2009 International Conference on Future Computer and Communication最新文献

筛选
英文 中文
Algorithms for Micro-mouse 微型鼠标的算法
2009 International Conference on Future Computer and Communication Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.38
M. Sharma, K. Robeonics
{"title":"Algorithms for Micro-mouse","authors":"M. Sharma, K. Robeonics","doi":"10.1109/ICFCC.2009.38","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.38","url":null,"abstract":"Robotics is not a new word. It has attracted people from all phases of life. The failure of a project in any field mostly occurs due to incomplete analysis of problem or improper planning. Such disappointments can be avoided by adapting a proper approach towards solving a given task. The problem of micro-mouse is 30 years old but its importance in the field of robotics is unparalleled, as it requires a complete analysis & proper planning to solve this problem. This paper covers one of the most important areas of robot, “Decision making Algorithm” or inlay-man’s language, “Intelligence”. The environment around the robot is not known, so it must have decision-making capabilities. For starting in the field of micro-mouse it is very difficult to begin with highly sophisticated algorithms. This paper begins with very basic wall follower logic to solve the maze. And gradually improves the algorithm to accurately solve the maze in shortest time with some more intelligence. The Algorithm is developed up to some sophisticated level as Flood fill algorithm.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123647427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Application of AHP-TOPSIS to the Evaluation and Classification of Provincial Landscape Construction Level of China AHP-TOPSIS在中国省级景观建设水平评价与分类中的应用
2009 International Conference on Future Computer and Communication Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.55
Zhang Yi-chuan, Qiao Li-fang, Cao Wei, Peng Xing-zhi
{"title":"Application of AHP-TOPSIS to the Evaluation and Classification of Provincial Landscape Construction Level of China","authors":"Zhang Yi-chuan, Qiao Li-fang, Cao Wei, Peng Xing-zhi","doi":"10.1109/ICFCC.2009.55","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.55","url":null,"abstract":"The urban green system constitutes the urban ecological infrastructure and plays a vital role in the healthy development of urban. This study, using Analytic Hierarchy Process (AHP) and Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) models, taking provinces in China as unit, has made analysis and thus carried out a classification of the landscape construction level of provinces in china from a macroscopic view. The results show that the provincial landscape construction level is positively correlated with the economic development level. But due to the big difference of landscape construction level of each province, enough importance should be attached. The AHP-TOPSIS model has good discrimination in the evaluation on China’s provincial landscape construction level and it is also applicable to the evaluation and classification of urban landscape construction level among different cities.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123348528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Bandwidth Reservation in Mobile Ad Hoc Network Using Real Time MAC Protocol 基于实时MAC协议的移动自组网带宽预留
2009 International Conference on Future Computer and Communication Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.114
M. Murali, R. Srinivasan
{"title":"Bandwidth Reservation in Mobile Ad Hoc Network Using Real Time MAC Protocol","authors":"M. Murali, R. Srinivasan","doi":"10.1109/ICFCC.2009.114","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.114","url":null,"abstract":"Abstract - The term MANET describes distributed, mobile, wireless, multihop networks that operate without the benefit of any existing infrastructure. When several nodes are participating in the Mobile Ad hoc Network collision of packets may happen and sending the time bounded packets to the destination node is difficult. Different nodes can use the same bandwidth simultaneously as long as they are sufficiently separated and do not interfere with each other. In this paper we are employing RealTime MAC(RT MAC) for data transmission between mobile terminals and support real time traffic, such as streamed voice or video, which has a more demanding quality-of-service (QoS) requirement and often requires bandwidth reservation. It uses a Bayesian algorithm to calculate contention probabilities and enable faster convergence of the reservation procedure. The Real Time MAC is free of the “hidden terminal” problem, and is designed such that reservations can be made quickly and efficiently with negligible probability of conflict. It is fully-distributed and parallel and a reservation is made through a localized conversation between nodes in a 2-hop neighborhood, and scalable.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"116 2-3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123570304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Network Management System Framework and Development 网络管理系统框架与开发
2009 International Conference on Future Computer and Communication Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.11
M. Ismail, Sera Syarmila
{"title":"Network Management System Framework and Development","authors":"M. Ismail, Sera Syarmila","doi":"10.1109/ICFCC.2009.11","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.11","url":null,"abstract":"We present the framework developmentof network management system approach. Thisresearch designs for network management systemmonitoring in Local Area Network (LAN)environment. The main objective of this study is tomonitor and measure the server performance, thusto analyze whether the server is normal, optimal oroverloaded. As a result, this framework of networkmanagement system can provide measurement ofthe server network traffic observed in the realnetwork environment. In addition, this frameworkof network management system can also provide abest practice for developers to implement thenetwork management system in real time basic.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131555485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Hierarchical Structures Based on Fuzzy Similarity Relation 基于模糊相似关系的层次结构
2009 International Conference on Future Computer and Communication Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.49
Mingfen Wu, Ting Shen, Xianwei Wu, C. Cao
{"title":"Hierarchical Structures Based on Fuzzy Similarity Relation","authors":"Mingfen Wu, Ting Shen, Xianwei Wu, C. Cao","doi":"10.1109/ICFCC.2009.49","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.49","url":null,"abstract":"In this paper, on the basis of fuzzy quotient space theory, a theoretical framework of hierarchical structures based on fuzzy similarity relations by fuzzy matrices is proposed. The first, the strictly matrix description is introduced to hierarchical structures by a fuzzy similarity relation induced, and we proved the same hierarchical structures by the fuzzy similarity relation induced in two ways of composition ; Secondly, the effective algorithm of getting their hierarchical structures by matrices is proposed, and we get some interesting properties. The algorithm has been validated by an example, and we have an analysis of the computational complexity.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131357502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Wired Equivalent Privacy (WEP) 有线等效隐私(WEP)
2009 International Conference on Future Computer and Communication Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.32
Arash Habibi Lashkari, Farnaz Towhidi, R. Hosseini
{"title":"Wired Equivalent Privacy (WEP)","authors":"Arash Habibi Lashkari, Farnaz Towhidi, R. Hosseini","doi":"10.1109/ICFCC.2009.32","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.32","url":null,"abstract":"There are some demonstrable reasons for customers who like use from wireless technology and this is clear because there are various benefits for using wireless technology. The contrast between wireless usage and security techniques growing, show that the security is not adequate enough for this data growing. It’s obvious that the hackers are able to monitor the transmitted data and hack whatever they want. So we see that these days Companies are investing more money on securing their wireless networks. There are three major type of security in wireless. In this paper, at first we try to completely explain the structure of WEP as a first wireless security technique and discuss about all versions of it. At the second step, we discuss about all problems of WEP and finally explain the solutions and improvements that done on this security technique. Then we are in the next plan witch is explain the structure of two other techniques (WPA, WPA2) and we hope that we will publish a completely comparison among wireless techniques in the near future.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116604666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Fault Tolerent Context Aware Mobile Computing 容错上下文感知移动计算
2009 International Conference on Future Computer and Communication Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.15
A. H. Afridi, Muhammad Ali
{"title":"Fault Tolerent Context Aware Mobile Computing","authors":"A. H. Afridi, Muhammad Ali","doi":"10.1109/ICFCC.2009.15","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.15","url":null,"abstract":"Fault tolerance is the main focus of design of new paradigms like context aware mobile computing. In situations where computing must be dependable require new engineering approaches and better understanding of paradigm. This paper discusses the fault tolerance approaches from the perspective of layers of context aware system architecture. An approach to make hardware level fault tolerant has been discussed.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"35 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125720824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Web-Based Portable Network Traffic Monitoring System Based on Embedded Linux and SBC 基于嵌入式Linux和SBC的基于web的便携式网络流量监控系统
2009 International Conference on Future Computer and Communication Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.14
Mostafijur Rahman, Z. Khalib, R. B. Ahmad, S. Asi
{"title":"Web-Based Portable Network Traffic Monitoring System Based on Embedded Linux and SBC","authors":"Mostafijur Rahman, Z. Khalib, R. B. Ahmad, S. Asi","doi":"10.1109/ICFCC.2009.14","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.14","url":null,"abstract":"This paper describes the design and implementation of a web-based portable network traffic monitoring system (PNtMS) on an embedded Linux platform, based on single board computer (SBC). The functionality of the monitoring system constitutes processing of TCP/IP network traffic in respect of network protocol analysis and traffic monitoring. The structural breakdown of this system can be generically segregated into three parts which can be mapped into different layers of the operating system. This monitoring system is designed to capture network packets information and performed statistical analysis. The analyzed data are then stored into log files that can be shown through a web browser and onboard LCD panel, which are mounted on the SBC. Results show that, the low-end embedded Linux platform is fit to produce reliable web-based network traffic monitoring system.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130711228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Thai Handwritten Segmentation Using Proportional Invariant Recognition Technique 基于比例不变识别技术的泰文手写分割
2009 International Conference on Future Computer and Communication Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.53
A. Chatchinarat
{"title":"Thai Handwritten Segmentation Using Proportional Invariant Recognition Technique","authors":"A. Chatchinarat","doi":"10.1109/ICFCC.2009.53","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.53","url":null,"abstract":"Handwritten character recognition has been an on-going research in many languages for many years. Most techniques focus on isolate recognition. However, if a writer writes at fast speed, two or more characters can be written within one stroke. This input cannot be used to recognition. Previously I present the method to separate two characters connected Thai handwriting. This paper presents the method to separate connected Thai handwriting based on a modified water-reservoir and Proportional Invariant Recognition technique to separate two or more characters. The proposed technique find candidate segmentation points (include correctly segmentation points) at 92.8% and segment correctly at 87.6%.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131083346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
BRQS Matching Algorithm for Searching Protein Sequence Databases 蛋白质序列数据库搜索的BRQS匹配算法
2009 International Conference on Future Computer and Communication Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.40
Ahmad F. Klaib, H. Osborne
{"title":"BRQS Matching Algorithm for Searching Protein Sequence Databases","authors":"Ahmad F. Klaib, H. Osborne","doi":"10.1109/ICFCC.2009.40","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.40","url":null,"abstract":"String matching algorithms play a key role in many computer science problems, challenges and in the implementation of computer software. This problem has received a great deal of attention due to various applications in computational biology. In our study, we propose a new algorithm called BRQS. Experimental results show that it offers fewer numbers of comparisons and offers improved elapsed searching time when compared to other well-known algorithms for searching any length of alphabets and patterns. The proposed algorithm is applicable to search protein sequence databases as well as any other string searching applications.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131168722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信