2009 International Conference on Future Computer and Communication最新文献

筛选
英文 中文
Improving Shared Awareness and QoS Factors in AntNet Algorithm Using Fuzzy Reinforcement and Traffic Sensing 利用模糊增强和流量感知改进AntNet算法中的共享感知和QoS因素
2009 International Conference on Future Computer and Communication Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.8
Pooia Lalbakhsh, Bahram Zaeri, M. Fesharaki
{"title":"Improving Shared Awareness and QoS Factors in AntNet Algorithm Using Fuzzy Reinforcement and Traffic Sensing","authors":"Pooia Lalbakhsh, Bahram Zaeri, M. Fesharaki","doi":"10.1109/ICFCC.2009.8","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.8","url":null,"abstract":"The paper Describes a novel method to introduce new concepts in functional and conceptual dimensions of routing algorithms in swarm-based communication networks.The method uses a fuzzy reinforcement factor in the learning phase of the system and a dynamic traffic monitor to analyze and control the changing network conditions.The combination of the mentioned approaches not only improves the routing process, it also introduces new ideas to face some of the swarm challenges such as dynamism and uncertainty by fuzzy capabilities. Our strategy is simulated on AntNet routing algorithm to produce the performance evaluation results. The proposed strategy is compared with the Standard AntNet to analyze instantaneous/average throughput and packet delay together with the network awareness capability. The presented results demonstrate the improved performance of our strategy against the standard algorithm.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123728584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Fingerprint Image De-noising through Decimated and Un-decimated Wavelet Transforms (WT) 基于抽取和非抽取小波变换的指纹图像去噪
2009 International Conference on Future Computer and Communication Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.101
V. Humbe, S. Gornale, Ganesh M. Magar, R. Manza, K. Kale
{"title":"Fingerprint Image De-noising through Decimated and Un-decimated Wavelet Transforms (WT)","authors":"V. Humbe, S. Gornale, Ganesh M. Magar, R. Manza, K. Kale","doi":"10.1109/ICFCC.2009.101","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.101","url":null,"abstract":"This Recent technologies for recognizing Fingerprints have proven as regards as reliable for security purposes. But, the efficient recognition is depending on the quality of fingerprint image and it is a complex computer problem while dealing with noisy and low quality images. The most common methods used to acquire the fingerprint images do not need expertise, but highly distorted images are still possible because of dryness of skin, skin disease, dirt or humidity. Therefore such type of images must be de-noised for recognition. Many researchers have proved advantages of Discrete Wavelet Transform (DWT) for image de-nosing. DWT in image de-noising has limitations due to its non-invariance in time/space. The time invariant property of SWT is useful for de-noising the image. In this paper we have studied effectiveness of orthogonal and bi-orthogonal wavelet transforms with different decomposition level using SWT. And the quality of de-noised image is evaluated through structural distortion measurement and also measured the computational processing time at each level. Our results show coif1 at level 5gives the best results.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124901779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Human Centered Multimedia Audio Data Retrieval in Computer Networks 计算机网络中以人为本多媒体音频数据检索
2009 International Conference on Future Computer and Communication Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.123
S. Manvi, Kavita Ganiger, A. Sutagundar
{"title":"Human Centered Multimedia Audio Data Retrieval in Computer Networks","authors":"S. Manvi, Kavita Ganiger, A. Sutagundar","doi":"10.1109/ICFCC.2009.123","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.123","url":null,"abstract":"In recent years, the growth of Internet has redefined various areas of entertainment, in particular, that of music. Today, real-time Internet music streaming Real audio and MP3 are regularly enjoyed by millions of listeners. This paper presents a human centered multimedia audio (audio information) retrieval system over a computer network. This work has also taken care of playing of audio continuously without any interrupt by implementing data streaming and buffering mechanisms. The system architecture follows client-server model. The database is used for storing the audio metadata information. The server is responsible for retrieving audio information from the database to satisfy the client requests. The client provides human computer interface to user through graphical user interface for browsing, searching and playing audio of interest over a network. Based on the user inputs client requests to server to get audio information (like list of movies of particular language, list of songs of particular movie and list of songs based on user entered matching lyrics text). The retrieval of audio information from database will be done by the server using text-based search method.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123847447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Scheme for Mobile Payment Using RFID-Enabled Smart SIMcard 一种基于rfid的智能sim卡移动支付新方案
2009 International Conference on Future Computer and Communication Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.132
M. Qadeer, N. Akhtar, Shalini Govil, A. Varshney
{"title":"A Novel Scheme for Mobile Payment Using RFID-Enabled Smart SIMcard","authors":"M. Qadeer, N. Akhtar, Shalini Govil, A. Varshney","doi":"10.1109/ICFCC.2009.132","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.132","url":null,"abstract":"Mobile phones have become essential part of everybody’s daily life. Efforts have been made to add more features into the mobile devices. Contact less payment is another dimension that adds value to mobile phones. In contact less payment through mobile device, user is able to pay using his mobile device without touching or swiping card on a reading device. In this paper, we present an idea to equip mobile devices with RFID-enabled SIM (Subscriber Identity Module) card to carry out money transfer. RFID-enabled SIMis a special SIM card that includes RFID (Radio Frequency Identification) chip in the SIM casing. We propose an architecture to integrate RFID and normal SIM features into a single specialized RFID-enabled SIM. This specialized SIM can be used for normal phone applications as well as contact less payment. RFID enables the mobile user to be identified by the RFID reader and SIM stores the payment information. We discuss various scenarios in which RFID-enabled SIM can be used for different applications. This mode of payment provides freedom, flexibility, mobility and security to the customer.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125714960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Using Enhancement Method to Improve Earned Value Index to Achieve an Accurate Project Time and Cost Estimation 运用增强法改进挣值指标,实现对项目时间和成本的准确估算
2009 International Conference on Future Computer and Communication Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.68
I. Attarzadeh, Ow Siew Hock
{"title":"Using Enhancement Method to Improve Earned Value Index to Achieve an Accurate Project Time and Cost Estimation","authors":"I. Attarzadeh, Ow Siew Hock","doi":"10.1109/ICFCC.2009.68","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.68","url":null,"abstract":"This paper presents how to use enhancement method to improve Earned Value (EV) method of projects. This method improves earned value management system (EVMS) and forecasting time and cost for projects. These method use established consists of four variables: Scheduled Performance Index (SPI), Cost Performance Index (CPI), Cost Variance (CV), Schedule Variance (SV). The model has been validated by a simulation study using a progress generator a new software. This software was developed in Visual Studio 2008 – Visual Basic .NET 2008 and Microsoft Office Project 2007 and it included some basic assumptions and data were generated day by day randomly. The results show a strong relationship between response variable and above four predictors. Therefore, it can be concluded that the model could be used in a wide range of projects for EAC estimation.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128036178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Bandwidth Resource Allocation 带宽资源分配
2009 International Conference on Future Computer and Communication Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.133
Rafeeq Ahmed, M. Qadeer, Musheer Ahmad
{"title":"Bandwidth Resource Allocation","authors":"Rafeeq Ahmed, M. Qadeer, Musheer Ahmad","doi":"10.1109/ICFCC.2009.133","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.133","url":null,"abstract":"A data network may not be stable at the connection level under some unfair bandwidth allocation policies, even when the normal offered load condition is satisfied i.e. average traffic load at each link is less than its capacity. In this paper,we present that a data network is stable when the bandwidth of the network is allocated so as to provide a minimum bandwidth using max min fairness algorithm. Thus each user will be guaranteed for a minimum bandwidth he will be getting.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131107468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Protecting E-courses Copyright in M-learning Process 移动学习过程中电子课程版权的保护
2009 International Conference on Future Computer and Communication Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.137
K. Titi, Osama A. Marie
{"title":"Protecting E-courses Copyright in M-learning Process","authors":"K. Titi, Osama A. Marie","doi":"10.1109/ICFCC.2009.137","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.137","url":null,"abstract":"As the world is becoming more and more flowing, networked, and composite organizations will continue to be more mobile than ever by. One part of the challenge for future mobile organizations is how can they communicate and exchange information securely within their clients, employees, and all other stockholders. Wireless communications offer organizations and individuals many benefits such as portability, flexibility, increased productivity, and lower installation costs. However, the joining together of information and communication technologies and increased reliance of organizations and individuals on such advances has caused a range of security issues to the face. Hence, wireless networks are open to intruders who may cause unwanted consequences to an organization and individuals’ information resources. The main aim of this research is to design a new model for securing mobile-phone learning system (SmLS), to protect the m-learning material from unauthorized distribution, to protect the e-course material from modified, and to make messages transmitted between communicators more secure and authenticated. The design of SmLS is provided to make the m-learning process more secure for both organization and students alike.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129892503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Novel Indoor UWB Antenna Array Design by GA 一种基于遗传算法的室内超宽带天线阵列设计
2009 International Conference on Future Computer and Communication Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.127
Chien-Hung Chen, Shu-Han Liao, Min-Hui Ho, C. Chiu, Kuan-Chung Chen
{"title":"A Novel Indoor UWB Antenna Array Design by GA","authors":"Chien-Hung Chen, Shu-Han Liao, Min-Hui Ho, C. Chiu, Kuan-Chung Chen","doi":"10.1109/ICFCC.2009.127","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.127","url":null,"abstract":"In this paper, a new ultra wideband circular antenna array (UCAA) combining genetic algorithm(GA) to minimize the bit error rate (BER) is proposed. The novelties of our approach is not only choosing BER as the object function instead of sidelobe level of the antenna pattern, but also consider the antenna feed length effect of each array element. The strong point of the genetic algorithm is that it can find out the solution even if the performance index cannot be formulated by simple equations. In other words, the receiver can increase the received signal energy to noise ratio. The synthesized array pattern also can mitigate severe multipath fading in complex propagation environment. As a result, the BER can be reduced substantially in indoor UWB communication system.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116314819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A New Approach for Web Applications Examination before Publishing Web应用程序发布前审查的新方法
2009 International Conference on Future Computer and Communication Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.141
M. Ghahremani, S. Hosseini-Seno, R. Budiarto
{"title":"A New Approach for Web Applications Examination before Publishing","authors":"M. Ghahremani, S. Hosseini-Seno, R. Budiarto","doi":"10.1109/ICFCC.2009.141","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.141","url":null,"abstract":"Before placing a web based application in the real servers of the real world with millions of users and going to serve them, it is needed to examine the functionality of the application which is under real work load stress to evaluate server and application for final conditions. This paper is focused on modeling of the user behavior by using data mining methods and extracting different types of application clusters and creating profiles of user’s behavior for each cluster. Also user think time is considered as the principal component of work load and presents a mathematical model of user think time. Related to the selected web application and finally by using the distribution function of user think time and written macros for the web browser, it also creates the work load of types of users and sends it toward the web servers and examines web server status. This article unlike some studies that attempt to model web server and characterizing it’s components, has simulated the web server responsibility and ability by using real traffic to prepare better solutions if hardware or their applications codes are not suitable. Unlike the related works that validate a special system and characterize parameters of its load, our recommendation is useful for all types of servers and web applications. Due to proposed model results, it’s possible to prefer suitable recommendation for programmers and the relevant site management.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126672719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Design for Improvement of Scalable-RTCP 一种改进可扩展rtcp的新设计
2009 International Conference on Future Computer and Communication Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.9
S. Shahbazi, K. Jumari, M. Ismail
{"title":"A New Design for Improvement of Scalable-RTCP","authors":"S. Shahbazi, K. Jumari, M. Ismail","doi":"10.1109/ICFCC.2009.9","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.9","url":null,"abstract":"Real-time Transport Control Protocol (RTCP) is the control protocol of Real-time Transport Protocol (RTP), with responsibilities such as Quality of Service (QoS) adaptation, implementation, and troubleshooting. Various problems with RTCP have led to alternative designs, one of which is a hierarchical design named Scalable-RTCP (S-RTCP). In this article, we explain about the weaknesses associated with S-RTCP (most of which are stability issues), and propose different approaches to solve the weaknesses, exposing each one’s pros and cons, in addition to proposing new features.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125263958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信