2007 International Conference on Information and Communication Technology最新文献

筛选
英文 中文
DWT Based Digital Watermarking Technique and its Robustness on Image Rotation, Scaling, JPEG compression, Cropping and Multiple Watermarking 基于DWT的数字水印技术及其对图像旋转、缩放、JPEG压缩、裁剪和多重水印的鲁棒性
2007 International Conference on Information and Communication Technology Pub Date : 2007-03-07 DOI: 10.1109/ICICT.2007.375386
S. M. Mohidul Islam, R. Debnath, S. K. Alamgir Hossain
{"title":"DWT Based Digital Watermarking Technique and its Robustness on Image Rotation, Scaling, JPEG compression, Cropping and Multiple Watermarking","authors":"S. M. Mohidul Islam, R. Debnath, S. K. Alamgir Hossain","doi":"10.1109/ICICT.2007.375386","DOIUrl":"https://doi.org/10.1109/ICICT.2007.375386","url":null,"abstract":"We propose in this paper a discrete wavelet transform (DWT) based digital image watermarking technique. For embedding process, we consider the watermark signal as a binary sequence which is embedded to the high (HL and HH) frequency band of the blue channel. For detecting process, the correlation between the high frequency band DWT coefficients of the watermarked image and the watermark signal is compared with the predefined threshold to determine whether the watermark is present or not. The experimental results show that the method is comparatively robust to several attacks such as rotation, scaling, JPEG compression, cropping, and multiple watermarking.","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133577711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Performance Comparison of Wavelength Shift Keying and Conventional on Off Keying Schemes in a Multi-Hop Optical Ring Network in Presence of Four Wave Mixing Cross Talk 四波混频串扰下多跳光环网络中波长移键控与常规开关键控方案的性能比较
2007 International Conference on Information and Communication Technology Pub Date : 2007-03-07 DOI: 10.1109/ICICT.2007.375363
M. Sakib, S. Dey, S. Majumder, M.N. Alam, R. Sajjad
{"title":"Performance Comparison of Wavelength Shift Keying and Conventional on Off Keying Schemes in a Multi-Hop Optical Ring Network in Presence of Four Wave Mixing Cross Talk","authors":"M. Sakib, S. Dey, S. Majumder, M.N. Alam, R. Sajjad","doi":"10.1109/ICICT.2007.375363","DOIUrl":"https://doi.org/10.1109/ICICT.2007.375363","url":null,"abstract":"A transmission performance study is carried out for an all-optical multi-wavelength metropolitan optical ring network (MON). Effect of using a wavelength shift keying (WSK) scheme is analyzed and compared to that of the conventional on off keying system (OOK) in respect of four wave mixing (FWM) cross talk. The performance results are evaluated at a bit rate of 10Gb/s taking into considerations the combined influence of photo detector shot noise, beat noise components arising out of the beating of the signal with accumulated amplifier's spontaneous emission (ASE) and cross talk introduced at each node due to four wave photon mixing. The computed results show that for 50 hops the bit error rate (BER) of the standard wavelength division multiplexing (WDM) system is higher than 10-12 while for the wavelength shift keying system, for the same received power the BER is lower than 10-16 for the hop length of 100 km. It is also shown that for a given BER, WSK-WDM technique provides higher values of both the maximum allowable number of hops and minimum required power.","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114158940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QoS Support in Ad hoc Networks Based on Cross Layer Design 基于跨层设计的Ad hoc网络QoS支持
2007 International Conference on Information and Communication Technology Pub Date : 2007-03-07 DOI: 10.1109/ICICT.2007.375370
S. Aziz, L. Yuan
{"title":"QoS Support in Ad hoc Networks Based on Cross Layer Design","authors":"S. Aziz, L. Yuan","doi":"10.1109/ICICT.2007.375370","DOIUrl":"https://doi.org/10.1109/ICICT.2007.375370","url":null,"abstract":"In this paper, we propose a cross layer design that not only improves the throughput of real time traffic but also the throughput of best effort traffic. Basically our proposed design is an enhancement of distributed cross-layer QoS [DCLQ] based on node-disjoint multipath routing in mobile ad hoc networks. The throughput of a system is enhanced at the cost of little overhead. Our simulation results show the better throughput of best effort flows without any degradation in the real time flows.","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130579735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Hybrid Jumping Genes Genetic Algorithm Based Request Scheduling Approach in Multiple Destination Routing 基于混合跳跃基因遗传算法的多目标路由请求调度方法
2007 International Conference on Information and Communication Technology Pub Date : 2007-03-07 DOI: 10.1109/ICICT.2007.375405
M. Rahman, S. Mondol, G. S. Hossain, A. Dey
{"title":"A Hybrid Jumping Genes Genetic Algorithm Based Request Scheduling Approach in Multiple Destination Routing","authors":"M. Rahman, S. Mondol, G. S. Hossain, A. Dey","doi":"10.1109/ICICT.2007.375405","DOIUrl":"https://doi.org/10.1109/ICICT.2007.375405","url":null,"abstract":"This paper presents a hybrid jumping genes genetic algorithm (HJGGA) for solving the request scheduling problem in multiple destination routing (MDR). The problem incorporates the scheduling and routing process of a set of requests having single source and multiple destinations through a network. Our proposed HJGGA framework, that facilitates intelligent splitting of bandwidth requirement of requests as well as multiple optimal paths for transmission, searches for a near-optimal scheduling solution. We have also developed new chromosome-encoding and mutation technique for our HJGGA. Experimental result shows that our scheme reflects better real world situations and performs superior than previous researches.","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121868953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automatic Music Classification and Retreival: Experiments with Thai Music Collection 音乐自动分类与检索:泰国音乐收藏实验
2007 International Conference on Information and Communication Technology Pub Date : 2007-03-07 DOI: 10.1109/ICICT.2007.375346
C. Nopthaisong, M. Hasan
{"title":"Automatic Music Classification and Retreival: Experiments with Thai Music Collection","authors":"C. Nopthaisong, M. Hasan","doi":"10.1109/ICICT.2007.375346","DOIUrl":"https://doi.org/10.1109/ICICT.2007.375346","url":null,"abstract":"We present the experimental results of classification and retrieval of Thai music using TreeQ (a tree-structured classifier) and LVQ (Learning Vector Quantization) algorithms in this paper. We use the HTK Toolkit in preprocessing acoustic signals including feature extraction from the Thai music collection. The training set consists of 250 songs -50 songs from each of the 5 genres. Training is divided into three phases using all or some of these songs. The test set consists of 10 songs selected from 5 genres which are not included in training. We trained and tested the music classifiers using both TreeQ and LVQ algorithms with varying parameters such as, Number of Codebook (NOC) and pruning thresholds to identify the effects of different parameters and features in the Thai music classification and retrieval. We observed that TreeQ-based experiments yield faster response-times than those of LVQ; and therefore, a TreeQ-based system maybe appropriate for online (real-time) music retrieval tasks. On the other hand, LVQ-based experiments consistently yield better accuracy than those of TreeQ; and therefore, a LVQ-based system may be appropriate in the music classification task since music classification can generally be performed off-line. We also outlined a Relevance Feedback based Music Retrieval System in this paper.","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"357 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115852790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
DOT: A New Distributed Data Management System DOT:一个新的分布式数据管理系统
2007 International Conference on Information and Communication Technology Pub Date : 2007-03-07 DOI: 10.1109/ICICT.2007.375371
A. Akther, Kazi Shah Nawaz Ripon, Kazi Masudul Alam
{"title":"DOT: A New Distributed Data Management System","authors":"A. Akther, Kazi Shah Nawaz Ripon, Kazi Masudul Alam","doi":"10.1109/ICICT.2007.375371","DOIUrl":"https://doi.org/10.1109/ICICT.2007.375371","url":null,"abstract":"In this paper we have proposed a new distributed data management system (DDMS) called DOT which provides high performance in an environment of high data mobility and heterogeneous host capabilities. The storage sites of DOT are divided in some groups where a group of client sites is under an administrator site. Intra group and inter group communications in DOT are maintained by peer-to-peer (P2P) connections. DOT follows decentralized-centralized communication architecture. Each client site of a group manages its data autonomously. Each administrator has a rule processing sub-system where rules are defined by high level language. The unit of data in the DOT system is fragment. Residence of a particular file fragments or replicas are not fixed in particular sites rather they can move in their own group. DOT ensures network bandwidth utilization, file location transparency, effective resource utilization, efficient data sharing, high failure tolerance and possibility to collaborate in Wide Area Network.","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130948222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Contaminated ECG Artifact Detection and Elimination from EEG Using Energy Function Based Transformation 基于能量函数变换的EEG污染心电伪影检测与消除
2007 International Conference on Information and Communication Technology Pub Date : 2007-03-07 DOI: 10.1109/ICICT.2007.375341
M. Ali, Akber Dewan, M. J. Hossain, Md Moshiul Hoque, Oksam Chael
{"title":"Contaminated ECG Artifact Detection and Elimination from EEG Using Energy Function Based Transformation","authors":"M. Ali, Akber Dewan, M. J. Hossain, Md Moshiul Hoque, Oksam Chael","doi":"10.1109/ICICT.2007.375341","DOIUrl":"https://doi.org/10.1109/ICICT.2007.375341","url":null,"abstract":"Electrical field of the heart (ECG) propagates throughout the body and introduce artifact in EEG recordings which may lead to incorrect interpretation of monitoring result. Hence in this paper, we present a method of automatic detection and reduction of ECG artifact from EEG. ECG has its own spike like property and periodicity. Moreover, it also has lack of correlation with the EEG signal. We have utilized the aforementioned properties to detect ECG artifact in EEG and have employed a method to remove it automatically. In the first step of the algorithm, an energy function based method is used to emphasize the R-waves of contaminated ECG artifact and thereafter, an adaptive thresholding method along with clustering is used to detect contaminated candidate R-spikes of ECG artifact in EEG signal. After that utilizing periodic information of R-wave, a searching mechanism is employed as post processing to detect the R-peaks more accurately. Thereafter, noise model of ECG artifact contaminated with EEG is generated and finally it is subtracted from the EEG recordings to decontaminate it from the artifact. Before subtraction, a time varying alignment procedure is applied to increase the effectiveness of the artifact reduction method. Results obtained from our extensive experiments show that the proposed method is effective and encouraging in terms of automatic ECG artifact detection and reduction from EEG signal.","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128495627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Data Quality Through Business Rules 通过业务规则实现数据质量
2007 International Conference on Information and Communication Technology Pub Date : 2007-03-07 DOI: 10.1109/ICICT.2007.375390
V. Chanana, A. Koronios
{"title":"Data Quality Through Business Rules","authors":"V. Chanana, A. Koronios","doi":"10.1109/ICICT.2007.375390","DOIUrl":"https://doi.org/10.1109/ICICT.2007.375390","url":null,"abstract":"Good quality data is a valuable asset for any enterprise in this information age. Though volumes of data have grown, their utility for decision making has been meagre. This is a result of poor quality data that enterprises generally possess. Data generation process goes through a number of stages from capture through exchange, integration, migration to storage and data can get corrupted at any stage. Information systems/business applications built with business rules embedded in the code are inadequate to overcome data quality problems. This paper presents a framework that enables enterprise develop business applications that externalize centralized business logic through business rules. Decoupling business rules from the application provides a number of benefits to enterprises including enhanced data quality conforming to defined rules and agility in responding to the ever changing demands of the business environment.","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127086504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Chromatic Dispersion Properties of A Decagonal Photonic Crystal Fiber 十角光子晶体光纤的色散特性
2007 International Conference on Information and Communication Technology Pub Date : 2007-03-07 DOI: 10.1109/ICICT.2007.375365
S. M. Abdur Razzak, Y. Namihira, M.A.G. Khan, F. Begum, S. Kaijage
{"title":"Chromatic Dispersion Properties of A Decagonal Photonic Crystal Fiber","authors":"S. M. Abdur Razzak, Y. Namihira, M.A.G. Khan, F. Begum, S. Kaijage","doi":"10.1109/ICICT.2007.375365","DOIUrl":"https://doi.org/10.1109/ICICT.2007.375365","url":null,"abstract":"This paper presents dispersion characteristics of a decagonal photonic crystal fiber (D-PCF) for the first time. The finite difference method (FDM) with an anisotropic perfectly matched boundary layer (PML) is used to investigate the chromatic dispersion characteristics. It is shown through numerical simulation results that D-PCFs can be used as a dispersion compensating fiber for their high negative dispersion slope characteristic. The dependency of chromatic dispersion with pitch, wavelength and air-hole diameters are also presented. Moreover, dispersion properties of D-PCF have been compared with that of the octagonal PCF (O-PCF) and hexagonal PCF (H-PCF), respectively.","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133340839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Proposaland Efficient Implementation of Detecting and Filtering Method for IP Spoofed Packets 一种有效的IP欺骗报文检测与过滤方法
2007 International Conference on Information and Communication Technology Pub Date : 2007-03-07 DOI: 10.1109/ICICT.2007.375404
T. Ohtsuka, F. Nakamura, Y. Sekiya, Y. Wakahara
{"title":"Proposaland Efficient Implementation of Detecting and Filtering Method for IP Spoofed Packets","authors":"T. Ohtsuka, F. Nakamura, Y. Sekiya, Y. Wakahara","doi":"10.1109/ICICT.2007.375404","DOIUrl":"https://doi.org/10.1109/ICICT.2007.375404","url":null,"abstract":"In the Internet there are a lot of distributed denial of service (DDoS) attacks. A lot of attacks aim to cause damage to services such as web, ire and DNS. However, there is no efficient method to protect regular traffic from the attacks. In this paper we propose FSN method to detect and filter out the attacks efficiently as much as possible, near the attackers. FSN method is effective and practical and applicable to the real Internet environment. FSN method uses topology information to detect the attacks and collects topology information using IGP routing protocol, so it is applicable to the environments including asymmetric paths and it doesn't require collected packets to construct neighbor information. To evaluate FSN method we perform some simulations compared to reverse path forwarding (RPF). The simulation results show FSN method can prevent the attacks more efficiently than RPF and filter out the attacks in the environments including asymmetric paths. According to the results, we conclude FSN method is very effective and practical.","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115934647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信