bangladesh is leading to empowerment.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116350433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
TCO model for server operating system 服务器操作系统的TCO模型
2010 13th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723887
T. Jensen, Shakil Ahmed
{"title":"TCO model for server operating system","authors":"T. Jensen, Shakil Ahmed","doi":"10.1109/ICCITECHN.2010.5723887","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723887","url":null,"abstract":"Over the last decade many but totally different Total Cost of Ownership reports were generated for a same system. It was even more puzzling since most of the times these reports were sponsored by the vendors themselves. There is more or less a war between Windows and Linux about which one has the best TCO. It is highly likely that the generated TCO is based on vendors' feelings for their operating system rather than the exact calculated costs. In the research a novel mathematical model as well as a tool is developed which can be used as standard for creating reliable TCO reports for server operating systems.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124803723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing an effective Fuzzy Logic Controller based on Quantum Evolutionary Algorithm 基于量子进化算法的模糊控制器设计
2010 13th International Conference on Computer and Information Technology (ICCIT) Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723828
Md. Amjad Hossain, P. C. Shill, Md. Kowsar Hossain, K. Murase
{"title":"Designing an effective Fuzzy Logic Controller based on Quantum Evolutionary Algorithm","authors":"Md. Amjad Hossain, P. C. Shill, Md. Kowsar Hossain, K. Murase","doi":"10.1109/ICCITECHN.2010.5723828","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723828","url":null,"abstract":"This paper proposes a new approach based on Quantum Evolutionary Algorithm (QEA) for effective selection and definition of fuzzy if-then rules to design Fuzzy Logic Controllers (FLCs). The majority of works done on designing FLCs were based on knowledgebase derived from imprecise heuristic knowledge of experienced operators or persons but they were difficult and time consuming to evaluate. The proposed approach decomposes the test problem in such a way that leads to more effective knowledge acquisition and improved control performance in fuzzy control. In this self-learning adaptive method, Truck backer-upper problem, an excellent test-bed for fuzzy control systems is considered as test problem. Each rule base is represented by a real-coded triploid chromosome. At each generation of QEA, rules are updated using Complementary Double Mutation Operator (CDMO) and Discrete Crossover (DC). The experimental results on backing up the truck problem show that the proposed approach to design FLCs do better in terms of time needed to backing up the truck.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121866692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信