2008 International Conference on Computer and Communication Engineering最新文献

筛选
英文 中文
A framework of tag anti-collision algorithm for fast identification in RFID system 一种用于RFID系统快速识别的标签防碰撞算法框架
2008 International Conference on Computer and Communication Engineering Pub Date : 2008-05-13 DOI: 10.1109/ICCCE.2008.4580762
S. M. Wasikon, Z. Suradi
{"title":"A framework of tag anti-collision algorithm for fast identification in RFID system","authors":"S. M. Wasikon, Z. Suradi","doi":"10.1109/ICCCE.2008.4580762","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580762","url":null,"abstract":"The problems of identifying a set of tagged objects simultaneously in an RFID network have hampered the adoption of RFID universally. When multiple tags transmit their IDs in a single period of time to a single reader over a shared wireless channel, the tag signals may collide. This collision will disturb the readerpsilas identification process. Hence, we proposed a modified version of accelerated frame slotted ALOHA protocol called hasten dynamic frame slotted ALOHA (HEDFSA) to condense a number of retransmission for one tag, besides reducing the probability of colliding tags. In HEDFSA, the colliding tags in the first round reading will be identified in the next reading. It is expected that our protocol performance would be better in terms of shorter time in identifying process of tags since number of tag collision problems has been reduced.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132755500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
MAC protocol to reduce packet collision in wireless sensor network 无线传感器网络中减少数据包冲突的MAC协议
2008 International Conference on Computer and Communication Engineering Pub Date : 2008-05-13 DOI: 10.1109/ICCCE.2008.4580812
A. H. Ab Halim, K. Zen
{"title":"MAC protocol to reduce packet collision in wireless sensor network","authors":"A. H. Ab Halim, K. Zen","doi":"10.1109/ICCCE.2008.4580812","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580812","url":null,"abstract":"Wireless sensor network (WSN) consists of a large number of sensor nodes densely deployed closed to each other. Each sensor carries out task such as monitoring and collecting data, or detecting and identifying certain events. While nodes in operation, they will detect each other and form a communication network. The problem arises when two or more nodes send data at the same times over the same channel. Here, the task of Medium Access Control (MAC) is crucial to efficiently manage the transmission among nodes and reduce collision. However, most of the MAC protocols designed for WSN are for static environment. Applying the existing MAC protocol to application such as medical care and disaster response will raise few problems where the moving node will experience delay in sending and receiving data. Thus, there is a need to design a protocol which can tolerate the node moving without degrading network performance. The aim of this paper is to evaluate the capability of MAC protocol issues especially for the popular MAC protocol for sensor network, S-MAC and IEEE 802.15.4.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"5 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134609866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Wireless smoke detection system 无线感烟探测系统
2008 International Conference on Computer and Communication Engineering Pub Date : 2008-05-13 DOI: 10.1109/ICCCE.2008.4580637
O. O. Khalifa, A. Albagul, S. Khan, M.R. Islam, N. Usman
{"title":"Wireless smoke detection system","authors":"O. O. Khalifa, A. Albagul, S. Khan, M.R. Islam, N. Usman","doi":"10.1109/ICCCE.2008.4580637","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580637","url":null,"abstract":"This paper attempts to integrate RF technology into smoke detector circuitry. In the proposed system, a smoke detector upon senses smoke activates its alarm, sends a low voltage signal to all other smoke detectors in the vicinity. This low voltage signal activates the individual relays in the other smoke detectors causing them to emit a tone that alerts residents that one of the smoke detectors senses smoke. In this system the transmitter and receiver are installed in a unit and the need for a base is eliminated. The individual smoke detectors are equipped with all the electronics required to both send and receive signals. They are battery operated and therefore they require no external connections. They can be installed by a homeowner just as they would a normal smoke detector. The proposed design is aiming to have Cost efficient system, Compact design, easily expandable, Simple to install, Replaceable components. The system was tested indoor and outdoor with different distance and with the presence of noise.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133299610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Effect of weather conditions on quality of Free Space Optics links (with focus on Malaysia) 天气状况对自由空间光学连线质量的影响(以马来西亚为重点)
2008 International Conference on Computer and Communication Engineering Pub Date : 2008-05-13 DOI: 10.1109/ICCCE.2008.4580797
H. Alma, W. Al-Khateeb
{"title":"Effect of weather conditions on quality of Free Space Optics links (with focus on Malaysia)","authors":"H. Alma, W. Al-Khateeb","doi":"10.1109/ICCCE.2008.4580797","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580797","url":null,"abstract":"Free space optics (FSO) is a promising optical technology that has a great chance to compliment the traditional wireless communications, through provision of high bandwidth, excellent security and reaching places where cable technology could never reach. Quality of FSO links however is greatly affected by weather conditions and link distance. Since there is no known analysis on the effect of weather conditions in Malaysia, this paper offers and attempt to analyze and simulate FSO links under typical local weather and terrain. The simulations under various weather conditions, ranging from light to heavy rain, clear weather to light and heavy haze, would help in determining system quality and design requirements, such as desired transmit power, receiver sensitivity, maximum range, etc. The quality analysis of the links in this paper is done in terms of BER, attenuation and link margin.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129422468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Mixed traffic modeling for wireless cellular network 无线蜂窝网络的混合流量建模
2008 International Conference on Computer and Communication Engineering Pub Date : 2008-05-13 DOI: 10.1109/ICCCE.2008.4580645
A.B.M. Siddique Hossain, M. S. Karim, M.I. Islam
{"title":"Mixed traffic modeling for wireless cellular network","authors":"A.B.M. Siddique Hossain, M. S. Karim, M.I. Islam","doi":"10.1109/ICCCE.2008.4580645","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580645","url":null,"abstract":"Any cell of a network experiences two types of call arrival; new originating call, and handoff call from surrounding cells. If the number of busy users around a cell is finite with an average value of N, then rest of the radio resources of the network can be assigned to support handoff calls. So, for handoff calls, the traffic case resembles a network with limited user traffic (PCT-II), where as rest of the radio resources handle unlimited user traffic (PCT-I). In this paper, a mixed traffic model (combination of PCT-I and PCT-II) has been considered to evaluate different traffic parameters like, probability state and call blocking of a cellular network. For analysis, here, two-dimensional state transition diagram as well as tabular method is considered.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132372363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Characterization of mean photon number for key distribution system using faint laser 用微弱激光表征密钥分配系统的平均光子数
2008 International Conference on Computer and Communication Engineering Pub Date : 2008-05-13 DOI: 10.1109/ICCCE.2008.4580803
S. Al-Kathiri, W. Al-Khateeb, M. Hafizulfika, M. Wahiddin, S. Saharudin
{"title":"Characterization of mean photon number for key distribution system using faint laser","authors":"S. Al-Kathiri, W. Al-Khateeb, M. Hafizulfika, M. Wahiddin, S. Saharudin","doi":"10.1109/ICCCE.2008.4580803","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580803","url":null,"abstract":"Key distribution system using faint laser is very likely to become the first application exploiting the particular properties of single quanta called photons. In experimental key distribution system, it is highly demanded to use single-photon source for secure key distribution. Since there is not yet a laser source capable of producing such faint state, most experiments uses low coherent pulse laser, which is attenuated to produce a mean photon number mu. In this paper, we present an experimental setup to determine the mean photon number using a 300-ps low coherent pulse laser at 1550 nm for a practical crypto system. We will also present the effect of trigger frequency, detection efficiency and dark counts on average photon counts.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133735161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance comparison of static CMOS and MCML gates in sub-threshold region of operation for 32nm CMOS technology 静态CMOS与MCML门在32nm CMOS亚阈值区域的性能比较
2008 International Conference on Computer and Communication Engineering Pub Date : 2008-05-13 DOI: 10.1109/ICCCE.2008.4580613
T. Agarwal, A. Sawhney, A. K. Kureshi, M. Hasan
{"title":"Performance comparison of static CMOS and MCML gates in sub-threshold region of operation for 32nm CMOS technology","authors":"T. Agarwal, A. Sawhney, A. K. Kureshi, M. Hasan","doi":"10.1109/ICCCE.2008.4580613","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580613","url":null,"abstract":"This paper investigates the performance of static CMOS logic circuits and MOS current mode logic (MCML) circuits in sub-threshold region. The simulations are based on 32 nm Berkeley predictive technology model (BPTM) running in HSPICE software. It is found that MCML logic circuits exhibit a decrease in delay and so decrease in overall PDP, which is one of our performance measures, with scaling of input voltage which is contrary to the behavior of static CMOS logic circuits. The results show a propagation delay improvement of more than 10 times when using MCML logic over CMOS logic in sub-threshold region of operation. Further the performance in terms of PDP of MCML logic circuits is improved by a factor of 7-10 when the input voltage is scaled down from 0.4 V to 0.2 V. .The results of various circuit simulations have been illustrated and compared by defining certain performance measures and the trade off between these performance measures.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132626237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Improving system performance through operating system optimization on embedded devices platform 通过对嵌入式设备平台上的操作系统进行优化,提高系统性能
2008 International Conference on Computer and Communication Engineering Pub Date : 2008-05-13 DOI: 10.1109/ICCCE.2008.4580760
S. Daud, Z. Khalib, R. B. Ahmad
{"title":"Improving system performance through operating system optimization on embedded devices platform","authors":"S. Daud, Z. Khalib, R. B. Ahmad","doi":"10.1109/ICCCE.2008.4580760","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580760","url":null,"abstract":"Implemented with a low speed CPU, small memory footprint, low static memory storage and developed specifically for low power requirement, small embedded devices are significantly affected by processing time. By cutting down processing time needed to complete a certain task, not only power consumption could be reduced, but it could also lead to greater system performance without the need to redevelop the current system. In this paper, we propose a system optimization technique through operating system optimization implemented during the OS compilation stages. Results obtained shows that a proper compiler optimization during the OS development stages could lead to a more than 100% speed increase on code execution performance, code loading sequences and library linking procedures. This greatly improves total system performance and reduces the time for a particular system to complete itspsila tasks and effectively reduces system turnover time without requiring a major overhaul on the software and hardware side.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115167542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Stealth steganography in visual cryptography for half tone images 半色调图像视觉密码术中的隐形隐写
2008 International Conference on Computer and Communication Engineering Pub Date : 2008-05-13 DOI: 10.1109/ICCCE.2008.4580799
K. Singh, Sukumar Nandi, S. Birendra Singh, L. ShyamSundar Singh
{"title":"Stealth steganography in visual cryptography for half tone images","authors":"K. Singh, Sukumar Nandi, S. Birendra Singh, L. ShyamSundar Singh","doi":"10.1109/ICCCE.2008.4580799","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580799","url":null,"abstract":"A novel approach for detection of cheating in visual cryptography based on steganography for hiding digital signature of the secret image is proposed. The proposed technique hides the verification bits of the signature in the different shares of the participants. For hiding binary \"0\", no flipping of the subpixel is done in the block of the share, but change is done for hiding binary \"1\" by flipping a white (black) subpixel in one of the blocks of black (white) share The hidden signature can be recovered in the presence of all shares and verified by comparing with the reconstructed digital signature in case of doubt.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"299 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134194267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A genetic algorithm approach to VLSI macro cell non-slicing floorplans using binary tree 基于二叉树的VLSI宏单元非切片平面图遗传算法
2008 International Conference on Computer and Communication Engineering Pub Date : 2008-05-13 DOI: 10.1109/ICCCE.2008.4580562
H. A. Rahim, A. A. ab Rahman, G. Andaljayalakshmi, R. Ahmad, W.N.S. Firuz Wan Arrifin
{"title":"A genetic algorithm approach to VLSI macro cell non-slicing floorplans using binary tree","authors":"H. A. Rahim, A. A. ab Rahman, G. Andaljayalakshmi, R. Ahmad, W.N.S. Firuz Wan Arrifin","doi":"10.1109/ICCCE.2008.4580562","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580562","url":null,"abstract":"This paper proposes an optimization approach for macro-cell placement which minimizes the chip area size. A binary tree method for non-slicing tree construction process is utilized for the placement and area optimization of macro-cell layout in very large scaled integrated (VLSI) design. Three different types of genetic algorithms: simple genetic algorithm (SGA), steady-state algorithm (SSGA) and adaptive genetic algorithm (AGA) are employed in order to examine their performances in converging to their global minimums. Experimental results on Microelectronics Center of North Carolina (MCNC) benchmark problems show that the developed algorithm achieves an acceptable performance quality to the slicing floorplan. Furthermore, the robustness of genetic algorithm also has been investigated in order to validate the performance stability in achieving the optimal solution for every runtime. This algorithm demonstrates that SSGA converges to the optimal result faster than SGA and AGA. Besides that, SSGA also outperforms SGA and AGA in terms of robustness.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132720857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信