2005 IEEE International Conference on Electro Information Technology最新文献

筛选
英文 中文
Imposed constraints on the Smith-Waterman alignment algorithm for enhanced modeling of a single-molecule DNA sequencer 为增强单分子DNA测序仪的建模,对史密斯-沃特曼比对算法施加了约束
2005 IEEE International Conference on Electro Information Technology Pub Date : 2005-05-22 DOI: 10.1109/EIT.2005.1627002
P. G. Humphrey, G. Bashford
{"title":"Imposed constraints on the Smith-Waterman alignment algorithm for enhanced modeling of a single-molecule DNA sequencer","authors":"P. G. Humphrey, G. Bashford","doi":"10.1109/EIT.2005.1627002","DOIUrl":"https://doi.org/10.1109/EIT.2005.1627002","url":null,"abstract":"An effort has been underway to develop a system for de novo sequencing of single DNA molecules with very long reads. The system operates by optically detecting the passage of fluorescently tagged DNA bases through a detection zone. A successful system would be revolutionary with respect to speed, read length, cost and minimized laboratory infrastructure. An important part of system development is modeling of the detection process. In particular, predicting the expected error from a set of sequencing parameters is helpful in system design. This paper describes variations on the Smith-Waterman algorithm for subsequence alignment used in a single-molecule detection model. The alignment algorithm is used to check the modeled output sequence generated from a known input sequence. Variations based on reasonable assumptions led to over an order of magnitude improvement in alignment speed","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124402929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two approaches to improve Java MIDP record management system in wireless devices 改进无线设备中Java MIDP记录管理系统的两种方法
2005 IEEE International Conference on Electro Information Technology Pub Date : 2005-05-22 DOI: 10.1109/EIT.2005.1627036
H. Kimm, S. Shin, Charlie Y. Shim
{"title":"Two approaches to improve Java MIDP record management system in wireless devices","authors":"H. Kimm, S. Shin, Charlie Y. Shim","doi":"10.1109/EIT.2005.1627036","DOIUrl":"https://doi.org/10.1109/EIT.2005.1627036","url":null,"abstract":"In this paper, we propose two approaches to improve current Java mobile information device profile (MIDP) record management system (RMS) in wireless devices and compare the approaches with current MIDP RMS. These approaches promote the efficient use of Java MIDP RMS in wireless devices such that a faster record retrieval using a smaller memory is achieved, which makes the device consume less battery power. The comparable program segments, which show how to use Java MIDP RMS with or without record-enumeration interface efficiently, are presented and analyzed. The first approach in the paper proposes to use a circular linked list in RMS RecordEnumeration interface. This requires less storage to represent a recordID as a node in the circular linked list than the current RecordEnumeration interface that uses a doubly linked list. The second approach supports the faster access of record traversal, which shows O(log n) time to retrieve any record in MIDP RMS file, while the record retrieval in the current Java MIDP RMS takes O(n) time. In addition, the second approach uses less RMS storage than the method using RecordEnumeration interface does","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125249329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optimize defect detection techniques through empirical software engineering method 通过经验软件工程方法优化缺陷检测技术
2005 IEEE International Conference on Electro Information Technology Pub Date : 2005-05-22 DOI: 10.1109/EIT.2005.1627056
H. T. Sun
{"title":"Optimize defect detection techniques through empirical software engineering method","authors":"H. T. Sun","doi":"10.1109/EIT.2005.1627056","DOIUrl":"https://doi.org/10.1109/EIT.2005.1627056","url":null,"abstract":"This paper introduces twelve defect detection techniques and describes a non-controlled experiment related to defect detection techniques to address the uncertainty of how to test an embedded software and find defects effectively. In this non-controlled experiment, three common testing techniques were applied to a large scale embedded system. This study is intended to evaluate different defect detection techniques that are actually used by software engineers using empirical software engineering method. The objective of empirical software engineering is to improve the software development processes and quality. This could be done by evaluating, comparing and controlling defect detection methods. This study is also intended to find a best method to reduce defects and increase the defect detection rate in a large scale embedded system, since defect detection is considered as one of the most costly development process in software development cycle","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114940921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A mobility based link layer approach for mobile wireless sensor networks 移动无线传感器网络中基于可移动性的链路层方法
2005 IEEE International Conference on Electro Information Technology Pub Date : 2005-05-22 DOI: 10.1109/EIT.2005.1626974
P. Raviraj, H. Sharif, M. Hempel, S. Ci, H. Ali, Jong-Hoon Youn
{"title":"A mobility based link layer approach for mobile wireless sensor networks","authors":"P. Raviraj, H. Sharif, M. Hempel, S. Ci, H. Ali, Jong-Hoon Youn","doi":"10.1109/EIT.2005.1626974","DOIUrl":"https://doi.org/10.1109/EIT.2005.1626974","url":null,"abstract":"Several MAC protocols have been proposed for wireless sensor networks (WSNs). These include T-MAC, D-MAC and the more commonly utilized SMAC. In this paper, we propose a new MAC layer approach to support mobility in WSNs. The proposed technique utilizes an adaptive frame size approach to overcome the effect of frame losses caused by the Doppler shifts under mobile scenarios. An extended Kalman filter is used to predict the frame size for each transmission, which also directly enhances the energy efficiency of the system. Our results show that based on the adaptive frame size predictor and its comparison with the SMAC protocol, the proposed technique can improve overall system performance and deliver enhanced energy efficiency of 24% under mobility. The current implementation of ns-2 does not take into consideration the packet error rate. As another contribution of our work, we have developed a physical layer model for ns-2, which processes the received frame based not only on the fading characteristics of the signal but also the SNR and relative velocity between the nodes. To characterize a more accurate wireless sensor networks' physical layer, we have modeled the Mica-2 sensors in MATLAB and implemented the model in ns-2 for simulations","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122360108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Frequency Domain Real Time Digital Image Watermarking 频域实时数字图像水印
2005 IEEE International Conference on Electro Information Technology Pub Date : 2005-05-22 DOI: 10.1109/EIT.2005.1627003
Ravi Shah, Abhinav Agarwal, Subramaniam Ganesan
{"title":"Frequency Domain Real Time Digital Image Watermarking","authors":"Ravi Shah, Abhinav Agarwal, Subramaniam Ganesan","doi":"10.1109/EIT.2005.1627003","DOIUrl":"https://doi.org/10.1109/EIT.2005.1627003","url":null,"abstract":"The present paper puts forward real time implementation of an algorithm for Watermarking and the results obtained using a Frequency domain approach.. The paper emphasizes an Adaptive Frequency domain watermarking approach in real time, demonstrating robustness against intentional or unintentional attacks on the watermarked image. This is achieved by modifying the middle frequency coefficients. Since the image is analyzed and modified in the frequency domain the changes made are difficult to perceive. The algorithm steps and special consideration regarding the real-time implementation on TI’s TMS320C6711 DSP are presented. Applications of watermarking process in real time are also described.","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116604344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Neural Network Based Approach for Tuning Kalman Filter 基于神经网络的卡尔曼滤波器调谐方法
2005 IEEE International Conference on Electro Information Technology Pub Date : 2005-05-22 DOI: 10.1109/EIT.2005.1626991
O. Korniyenko, M. Sharawi, D. Aloi
{"title":"Neural Network Based Approach for Tuning Kalman Filter","authors":"O. Korniyenko, M. Sharawi, D. Aloi","doi":"10.1109/EIT.2005.1626991","DOIUrl":"https://doi.org/10.1109/EIT.2005.1626991","url":null,"abstract":"Kalman filter (KF) parameter tuning has been dealt with in a limited fashion and usually was left to engineering intuition due to unavailable measurements of process noise and high dimensionality of the problem. In this paper we present a simple Neural Network (NN) based approach to KF tuning problem. Since the approach trades number of KF runs required for the optimal filter tuning for KF performance, the result of the such tuning is the set of tuning parameters that gives suboptimal performance. Advantages of this approach are: 1) simple practical framework for optimal filter performance tuning, 2) the framework is independent of the type of a filter and 3) low number of filter runs required to obtain quasi optimal parameter set. The main disadvantage is the suboptimal filter performance that can be easily improved by increasing the number of filter runs. Two NN architectures were investigated, generalized regression neural network (GRNN) and regular radial basis networks (RBNN). RBNN showed much better performance for a given non-linear test function with a clear maximum peak. Performance measures along with computational efficiency for these methods were compared. A step-by-step tuning procedure is presented.","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128797408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Modeling of the biliary tree structure in MRCP images MRCP图像中胆道树状结构的建模
2005 IEEE International Conference on Electro Information Technology Pub Date : 2005-05-22 DOI: 10.1109/EIT.2005.1627008
R. Logeswaran, C. Eswaran
{"title":"Modeling of the biliary tree structure in MRCP images","authors":"R. Logeswaran, C. Eswaran","doi":"10.1109/EIT.2005.1627008","DOIUrl":"https://doi.org/10.1109/EIT.2005.1627008","url":null,"abstract":"Magnetic resonance cholangio pancreatography (MRCP) has become a favorite imaging technique for diagnosis of liver diseases, especially those associated with the biliary track. In a typical MRCP examination, a large series of image acquisitions are taken, ranging from the positioning series, to the re-projected image sets of Tl- and T2-weighted image series. This paper describes several modeling techniques in 2D and 3D which may aid in highlighting features in the MRCP images, as well as promote some possible compression gains through replacement of certain raw images with the prescribed models","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131761053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Scalable resource allocation of dynamic multiple-services for next generation wireless networks 下一代无线网络动态多业务的可扩展资源分配
2005 IEEE International Conference on Electro Information Technology Pub Date : 2005-05-22 DOI: 10.1109/EIT.2005.1626963
Seok-Yee Tang, S. Thilakawarda, R. Tafazolli, Y. Qian
{"title":"Scalable resource allocation of dynamic multiple-services for next generation wireless networks","authors":"Seok-Yee Tang, S. Thilakawarda, R. Tafazolli, Y. Qian","doi":"10.1109/EIT.2005.1626963","DOIUrl":"https://doi.org/10.1109/EIT.2005.1626963","url":null,"abstract":"In this paper, the concept of scalable resource allocation (ScRA) technique is introduced and the ScRA technique efficiency is investigated in a diverse and dynamic traffic scenario. Detailed performance analysis of the ScRA through simulations is also presented in this paper. Most importantly, our simulation results indicate that significant radio resource utilization gain can be achieved with the use of ScRA scheme over the conventional static resource allocation (StRA) technique. This superior performance is credited to its flexible and adaptive radio channel allocation (or re-allocation) between the multiple-services at each sampled time","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131158953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Theft-induced checkpointing for reconfigurable dataflow applications 可重构数据流应用程序的盗窃诱发检查点
2005 IEEE International Conference on Electro Information Technology Pub Date : 2005-05-22 DOI: 10.1109/EIT.2005.1626998
S. Jafar, A. Krings, T. Gautier, Jean-Louis Roch
{"title":"Theft-induced checkpointing for reconfigurable dataflow applications","authors":"S. Jafar, A. Krings, T. Gautier, Jean-Louis Roch","doi":"10.1109/EIT.2005.1626998","DOIUrl":"https://doi.org/10.1109/EIT.2005.1626998","url":null,"abstract":"In this paper a new checkpoint/recovery protocol called theft-induced checkpointing is defined for dataflow computations in large heterogeneous environments. The protocol is especially useful in massively parallel multi-threaded computations as found in cluster or grid computing and utilizes the principle of work-stealing to distribute work. By basing the state of executions on a macro dataflow graph, the protocol shows extreme flexibility with respect to rollback. Specifically, it allows local rollback in dynamic heterogeneous systems, even under a different number of processors and processes. To maximize run-time efficiency, the overhead associated with checkpointing is shifted to the rollback operations whenever possible. Experimental results show the overhead induced is very small","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114844801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Wireless SAW sensors reader: architecture and design 无线SAW传感器读取器:架构与设计
2005 IEEE International Conference on Electro Information Technology Pub Date : 2005-05-22 DOI: 10.1109/EIT.2005.1626992
S. Krishnamurthy, B. Bazuin, M. Atashbar
{"title":"Wireless SAW sensors reader: architecture and design","authors":"S. Krishnamurthy, B. Bazuin, M. Atashbar","doi":"10.1109/EIT.2005.1626992","DOIUrl":"https://doi.org/10.1109/EIT.2005.1626992","url":null,"abstract":"This paper describes a prototype burst transceiver operating in the industrial, scientific and medical band that can be used to power, interrogate and receive response from a wireless passive surface acoustic wave sensor. While the transceiver architecture for this system has been previously described, this paper focuses on the prototype construction and component and system level performance testing. Key performance factors for the transceiver include the isolation provided by various radio frequency (RF) switches, the appropriate switch timing, and the digitization and collection of burst response signals for further processing. The isolation provided by RF switches generates the signal burst, switches the transceiver from the transmission to receiving mode, and provide receiver isolation from the transmission signal and path. The measurements taken in testing the transmitter and receiver sections are presented. In addition, the frequency spectrum of the in-phase and quadrature signals obtained after digitization and data collection is shown and briefly described","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128613765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书