2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks最新文献

筛选
英文 中文
Simulation Study of Buffering in Manhattan Street Network in NS2 NS2曼哈顿街道网络缓冲仿真研究
Ravinder Bahl, Rakesh Kumar
{"title":"Simulation Study of Buffering in Manhattan Street Network in NS2","authors":"Ravinder Bahl, Rakesh Kumar","doi":"10.1109/CICSyN.2010.81","DOIUrl":"https://doi.org/10.1109/CICSyN.2010.81","url":null,"abstract":"The paper presents the Performance Analysis of Manhattan Street Network (MSN).Improvement of performance at the destination node by applying different buffering capacities at the routers is demonstrated. The results using NS2 simulator are produced. It can be concluded that the congestion and the packet drops can be reduced at the link node by appropriate size of buffer at the link node.","PeriodicalId":358023,"journal":{"name":"2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130548687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Contourlet Transform with the Principal Component Analysis for Palmprint Recognition 基于主成分分析的Contourlet变换掌纹识别
M. Sharkas, I. E. Rube, M. A. Mostafa
{"title":"The Contourlet Transform with the Principal Component Analysis for Palmprint Recognition","authors":"M. Sharkas, I. E. Rube, M. A. Mostafa","doi":"10.1109/CICSyN.2010.61","DOIUrl":"https://doi.org/10.1109/CICSyN.2010.61","url":null,"abstract":"In this paper two techniques for palmprint recognition are suggested and compared. Palmprint include principal lines, wrinkles and ridges which contain very important features essential for recognition. The Contourlet Transform (CT) is a multiresolution and multidirection transform which can be effective in capturing the palm features. The first technique extracts the edges from the palm images and then performs the CT or the Discrete Wavelet Transform (DWT) on the edge extracted images. The sub-band images are divided into M*M non-overlapping blocks. The energy of each block is calculated and normalized to form a feature vector. The second technique employs the principal component analysis PCA where the approximation images are input to it for dimensionality reduction and to produce the eigen palms. Features extracted from both techniques are tested and compared where it was found that the best achieved recognition rate is about 94% when combining the results of both techniques using the CT.","PeriodicalId":358023,"journal":{"name":"2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126147988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Fair Hierarchical Scheduling with Capability of Handling Channel Failures in a Wireless LAN 无线局域网中具有信道故障处理能力的公平分层调度
M. Saleh, Basima Hani F. Hasan
{"title":"Fair Hierarchical Scheduling with Capability of Handling Channel Failures in a Wireless LAN","authors":"M. Saleh, Basima Hani F. Hasan","doi":"10.1109/CICSyN.2010.39","DOIUrl":"https://doi.org/10.1109/CICSyN.2010.39","url":null,"abstract":"This paper proposes and analyzes the performance of a packet scheduling scheme capable of satisfying both real-time Quality-of-Service (QoS) constrains and non-real time best effort service while handling channel errors in IEEE 802.11 WLAN through exploiting a hierarchical EDF-FCFS scheduler featuring an adaptive feedback control mechanism. While the real-time scheduler is derived from the legacy Earliest Deadline First (EDF) scheme, the non-real time scheduler is derived from the ordinary First Come First Served (FCFS) scheme. During runtime operation, with the support of a feedback control mechanism, the Access Point (AP) dynamically switches the two polling schedulers according to the channel status, giving the temporarily unreachable real-time traffic more chances to meet its time constrains while continuing the best effort service for the non-real time traffic. Simulation results show that the proposed hierarchical scheduler efficiently improves the overall WLAN packet success ratio.","PeriodicalId":358023,"journal":{"name":"2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123012154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tree Based Structured Management of Delivery Path for the Multi-path Streaming 基于树的多路径流传输路径结构化管理
Guochao Jing, Takeshi Tsuchiya, Katsuhiro Sebayashi, K. Shimizu, M. Maruyama, K. Koyanagi
{"title":"Tree Based Structured Management of Delivery Path for the Multi-path Streaming","authors":"Guochao Jing, Takeshi Tsuchiya, Katsuhiro Sebayashi, K. Shimizu, M. Maruyama, K. Koyanagi","doi":"10.1109/CICSyN.2010.44","DOIUrl":"https://doi.org/10.1109/CICSyN.2010.44","url":null,"abstract":"Recently, the real-time streaming application has gained great interest of engineers, because of the increasing requirements for transferring massive volumes data, such as high definition video and audio. Therefore, various architectures have been proposed to enhance the efficiency and quality of the transmission. The proposals based on the Application Layer Multicast (ALM) usually applying on the peer-to-peer protocol is one of those. The previous work of this paper designed a Multi-Path based ALM, which utilized the transmission ability of free peers existing in the overlay networks. The design focused on an unstructured overlay network, where peers are connected randomly. Therefore, the flooding query method, which checked transmission ability of each peer, is used to discover and construct the desired multiple delivery path. This unstructured management made the communication cost much higher than expected. This paper proposed a tree-based structured management way to provide efficient discovery and construction. Based on the K-tree model, this method is also available to promote the current ALM structures. The improvement of the management cost has been illustrated in our experiment with an instance of Multi-Path transmission, which is based on the well-developed project DVTS (Digital Video Transport System). The improved transmission speed could be seen from our result.","PeriodicalId":358023,"journal":{"name":"2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132673405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Call Admission Control Policy for Integration of Voice/Data Traffic in Cellular Mobile Networks 蜂窝移动网络中话音/数据流量集成的呼叫接纳控制策略
Aytül Bozkurt, E. Uçar, R. Akdeniz
{"title":"Call Admission Control Policy for Integration of Voice/Data Traffic in Cellular Mobile Networks","authors":"Aytül Bozkurt, E. Uçar, R. Akdeniz","doi":"10.1109/CICSyN.2010.85","DOIUrl":"https://doi.org/10.1109/CICSyN.2010.85","url":null,"abstract":"In integrated voice/data cellular mobile networks, the most important consideration is to utilize the resources in an efficient way and maintain the required quality of service (QoS). In this paper, we proposed a new call admission control scheme for improving efficiency of resource utilization. Proposed scheme restricts the new and handoff voice and data calls arrived to system by finding the optimal threshold number of new and handoff voice and data calls allowed in system according to admission criters such as maximum data response time, voice and data blocking and dropping probabilities. From the numerical analysis, we observed that required call-level QoS for both voice and data calls is provided and upper bound of data response time is guaranteed to data calls. Also taking the required minimum bandwith need of voice calls in different values, we evaluated the performance improvements of data calls.","PeriodicalId":358023,"journal":{"name":"2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115018972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multimode WSN: Improving Robustness, Fault Tolerance and Performance of Randomly Deployed Wireless Sensor Network 多模无线传感器网络:提高随机部署无线传感器网络的鲁棒性、容错性和性能
S. F. Pileggi, C. Palau, M. Esteve
{"title":"Multimode WSN: Improving Robustness, Fault Tolerance and Performance of Randomly Deployed Wireless Sensor Network","authors":"S. F. Pileggi, C. Palau, M. Esteve","doi":"10.1109/CICSyN.2010.12","DOIUrl":"https://doi.org/10.1109/CICSyN.2010.12","url":null,"abstract":"This paper proposes an advanced, robust and flexible solution that applies the (revised) concept of Always Best Connected (ABC) Network, typical of multimode modern mobile devices, to Wireless Sensor Network. Hostile environments and unpredictable conditions (e.g. interferences) can negatively affect communication range, potentially increasing the number of unconnected nodes in random deployments. Multimode Wireless Sensor Network (MM-WSN) is provided with an adaptive mechanism for environmental condition evaluation and with the ability of self-configuring itself for optimal networking independence of detected conditions. Proposed solution is based on advanced smart nodes provided with multiple resource in terms of computation, storage, communication and sensing that, with the support of proposed framework, allows complex mechanisms for fault detecting/tolerance and for the increasing of network robustness and performance. Several research issues are addressed by the paper.","PeriodicalId":358023,"journal":{"name":"2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122619822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Networked control systems with delay [Tutorial] 时延网络控制系统[教程]
V. Tsoulkas
{"title":"Networked control systems with delay [Tutorial]","authors":"V. Tsoulkas","doi":"10.1109/CICSYN.2010.78","DOIUrl":"https://doi.org/10.1109/CICSYN.2010.78","url":null,"abstract":"The issue of time-delay is of primary importance in different areas of modern control systems and instrumentation such as power systems, industrial process control including the steel and oil industry, machining and metallurgical processes, remotely operated robots and control over computer networks (or as it is also known Networked Control Systems) to name a few. A Networked Control System (NCS) is a feedback control system where the feedback loops are closed by means of an electronic network. It is well known that Networked (Control) Systems are not subject to the same design assumptions as non-networked systems, a fact that is mainly due to the inevitable presence of network delays and packet drops. In a typical closed-loop NCS, the state is sampled periodically, transmitted through the network, becomes available to the controller, which after computing the control action, transmits the sampled signal to the event-driven actuator after an uncertain or constant but unknown delay. The plant receives this command via a Zero Order Hold device (ZOH) after a delay τ, which models the sum total of the involved transmission delays. These network-induced delays appear in the information flow between the sensor and the controller (delay τsc (k)), as well as between the controller and the actuator (delay τca (k)), where k denotes the dependence on the kth sampling period.","PeriodicalId":358023,"journal":{"name":"2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121205373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of TFRC and UDP over Mobile-IP Network with Computing Flows 基于计算流的移动ip网络中TFRC和UDP性能分析
H. Al-Samarraie, Hussein Qasim, M. Abbas, T. Jameel, I. Umar, Mahmoud Nofal
{"title":"Performance Analysis of TFRC and UDP over Mobile-IP Network with Computing Flows","authors":"H. Al-Samarraie, Hussein Qasim, M. Abbas, T. Jameel, I. Umar, Mahmoud Nofal","doi":"10.1109/CICSyN.2010.53","DOIUrl":"https://doi.org/10.1109/CICSyN.2010.53","url":null,"abstract":"In wireless networking, mobility is one of the key features. Mobility allows users to move around with their device within the given area that is covered by wireless network. This research aimed to conduct a performance analysis of TFRC and UDP over mobile-IP network with competing flows that enables to investigate three major performance metrics such as jitter, throughput, packet loss and packet delay. Two different transport layer protocols will be used in this analysis. Since mobility has been the core issue of computing of 21st century, hence, this research aims to contribute in this phenomena by measuring the performance analysis in mobile IP network, where mobile devices (nodes) are moved from access points to access points (AP) in order to exemplify the suitability of TFRC and UDP in wireless networking, moreover to collect data about crucial performance metrics features. The experiment was conducted by Network Simulation (NS-2).","PeriodicalId":358023,"journal":{"name":"2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126631361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Artificial Neural Networks Based Algorithm for Identifying Engine Oil Parameters 基于人工神经网络的机油参数识别算法
H. Hashim, M. A. Haron, F. N. Osman, S. Junid, M. Idros, W. Nawang
{"title":"Artificial Neural Networks Based Algorithm for Identifying Engine Oil Parameters","authors":"H. Hashim, M. A. Haron, F. N. Osman, S. Junid, M. Idros, W. Nawang","doi":"10.1109/CICSyN.2010.83","DOIUrl":"https://doi.org/10.1109/CICSyN.2010.83","url":null,"abstract":"Engine oil is an essential type of lubricant normally used by internal combustion engines. The main job is to lubricate moving part of the engine. Engine oil is also performed to clean, inhibits corrosion and cools the engine by sinking the heat away from the main structure of the engine. However, the viscosity of the engine oil varies with respect to changes in mileage and the change of lubricant on schedule is always inaccurate. As a result, engine oil becomes out of condition for after a period of usage, resulting poor performance and increase cost and maintenance. Viscosity is a parameter to measure resistance of a fluid to flow. Through the theoretical and experimental method, this paper verifies the measurement of transmittance percentages of viscosity in terms of infrared wavelength with respect to several classes’ mileage distances. The most robust networks are also identified to be applied in this study. Finally, this information can be used in designing sensor to detect the degree of viscosity and development of the decay of lubricant evaluation index.","PeriodicalId":358023,"journal":{"name":"2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126665968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Learning Rule-Based Robotics Hand Optimal Force Closure 基于学习规则的机器人手部最优力闭合
E. Al-Gallaf
{"title":"A Learning Rule-Based Robotics Hand Optimal Force Closure","authors":"E. Al-Gallaf","doi":"10.1109/CICSyN.2010.57","DOIUrl":"https://doi.org/10.1109/CICSyN.2010.57","url":null,"abstract":"This article presents an intelligent fuzzy rule-based approach for computing optimal set of joints torques, for manipulating a grasped object by a dexterous multi-fingered robotics hand. The intelligent approached followed here, is to let a learning fuzzy system to approximate a nonlinear force formulation for optimal contact forces. This has been achieved via following two major steps: The first was to formulate the optimal fingertips force distribution as a quadratic force optimization problem, hence to generate a large set of data. The second step was to involve a learning fuzzy system (Neuro- Fuzzy System) to learn the nonlinear relations governing fingertips forces (ÂÎ12x1) to hand joint torques (ÂÎ12x1). Simulation results show that the proposed Neuro-Fuzzy network do achieve optimal grasping force in real time.","PeriodicalId":358023,"journal":{"name":"2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116573748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信