S. M. Mohidul Islam, R. Debnath, S. K. Alamgir Hossain
{"title":"DWT Based Digital Watermarking Technique and its Robustness on Image Rotation, Scaling, JPEG compression, Cropping and Multiple Watermarking","authors":"S. M. Mohidul Islam, R. Debnath, S. K. Alamgir Hossain","doi":"10.1109/ICICT.2007.375386","DOIUrl":"https://doi.org/10.1109/ICICT.2007.375386","url":null,"abstract":"We propose in this paper a discrete wavelet transform (DWT) based digital image watermarking technique. For embedding process, we consider the watermark signal as a binary sequence which is embedded to the high (HL and HH) frequency band of the blue channel. For detecting process, the correlation between the high frequency band DWT coefficients of the watermarked image and the watermark signal is compared with the predefined threshold to determine whether the watermark is present or not. The experimental results show that the method is comparatively robust to several attacks such as rotation, scaling, JPEG compression, cropping, and multiple watermarking.","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133577711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Sakib, S. Dey, S. Majumder, M.N. Alam, R. Sajjad
{"title":"Performance Comparison of Wavelength Shift Keying and Conventional on Off Keying Schemes in a Multi-Hop Optical Ring Network in Presence of Four Wave Mixing Cross Talk","authors":"M. Sakib, S. Dey, S. Majumder, M.N. Alam, R. Sajjad","doi":"10.1109/ICICT.2007.375363","DOIUrl":"https://doi.org/10.1109/ICICT.2007.375363","url":null,"abstract":"A transmission performance study is carried out for an all-optical multi-wavelength metropolitan optical ring network (MON). Effect of using a wavelength shift keying (WSK) scheme is analyzed and compared to that of the conventional on off keying system (OOK) in respect of four wave mixing (FWM) cross talk. The performance results are evaluated at a bit rate of 10Gb/s taking into considerations the combined influence of photo detector shot noise, beat noise components arising out of the beating of the signal with accumulated amplifier's spontaneous emission (ASE) and cross talk introduced at each node due to four wave photon mixing. The computed results show that for 50 hops the bit error rate (BER) of the standard wavelength division multiplexing (WDM) system is higher than 10-12 while for the wavelength shift keying system, for the same received power the BER is lower than 10-16 for the hop length of 100 km. It is also shown that for a given BER, WSK-WDM technique provides higher values of both the maximum allowable number of hops and minimum required power.","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114158940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QoS Support in Ad hoc Networks Based on Cross Layer Design","authors":"S. Aziz, L. Yuan","doi":"10.1109/ICICT.2007.375370","DOIUrl":"https://doi.org/10.1109/ICICT.2007.375370","url":null,"abstract":"In this paper, we propose a cross layer design that not only improves the throughput of real time traffic but also the throughput of best effort traffic. Basically our proposed design is an enhancement of distributed cross-layer QoS [DCLQ] based on node-disjoint multipath routing in mobile ad hoc networks. The throughput of a system is enhanced at the cost of little overhead. Our simulation results show the better throughput of best effort flows without any degradation in the real time flows.","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130579735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Hybrid Jumping Genes Genetic Algorithm Based Request Scheduling Approach in Multiple Destination Routing","authors":"M. Rahman, S. Mondol, G. S. Hossain, A. Dey","doi":"10.1109/ICICT.2007.375405","DOIUrl":"https://doi.org/10.1109/ICICT.2007.375405","url":null,"abstract":"This paper presents a hybrid jumping genes genetic algorithm (HJGGA) for solving the request scheduling problem in multiple destination routing (MDR). The problem incorporates the scheduling and routing process of a set of requests having single source and multiple destinations through a network. Our proposed HJGGA framework, that facilitates intelligent splitting of bandwidth requirement of requests as well as multiple optimal paths for transmission, searches for a near-optimal scheduling solution. We have also developed new chromosome-encoding and mutation technique for our HJGGA. Experimental result shows that our scheme reflects better real world situations and performs superior than previous researches.","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121868953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Music Classification and Retreival: Experiments with Thai Music Collection","authors":"C. Nopthaisong, M. Hasan","doi":"10.1109/ICICT.2007.375346","DOIUrl":"https://doi.org/10.1109/ICICT.2007.375346","url":null,"abstract":"We present the experimental results of classification and retrieval of Thai music using TreeQ (a tree-structured classifier) and LVQ (Learning Vector Quantization) algorithms in this paper. We use the HTK Toolkit in preprocessing acoustic signals including feature extraction from the Thai music collection. The training set consists of 250 songs -50 songs from each of the 5 genres. Training is divided into three phases using all or some of these songs. The test set consists of 10 songs selected from 5 genres which are not included in training. We trained and tested the music classifiers using both TreeQ and LVQ algorithms with varying parameters such as, Number of Codebook (NOC) and pruning thresholds to identify the effects of different parameters and features in the Thai music classification and retrieval. We observed that TreeQ-based experiments yield faster response-times than those of LVQ; and therefore, a TreeQ-based system maybe appropriate for online (real-time) music retrieval tasks. On the other hand, LVQ-based experiments consistently yield better accuracy than those of TreeQ; and therefore, a LVQ-based system may be appropriate in the music classification task since music classification can generally be performed off-line. We also outlined a Relevance Feedback based Music Retrieval System in this paper.","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"357 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115852790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Akther, Kazi Shah Nawaz Ripon, Kazi Masudul Alam
{"title":"DOT: A New Distributed Data Management System","authors":"A. Akther, Kazi Shah Nawaz Ripon, Kazi Masudul Alam","doi":"10.1109/ICICT.2007.375371","DOIUrl":"https://doi.org/10.1109/ICICT.2007.375371","url":null,"abstract":"In this paper we have proposed a new distributed data management system (DDMS) called DOT which provides high performance in an environment of high data mobility and heterogeneous host capabilities. The storage sites of DOT are divided in some groups where a group of client sites is under an administrator site. Intra group and inter group communications in DOT are maintained by peer-to-peer (P2P) connections. DOT follows decentralized-centralized communication architecture. Each client site of a group manages its data autonomously. Each administrator has a rule processing sub-system where rules are defined by high level language. The unit of data in the DOT system is fragment. Residence of a particular file fragments or replicas are not fixed in particular sites rather they can move in their own group. DOT ensures network bandwidth utilization, file location transparency, effective resource utilization, efficient data sharing, high failure tolerance and possibility to collaborate in Wide Area Network.","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130948222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Ali, Akber Dewan, M. J. Hossain, Md Moshiul Hoque, Oksam Chael
{"title":"Contaminated ECG Artifact Detection and Elimination from EEG Using Energy Function Based Transformation","authors":"M. Ali, Akber Dewan, M. J. Hossain, Md Moshiul Hoque, Oksam Chael","doi":"10.1109/ICICT.2007.375341","DOIUrl":"https://doi.org/10.1109/ICICT.2007.375341","url":null,"abstract":"Electrical field of the heart (ECG) propagates throughout the body and introduce artifact in EEG recordings which may lead to incorrect interpretation of monitoring result. Hence in this paper, we present a method of automatic detection and reduction of ECG artifact from EEG. ECG has its own spike like property and periodicity. Moreover, it also has lack of correlation with the EEG signal. We have utilized the aforementioned properties to detect ECG artifact in EEG and have employed a method to remove it automatically. In the first step of the algorithm, an energy function based method is used to emphasize the R-waves of contaminated ECG artifact and thereafter, an adaptive thresholding method along with clustering is used to detect contaminated candidate R-spikes of ECG artifact in EEG signal. After that utilizing periodic information of R-wave, a searching mechanism is employed as post processing to detect the R-peaks more accurately. Thereafter, noise model of ECG artifact contaminated with EEG is generated and finally it is subtracted from the EEG recordings to decontaminate it from the artifact. Before subtraction, a time varying alignment procedure is applied to increase the effectiveness of the artifact reduction method. Results obtained from our extensive experiments show that the proposed method is effective and encouraging in terms of automatic ECG artifact detection and reduction from EEG signal.","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128495627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Quality Through Business Rules","authors":"V. Chanana, A. Koronios","doi":"10.1109/ICICT.2007.375390","DOIUrl":"https://doi.org/10.1109/ICICT.2007.375390","url":null,"abstract":"Good quality data is a valuable asset for any enterprise in this information age. Though volumes of data have grown, their utility for decision making has been meagre. This is a result of poor quality data that enterprises generally possess. Data generation process goes through a number of stages from capture through exchange, integration, migration to storage and data can get corrupted at any stage. Information systems/business applications built with business rules embedded in the code are inadequate to overcome data quality problems. This paper presents a framework that enables enterprise develop business applications that externalize centralized business logic through business rules. Decoupling business rules from the application provides a number of benefits to enterprises including enhanced data quality conforming to defined rules and agility in responding to the ever changing demands of the business environment.","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127086504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. M. Abdur Razzak, Y. Namihira, M.A.G. Khan, F. Begum, S. Kaijage
{"title":"Chromatic Dispersion Properties of A Decagonal Photonic Crystal Fiber","authors":"S. M. Abdur Razzak, Y. Namihira, M.A.G. Khan, F. Begum, S. Kaijage","doi":"10.1109/ICICT.2007.375365","DOIUrl":"https://doi.org/10.1109/ICICT.2007.375365","url":null,"abstract":"This paper presents dispersion characteristics of a decagonal photonic crystal fiber (D-PCF) for the first time. The finite difference method (FDM) with an anisotropic perfectly matched boundary layer (PML) is used to investigate the chromatic dispersion characteristics. It is shown through numerical simulation results that D-PCFs can be used as a dispersion compensating fiber for their high negative dispersion slope characteristic. The dependency of chromatic dispersion with pitch, wavelength and air-hole diameters are also presented. Moreover, dispersion properties of D-PCF have been compared with that of the octagonal PCF (O-PCF) and hexagonal PCF (H-PCF), respectively.","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133340839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proposaland Efficient Implementation of Detecting and Filtering Method for IP Spoofed Packets","authors":"T. Ohtsuka, F. Nakamura, Y. Sekiya, Y. Wakahara","doi":"10.1109/ICICT.2007.375404","DOIUrl":"https://doi.org/10.1109/ICICT.2007.375404","url":null,"abstract":"In the Internet there are a lot of distributed denial of service (DDoS) attacks. A lot of attacks aim to cause damage to services such as web, ire and DNS. However, there is no efficient method to protect regular traffic from the attacks. In this paper we propose FSN method to detect and filter out the attacks efficiently as much as possible, near the attackers. FSN method is effective and practical and applicable to the real Internet environment. FSN method uses topology information to detect the attacks and collects topology information using IGP routing protocol, so it is applicable to the environments including asymmetric paths and it doesn't require collected packets to construct neighbor information. To evaluate FSN method we perform some simulations compared to reverse path forwarding (RPF). The simulation results show FSN method can prevent the attacks more efficiently than RPF and filter out the attacks in the environments including asymmetric paths. According to the results, we conclude FSN method is very effective and practical.","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115934647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}