2011 Second Asian Himalayas International Conference on Internet (AH-ICI)最新文献

筛选
英文 中文
Design and implementation of sustainable educational network using knowledge management in Nepal 尼泊尔利用知识管理设计和实施可持续教育网络
2011 Second Asian Himalayas International Conference on Internet (AH-ICI) Pub Date : 2011-12-29 DOI: 10.1109/AHICI.2011.6113944
Kumar Pudashine, Vishnu Kumar Rana
{"title":"Design and implementation of sustainable educational network using knowledge management in Nepal","authors":"Kumar Pudashine, Vishnu Kumar Rana","doi":"10.1109/AHICI.2011.6113944","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113944","url":null,"abstract":"Educational network interconnects various academic and research institutions. It provides a platform for knowledge sharing between different institutions. It can be implemented via National Regional Educational Network. For the sustainability of any educational network, active stakeholders play a vital role. These stakeholders could be considered as the major contributors of a knowledge base. The main aim of this research paper is to provide a model of various knowledge base through the inclusion of active stakeholders for the sustainability of educational network in Nepal. The implementation of knowledge base is done through the three models. The first model provides implementation in an academic institution. The second approach provides implementation in NREN. The third model referred as hybrid provides implementation of Knowledge base in both academic institutions and NREN. It is expected that this research will enhance the performance of existing NREN. Finally this research will help to minimize the digital divide of Nepal.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128966518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Provisioning secure on-demand routing protocol in mobile ad hoc network 在移动自组网中提供安全的按需路由协议
2011 Second Asian Himalayas International Conference on Internet (AH-ICI) Pub Date : 2011-12-29 DOI: 10.1109/AHICI.2011.6113952
B. Vaidya, D. Makrakis, H. Mouftah
{"title":"Provisioning secure on-demand routing protocol in mobile ad hoc network","authors":"B. Vaidya, D. Makrakis, H. Mouftah","doi":"10.1109/AHICI.2011.6113952","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113952","url":null,"abstract":"Mobile ad-hoc network (MANET) has been a leading technology for ubiquitous networking since a decade, in which an ad-hoc routing is one of its fundamental components. Due to a number of inevitable challenges in MANETs, especially a problem of secure routing is long-standing, many researchers have extensively studied and developed various techniques to secure on-demand routing protocols in MANETs. However, many open issues remain in secure on-demand routing for MANETs. In this paper, we propose a lightweight and efficient security mechanism for on-demand source routing protocol including DSR in MANETs. The proposed scheme provides key generation by using a self-certified public keying technique as well as ensures secure route discovery by employing Schnorr digital signature and multi-signatures scheme. We provide security analysis of the proposed scheme. It can be seen that the proposed approach is more secure than the existing schemes. We also evaluated the proposed approach using computer simulation and compared its performance to that of SRP. The results show that the proposed mechanism is better than SRP.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129650441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
RFID management for tracking and inventory RFID管理跟踪和库存
2011 Second Asian Himalayas International Conference on Internet (AH-ICI) Pub Date : 2011-12-29 DOI: 10.1109/AHICI.2011.6113935
Ankush Agarwal, Geethu Babu, L. Rishi, K. Shruthi, Vinu Agarwal
{"title":"RFID management for tracking and inventory","authors":"Ankush Agarwal, Geethu Babu, L. Rishi, K. Shruthi, Vinu Agarwal","doi":"10.1109/AHICI.2011.6113935","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113935","url":null,"abstract":"RFID (Radio Frequency Identification Technology) is a field of computerizing recognition process that is progressively gaining thrust in recent years and is now being seen as a means of enhancing data handling procedures, complimentary in many ways to other data capture technologies such as bar coding. A variety of devices and associated systems have been developed to satisfy a broad series of applications. Regardless of the diversity of applications, the ideologies upon which they are based are quite understated, even though the technology and technicalities associated with their function can be quite innovative.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126963238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A single spatial 2D phase filter for channel demultiplexing in mode diversity multiplexing 一种用于模式分集复用中信道解复用的单空间二维相位滤波器
2011 Second Asian Himalayas International Conference on Internet (AH-ICI) Pub Date : 2011-12-29 DOI: 10.1109/AHICI.2011.6113933
G. Stepniak
{"title":"A single spatial 2D phase filter for channel demultiplexing in mode diversity multiplexing","authors":"G. Stepniak","doi":"10.1109/AHICI.2011.6113933","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113933","url":null,"abstract":"A single spatial phase filter that discriminates multiple channels at the output of mode division multiplexing system is shown. Excellently low crosstalk performance is reported for 4 × 4 and 8 × 8 systems.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121557067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimal and suboptimal relay selection and power allocation in multi-relay cooperative network 多中继合作网络中中继的最优与次优选择与功率分配
2011 Second Asian Himalayas International Conference on Internet (AH-ICI) Pub Date : 2011-12-29 DOI: 10.1109/AHICI.2011.6113937
Umesh Phuyal, S. C. Jha, V. Bhargava
{"title":"Optimal and suboptimal relay selection and power allocation in multi-relay cooperative network","authors":"Umesh Phuyal, S. C. Jha, V. Bhargava","doi":"10.1109/AHICI.2011.6113937","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113937","url":null,"abstract":"We study a cooperative communication scenario where multiple amplify-and-forward relays cooperate to transmit data from a source to destination. We discuss an optimal power allocation method to assign transmit powers to the source and relays in order to maximize achievable data rate of the system.We also propose less-complex suboptimal power allocation methods using various relay selection strategies. We provide simulation results to demonstrate performance of the optimal power allocation and suboptimal relay selection and power allocation schemes. We show that these suboptimal schemes perform close to optimal scheme and are more reasonable for practical implementation.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121990166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An advanced segmentation using bit-plane slicing technique in extraction of lungs region 一种基于位平面切片技术的肺区域提取的高级分割方法
2011 Second Asian Himalayas International Conference on Internet (AH-ICI) Pub Date : 2011-12-29 DOI: 10.1109/AHICI.2011.6113949
T. Kiran, G. Kwon
{"title":"An advanced segmentation using bit-plane slicing technique in extraction of lungs region","authors":"T. Kiran, G. Kwon","doi":"10.1109/AHICI.2011.6113949","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113949","url":null,"abstract":"This paper presents the new method for the segmentation of pulmonary parenchyma. The proposed method is based on the bit-plane slicing technique. The original image is binarized using the bit-plane technique and among the different images the best binarized image is chosen. After the image is binarized, the labeling is done and the area of each label is calculated from which we obtained the next level of binarized image. Then the boundary tracing algorithm is applied to get the binarized image. The following steps show the automatic extraction of lungs area and experimental results has proved it's significant.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127993898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The ideal search 理想搜索
2011 Second Asian Himalayas International Conference on Internet (AH-ICI) Pub Date : 2011-12-29 DOI: 10.1109/AHICI.2011.6113943
Thapa Parmeshwor
{"title":"The ideal search","authors":"Thapa Parmeshwor","doi":"10.1109/AHICI.2011.6113943","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113943","url":null,"abstract":"There are various types of search techniques developed so far for searching the numbers, searching strings and others. Searching in large database containing huge collection of data is done (in most of the cases) using numerical indexes. Though there are many efficient search methods available still they are not ideal. The ideal search is the one that performs search in constant time, i.e. O(1). Till now this case is considered impossible but still we can achieve a performance very close to it using hash table. But this “The Ideal Search” can search any integer number among billions of numbers at constant O(1) time.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126818981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real - time download prediction based on the k - nearest neighbor method 基于k近邻法的实时下载预测
2011 Second Asian Himalayas International Conference on Internet (AH-ICI) Pub Date : 2011-12-29 DOI: 10.1109/AHICI.2011.6113929
Akshata Patil, Sanchita Jha
{"title":"Real - time download prediction based on the k - nearest neighbor method","authors":"Akshata Patil, Sanchita Jha","doi":"10.1109/AHICI.2011.6113929","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113929","url":null,"abstract":"The amount of download prediction or forecast is a statement about the way things will happen in the future, often but not always based on experience or knowledge. While there is much overlap between prediction and forecast, a prediction may be a statement that some outcome is expected, while a forecast may cover a range of possible outcomes. Although guaranteed information about the information is in many cases impossible, prediction is necessary to allow plans to be made about possible developments; Howard H. Stevenson writes that prediction in business “… is at least two things: Important and hard”. In this paper a method is proposed to predict the amount of download in real-time using the k - Nearest neighbor algorithm., the k-nearest neighbor algorithm (k-NN) is a method for classifying objects based on closest training examples in the feature space. k-NN is a type of instance-based learning, or lazy learning where the function is only approximated locally and all computation is deferred until classification.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134451410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Solar power of mobile transmitter/receiver tower antennas in remote areas 偏远地区移动发射/接收塔天线的太阳能
2011 Second Asian Himalayas International Conference on Internet (AH-ICI) Pub Date : 2011-12-29 DOI: 10.1109/AHICI.2011.6113939
Tapas K. Das, Alokekumar Das, Avranil Das
{"title":"Solar power of mobile transmitter/receiver tower antennas in remote areas","authors":"Tapas K. Das, Alokekumar Das, Avranil Das","doi":"10.1109/AHICI.2011.6113939","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113939","url":null,"abstract":"The low cost solar power requiring for mobile transmitter/receiver tower antennas in remote areas with low traffic density and other uses in village sites, is developed. The power provides coverage to large areas having the mega cells presenting radii in the range of 100–500 km. The solar cell assembly parameters considering the top glass plate, thickness of the EVA film, back cover material, and the processing control parameters of the laminated equipment considering the temperature and duration of curing of the EVA film, vacuum pressure, are taken to obtain maximum power output in the flat panel Photovoltaic (PV) module. The line-focused solar-cell concentrator was used to reduce the cost of the PV module as concentrating the light is significantly less expensive than the cost of flat-pate module. The decrease of output power was measured by increasing the temperature of the solar cell strings. Air-cooled heat sink was used to cool the cells and the temperature variation was obtained by changing fin area and wind speed. The optimum condition related to the assembly and processing parameters of the solar cell module to obtain maximum power is shown.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133915709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SYN flood attack prevention using main-memory database management system 防范SYN flood攻击的主存数据库管理系统
2011 Second Asian Himalayas International Conference on Internet (AH-ICI) Pub Date : 2011-12-29 DOI: 10.1109/AHICI.2011.6113945
S. Bhirud, V. Katkar
{"title":"SYN flood attack prevention using main-memory database management system","authors":"S. Bhirud, V. Katkar","doi":"10.1109/AHICI.2011.6113945","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113945","url":null,"abstract":"With increase in densities of semiconductor chips and decrease in cost, it is feasible to store huge amount of data in main memory. Main Memory Database Management System (MMDBMS) uses main memory as primary storage for huge amount of data and provides very high speed access to it. This makes MMDBMS suitable option for implementation of real-time network security systems. This paper presents light-weight mechanism for detection and prevention of SYN flood attack using MMDBMS. Experimental results are provided to support proposed mechanism.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132810344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信