{"title":"Speech enabled operating system control","authors":"M. A. Kader, B. Singha, M.N. Islam","doi":"10.1109/ICCITECHN.2008.4803075","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2008.4803075","url":null,"abstract":"Our goal is to provide the computer with a natural interface, including the ability to understand human speech. For this purpose, we propose a way how to operate an operating system with voice command. At first, the user initiates a given command by his voice through the microphone then the recognition software of the proposed system will take over to recognize the command. If the recognition is succeeded or matched with one of the given voice command then it will perform the operation on the operating system according to speaker's speech command. In our proposed system we have used Markov chain model for voice recognition process and voice-XML for creating the voice grammar in the software part. It has the flexibility to work with the speech of any user means and remove the problem of dasiahesitationpsila which is very effective for spontaneous speech recognition. The proposed system minimizes the error rate up to 30% which is very precise for any speech recognition system.","PeriodicalId":335795,"journal":{"name":"2008 11th International Conference on Computer and Information Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130838942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Generation of Combinatorial Families","authors":"S. Bhuyan, S. Rahman","doi":"10.1109/ICCITECHN.2008.4803047","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2008.4803047","url":null,"abstract":"In this paper, we propose a unifying framework for efficient generation of combinatorial objects by giving recursive definition of an abstract combinatorial class. The definition can be instantiated to an array of specific combinatorial classes by specifying the framework parameters appropriately. Our framework defines a rooted spanning tree over a representative graph of that abstract combinatorial class where exhaustive generation can be done by a depth-first traversal. As an illustration, we show an instantiation for the combinatorial class of combinations as well as give a novel constant time generation algorithm for them.","PeriodicalId":335795,"journal":{"name":"2008 11th International Conference on Computer and Information Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121600797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A lossless image compression technique using generic peano pattern mask tree","authors":"M.K. Hossain, S.M. Imam, K. Hasan, W. Perrizo","doi":"10.1109/ICCITECHN.2008.4802980","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2008.4802980","url":null,"abstract":"Digital image processing has become ubiquitous in our daily life and the demands to produce and process images are ever increasing. Large amounts of space are required to store these images. Image compression techniques are in high demand as they allow reduction in this storage space. The basis for image compression, as is for most other compression techniques, is to remove redundant and unimportant data. Lossless image compression techniques retain the original information in compact form and do not introduce any errors when decompressed. In this paper, we discuss such a lossless technique using a data structure that we name ldquogeneric Peano pattern mask treerdquo. It is an improvement over a previously discussed Lossless Image compression technique - ldquoPeano pattern mask treerdquo. Both these structures are based on the data structure - Peano mask tree.","PeriodicalId":335795,"journal":{"name":"2008 11th International Conference on Computer and Information Technology","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125065602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Disassembling SLAs for follow-up processes in an SOA system","authors":"Chih-Hao Hsu, Yunhe. Liao, Chien-Pang Kuo","doi":"10.1109/ICCITECHN.2008.4803124","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2008.4803124","url":null,"abstract":"This work presents a novel scheme for Service Level Agreements (SLAs) in a service-oriented architecture (SOA). An SLA is a contract that guarantees quality of service (QoS) between service providers and consumers. An SLA can be split into several parts for an SOA system which is consisting of different services. A split SLA is used to guarantee quality of services for one of services in an SOA system. However, these contract rules do not regulate follow-up process in services. SLA violations may occur consequently. For instance, interactions between services are not encrypted because the encryption parameter isn't included in the split SLA contract. Confidential data would be transmitted through unsafe channels. There would be a security issue of SLA Management for follow-up processes in an SOA system. The novel scheme in this work addresses these problems. Using SLAs management proposed in this work can identify the services that consumer needs and split the contracts for follow-up services. SLAs are not only guaranteed between service providers and consumers but also assured in follow-up processes. The proposed method improves the security and completeness of SLA using in an SOA system.","PeriodicalId":335795,"journal":{"name":"2008 11th International Conference on Computer and Information Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133538570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Algorithm for Segmenting Modifiers from Bangla Text","authors":"N. Akter, S. Hossain, M.T. Islam, H. Sarwar","doi":"10.1109/ICCITECHN.2008.4803049","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2008.4803049","url":null,"abstract":"Script segmentation is an essential and preprocessing task for any OCR system. Bangla is one of the most popular scripts in the world. Since segmentation effects the recognition process, accurate and proper segmentation is necessary to implement Bangla OCR. Many works have been done for both handwritten and printed Bangla text. This paper presents the segmentation process of different Bangla modifiers from printed Bangla words.","PeriodicalId":335795,"journal":{"name":"2008 11th International Conference on Computer and Information Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121646470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. M. Didar-Al-Alam, M. Hasan, M.M. Islam, A. Azim
{"title":"Cell database based time specific resource Reservation scheme","authors":"S. M. Didar-Al-Alam, M. Hasan, M.M. Islam, A. Azim","doi":"10.1109/ICCITECHN.2008.4803045","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2008.4803045","url":null,"abstract":"Increasing cellular network offers services with diverse quality-of-service supports users to access telephony, paging, instant messaging, and trivial Web-browsing on the same device. The mobility of communication devices and channel imperfection makes the service offerings much more challenging with limited resources. Resource reservation plays a very important role in cellular communication in terms of availability of services. There are various schemes present to manage the resources in an efficient way. In this paper, we have tried to analysis several resource management schemes and their drawbacks. We have proposed a time dependent resource reservation scheme which has significant advantages over other schemes.","PeriodicalId":335795,"journal":{"name":"2008 11th International Conference on Computer and Information Technology","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122867595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of e-governance: Only way to build a corruption-free Bangladesh","authors":"S. Rajon, Sk. Ali Zaman","doi":"10.1109/ICCITECHN.2008.4802970","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2008.4802970","url":null,"abstract":"This paper focuses on various aspects of implementing e-governance in developing countries like Bangladesh. In this paper, we present a comparative analysis of present government architecture and the prospects and problems of implementing e-governance in Bangladesh emphasizing on the usage and effectiveness of e-governance to eradicate corruption from various sectors of governance. We especially present the adaptability of e-governance in the prime sectors of government and provide a methodical study on the strategies of involving mass people in the governance process improving information and service delivery with their participation in overall decision-making. The potential to ensure highest level of transparency in all the sectors of government with the implementation of e-governance is also presented in this paper. Moreover, we provide specific recommendations for implementing the e-governance in the most effective and efficient manner.","PeriodicalId":335795,"journal":{"name":"2008 11th International Conference on Computer and Information Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125199830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Generation of random channel specifications for channel routing problem","authors":"A. Pal, T.N. Mandal, A. Datta, D. Kundu, R. Pal","doi":"10.1109/ICCITECHN.2008.4803033","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2008.4803033","url":null,"abstract":"In this paper we develop algorithms for generating random channel specifications of channel routing problem in VLSI design. A channel is a rectangular routing region containing two sets of fixed terminals on two of its opposite sides and the other two opposite sides (of the rectangle) are open ends, may or may not contain any terminal of a net but the terminal position is not fixed before a routing solution is computed. Most of the problems in two-, three-, and multi-layer channel routing are beyond polynomial time computable. Hence for each of these problems it is unlikely to design a polynomial time deterministic algorithm. Developing heuristic algorithm might be a probable way out that hopefully provides good solutions for most of the instances occur in practice. Novelty of a heuristic algorithm is judged better if it works for a variety of large number of randomly generated instances of the problem. In fact, convergence of results of a heuristic algorithm is well established when the algorithm of a problem is executed for a huge number of randomly generated similar instances and the final result is computed making an average on all of them.","PeriodicalId":335795,"journal":{"name":"2008 11th International Conference on Computer and Information Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125206147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The study of tracking control of a robotic manipulator actuated by shape memory alloy","authors":"S. Rahman, K. Ahn","doi":"10.1109/ICCITECHN.2008.4803080","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2008.4803080","url":null,"abstract":"Shape memory alloy (SMA) composites offer a great potential as actuators because of its excellent power to weight ratio, smooth motion and silent actuation. However, SMA actuated robotic manipulator systems have severe hysteresis, system nonlinearities, model and parametric uncertainties those are often responsible for position inaccuracy in a regulation or tracking system. A simple and upstanding control algorithm for tracking control of a SMA actuated robotic manipulator system is presented in this paper. The controller is developed based on the combination of a variable structure control approach and a heuristic based intelligent control approach like fuzzy logic control (FLC), so that the resulting control algorithms have a superior performance both in stabilization and tracking the desired trajectories. A desktop prototype of the robotic manipulator system is recalled from our previous work. A nonlinear form of proportional-integral-derivative (PID) controller is also employed to the system for comparison of performance. Several experiments have been performed in tracking both stationary and periodically varied input signals. Experimental results from real time control verify the effective and robust performance of the controller.","PeriodicalId":335795,"journal":{"name":"2008 11th International Conference on Computer and Information Technology","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126386452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. S. Munir, K. Ahmed, A. Shihavuddin, S. Nizamuddin, M.J. Sarker
{"title":"A new SS7-SIGTRAN protocol interchanger software and hardware to implement an improved distributed database based ATM network using existing IP network","authors":"M. S. Munir, K. Ahmed, A. Shihavuddin, S. Nizamuddin, M.J. Sarker","doi":"10.1109/ICCITECHN.2008.4803027","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2008.4803027","url":null,"abstract":"This paper presents new Signaling System No. 7 (SS7) to IP based Signaling Transport (SIGTRAN) protocol interchanger software and related hardware to implement an improved distributed database based Automated Teller Machine (ATM) network where the countrywide existing IP network can be used. Currently the ATM network is based on fully centralized database environment. This leads to varying transaction time according to the ATM and central database. Moreover, link failure between central database and ATM leads to transaction failure. To overcome this problem, an improved distributed database system for ATM network is proposed. To deploy such network, a new software and related hardware is also presented which discards the need of costly new leased line or dial up connection. Using the software and hardware, the existing IP network can be used for expanding ATM network. Also the cost and benefits of the network is discussed by allocating fragment on different sites.","PeriodicalId":335795,"journal":{"name":"2008 11th International Conference on Computer and Information Technology","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124640551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}