{"title":"Direct sequence ultra wideband system design for wireless sensor network","authors":"M.A. Azim, H. Mohammad, M. Rahman, N. Amin","doi":"10.1109/ICCCE.2008.4580783","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580783","url":null,"abstract":"In this study, we present the suitability of UWB for WSN by simulating a DS-UWB digital transmission system using Matlab. DS-UWB is a single-band approach that uses narrow UWB pulses and time-domain signal processing combined with direct sequence spread spectrum (DSSS) techniques to transmit and receive information. Due to signal spreading, transmitted power becomes very low which paves to low probability of detection and co-existence with other systems. Simple lower order modulation scheme is considered such as binary PSK, PAM due to low data rate requirements of WSN. Bit error rate (BER) performance has been evaluated for both modulation technique and simulation results show that the pulse repetition coder has significant impact on performance as well as control on data rates and reliable reception. Data is successfully recovered by energy detection method (Detect and Avoid) which facilitates design simplicity at the receiver by avoiding pulse synchronization and coherent detection.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114920354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling and analysis for heterogeneous wireless networks by using of multi-dimensional Markov models","authors":"Hesham M. El-Badawy","doi":"10.1109/ICCCE.2008.4580780","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580780","url":null,"abstract":"Nowadays, a lot of radio access technologies (RAT) have been deployed. In order to achieve a seamless integration between these different RATs, common radio resource management (CRRM) algorithms are considered to be deployed in such heterogeneous wireless networks. This paper provides a complete analytical approach to determine the performance of different RAT with selection procedures in multi-RAT/multi-service environment. Particularly, multi-dimensional Markovian model was used to perform a complete derivation for the system state probabilities. The allocation of voice and data services in both of GERAN/UTRAN systems, will be considered. In addition numerical results was illustrated for different operational scenarios for such heterogeneous system.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122540123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using clock gating technique for energy reduction in portable computers","authors":"D. R. Sulaiman","doi":"10.1109/ICCCE.2008.4580723","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580723","url":null,"abstract":"Today, Power has become a primary consideration during hardware designs, and is critical in computer systems especially for portable devices for the need of higher performance and more functionality; this requires techniques for energy reduction. Many techniques are used for energy reduction such as, dynamic power management, pipelining, transistor sizing, and clock gating. Clock-gating is the most common technique for reducing microprocessors power. This technique is widely used in digital circuits, and forms the basis of many of the other power reduction techniques; clock-gating implementation becomes an emergency-function, if the CPU is about to overheat, it's means that the CPU is stopped for some cycles and then is working for some cycles based on the supply voltage control, the CPU will consume less energy per period which reduces the total power usage of a program. This paper presents a hardware design of the clock gating technique, which enables the CPU to reduce the supply voltage accompanied with the clock frequency, based on its workload variation, which leads to a possible reduction in power requirements. Spice simulation results confirm and verify the theoretical idea and successful hardware operations.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117104405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of single and combined bit-planes feature extraction for recognition in face expression database","authors":"K. C. Ting, D. Bong, Y.C. Wang","doi":"10.1109/ICCCE.2008.4580714","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580714","url":null,"abstract":"Bit-planes for digital gray images have been used in many applications for special feature extraction. This paper presents analysis of single and combined bit-plane performance for face recognition. Novel approach of using bit-plane as input to Feedforward Neural Network is used. Comparison is done to analyze recognition rate of using single and combined bit-planes. Every single pixel in an 8-bits gray level digital image consists of 8 bits. Among these eight bit-planes, bit-planes 4, 5, 6 and 7 provide better recognition rates than bit-planes 0, 1, 2 and 3. Feed-Forward Neural Network is used in this paper for training and testing the bit-planes. The face database used for evaluation is CMU AMP Face Expression Database, which consists of 13 subjects, with 75 8-bits gray level images from each subject. Bit-planes 4, 5, 6 and 7 achieve over 88% accuracy after 15 image samples are trained. However, by using combination of these 4 bit-planes based on majority vote, false acceptance rate (FAR) can be reduced from over 80% to 26.2%. False rejection rate (FRR) of the combined approach is 2.2% and half total error rate (HTER) is 14.2%.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128756562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Access control scheme for Web services ( ACSWS )","authors":"S. Elsheikh","doi":"10.1109/ICCCE.2008.4580726","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580726","url":null,"abstract":"The development and the wide spread use of web services allow for convenient electronic data storage and distribution all over the world. As this web services is a new service-oriented computing paradigm which poses the unique security challenges due to its inherent heterogeneity, multi-domain characteristic and highly dynamic nature. A key challenge in Web services security is to design effective access control schemes. However, most current access control systems base authorization decisions on subjectpsilas identity. In this paper, we suggest web access control scheme which incorporating user password and web server log. The major objective of the proposed model is to provide mechanisms to allow control of web user access based on the user access behavior by tracking the web access history. The system controls access to web pages depending on user password, date of last request, page visited (URL) and status action. The active userpsilas access pattern is matched with user access data discovered from user access history, based on mining web usage data using association rules mining and PrefixSpan algorithms, then analyzed to make the access control decision (web access is permitted or denied).","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128151082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An approach for multi factor authentication for securing smart cards’ applications","authors":"N. Elfadil, Y. J. Al-raisi","doi":"10.1109/ICCCE.2008.4580630","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580630","url":null,"abstract":"This paper discusses a concept of integrating a handwritten signature and digital signature into an overall public key infrastructure (PKI). The purpose of this proposed solution is to fulfill the cultural gap between traditional handwritten signatures and digital certificate/signature through the integration of culturally relevant built-in features for increasing the acceptability of digital signatures and smart cards in global e-government, while maintaining the security features of current digital signature/certificate schemes. Furthermore, the paper discusses the usability of two-facto authentication systems in securing smart cards.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130038772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Handwritten Arabic word recognition: A review of common approaches","authors":"Assma O H, O. Khalifa, Aisha Hassan","doi":"10.1109/ICCCE.2008.4580716","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580716","url":null,"abstract":"Automated methods for the recognition of Arabic script are at an early stage compared to their equivalent for the recognition of Latin and Chinese. In this paper, different approaches used for handwritten Arabic word recognition were reviewed. An introduction to the Arabic script is given, followed by a description of algorithms for the process involved: segmentation, feature extraction, classification, and recognition. However, an automatic recognition of text on scanned images has enabled many applications such as words spotting in large volumes of documents, automatic sorting of postal mail, and convenient editing of previously printed documents. The domain of handwriting in the Arabic script presents unique technical challenges and has been addressed more recently than other domains. Many different methods have been proposed and applied to various types of images, and a variety of approaches have been already developed, tested and returned good results. Yet the database used was too small compared to the huge size of Arabic texts, which gives way to other approaches to be developed based on a bigger database. Since handwriting recognition is such a large subject, there is plenty of scope for the work in this field. Finally, a comparison to show pros and cons of the approaches reviewed is conducted.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130040924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigation of digestive system disorders using Electrogastrogram","authors":"G. Gopu, R. Neelaveni, Porkumaran Karantharaj","doi":"10.1109/ICCCE.2008.4580596","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580596","url":null,"abstract":"Most of the people around the world face the problems related to health especially due to the food intake and disorders in the digestive system. Nowadays endoscope procedure is followed to investigate the problems in the digestive system disorders, which is a tedious, expensive and invasive method. A non-invasive, cheap and painless method called electrogastrogram (EGG) has been devised for the detection of electrical signal cutaneously from the stomach and it is an initial mode of investigation for gastric disorders before encouraging the endoscope procedure for uncomplicated Gastric disease and benign (non cancer). The main objective of this paper is to propose a simple method of finding the digestive systempsilas disorders more easily and accurately using virtual instrumentation (VI) based EGG. The recording setup or the model explained in this proposed system helped us to record the EGG for more than hundred patients, nearly 70-75% of the patient results in digestive systempsilas disorder such as dyspepsia (D), stomach ulcer (SU), gastric esophagus reflux disease (GERD), nausea (N), cyclic vomiting syndrome, etc. For the above said digestive systempsilas disorder dissimilarity is found in its frequency, amplitude, power spectrum analysis and the statistical analysis compared with its normal individual parameter at a high fair amount of accuracy.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134588368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient approach to mitigate scintillation effects on GPS range-finding in ionosphere","authors":"F. Abdul Rahman, A. Hassan, H. Strangeways","doi":"10.1109/ICCCE.2008.4580825","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580825","url":null,"abstract":"This paper presents the optimal approach to mitigate scintillation effects caused by ionosphere irregularities, principally plasma bubbles that occur mostly in ionosphere in low latitude. The mitigation is made by figuring out the scintillation index for the chosen geographic location, extracted from the received real-time RINEX data. Various simulators and programs are used, mainly MATLAB, such as Transionospheric Simulator, Scintillation Index Simulation Program, Power Spectral Density Program, Read RINEX Observation Program and Bubble Scintillation Simulation Program. Based on the detrend signal, MATLAB function that is polyfit will be used to find the phase and amplitude spectra. Comparison simulations result with Bubble Scintillation Simulation Program, which is programmed to detect plasma bubbles in certain geographical area under observations, is executed. The result of this study will provide information for ionospheric activity and also enable GPS system to make predictions and necessary adjustments to maximize its navigations.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134349799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A meta level dynamic approach to visualize impact analysis for regression testing","authors":"Omid Pourgalehdari, K. Z. Zamli, Ashidi Mat, Isa","doi":"10.1109/ICCCE.2008.4580742","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580742","url":null,"abstract":"Fixing software bugs, extending base applications with new functionalities, as well as adapting to changing environments are among the reasons for software evolution. To facilitate such a process and to help maintainers make informed decision, there is a need to be able to estimate and determine the impacts of evolution to the overall software system. While there are already quite a number of useful tools, termed impact analysis tools, developed either as research prototypes or commercial products that addresses such issues, much of which is static based and adopts traditional text based impact reporting. To address some of these issues, we propose a new change impact analysis, called JRegres, that can dynamically generate trails for impact analysis as well as support impact visualization. JRegres serves as a research vehicle to investigate the hypothesis that suggests impact visualization is useful for supporting regression testing.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133053051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}