2008 11th International Conference on Computer and Information Technology最新文献

筛选
英文 中文
Speech enabled operating system control 语音操作系统控制
2008 11th International Conference on Computer and Information Technology Pub Date : 2008-12-01 DOI: 10.1109/ICCITECHN.2008.4803075
M. A. Kader, B. Singha, M.N. Islam
{"title":"Speech enabled operating system control","authors":"M. A. Kader, B. Singha, M.N. Islam","doi":"10.1109/ICCITECHN.2008.4803075","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2008.4803075","url":null,"abstract":"Our goal is to provide the computer with a natural interface, including the ability to understand human speech. For this purpose, we propose a way how to operate an operating system with voice command. At first, the user initiates a given command by his voice through the microphone then the recognition software of the proposed system will take over to recognize the command. If the recognition is succeeded or matched with one of the given voice command then it will perform the operation on the operating system according to speaker's speech command. In our proposed system we have used Markov chain model for voice recognition process and voice-XML for creating the voice grammar in the software part. It has the flexibility to work with the speech of any user means and remove the problem of dasiahesitationpsila which is very effective for spontaneous speech recognition. The proposed system minimizes the error rate up to 30% which is very precise for any speech recognition system.","PeriodicalId":335795,"journal":{"name":"2008 11th International Conference on Computer and Information Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130838942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Efficient Generation of Combinatorial Families 组合家族的有效生成
2008 11th International Conference on Computer and Information Technology Pub Date : 2008-12-01 DOI: 10.1109/ICCITECHN.2008.4803047
S. Bhuyan, S. Rahman
{"title":"Efficient Generation of Combinatorial Families","authors":"S. Bhuyan, S. Rahman","doi":"10.1109/ICCITECHN.2008.4803047","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2008.4803047","url":null,"abstract":"In this paper, we propose a unifying framework for efficient generation of combinatorial objects by giving recursive definition of an abstract combinatorial class. The definition can be instantiated to an array of specific combinatorial classes by specifying the framework parameters appropriately. Our framework defines a rooted spanning tree over a representative graph of that abstract combinatorial class where exhaustive generation can be done by a depth-first traversal. As an illustration, we show an instantiation for the combinatorial class of combinations as well as give a novel constant time generation algorithm for them.","PeriodicalId":335795,"journal":{"name":"2008 11th International Conference on Computer and Information Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121600797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A lossless image compression technique using generic peano pattern mask tree 一种使用通用豌豆模式掩模树的无损图像压缩技术
2008 11th International Conference on Computer and Information Technology Pub Date : 2008-12-01 DOI: 10.1109/ICCITECHN.2008.4802980
M.K. Hossain, S.M. Imam, K. Hasan, W. Perrizo
{"title":"A lossless image compression technique using generic peano pattern mask tree","authors":"M.K. Hossain, S.M. Imam, K. Hasan, W. Perrizo","doi":"10.1109/ICCITECHN.2008.4802980","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2008.4802980","url":null,"abstract":"Digital image processing has become ubiquitous in our daily life and the demands to produce and process images are ever increasing. Large amounts of space are required to store these images. Image compression techniques are in high demand as they allow reduction in this storage space. The basis for image compression, as is for most other compression techniques, is to remove redundant and unimportant data. Lossless image compression techniques retain the original information in compact form and do not introduce any errors when decompressed. In this paper, we discuss such a lossless technique using a data structure that we name ldquogeneric Peano pattern mask treerdquo. It is an improvement over a previously discussed Lossless Image compression technique - ldquoPeano pattern mask treerdquo. Both these structures are based on the data structure - Peano mask tree.","PeriodicalId":335795,"journal":{"name":"2008 11th International Conference on Computer and Information Technology","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125065602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Disassembling SLAs for follow-up processes in an SOA system 为SOA系统中的后续流程拆卸sla
2008 11th International Conference on Computer and Information Technology Pub Date : 2008-12-01 DOI: 10.1109/ICCITECHN.2008.4803124
Chih-Hao Hsu, Yunhe. Liao, Chien-Pang Kuo
{"title":"Disassembling SLAs for follow-up processes in an SOA system","authors":"Chih-Hao Hsu, Yunhe. Liao, Chien-Pang Kuo","doi":"10.1109/ICCITECHN.2008.4803124","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2008.4803124","url":null,"abstract":"This work presents a novel scheme for Service Level Agreements (SLAs) in a service-oriented architecture (SOA). An SLA is a contract that guarantees quality of service (QoS) between service providers and consumers. An SLA can be split into several parts for an SOA system which is consisting of different services. A split SLA is used to guarantee quality of services for one of services in an SOA system. However, these contract rules do not regulate follow-up process in services. SLA violations may occur consequently. For instance, interactions between services are not encrypted because the encryption parameter isn't included in the split SLA contract. Confidential data would be transmitted through unsafe channels. There would be a security issue of SLA Management for follow-up processes in an SOA system. The novel scheme in this work addresses these problems. Using SLAs management proposed in this work can identify the services that consumer needs and split the contracts for follow-up services. SLAs are not only guaranteed between service providers and consumers but also assured in follow-up processes. The proposed method improves the security and completeness of SLA using in an SOA system.","PeriodicalId":335795,"journal":{"name":"2008 11th International Conference on Computer and Information Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133538570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Algorithm for Segmenting Modifiers from Bangla Text 一种孟加拉语文本修饰语切分算法
2008 11th International Conference on Computer and Information Technology Pub Date : 2008-12-01 DOI: 10.1109/ICCITECHN.2008.4803049
N. Akter, S. Hossain, M.T. Islam, H. Sarwar
{"title":"An Algorithm for Segmenting Modifiers from Bangla Text","authors":"N. Akter, S. Hossain, M.T. Islam, H. Sarwar","doi":"10.1109/ICCITECHN.2008.4803049","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2008.4803049","url":null,"abstract":"Script segmentation is an essential and preprocessing task for any OCR system. Bangla is one of the most popular scripts in the world. Since segmentation effects the recognition process, accurate and proper segmentation is necessary to implement Bangla OCR. Many works have been done for both handwritten and printed Bangla text. This paper presents the segmentation process of different Bangla modifiers from printed Bangla words.","PeriodicalId":335795,"journal":{"name":"2008 11th International Conference on Computer and Information Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121646470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cell database based time specific resource Reservation scheme 基于单元格数据库的时间特定资源预约方案
2008 11th International Conference on Computer and Information Technology Pub Date : 2008-12-01 DOI: 10.1109/ICCITECHN.2008.4803045
S. M. Didar-Al-Alam, M. Hasan, M.M. Islam, A. Azim
{"title":"Cell database based time specific resource Reservation scheme","authors":"S. M. Didar-Al-Alam, M. Hasan, M.M. Islam, A. Azim","doi":"10.1109/ICCITECHN.2008.4803045","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2008.4803045","url":null,"abstract":"Increasing cellular network offers services with diverse quality-of-service supports users to access telephony, paging, instant messaging, and trivial Web-browsing on the same device. The mobility of communication devices and channel imperfection makes the service offerings much more challenging with limited resources. Resource reservation plays a very important role in cellular communication in terms of availability of services. There are various schemes present to manage the resources in an efficient way. In this paper, we have tried to analysis several resource management schemes and their drawbacks. We have proposed a time dependent resource reservation scheme which has significant advantages over other schemes.","PeriodicalId":335795,"journal":{"name":"2008 11th International Conference on Computer and Information Technology","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122867595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of e-governance: Only way to build a corruption-free Bangladesh 实施电子政务:建设一个没有腐败的孟加拉国的唯一途径
2008 11th International Conference on Computer and Information Technology Pub Date : 2008-12-01 DOI: 10.1109/ICCITECHN.2008.4802970
S. Rajon, Sk. Ali Zaman
{"title":"Implementation of e-governance: Only way to build a corruption-free Bangladesh","authors":"S. Rajon, Sk. Ali Zaman","doi":"10.1109/ICCITECHN.2008.4802970","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2008.4802970","url":null,"abstract":"This paper focuses on various aspects of implementing e-governance in developing countries like Bangladesh. In this paper, we present a comparative analysis of present government architecture and the prospects and problems of implementing e-governance in Bangladesh emphasizing on the usage and effectiveness of e-governance to eradicate corruption from various sectors of governance. We especially present the adaptability of e-governance in the prime sectors of government and provide a methodical study on the strategies of involving mass people in the governance process improving information and service delivery with their participation in overall decision-making. The potential to ensure highest level of transparency in all the sectors of government with the implementation of e-governance is also presented in this paper. Moreover, we provide specific recommendations for implementing the e-governance in the most effective and efficient manner.","PeriodicalId":335795,"journal":{"name":"2008 11th International Conference on Computer and Information Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125199830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Generation of random channel specifications for channel routing problem 针对信道路由问题的随机信道规范的生成
2008 11th International Conference on Computer and Information Technology Pub Date : 2008-12-01 DOI: 10.1109/ICCITECHN.2008.4803033
A. Pal, T.N. Mandal, A. Datta, D. Kundu, R. Pal
{"title":"Generation of random channel specifications for channel routing problem","authors":"A. Pal, T.N. Mandal, A. Datta, D. Kundu, R. Pal","doi":"10.1109/ICCITECHN.2008.4803033","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2008.4803033","url":null,"abstract":"In this paper we develop algorithms for generating random channel specifications of channel routing problem in VLSI design. A channel is a rectangular routing region containing two sets of fixed terminals on two of its opposite sides and the other two opposite sides (of the rectangle) are open ends, may or may not contain any terminal of a net but the terminal position is not fixed before a routing solution is computed. Most of the problems in two-, three-, and multi-layer channel routing are beyond polynomial time computable. Hence for each of these problems it is unlikely to design a polynomial time deterministic algorithm. Developing heuristic algorithm might be a probable way out that hopefully provides good solutions for most of the instances occur in practice. Novelty of a heuristic algorithm is judged better if it works for a variety of large number of randomly generated instances of the problem. In fact, convergence of results of a heuristic algorithm is well established when the algorithm of a problem is executed for a huge number of randomly generated similar instances and the final result is computed making an average on all of them.","PeriodicalId":335795,"journal":{"name":"2008 11th International Conference on Computer and Information Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125206147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The study of tracking control of a robotic manipulator actuated by shape memory alloy 形状记忆合金驱动机械臂的跟踪控制研究
2008 11th International Conference on Computer and Information Technology Pub Date : 2008-12-01 DOI: 10.1109/ICCITECHN.2008.4803080
S. Rahman, K. Ahn
{"title":"The study of tracking control of a robotic manipulator actuated by shape memory alloy","authors":"S. Rahman, K. Ahn","doi":"10.1109/ICCITECHN.2008.4803080","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2008.4803080","url":null,"abstract":"Shape memory alloy (SMA) composites offer a great potential as actuators because of its excellent power to weight ratio, smooth motion and silent actuation. However, SMA actuated robotic manipulator systems have severe hysteresis, system nonlinearities, model and parametric uncertainties those are often responsible for position inaccuracy in a regulation or tracking system. A simple and upstanding control algorithm for tracking control of a SMA actuated robotic manipulator system is presented in this paper. The controller is developed based on the combination of a variable structure control approach and a heuristic based intelligent control approach like fuzzy logic control (FLC), so that the resulting control algorithms have a superior performance both in stabilization and tracking the desired trajectories. A desktop prototype of the robotic manipulator system is recalled from our previous work. A nonlinear form of proportional-integral-derivative (PID) controller is also employed to the system for comparison of performance. Several experiments have been performed in tracking both stationary and periodically varied input signals. Experimental results from real time control verify the effective and robust performance of the controller.","PeriodicalId":335795,"journal":{"name":"2008 11th International Conference on Computer and Information Technology","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126386452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new SS7-SIGTRAN protocol interchanger software and hardware to implement an improved distributed database based ATM network using existing IP network 一种新的SS7-SIGTRAN协议交换器软硬件,利用现有的IP网络实现了一种改进的基于分布式数据库的ATM网络
2008 11th International Conference on Computer and Information Technology Pub Date : 2008-12-01 DOI: 10.1109/ICCITECHN.2008.4803027
M. S. Munir, K. Ahmed, A. Shihavuddin, S. Nizamuddin, M.J. Sarker
{"title":"A new SS7-SIGTRAN protocol interchanger software and hardware to implement an improved distributed database based ATM network using existing IP network","authors":"M. S. Munir, K. Ahmed, A. Shihavuddin, S. Nizamuddin, M.J. Sarker","doi":"10.1109/ICCITECHN.2008.4803027","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2008.4803027","url":null,"abstract":"This paper presents new Signaling System No. 7 (SS7) to IP based Signaling Transport (SIGTRAN) protocol interchanger software and related hardware to implement an improved distributed database based Automated Teller Machine (ATM) network where the countrywide existing IP network can be used. Currently the ATM network is based on fully centralized database environment. This leads to varying transaction time according to the ATM and central database. Moreover, link failure between central database and ATM leads to transaction failure. To overcome this problem, an improved distributed database system for ATM network is proposed. To deploy such network, a new software and related hardware is also presented which discards the need of costly new leased line or dial up connection. Using the software and hardware, the existing IP network can be used for expanding ATM network. Also the cost and benefits of the network is discussed by allocating fragment on different sites.","PeriodicalId":335795,"journal":{"name":"2008 11th International Conference on Computer and Information Technology","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124640551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信