Proceedings of the IEEE Symposium on Emerging Technologies, 2005.最新文献

筛选
英文 中文
Node failure detection and path repairing scheme in virtual circuit routing algorithm for wireless ad hoc micro sensor networks 无线自组织微传感器网络虚拟电路路由算法中的节点故障检测和路径修复方案
Proceedings of the IEEE Symposium on Emerging Technologies, 2005. Pub Date : 2005-12-19 DOI: 10.1109/ICET.2005.1558860
A. A. Minhas, C. Steger, R. Weiss, S. Ehsan
{"title":"Node failure detection and path repairing scheme in virtual circuit routing algorithm for wireless ad hoc micro sensor networks","authors":"A. A. Minhas, C. Steger, R. Weiss, S. Ehsan","doi":"10.1109/ICET.2005.1558860","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558860","url":null,"abstract":"Routing algorithms haveshowntheir importance in the power aware wireless micro-sensor networks. In this paper,we presenttheimproved virtuial circulit routingalgorithm (IVCRA)implemented in temperatuire sensorapplication developed bytus. We introduce a method todetect nodefailure andthen to repair thepathtoroutte thedatapack-et safely to basestation. Weverified itbysimulating inTOSSIM andthenimplementing on real motesnetwork. The motes are fromBerkeley USA andare being operated byusingTinyOS-operating systemand nesClanguage. Energy analysis showsthat IVCRAis energy efficient. ForIVCRA,we theninclude the packet sizerecommended byZigbee/IEEE 802.15.4 standard, an emerging standard forwireless sensor networks, alongwithftatures ofitsNetwork Layer. We prove thereliabilitv ofnetwork withIVCRA. Energycfficiencies fbrdifferent packet sizereveal that ourpacket size isoptimal.","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134227179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Speech enabled algorithm for multilingual educational game 多语种教育游戏的语音启用算法
Proceedings of the IEEE Symposium on Emerging Technologies, 2005. Pub Date : 2005-12-19 DOI: 10.1109/ICET.2005.1558880
A. Shah, A. W. Ansari, I. A. Ismaili
{"title":"Speech enabled algorithm for multilingual educational game","authors":"A. Shah, A. W. Ansari, I. A. Ismaili","doi":"10.1109/ICET.2005.1558880","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558880","url":null,"abstract":"In this paper we propose an algorithmii that utilizes the Artificial Intelligence bcased techniques including Heuristic Search and natural language processing to enable tlhe single user to plaiy the game at any time with the coimputer withoutt waiting far the availability of other player. As well as we propose to acldd tlhe support of the vocabularv oJ other regional languages such as Urdu / Sindhi/ Paslhto witha the speech synthesis based pronunciation facility. Thae tools and tlhe technologies that are to be used for the implemtientation of the algorithm include: Microsoft VB and AI Techniques along with mttultilingual dictioncaries. The imtplemlentation of this algoritlhm wouldfacilitate any one in general and studcents in particulair to butild a strong ivocabulary of acny language with just the fun of playing. Thlis wouild provide a direct contriburtion to thze educcation an1d literacyaclong with entertainment.","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133706132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An improved laplacian distortion model of Mpeg-4 FGS 一种改进的Mpeg-4 FGS拉普拉斯失真模型
Proceedings of the IEEE Symposium on Emerging Technologies, 2005. Pub Date : 2005-12-19 DOI: 10.1109/ICET.2005.1558853
Xie Li, Wenjun Zhang
{"title":"An improved laplacian distortion model of Mpeg-4 FGS","authors":"Xie Li, Wenjun Zhang","doi":"10.1109/ICET.2005.1558853","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558853","url":null,"abstract":"In this paper, we did research on the relationship between rate and distortion for mpeg-4 FGS enhancement layer. During the course of research on the relationship between rate and distortion of meg-4 FGS enhancement layer, we found that there are big discrepancy between the real data and the RD model based on Laplacian distribution. And what's more, the higher the rate is, the larger the error is. Based on the detailed analysis of quantisation approach used in the mpeg-4 FGS encoder, we put forward an improved distortion model. Experiments' results show that the proposed improved distortion model not only can keep good approximation with the real data when the rate is low, the same as the distortion model based on Laplacian model, but also can keep good approximation with the real empirical data when the rate is high. Our proposed new distortion model has a better performance","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122909266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance analysis of odd bit QAM constellation 奇位QAM星座性能分析
Proceedings of the IEEE Symposium on Emerging Technologies, 2005. Pub Date : 2005-12-19 DOI: 10.1109/ICET.2005.1558876
Habibullah Jamal
{"title":"Performance analysis of odd bit QAM constellation","authors":"Habibullah Jamal","doi":"10.1109/ICET.2005.1558876","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558876","url":null,"abstract":"Quadrature amplitude modulation (QAM) is used for transmission at high data rate in band-limited channels. A great deal of attention has been devoted to derive expressions for bit error probability of QAM. In this paper, a generalized expression for bit error rate (BER) for odd bit QAM using symmetry properties of Gray code is derived and its performance is compared with existing closed form expression for arbitrary QAM constellation. New BER expression offers a convenient way to evaluate the performance of odd bit QAM for various cases of practical interest","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121161600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Comparative analysis and design philosophy of next generation unified enterprise application security 下一代统一企业应用安全的比较分析与设计理念
Proceedings of the IEEE Symposium on Emerging Technologies, 2005. Pub Date : 2005-12-19 DOI: 10.1109/ICET.2005.1558935
R.A. Shaikh, S. Rajput, S. Zaidi, K. Sharif
{"title":"Comparative analysis and design philosophy of next generation unified enterprise application security","authors":"R.A. Shaikh, S. Rajput, S. Zaidi, K. Sharif","doi":"10.1109/ICET.2005.1558935","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558935","url":null,"abstract":"Unified enterprise application security is a newly emerging approach for providing protection against application level attacks. Conventional application security approaches that embed security into each critical application results into scattered security mechanism, which is not only difficult to manage but also creates security loopholes. Therefore, new unified enterprise application security concept is evolving in the industry that consists of centralized authentication, access control, incident response and auditing. Industries such as Computer Associate, Cerebit, Entrust, Evidian, IBM Tivoli, Netegrity, Ohlix and SunOne have comes up with the identity and access management solutions that are based on this concept. Significant amount of misunderstanding exists in the industry and research community about appropriate features of such a unified product. Therefore we have proposed new enterprise application security (EAS) comparison framework to compare existing enterprise application security products. This framework helps an enterprise in selecting appropriate application security product. From comparison we found that Computer Associate and Netegrity solutions are the best available solutions, however none of the current available solutions are providing complete enterprise application security. Therefore we have proposed new unified enterprise application security architecture. This architecture provides all basic information security and other critical services such as, auditing, reporting, authentication, access control, confidentiality, integrity, commitment to standards, incident response, scalability. flexibility, manageability, and compliance of regulatory mandates.","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129062915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Detection of period-3 behavior in genomic sequences using singular value decomposition 利用奇异值分解检测基因组序列的周期-3行为
Proceedings of the IEEE Symposium on Emerging Technologies, 2005. Pub Date : 2005-12-19 DOI: 10.1109/ICET.2005.1558846
M. Akhtar, E. Ambikairajah, J. Epps
{"title":"Detection of period-3 behavior in genomic sequences using singular value decomposition","authors":"M. Akhtar, E. Ambikairajah, J. Epps","doi":"10.1109/ICET.2005.1558846","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558846","url":null,"abstract":"Manydigital signal processing techniques have beenusedtoautomatically distinguish theprotein coding regions (exons) fromnon-coding regions (introns) inaDNAsequence. Recently, Auto-regressive (AR) technique hasbeenused forthedetection of3periodicty present inprotein coding regions of genomic sequences. The. sequence length, average spacing between coding regions, andaverage coding region length arethemainfactors thataffect the performance ofanyprediction method Inthis paper, wepropose theuseofSingular Value Decomposition (SVD) methodfor thedetection ofperiod-3 behavior in DNA sequences. Results showthatSVDmethod outperforms theARtechnique.","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116893650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Horizontally opposed pressure loaded computer generated artificial feel control column for a motion base flight simulation system using fused hard & soft computing 采用软硬融合计算技术,水平对置压力加载计算机生成了运动基飞行仿真系统的人工手感控制柱
Proceedings of the IEEE Symposium on Emerging Technologies, 2005. Pub Date : 2005-12-19 DOI: 10.1109/ICET.2005.1558927
S.M. Raza, B. Zeir
{"title":"Horizontally opposed pressure loaded computer generated artificial feel control column for a motion base flight simulation system using fused hard & soft computing","authors":"S.M. Raza, B. Zeir","doi":"10.1109/ICET.2005.1558927","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558927","url":null,"abstract":"To induce true feel of flight in a flight simulation system, flight controls play a vital role. The varying loading of the flight column during flight, is based entirely on the aerodynamics characteristics of the aircraft set by the flight controls. Replication of such forces in a simulator poses multiple challenges, including generation of simulated aerodynamic forces, mapping of the forces on a mechanical assembly and development of a mechanical assembly for translation of such forces on the flight column. The addition of non-linearities in the system increases the degree of difficulty. The paper presents such a developed system, which uses a simulation software for generating flight data, a 3-mode feed forward PID control loop for maintaining the mechanical system close to the set-points generated by the simulation software, a fuzzy logic based inference engine for modifying control loop parameters according to changing system conditions and a horizontally opposed spring loaded mechanical system for mapping controller responses on the flight column. The usage of a fused hard & soft computing approach results in increased repeatability, reliability and robustness. The initial testing and experimental results have been very encouraging.","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117228679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dynamic queue deadline first scheduling algorithm for soft real time systems 软实时系统的动态队列截止日期优先调度算法
Proceedings of the IEEE Symposium on Emerging Technologies, 2005. Pub Date : 2005-12-19 DOI: 10.1109/ICET.2005.1558906
A. lqbal, A. Zafar, B. Siddique
{"title":"Dynamic queue deadline first scheduling algorithm for soft real time systems","authors":"A. lqbal, A. Zafar, B. Siddique","doi":"10.1109/ICET.2005.1558906","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558906","url":null,"abstract":"Most embedded real time systems are based on uiniprocessor architecture, and deadline miss ratio is always a mainstay .fr anv type of real time system. This paper presents the design and analysis of a new scheduling algorithm, Dynamic Queue Deadline First (DQDF) to handle scheduling of dynamic multiple tasks in real time systems. Soft real-time processing is a realtime processing in which some or all applicati6ns are allowed to miss deadlines, particularly in situations of system load. In this paper, a new scheduler is introduced to minimize the overhead and percentage of deadline misses to improve the system utilization andfairness. We have used Earliest Deadline First (EDF) with dynamic queuing technique, as it is an optimal scheduling algorithm for uniprocessor systems. Simulation results show that with DQDF algorithm, the deadline miss ratio is improved and fairness is restored by utsing static priority approach. The comparison of the new scheduler DQDF with simple EDF scheduler results the perjbrmance improvement upto 68%.","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"07 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130164031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Data acquisition and handling for the simulation of ASIC by utilizing SW/HW co-design methodology 利用软件/硬件协同设计方法对ASIC的仿真进行数据采集和处理
Proceedings of the IEEE Symposium on Emerging Technologies, 2005. Pub Date : 2005-12-19 DOI: 10.1109/ICET.2005.1558895
K. Muhammad, Feng Shi, A.Q. Suhail
{"title":"Data acquisition and handling for the simulation of ASIC by utilizing SW/HW co-design methodology","authors":"K. Muhammad, Feng Shi, A.Q. Suhail","doi":"10.1109/ICET.2005.1558895","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558895","url":null,"abstract":"","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133027214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Geographical information systems and digital cartography in environment planning and development of Islamabad 伊斯兰堡环境规划和发展中的地理信息系统和数字制图
Proceedings of the IEEE Symposium on Emerging Technologies, 2005. Pub Date : 2005-12-19 DOI: 10.1109/ICET.2005.1558910
M.F. Mahbub, S. Jawad, S. Ahmed
{"title":"Geographical information systems and digital cartography in environment planning and development of Islamabad","authors":"M.F. Mahbub, S. Jawad, S. Ahmed","doi":"10.1109/ICET.2005.1558910","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558910","url":null,"abstract":"Geographical information systems have evolved over the past thirty years keeping pace with the ever-clumping computing facilities. Today it is possible to operate almost all components required for GIS development from the desktop PC. GIS incorporates thematic mapping with techniques to use raster maps that have been rectified, geo-referenced and digitized to provide accurate vector data of a study area thus allowing intelligent and reasonably credible inference by its users. For such goals and the processes involved therein, sophisticated software including AutoCAD Map, ERDAS IMAGINE and ArcGIS are vital tools available in the industry. It is possible to conveniently develop customized GIS solution for almost any domain dealing with a geographic location and requiring spatial analysis. The work presented in this paper discusses the methods that may be employed to conveniently develop a GlS application with cartographic functions for automation of tasks dependent on accurate mapping in environmental planning and development. A GlS based solution has been developed for an environment planning authority with an objective to present a model work using GIS technologies focused around improving city planning, development and management in Pakistan. The model can be used for meeting water requirements, fault diagnosis and corrective actions by water management authority. As the geo-referenced data was readily available for Islamabad hence the case study is focused around it.","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133078297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信