{"title":"A framework of tag anti-collision algorithm for fast identification in RFID system","authors":"S. M. Wasikon, Z. Suradi","doi":"10.1109/ICCCE.2008.4580762","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580762","url":null,"abstract":"The problems of identifying a set of tagged objects simultaneously in an RFID network have hampered the adoption of RFID universally. When multiple tags transmit their IDs in a single period of time to a single reader over a shared wireless channel, the tag signals may collide. This collision will disturb the readerpsilas identification process. Hence, we proposed a modified version of accelerated frame slotted ALOHA protocol called hasten dynamic frame slotted ALOHA (HEDFSA) to condense a number of retransmission for one tag, besides reducing the probability of colliding tags. In HEDFSA, the colliding tags in the first round reading will be identified in the next reading. It is expected that our protocol performance would be better in terms of shorter time in identifying process of tags since number of tag collision problems has been reduced.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132755500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MAC protocol to reduce packet collision in wireless sensor network","authors":"A. H. Ab Halim, K. Zen","doi":"10.1109/ICCCE.2008.4580812","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580812","url":null,"abstract":"Wireless sensor network (WSN) consists of a large number of sensor nodes densely deployed closed to each other. Each sensor carries out task such as monitoring and collecting data, or detecting and identifying certain events. While nodes in operation, they will detect each other and form a communication network. The problem arises when two or more nodes send data at the same times over the same channel. Here, the task of Medium Access Control (MAC) is crucial to efficiently manage the transmission among nodes and reduce collision. However, most of the MAC protocols designed for WSN are for static environment. Applying the existing MAC protocol to application such as medical care and disaster response will raise few problems where the moving node will experience delay in sending and receiving data. Thus, there is a need to design a protocol which can tolerate the node moving without degrading network performance. The aim of this paper is to evaluate the capability of MAC protocol issues especially for the popular MAC protocol for sensor network, S-MAC and IEEE 802.15.4.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"5 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134609866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. O. Khalifa, A. Albagul, S. Khan, M.R. Islam, N. Usman
{"title":"Wireless smoke detection system","authors":"O. O. Khalifa, A. Albagul, S. Khan, M.R. Islam, N. Usman","doi":"10.1109/ICCCE.2008.4580637","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580637","url":null,"abstract":"This paper attempts to integrate RF technology into smoke detector circuitry. In the proposed system, a smoke detector upon senses smoke activates its alarm, sends a low voltage signal to all other smoke detectors in the vicinity. This low voltage signal activates the individual relays in the other smoke detectors causing them to emit a tone that alerts residents that one of the smoke detectors senses smoke. In this system the transmitter and receiver are installed in a unit and the need for a base is eliminated. The individual smoke detectors are equipped with all the electronics required to both send and receive signals. They are battery operated and therefore they require no external connections. They can be installed by a homeowner just as they would a normal smoke detector. The proposed design is aiming to have Cost efficient system, Compact design, easily expandable, Simple to install, Replaceable components. The system was tested indoor and outdoor with different distance and with the presence of noise.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133299610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effect of weather conditions on quality of Free Space Optics links (with focus on Malaysia)","authors":"H. Alma, W. Al-Khateeb","doi":"10.1109/ICCCE.2008.4580797","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580797","url":null,"abstract":"Free space optics (FSO) is a promising optical technology that has a great chance to compliment the traditional wireless communications, through provision of high bandwidth, excellent security and reaching places where cable technology could never reach. Quality of FSO links however is greatly affected by weather conditions and link distance. Since there is no known analysis on the effect of weather conditions in Malaysia, this paper offers and attempt to analyze and simulate FSO links under typical local weather and terrain. The simulations under various weather conditions, ranging from light to heavy rain, clear weather to light and heavy haze, would help in determining system quality and design requirements, such as desired transmit power, receiver sensitivity, maximum range, etc. The quality analysis of the links in this paper is done in terms of BER, attenuation and link margin.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129422468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mixed traffic modeling for wireless cellular network","authors":"A.B.M. Siddique Hossain, M. S. Karim, M.I. Islam","doi":"10.1109/ICCCE.2008.4580645","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580645","url":null,"abstract":"Any cell of a network experiences two types of call arrival; new originating call, and handoff call from surrounding cells. If the number of busy users around a cell is finite with an average value of N, then rest of the radio resources of the network can be assigned to support handoff calls. So, for handoff calls, the traffic case resembles a network with limited user traffic (PCT-II), where as rest of the radio resources handle unlimited user traffic (PCT-I). In this paper, a mixed traffic model (combination of PCT-I and PCT-II) has been considered to evaluate different traffic parameters like, probability state and call blocking of a cellular network. For analysis, here, two-dimensional state transition diagram as well as tabular method is considered.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132372363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Al-Kathiri, W. Al-Khateeb, M. Hafizulfika, M. Wahiddin, S. Saharudin
{"title":"Characterization of mean photon number for key distribution system using faint laser","authors":"S. Al-Kathiri, W. Al-Khateeb, M. Hafizulfika, M. Wahiddin, S. Saharudin","doi":"10.1109/ICCCE.2008.4580803","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580803","url":null,"abstract":"Key distribution system using faint laser is very likely to become the first application exploiting the particular properties of single quanta called photons. In experimental key distribution system, it is highly demanded to use single-photon source for secure key distribution. Since there is not yet a laser source capable of producing such faint state, most experiments uses low coherent pulse laser, which is attenuated to produce a mean photon number mu. In this paper, we present an experimental setup to determine the mean photon number using a 300-ps low coherent pulse laser at 1550 nm for a practical crypto system. We will also present the effect of trigger frequency, detection efficiency and dark counts on average photon counts.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133735161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance comparison of static CMOS and MCML gates in sub-threshold region of operation for 32nm CMOS technology","authors":"T. Agarwal, A. Sawhney, A. K. Kureshi, M. Hasan","doi":"10.1109/ICCCE.2008.4580613","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580613","url":null,"abstract":"This paper investigates the performance of static CMOS logic circuits and MOS current mode logic (MCML) circuits in sub-threshold region. The simulations are based on 32 nm Berkeley predictive technology model (BPTM) running in HSPICE software. It is found that MCML logic circuits exhibit a decrease in delay and so decrease in overall PDP, which is one of our performance measures, with scaling of input voltage which is contrary to the behavior of static CMOS logic circuits. The results show a propagation delay improvement of more than 10 times when using MCML logic over CMOS logic in sub-threshold region of operation. Further the performance in terms of PDP of MCML logic circuits is improved by a factor of 7-10 when the input voltage is scaled down from 0.4 V to 0.2 V. .The results of various circuit simulations have been illustrated and compared by defining certain performance measures and the trade off between these performance measures.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132626237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving system performance through operating system optimization on embedded devices platform","authors":"S. Daud, Z. Khalib, R. B. Ahmad","doi":"10.1109/ICCCE.2008.4580760","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580760","url":null,"abstract":"Implemented with a low speed CPU, small memory footprint, low static memory storage and developed specifically for low power requirement, small embedded devices are significantly affected by processing time. By cutting down processing time needed to complete a certain task, not only power consumption could be reduced, but it could also lead to greater system performance without the need to redevelop the current system. In this paper, we propose a system optimization technique through operating system optimization implemented during the OS compilation stages. Results obtained shows that a proper compiler optimization during the OS development stages could lead to a more than 100% speed increase on code execution performance, code loading sequences and library linking procedures. This greatly improves total system performance and reduces the time for a particular system to complete itspsila tasks and effectively reduces system turnover time without requiring a major overhaul on the software and hardware side.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115167542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Singh, Sukumar Nandi, S. Birendra Singh, L. ShyamSundar Singh
{"title":"Stealth steganography in visual cryptography for half tone images","authors":"K. Singh, Sukumar Nandi, S. Birendra Singh, L. ShyamSundar Singh","doi":"10.1109/ICCCE.2008.4580799","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580799","url":null,"abstract":"A novel approach for detection of cheating in visual cryptography based on steganography for hiding digital signature of the secret image is proposed. The proposed technique hides the verification bits of the signature in the different shares of the participants. For hiding binary \"0\", no flipping of the subpixel is done in the block of the share, but change is done for hiding binary \"1\" by flipping a white (black) subpixel in one of the blocks of black (white) share The hidden signature can be recovered in the presence of all shares and verified by comparing with the reconstructed digital signature in case of doubt.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"299 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134194267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. A. Rahim, A. A. ab Rahman, G. Andaljayalakshmi, R. Ahmad, W.N.S. Firuz Wan Arrifin
{"title":"A genetic algorithm approach to VLSI macro cell non-slicing floorplans using binary tree","authors":"H. A. Rahim, A. A. ab Rahman, G. Andaljayalakshmi, R. Ahmad, W.N.S. Firuz Wan Arrifin","doi":"10.1109/ICCCE.2008.4580562","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580562","url":null,"abstract":"This paper proposes an optimization approach for macro-cell placement which minimizes the chip area size. A binary tree method for non-slicing tree construction process is utilized for the placement and area optimization of macro-cell layout in very large scaled integrated (VLSI) design. Three different types of genetic algorithms: simple genetic algorithm (SGA), steady-state algorithm (SSGA) and adaptive genetic algorithm (AGA) are employed in order to examine their performances in converging to their global minimums. Experimental results on Microelectronics Center of North Carolina (MCNC) benchmark problems show that the developed algorithm achieves an acceptable performance quality to the slicing floorplan. Furthermore, the robustness of genetic algorithm also has been investigated in order to validate the performance stability in achieving the optimal solution for every runtime. This algorithm demonstrates that SSGA converges to the optimal result faster than SGA and AGA. Besides that, SSGA also outperforms SGA and AGA in terms of robustness.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132720857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}