2012 10th International Conference on Frontiers of Information Technology最新文献

筛选
英文 中文
Formation of a Near Optimal Solution for Raster Region Having Min/Max Cell Value 具有最小/最大单元值的栅格区域的近最优解的形成
2012 10th International Conference on Frontiers of Information Technology Pub Date : 2012-12-17 DOI: 10.1109/FIT.2012.73
Muhammad Waqas Raja, R. Bulbul
{"title":"Formation of a Near Optimal Solution for Raster Region Having Min/Max Cell Value","authors":"Muhammad Waqas Raja, R. Bulbul","doi":"10.1109/FIT.2012.73","DOIUrl":"https://doi.org/10.1109/FIT.2012.73","url":null,"abstract":"Region selection problems from raster images in Geographic Information Systems (GIS) involve lots of computational complexity for which designing of the optimized algorithms is required. A region with maximum sum of an attribute value is useful in different decision making problems, for which no efficient solution has yet been found. For selecting a region of such interest, there are lots of unique regions in both 4 and 8-Adjacency region rules. In case of 4-Adjacency rule, for selecting a 10-cell region, more than 288 thousand unique regions can be found among one will be a region with maximum sum value. The scenario suggests that the problem falls in the class of NP-Hard decision problems, so the problem is complex in nature as we deal with the computation terms of the algorithm to be designed in polynomial time. This research contains a new dynamic programming approach for the problem, whose focus is on the efficiency for finding approximate solutions. Experiments have suggested that with the data input of images having higher degree of spatial auto correlation, the algorithm is quite useful and practical in nature, as it was tested with real life data and has extracted maximum value regions with thousands of cells in a sufficient time.","PeriodicalId":166149,"journal":{"name":"2012 10th International Conference on Frontiers of Information Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121696645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Gain Enhancement by ECC Coded Data in Wireless Sensor Networks 无线传感器网络中ECC编码数据的能量增益增强
2012 10th International Conference on Frontiers of Information Technology Pub Date : 2012-12-17 DOI: 10.1109/FIT.2012.11
M. Adeel, Aamir Latif, Muhammad Muaz, S. Mahmud
{"title":"Energy Gain Enhancement by ECC Coded Data in Wireless Sensor Networks","authors":"M. Adeel, Aamir Latif, Muhammad Muaz, S. Mahmud","doi":"10.1109/FIT.2012.11","DOIUrl":"https://doi.org/10.1109/FIT.2012.11","url":null,"abstract":"Main research in focus nowadays in the area of wireless sensor networks (WSN) is optimizing solution of energy gain. Techniques for optimizing power usage in WSNs have been developed in this paper. The goal is achieved by exploiting a decrease in cross-over distance between error correcting coded (ECC) information signals and its un-coded version. A decrease in total energy gain is observed from the practical data acquisitioning. From analysis presented in this paper, the overall 22% energy gain in ECC coded data was observed with the theoretical analysis and results obtained using MATLAB. The modulation schemes under test were MPSK, MFSK and MQAM. Furthermore, the presented idea has opened ways for researchers to exploit other means to bring a decrease in cross-over distance so that further gain of energy in WSNs can be possible.","PeriodicalId":166149,"journal":{"name":"2012 10th International Conference on Frontiers of Information Technology","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124541158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyclomatic Complexity for WCF: A Service Oriented Architecture WCF的圈复杂度:一个面向服务的体系结构
2012 10th International Conference on Frontiers of Information Technology Pub Date : 2012-12-17 DOI: 10.1109/FIT.2012.39
Mir Muhammad Suleman Sarwar, Ibrar Ahmad, Sara Shahzad
{"title":"Cyclomatic Complexity for WCF: A Service Oriented Architecture","authors":"Mir Muhammad Suleman Sarwar, Ibrar Ahmad, Sara Shahzad","doi":"10.1109/FIT.2012.39","DOIUrl":"https://doi.org/10.1109/FIT.2012.39","url":null,"abstract":"SOA is a latest architecture for softwares and a lot of tools are available to implement this architecture. Critics of cyclomatic complexity argue that complexity changes with modularization of code. If the technology is shifted from linear programming to OOP and SOA, the complexity of code will also change. The cyclomatic complexity was for the first time introduced by TJ McCabe as metric for the measurement of complexity of a piece of code. McCabe calculated the complexity of a sample code written in fortran language. Fortran is a linear programming language and there are no functions and classes in this language. Hence at the time of introducing cyclomatic complexity there was no concept of structured languages and object oriented languages. This is ignored in McCabes's cyclomatic complexity due to which it is not enough to measure complexity for advance programming architectures like OOP and SOA. Further work has been done on the complexity of structured, OOP and SOA but still work is required on SOA. This study proposes a new metric for the measurement of complexity of WCF a SOA. The significance of this new metric is that it can help to estimate cost of a new project, maintenance cost of already existing projects, basis path testing, comparison of two projects and many other factors.","PeriodicalId":166149,"journal":{"name":"2012 10th International Conference on Frontiers of Information Technology","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134065328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Antenna Arrangements in a Telecommunication Network 电信网络中的天线布置
2012 10th International Conference on Frontiers of Information Technology Pub Date : 2012-12-17 DOI: 10.1109/FIT.2012.58
K. Karami, S. Khan
{"title":"Antenna Arrangements in a Telecommunication Network","authors":"K. Karami, S. Khan","doi":"10.1109/FIT.2012.58","DOIUrl":"https://doi.org/10.1109/FIT.2012.58","url":null,"abstract":"In this paper, we discuss the approach to efficiently place antennas to cover users within a telecommunication network. The main goal is to lower the power and utilities cost while covering all of the users within the telecommunication network. Four heuristics are proposed and compared.","PeriodicalId":166149,"journal":{"name":"2012 10th International Conference on Frontiers of Information Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132533088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of Mobility Models on Clustering Based Routing Protocols in Mobile WSNs 移动模型对移动wsn中基于聚类路由协议的影响
2012 10th International Conference on Frontiers of Information Technology Pub Date : 2012-12-17 DOI: 10.1109/FIT.2012.72
Atta ur Rehman Khan, Shahzad Ali, S. Mustafa, Mazliza Othman
{"title":"Impact of Mobility Models on Clustering Based Routing Protocols in Mobile WSNs","authors":"Atta ur Rehman Khan, Shahzad Ali, S. Mustafa, Mazliza Othman","doi":"10.1109/FIT.2012.72","DOIUrl":"https://doi.org/10.1109/FIT.2012.72","url":null,"abstract":"This paper presents comparison of different hierarchical (position and non-position based) protocols with respect to different mobility models. Previous work mainly focuses on static networks or at most a single mobility model. Using only one mobility model may not predict the behavior of routing protocol accurately. Simulation results show that mobility has large impact on the behavior of WSN routing protocols. Also, position based routing protocols performs better in terms of packet delivery compared to non position based routing protocols.","PeriodicalId":166149,"journal":{"name":"2012 10th International Conference on Frontiers of Information Technology","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127782124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Two Problems of Circle in Image 图像中圆的两个问题
2012 10th International Conference on Frontiers of Information Technology Pub Date : 2012-12-17 DOI: 10.1109/FIT.2012.25
Zili Zhang, Xuan Wang, W. Anwar, U. I. Bajwa
{"title":"Two Problems of Circle in Image","authors":"Zili Zhang, Xuan Wang, W. Anwar, U. I. Bajwa","doi":"10.1109/FIT.2012.25","DOIUrl":"https://doi.org/10.1109/FIT.2012.25","url":null,"abstract":"Circle is an important primitive in document images, which is contained in many scenes and shapes due to the aesthetic feeling. As it is known to all, three nonlinear points determine a circle, namely, the radius and the coordinates of circle can be calculated. However, three nonlinear points cannot determine a unique desirable circle occasionally in images. Circumferences consist of many pixels, what is the relation of radius size and number of pixels on the circumferences with and without redundancy? We mainly discuss the condition about how to make a unique desirable circle with three nonlinear pixels in images and the above-mentioned relation. Finally, the relation and condition have been found and testified by experiments.","PeriodicalId":166149,"journal":{"name":"2012 10th International Conference on Frontiers of Information Technology","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115964234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design Time Considedrations for Cyber Physical Systems 网络物理系统的设计时间考虑
2012 10th International Conference on Frontiers of Information Technology Pub Date : 2012-12-17 DOI: 10.1109/FIT.2012.56
A. Usman, H. Mukhtar
{"title":"Design Time Considedrations for Cyber Physical Systems","authors":"A. Usman, H. Mukhtar","doi":"10.1109/FIT.2012.56","DOIUrl":"https://doi.org/10.1109/FIT.2012.56","url":null,"abstract":"Cyber physical systems are complex systems which monitor, sense or interact with the environment, gather information with the help of different types of sensors or mobile devices, propagate the sensed data to a processing unit via WAN, LAN, MANET, VANET or overlay network, the processing unit process, analyze and store the received data, and based on the nature of the data or input send instructions to actuators to alter or try to alter the environment, or raise alarm, or send notifications to concerned devices or peoples already registered with the CPS for a particular type of event. Designing such a complex system is not an easy task and there are a number of important factors that should be taken care while designing these systems. A good number of studies have already focused on these requirements but for a particular type of cyber physical systems. In this work some of the general requirements are highlighted. These requirements are more of a MUST TO HAVE requirements rather than GOOD TO HAVE.","PeriodicalId":166149,"journal":{"name":"2012 10th International Conference on Frontiers of Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128423093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges 未来互联网:物联网架构、可能的应用和主要挑战
2012 10th International Conference on Frontiers of Information Technology Pub Date : 2012-12-17 DOI: 10.1109/FIT.2012.53
Rafiullah Khan, Sarmad Ullah Khan, R. Zaheer, Shahid Khan
{"title":"Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges","authors":"Rafiullah Khan, Sarmad Ullah Khan, R. Zaheer, Shahid Khan","doi":"10.1109/FIT.2012.53","DOIUrl":"https://doi.org/10.1109/FIT.2012.53","url":null,"abstract":"The Internet is continuously changing and evolving. The main communication form of present Internet is human-human. The Internet of Things (IoT) can be considered as the future evaluation of the Internet that realizes machine-to-machine (M2M) learning. Thus, IoT provides connectivity for everyone and everything. The IoT embeds some intelligence in Internet-connected objects to communicate, exchange information, take decisions, invoke actions and provide amazing services. This paper addresses the existing development trends, the generic architecture of IoT, its distinguishing features and possible future applications. This paper also forecast the key challenges associated with the development of IoT. The IoT is getting increasing popularity for academia, industry as well as government that has the potential to bring significant personal, professional and economic benefits.","PeriodicalId":166149,"journal":{"name":"2012 10th International Conference on Frontiers of Information Technology","volume":"291 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123177667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1173
Analysis of TCP under Wireless Circumstances: A Performance Evaluation 无线环境下TCP分析:性能评估
2012 10th International Conference on Frontiers of Information Technology Pub Date : 2012-12-17 DOI: 10.1109/FIT.2012.74
R. N. B. Rais, Muhammad Musaddiq, Mayyda Mukhtar, A. Shafiq, Hafiz Muhammad Imran, M. Najam-ul-Islam
{"title":"Analysis of TCP under Wireless Circumstances: A Performance Evaluation","authors":"R. N. B. Rais, Muhammad Musaddiq, Mayyda Mukhtar, A. Shafiq, Hafiz Muhammad Imran, M. Najam-ul-Islam","doi":"10.1109/FIT.2012.74","DOIUrl":"https://doi.org/10.1109/FIT.2012.74","url":null,"abstract":"With the emergence of wireless technology, and increase of mobile computing devices, the demand for the better network connectivity is the major interest of the users. Transmission Control Protocol (TCP) is the standard network protocol for communication in the Internet, but its performance drastically degrades over wireless networks, as TCP takes packet drop or collision as a sign of congestion. In this paper, we analyze TCP's performance over wireless networks using NS-2 Simulator. Unlike traditional performance evaluation methods for TCP over wireless networks, we consider different versions of TCP over different routing protocols. Moreover, we also consider the effectiveness of TCP both over infrastructure-based and infrastructure-less wireless networks. Simulation results show that TCP's performance varies from scenario to scenario both in infrastructure-based and ad-hoc wireless networks.","PeriodicalId":166149,"journal":{"name":"2012 10th International Conference on Frontiers of Information Technology","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124535231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Adjustment Parameters for EPC Global RFID Anti-collision Q-Algorithm in Different Traffic Scenarios 不同交通场景下EPC全局RFID防碰撞q算法的最优调整参数
2012 10th International Conference on Frontiers of Information Technology Pub Date : 2012-12-17 DOI: 10.1109/FIT.2012.61
M. U. Farooq, Muddassar Asif, S. Nabi, Adnan Qureshi
{"title":"Optimal Adjustment Parameters for EPC Global RFID Anti-collision Q-Algorithm in Different Traffic Scenarios","authors":"M. U. Farooq, Muddassar Asif, S. Nabi, Adnan Qureshi","doi":"10.1109/FIT.2012.61","DOIUrl":"https://doi.org/10.1109/FIT.2012.61","url":null,"abstract":"A RFID system's front-end consists of multiple tags being identified by a single (or multiple) reader. In order for the reader to uniquely identify all tags within certain range, some sort of anti-collision mechanism is required. ALOHA and its variations can be used in such a scenario. EPC Global, a standardizing body for RFID technology, has proposed a Dynamic Framed Slotted ALOHA mechanism for UHF passive tags (Gen 2, Class I), and a 'Q' algorithm is used to dynamically update the size of the frame, where the size changes exponentially. Two parameters that define this Q algorithm are the initial size of the frame and the speed of frame-size estimation. In this paper we present a complete RFID system simulator which can be used to investigate various algorithms in various scenarios, in context of UHF RFID systems, and then present our simulation setup, results and analysis where the throughput for different traffic scenarios is calculated. Based on the results the trend and the optimal values are discussed for the two parameters. These results can be used by an RFID system designer to choose the right initial parameters, based on an order-of-magnitude estimate of the traffic conditions.","PeriodicalId":166149,"journal":{"name":"2012 10th International Conference on Frontiers of Information Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126437978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信