2008 11th International Conference on Computer and Information Technology最新文献

筛选
英文 中文
Anycast routing in Delay Tolerant Networks using genetic algorithms for route decision 基于遗传算法的容延迟网络中的任播路由
2008 11th International Conference on Computer and Information Technology Pub Date : 2008-12-01 DOI: 10.1109/ICCITECHN.2008.4803128
É. da Silva, P. R. Guardieiro
{"title":"Anycast routing in Delay Tolerant Networks using genetic algorithms for route decision","authors":"É. da Silva, P. R. Guardieiro","doi":"10.1109/ICCITECHN.2008.4803128","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2008.4803128","url":null,"abstract":"Delay/Disruption Tolerant Networking (DTN) architecture adopts the concept of intermittent networks that may suffer frequent disconnections, with the possibility of never having end-to-end connectivity between the source and destination over a given period of time. Therefore, the design of protocols for those networks becomes a unique challenge. Routing in DTNs is one of the key components and remains open for discussion. In this paper we treat the routing for anycast delivery that is useful in situations where a host, applications or users wish to locate a host which supports a particular service. However, if several servers support the service, any of these servers can be used. Then we implement a routing algorithm using genetic algorithm (GA), because the route and destination decision influence many parameters simultaneously. Our simulation results have shown that the routing using GA performs better than the shortest path algorithm.","PeriodicalId":335795,"journal":{"name":"2008 11th International Conference on Computer and Information Technology","volume":"2002 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131386752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
File sharing in advanced collaborating environment: Node registration & cache optimization techniques 高级协作环境中的文件共享:节点注册和缓存优化技术
2008 11th International Conference on Computer and Information Technology Pub Date : 2008-12-01 DOI: 10.1109/ICCITECHN.2008.4803059
M.R. Rahman, Mahnoor Khan, T. Avi, M. R. Huq
{"title":"File sharing in advanced collaborating environment: Node registration & cache optimization techniques","authors":"M.R. Rahman, Mahnoor Khan, T. Avi, M. R. Huq","doi":"10.1109/ICCITECHN.2008.4803059","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2008.4803059","url":null,"abstract":"A major challenge in a collaborative environment is to device an efficient file sharing and adaptation mechanism. Through this, the users at different nodes can achieve the highest degree of collaboration. Some authors have already proposed file sharing and adaptation framework. As per their proposed framework, users are allowed to share adapted files among them, invoking their file sharing and adaptation service built on the top of advanced collaborating environment (ACE). For file adaptation, a hybrid approach has been mentioned for adapting files which considers users preferences as well as user's device capabilities. The goal of this adaptation approach is to provide the best possible adaptation scheme and convert the file according to the user's preferences and device capabilities. In this paper, we propose some new features for file sharing and adaptation framework to have faster and more efficient and meaningful collaboration among users in advanced collaborating environment. We are proposing a Key based registration system as well as an algorithm for key generation to automate the registration process for slave ACE nodes. We also propose an automated mechanism to distinguish trusted (registered) Slave ACE nodes, which are privileged for p2p file sharing under certain conditions. This approach will completely eliminate the manual intervention in the purposive node selection process. Moreover there would be a network traffic monitoring process which will radically reduce the network overhead to the master ACE node and introduce faster network collaboration in a distributive manner. Consequently, the approach leads towards better collaboration among the users of ACE.","PeriodicalId":335795,"journal":{"name":"2008 11th International Conference on Computer and Information Technology","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127549503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Corpus-based evaluation of lexical components of a domain-specific text to Knowledge Mapping prototype 一个基于语料库的评估领域特定文本的词法成分到知识映射原型
2008 11th International Conference on Computer and Information Technology Pub Date : 2008-12-01 DOI: 10.1109/ICCITECHN.2008.4803005
R. Shams, A. Elsayed
{"title":"A Corpus-based evaluation of lexical components of a domain-specific text to Knowledge Mapping prototype","authors":"R. Shams, A. Elsayed","doi":"10.1109/ICCITECHN.2008.4803005","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2008.4803005","url":null,"abstract":"The aim of this paper is to evaluate the lexical components of a text to knowledge mapping (TKM) prototype. The prototype is domain-specific, the purpose of which is to map instructional text onto a knowledge domain. The context of the knowledge domain of the prototype is physics, specifically DC electrical circuits. During development, the prototype has been tested with a limited data set from the domain. The prototype now reached a stage where it needs to be evaluated with a representative linguistic data set called corpus. A corpus is a collection of text drawn from typical sources which can be used as a test data set to evaluate NLP systems. As there is no available corpus for the domain, we developed a representative corpus and annotated it with linguistic information. The evaluation of the prototype considers one of its two main components-lexical knowledge base. With the corpus, the evaluation enriches the lexical knowledge resources like vocabulary and grammar structure. This leads the prototype to parse a reasonable amount of sentences in the corpus.","PeriodicalId":335795,"journal":{"name":"2008 11th International Conference on Computer and Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129153582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Isolating significant phrases in common natural language queries to databases 隔离对数据库的常见自然语言查询中的重要短语
2008 11th International Conference on Computer and Information Technology Pub Date : 2008-12-01 DOI: 10.1109/ICCITECHN.2008.4803022
M. M. Hoque, M.S. Mahbub, S. Al-Mamun
{"title":"Isolating significant phrases in common natural language queries to databases","authors":"M. M. Hoque, M.S. Mahbub, S. Al-Mamun","doi":"10.1109/ICCITECHN.2008.4803022","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2008.4803022","url":null,"abstract":"This paper describes a novel methodology for extracting significant phrases from common natural language queries to databases. We show the usability of the methodology for developing database front ends, and propose it as an acceptable alternative to developers of databases that are supposed to be subject to massive interaction by non-technical people. Here we localize the matching procedures by isolating the phrases that are important for mapping the queries to database details, and propose to use heuristics and soft computing techniques for inexact matching of the phrases.","PeriodicalId":335795,"journal":{"name":"2008 11th International Conference on Computer and Information Technology","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116579400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Crosstalk and bit error rate performance of a proposed optical cross-connect topology 提出的光交叉连接拓扑的串扰和误码率性能
2008 11th International Conference on Computer and Information Technology Pub Date : 2008-12-01 DOI: 10.1109/ICCITECHN.2008.4803086
M. Hossen, M. A. Siddique, M.R. Islam
{"title":"Crosstalk and bit error rate performance of a proposed optical cross-connect topology","authors":"M. Hossen, M. A. Siddique, M.R. Islam","doi":"10.1109/ICCITECHN.2008.4803086","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2008.4803086","url":null,"abstract":"This paper presents an optical wavelength division multiplexed (WDM) cross-connect (OXC) topology, which is the modified form of the existing topologies. The analytical approach for the proposed topology is derived to explore the effect of crosstalk induced in multichannel WDM network due to OXC. The factors that affect the magnitude of crosstalk in the OXC are investigated and identified. The bit error rate (BER) performance of a WDM optical system is evaluated at a bit rate of 10 Gb/s on account of OXC-induced crosstalk and different noises. Power penalty is evaluated at BER of 10-9 shows that there is a significant impact of crosstalk on the number of wavelengths and input fibers. The results obtained from the present study demonstrate that the crosstalk performance of the proposed topology can be improved significantly than the existing topologies.","PeriodicalId":335795,"journal":{"name":"2008 11th International Conference on Computer and Information Technology","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117218428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance evaluation of dode of a voice/data integrated wireless mobile network 一种语音/数据综合无线移动网络的信道性能评价
2008 11th International Conference on Computer and Information Technology Pub Date : 2008-12-01 DOI: 10.1109/ICCITECHN.2008.4802974
H. Rahat, R. Laila, S.R. Juthy, M.I. Islam, M. Amin
{"title":"Performance evaluation of dode of a voice/data integrated wireless mobile network","authors":"H. Rahat, R. Laila, S.R. Juthy, M.I. Islam, M. Amin","doi":"10.1109/ICCITECHN.2008.4802974","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2008.4802974","url":null,"abstract":"An analytical model has been developed to improve the performance of a wireless mobile communication network with voice and data integrated traffic system. To reduce the probability of no channel available, which is an important quantity for performance evaluation, delays to the last data end user is introduced to the system. It has been found that by applying a very small delay to the last data end user, the probability of no channel available can be drastically reduced compared to the usual erlang case.","PeriodicalId":335795,"journal":{"name":"2008 11th International Conference on Computer and Information Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132457951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Side channel attack prevention for AES smart card 防AES智能卡侧信道攻击
2008 11th International Conference on Computer and Information Technology Pub Date : 2008-12-01 DOI: 10.1109/ICCITECHN.2008.4802973
Mohammad Zahiduf, Rahaman, Mohammad Akram Hossain
{"title":"Side channel attack prevention for AES smart card","authors":"Mohammad Zahiduf, Rahaman, Mohammad Akram Hossain","doi":"10.1109/ICCITECHN.2008.4802973","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2008.4802973","url":null,"abstract":"This paper describes an AES smart card implementation highly tamper resistant to side channel attacks. Smart cards are gaining popularity in applications that require high security and store sensitive information. Modern smart cards, highly capable of complicated cryptology, provide a high assurance of tamper resistance and thus commonly used in payment application. Although advanced smart cards can not protect attackers from being defrauded by different side channel attacks. Small, embedded integrated circuits (ICs) such as smart cards are vulnerable to side-channel attacks (SCAs). We describe the development of differential power attacks and describe how to perform differential power kind of side-channel attack on an AES implementation, using simulated power traces. We also discusses the security prevention from such corresponding attacks, such as randomized masking techniques for software implementations.","PeriodicalId":335795,"journal":{"name":"2008 11th International Conference on Computer and Information Technology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132858553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A new approach to wrap legacy programs into web services 将遗留程序打包到web服务中的新方法
2008 11th International Conference on Computer and Information Technology Pub Date : 2008-12-01 DOI: 10.1109/ICCITECHN.2008.4803065
Saeed Parsa, L. Ghods
{"title":"A new approach to wrap legacy programs into web services","authors":"Saeed Parsa, L. Ghods","doi":"10.1109/ICCITECHN.2008.4803065","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2008.4803065","url":null,"abstract":"Reengineering a legacy system to provide Web Services is a great challenge. Wrapping legacy systems is a proper solution to expose legacy program functionalities as Web Services. In this paper we propose a new approach in two phases to integrate legacy programs written in legacy languages such as C or Pascal into Web Services. This will be done by analyzing the legacy program and creating a Service Bus Class. Also, an automatic wrapping tool is developed to generate Web Services and related source code in Microsoft .Net environment. To evaluate this approach a legacy student learning program was wrapped into Web Services.","PeriodicalId":335795,"journal":{"name":"2008 11th International Conference on Computer and Information Technology","volume":"50 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131887378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Time-frequency representation of audio signals using Hilbert spectrum with effective frequency scaling 音频信号的时频表示使用希尔伯特频谱与有效的频率缩放
2008 11th International Conference on Computer and Information Technology Pub Date : 2008-12-01 DOI: 10.1109/ICCITECHN.2008.4803077
K. I. Molla, M. Shaikh, K. Hirose
{"title":"Time-frequency representation of audio signals using Hilbert spectrum with effective frequency scaling","authors":"K. I. Molla, M. Shaikh, K. Hirose","doi":"10.1109/ICCITECHN.2008.4803077","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2008.4803077","url":null,"abstract":"The efficiency of Hilbert spectrum (HS) in time-frequency representation (TFR) of audio signals is investigated in this paper. HS is derived by applying empirical mode decomposition (EMD), a newly developed data adaptive method for nonlinear and non-stationary signal analysis together with Hilbert transform. EMD represents any time domain signal as a sum of a finite number of bases called intrinsic mode functions (IMFs). The instantaneous frequency responses of the IMFs derived through Hilbert transform are arranged to obtain the TFR of the analyzing signal yielding the HS. A new frequency scaling method is introduced here for proper interpretation of the energy spectra in HS. The performance of HS is compared with well known and widely used short-time Fourier transform (STFT) technique for TFR. The experimental results show that HS based method performs better than STFT in time-frequency representation of the audio signals.","PeriodicalId":335795,"journal":{"name":"2008 11th International Conference on Computer and Information Technology","volume":"399 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132217458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A machine vision based automatic system for real time recognition and sorting of Bangladeshi bank notes. 基于机器视觉的孟加拉钞票实时识别和分类自动系统。
2008 11th International Conference on Computer and Information Technology Pub Date : 2008-12-01 DOI: 10.1109/ICCITECHN.2008.4803060
R. Sajal, M. Kamruzzaman, F.A. Jewel
{"title":"A machine vision based automatic system for real time recognition and sorting of Bangladeshi bank notes.","authors":"R. Sajal, M. Kamruzzaman, F.A. Jewel","doi":"10.1109/ICCITECHN.2008.4803060","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2008.4803060","url":null,"abstract":"This paper presents an efficient machine vision algorithm for real time image analysis and recognition of different features of Bangladeshi bank notes by using an automatic banknotes sorting system. The features recognized by this algorithm include denominations, orientations and sides of the bank notes. In a mechatronic system the Bangladeshi bank notes are fed together. The system draws the notes one by one and gets their images using a CCD sensor from a specific side. Then the system determines the denomination, orientation and side of the bank notes by analyzing the images grabbed by the CCD sensor. The average recognition speed is 8 to 9 bank notes per second and the rate of success is 100% for the banknotes having no extremely fatal damage.","PeriodicalId":335795,"journal":{"name":"2008 11th International Conference on Computer and Information Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134334321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信