2008 International Conference on Computer and Communication Engineering最新文献

筛选
英文 中文
Direct sequence ultra wideband system design for wireless sensor network 无线传感器网络直接序列超宽带系统设计
2008 International Conference on Computer and Communication Engineering Pub Date : 2008-05-13 DOI: 10.1109/ICCCE.2008.4580783
M.A. Azim, H. Mohammad, M. Rahman, N. Amin
{"title":"Direct sequence ultra wideband system design for wireless sensor network","authors":"M.A. Azim, H. Mohammad, M. Rahman, N. Amin","doi":"10.1109/ICCCE.2008.4580783","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580783","url":null,"abstract":"In this study, we present the suitability of UWB for WSN by simulating a DS-UWB digital transmission system using Matlab. DS-UWB is a single-band approach that uses narrow UWB pulses and time-domain signal processing combined with direct sequence spread spectrum (DSSS) techniques to transmit and receive information. Due to signal spreading, transmitted power becomes very low which paves to low probability of detection and co-existence with other systems. Simple lower order modulation scheme is considered such as binary PSK, PAM due to low data rate requirements of WSN. Bit error rate (BER) performance has been evaluated for both modulation technique and simulation results show that the pulse repetition coder has significant impact on performance as well as control on data rates and reliable reception. Data is successfully recovered by energy detection method (Detect and Avoid) which facilitates design simplicity at the receiver by avoiding pulse synchronization and coherent detection.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114920354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Modeling and analysis for heterogeneous wireless networks by using of multi-dimensional Markov models 基于多维马尔可夫模型的异构无线网络建模与分析
2008 International Conference on Computer and Communication Engineering Pub Date : 2008-05-13 DOI: 10.1109/ICCCE.2008.4580780
Hesham M. El-Badawy
{"title":"Modeling and analysis for heterogeneous wireless networks by using of multi-dimensional Markov models","authors":"Hesham M. El-Badawy","doi":"10.1109/ICCCE.2008.4580780","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580780","url":null,"abstract":"Nowadays, a lot of radio access technologies (RAT) have been deployed. In order to achieve a seamless integration between these different RATs, common radio resource management (CRRM) algorithms are considered to be deployed in such heterogeneous wireless networks. This paper provides a complete analytical approach to determine the performance of different RAT with selection procedures in multi-RAT/multi-service environment. Particularly, multi-dimensional Markovian model was used to perform a complete derivation for the system state probabilities. The allocation of voice and data services in both of GERAN/UTRAN systems, will be considered. In addition numerical results was illustrated for different operational scenarios for such heterogeneous system.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122540123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Using clock gating technique for energy reduction in portable computers 时钟门控技术在便携式计算机中的节能应用
2008 International Conference on Computer and Communication Engineering Pub Date : 2008-05-13 DOI: 10.1109/ICCCE.2008.4580723
D. R. Sulaiman
{"title":"Using clock gating technique for energy reduction in portable computers","authors":"D. R. Sulaiman","doi":"10.1109/ICCCE.2008.4580723","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580723","url":null,"abstract":"Today, Power has become a primary consideration during hardware designs, and is critical in computer systems especially for portable devices for the need of higher performance and more functionality; this requires techniques for energy reduction. Many techniques are used for energy reduction such as, dynamic power management, pipelining, transistor sizing, and clock gating. Clock-gating is the most common technique for reducing microprocessors power. This technique is widely used in digital circuits, and forms the basis of many of the other power reduction techniques; clock-gating implementation becomes an emergency-function, if the CPU is about to overheat, it's means that the CPU is stopped for some cycles and then is working for some cycles based on the supply voltage control, the CPU will consume less energy per period which reduces the total power usage of a program. This paper presents a hardware design of the clock gating technique, which enables the CPU to reduce the supply voltage accompanied with the clock frequency, based on its workload variation, which leads to a possible reduction in power requirements. Spice simulation results confirm and verify the theoretical idea and successful hardware operations.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117104405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Performance analysis of single and combined bit-planes feature extraction for recognition in face expression database 人脸表情库中单个和组合位面特征提取的识别性能分析
2008 International Conference on Computer and Communication Engineering Pub Date : 2008-05-13 DOI: 10.1109/ICCCE.2008.4580714
K. C. Ting, D. Bong, Y.C. Wang
{"title":"Performance analysis of single and combined bit-planes feature extraction for recognition in face expression database","authors":"K. C. Ting, D. Bong, Y.C. Wang","doi":"10.1109/ICCCE.2008.4580714","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580714","url":null,"abstract":"Bit-planes for digital gray images have been used in many applications for special feature extraction. This paper presents analysis of single and combined bit-plane performance for face recognition. Novel approach of using bit-plane as input to Feedforward Neural Network is used. Comparison is done to analyze recognition rate of using single and combined bit-planes. Every single pixel in an 8-bits gray level digital image consists of 8 bits. Among these eight bit-planes, bit-planes 4, 5, 6 and 7 provide better recognition rates than bit-planes 0, 1, 2 and 3. Feed-Forward Neural Network is used in this paper for training and testing the bit-planes. The face database used for evaluation is CMU AMP Face Expression Database, which consists of 13 subjects, with 75 8-bits gray level images from each subject. Bit-planes 4, 5, 6 and 7 achieve over 88% accuracy after 15 image samples are trained. However, by using combination of these 4 bit-planes based on majority vote, false acceptance rate (FAR) can be reduced from over 80% to 26.2%. False rejection rate (FRR) of the combined approach is 2.2% and half total error rate (HTER) is 14.2%.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128756562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Access control scheme for Web services ( ACSWS ) Web服务访问控制方案(ACSWS)
2008 International Conference on Computer and Communication Engineering Pub Date : 2008-05-13 DOI: 10.1109/ICCCE.2008.4580726
S. Elsheikh
{"title":"Access control scheme for Web services ( ACSWS )","authors":"S. Elsheikh","doi":"10.1109/ICCCE.2008.4580726","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580726","url":null,"abstract":"The development and the wide spread use of web services allow for convenient electronic data storage and distribution all over the world. As this web services is a new service-oriented computing paradigm which poses the unique security challenges due to its inherent heterogeneity, multi-domain characteristic and highly dynamic nature. A key challenge in Web services security is to design effective access control schemes. However, most current access control systems base authorization decisions on subjectpsilas identity. In this paper, we suggest web access control scheme which incorporating user password and web server log. The major objective of the proposed model is to provide mechanisms to allow control of web user access based on the user access behavior by tracking the web access history. The system controls access to web pages depending on user password, date of last request, page visited (URL) and status action. The active userpsilas access pattern is matched with user access data discovered from user access history, based on mining web usage data using association rules mining and PrefixSpan algorithms, then analyzed to make the access control decision (web access is permitted or denied).","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128151082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An approach for multi factor authentication for securing smart cards’ applications 一种保护智能卡应用安全的多因素认证方法
2008 International Conference on Computer and Communication Engineering Pub Date : 2008-05-13 DOI: 10.1109/ICCCE.2008.4580630
N. Elfadil, Y. J. Al-raisi
{"title":"An approach for multi factor authentication for securing smart cards’ applications","authors":"N. Elfadil, Y. J. Al-raisi","doi":"10.1109/ICCCE.2008.4580630","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580630","url":null,"abstract":"This paper discusses a concept of integrating a handwritten signature and digital signature into an overall public key infrastructure (PKI). The purpose of this proposed solution is to fulfill the cultural gap between traditional handwritten signatures and digital certificate/signature through the integration of culturally relevant built-in features for increasing the acceptability of digital signatures and smart cards in global e-government, while maintaining the security features of current digital signature/certificate schemes. Furthermore, the paper discusses the usability of two-facto authentication systems in securing smart cards.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130038772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Handwritten Arabic word recognition: A review of common approaches 手写阿拉伯语单词识别:常用方法综述
2008 International Conference on Computer and Communication Engineering Pub Date : 2008-05-13 DOI: 10.1109/ICCCE.2008.4580716
Assma O H, O. Khalifa, Aisha Hassan
{"title":"Handwritten Arabic word recognition: A review of common approaches","authors":"Assma O H, O. Khalifa, Aisha Hassan","doi":"10.1109/ICCCE.2008.4580716","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580716","url":null,"abstract":"Automated methods for the recognition of Arabic script are at an early stage compared to their equivalent for the recognition of Latin and Chinese. In this paper, different approaches used for handwritten Arabic word recognition were reviewed. An introduction to the Arabic script is given, followed by a description of algorithms for the process involved: segmentation, feature extraction, classification, and recognition. However, an automatic recognition of text on scanned images has enabled many applications such as words spotting in large volumes of documents, automatic sorting of postal mail, and convenient editing of previously printed documents. The domain of handwriting in the Arabic script presents unique technical challenges and has been addressed more recently than other domains. Many different methods have been proposed and applied to various types of images, and a variety of approaches have been already developed, tested and returned good results. Yet the database used was too small compared to the huge size of Arabic texts, which gives way to other approaches to be developed based on a bigger database. Since handwriting recognition is such a large subject, there is plenty of scope for the work in this field. Finally, a comparison to show pros and cons of the approaches reviewed is conducted.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130040924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Investigation of digestive system disorders using Electrogastrogram 胃电图应用于消化系统疾病的研究
2008 International Conference on Computer and Communication Engineering Pub Date : 2008-05-13 DOI: 10.1109/ICCCE.2008.4580596
G. Gopu, R. Neelaveni, Porkumaran Karantharaj
{"title":"Investigation of digestive system disorders using Electrogastrogram","authors":"G. Gopu, R. Neelaveni, Porkumaran Karantharaj","doi":"10.1109/ICCCE.2008.4580596","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580596","url":null,"abstract":"Most of the people around the world face the problems related to health especially due to the food intake and disorders in the digestive system. Nowadays endoscope procedure is followed to investigate the problems in the digestive system disorders, which is a tedious, expensive and invasive method. A non-invasive, cheap and painless method called electrogastrogram (EGG) has been devised for the detection of electrical signal cutaneously from the stomach and it is an initial mode of investigation for gastric disorders before encouraging the endoscope procedure for uncomplicated Gastric disease and benign (non cancer). The main objective of this paper is to propose a simple method of finding the digestive systempsilas disorders more easily and accurately using virtual instrumentation (VI) based EGG. The recording setup or the model explained in this proposed system helped us to record the EGG for more than hundred patients, nearly 70-75% of the patient results in digestive systempsilas disorder such as dyspepsia (D), stomach ulcer (SU), gastric esophagus reflux disease (GERD), nausea (N), cyclic vomiting syndrome, etc. For the above said digestive systempsilas disorder dissimilarity is found in its frequency, amplitude, power spectrum analysis and the statistical analysis compared with its normal individual parameter at a high fair amount of accuracy.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134588368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
An efficient approach to mitigate scintillation effects on GPS range-finding in ionosphere 一种有效减轻电离层闪烁对GPS测距影响的方法
2008 International Conference on Computer and Communication Engineering Pub Date : 2008-05-13 DOI: 10.1109/ICCCE.2008.4580825
F. Abdul Rahman, A. Hassan, H. Strangeways
{"title":"An efficient approach to mitigate scintillation effects on GPS range-finding in ionosphere","authors":"F. Abdul Rahman, A. Hassan, H. Strangeways","doi":"10.1109/ICCCE.2008.4580825","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580825","url":null,"abstract":"This paper presents the optimal approach to mitigate scintillation effects caused by ionosphere irregularities, principally plasma bubbles that occur mostly in ionosphere in low latitude. The mitigation is made by figuring out the scintillation index for the chosen geographic location, extracted from the received real-time RINEX data. Various simulators and programs are used, mainly MATLAB, such as Transionospheric Simulator, Scintillation Index Simulation Program, Power Spectral Density Program, Read RINEX Observation Program and Bubble Scintillation Simulation Program. Based on the detrend signal, MATLAB function that is polyfit will be used to find the phase and amplitude spectra. Comparison simulations result with Bubble Scintillation Simulation Program, which is programmed to detect plasma bubbles in certain geographical area under observations, is executed. The result of this study will provide information for ionospheric activity and also enable GPS system to make predictions and necessary adjustments to maximize its navigations.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134349799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A meta level dynamic approach to visualize impact analysis for regression testing 一个元水平的动态方法来可视化回归测试的影响分析
2008 International Conference on Computer and Communication Engineering Pub Date : 2008-05-13 DOI: 10.1109/ICCCE.2008.4580742
Omid Pourgalehdari, K. Z. Zamli, Ashidi Mat, Isa
{"title":"A meta level dynamic approach to visualize impact analysis for regression testing","authors":"Omid Pourgalehdari, K. Z. Zamli, Ashidi Mat, Isa","doi":"10.1109/ICCCE.2008.4580742","DOIUrl":"https://doi.org/10.1109/ICCCE.2008.4580742","url":null,"abstract":"Fixing software bugs, extending base applications with new functionalities, as well as adapting to changing environments are among the reasons for software evolution. To facilitate such a process and to help maintainers make informed decision, there is a need to be able to estimate and determine the impacts of evolution to the overall software system. While there are already quite a number of useful tools, termed impact analysis tools, developed either as research prototypes or commercial products that addresses such issues, much of which is static based and adopts traditional text based impact reporting. To address some of these issues, we propose a new change impact analysis, called JRegres, that can dynamically generate trails for impact analysis as well as support impact visualization. JRegres serves as a research vehicle to investigate the hypothesis that suggests impact visualization is useful for supporting regression testing.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133053051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信