2010 5th International Conference on Future Information Technology最新文献

筛选
英文 中文
Wavelets Based Facial Expression Recognition Using a Bank of Neural Networks 基于小波的神经网络面部表情识别
2010 5th International Conference on Future Information Technology Pub Date : 2010-05-21 DOI: 10.1109/FUTURETECH.2010.5482717
S. B. Kazmi, Qurat-ul Ain, M. Jaffar
{"title":"Wavelets Based Facial Expression Recognition Using a Bank of Neural Networks","authors":"S. B. Kazmi, Qurat-ul Ain, M. Jaffar","doi":"10.1109/FUTURETECH.2010.5482717","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482717","url":null,"abstract":"NA","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125362599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
A Flexible Electrode Driver Using 65 nm CMOS Process for 1024-Electrode Epi-Retinal Prosthesis 采用65纳米CMOS工艺的柔性电极驱动器用于1024电极视网膜假体
2010 5th International Conference on Future Information Technology Pub Date : 2010-05-21 DOI: 10.1109/FUTURETECH.2010.5482677
N. Tran, J. Yang, S. Bai, E. Skafidas, I. Mareels, D. Ng, M. Halpern
{"title":"A Flexible Electrode Driver Using 65 nm CMOS Process for 1024-Electrode Epi-Retinal Prosthesis","authors":"N. Tran, J. Yang, S. Bai, E. Skafidas, I. Mareels, D. Ng, M. Halpern","doi":"10.1109/FUTURETECH.2010.5482677","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482677","url":null,"abstract":"NA","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121282681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Staggered-TCP for Parallel Split-Sessions across Multiple Proxies in Heterogeneous Networks 异构网络中跨多个代理并行分裂会话的交错tcp
2010 5th International Conference on Future Information Technology Pub Date : 2010-05-21 DOI: 10.1109/FUTURETECH.2010.5482728
S. Zafar, Sana Jabbar, A. Akbar, N. M. Sheikh
{"title":"Staggered-TCP for Parallel Split-Sessions across Multiple Proxies in Heterogeneous Networks","authors":"S. Zafar, Sana Jabbar, A. Akbar, N. M. Sheikh","doi":"10.1109/FUTURETECH.2010.5482728","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482728","url":null,"abstract":"Wired-cum-wireless networks are interconnected through proxy or gateway that acts as router and also caters for link MTU mismatch between the two networks. In IPv6 based networks, TCP is mandatory for bulk data transfer from wired to wireless host. This results in end-to-end TCP session through the default proxy. The single proxy supporting a large number of TCP sessions; is vulnerable to buffer overflow which results in end-to-end retransmissions, that degrades TCP performance. The use of split-TCP sessions across proxy has been proposed in order to improve TCP performance in heterogeneous networks by researchers. We assert that the availability of multiple proxies for interconnectivity (that is usually the case) can be exploited in order to make TCP efficient. We propose Staggered-TCP; an architecture that manages parallel split-TCP sessions across multiple proxies. Through simulations we show that for bulk data transfer, our proposed solution optimizes communication, simultaneously providing load balancing services.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115353527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Restoration Using Modified Hopfield Fuzzy Regularization Method 基于改进Hopfield模糊正则化方法的图像恢复
2010 5th International Conference on Future Information Technology Pub Date : 2010-05-21 DOI: 10.1109/FUTURETECH.2010.5482736
M. Bilal, M. Sharif, M. Jaffar, Ayyaz Hussain, A. M. Mirza
{"title":"Image Restoration Using Modified Hopfield Fuzzy Regularization Method","authors":"M. Bilal, M. Sharif, M. Jaffar, Ayyaz Hussain, A. M. Mirza","doi":"10.1109/FUTURETECH.2010.5482736","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482736","url":null,"abstract":"This paper addresses one of the primary problems of visual information processing known as image restoration. Image restoration is a challenging task because of its ill-posed inverse nature. A modified Hopfield neural network with fuzzy adaptive regularization is proposed that shows potential to minimize constraint mean square error in order to guarantee the optimized results. Adaptive regularization was achieved by using fuzzy quasi-range edge detector. The visual results along with the statistical measurements of the resultant images are presented in the paper. Improved SNRs show that the fuzzy regularization method is superior to other statistical and neural network methods when used along with the modified Hopfield neural network.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126804649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Analysis of SRAM Reliability under Combined Effect of NBTI, Process and Temperature Variations in Nano-Scale CMOS 纳米级CMOS中NBTI、工艺和温度变化联合作用下SRAM可靠性分析
2010 5th International Conference on Future Information Technology Pub Date : 2010-05-21 DOI: 10.1109/FUTURETECH.2010.5482682
Harwinder Singh, H. Mahmoodi
{"title":"Analysis of SRAM Reliability under Combined Effect of NBTI, Process and Temperature Variations in Nano-Scale CMOS","authors":"Harwinder Singh, H. Mahmoodi","doi":"10.1109/FUTURETECH.2010.5482682","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482682","url":null,"abstract":"As dimensions of MOS devices have been scaled down, new reliability problems are coming into effect. One of these emerging reliability issues is aging effects which result in device performance degradation over time. NBTI (Negative biased temperature instability) is a well known aging phenomenon which is a limiting factor for future scaling of devices. NBTI results in the generation of trapped charges which cause Vt (threshold voltage) degradation of PMOS. It is observed that a sharp Vt shift occurs in just a few seconds after turning on the MOSFET. In nano-scale CMOS technologies, process (threshold voltage) and temperature variations are also crucial reliability concerns. On the other hand, NBTI itself is dependent on temperature and threshold voltage. In this paper, the combined effect of NBTI, process and temperature variations on the reliability of the 6T SRAM (Static Random Access Memory) in 32nm CMOS technology is analyzed. It is observed that: (1) Vt abruptly increases initially and afterwards Vt shift is very small, even for prolonged time; (2) Low Vt transistors age faster than high Vt transistors; and (3) NBTI Vt degradation is more significant at higher temperature. Along with these observations, we also quantified our results in terms of number of faulty cells in SRAM array. It is observed that: (1) number of faulty cells rises over time (8.2% rise in faulty cells for the inter-die nominal Vt chip over 2 years) due to SNM degradation; (2) rise in the number of faulty cells over time due to write failures under NBTI effect is practically negligible; (3) Leakage (in the worst case condition) and access time are not impacted by NBTI.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126875773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Utility of Gestural Cues in Indexing Semantic Miscommunication 手势线索在语义误解索引中的应用
2010 5th International Conference on Future Information Technology Pub Date : 2010-05-21 DOI: 10.1109/FUTURETECH.2010.5482653
Masashi Inoue, M. Ogihara, Ryoko Hanada, N. Furuyama
{"title":"Utility of Gestural Cues in Indexing Semantic Miscommunication","authors":"Masashi Inoue, M. Ogihara, Ryoko Hanada, N. Furuyama","doi":"10.1109/FUTURETECH.2010.5482653","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482653","url":null,"abstract":"In multimedia data analysis, automated indexing of conversational video is an emerging topic. One challenging problem in this topic is the recognition of higher-level concepts, such as emph{miscommunications} in conversations. While detecting these miscommunications is generally easy for the speakers as well as for observers, it is not currently understood which cues contribute to their detection and to what extent. We investigate the possibility of indexing the occurrence of miscommunications in psychotherapeutic face-to-face conversations from gestural patterns. The applicability of machine learning is investigated as a means of detecting miscommunication from gestural patterns observed in the conversations. Both simple and complex classifiers are constructed using different features taken from the gesture data. Both short-term and long-term effects are tested using different time window sizes. Also, two types of gestures, communicative and non-communicative, are considered. The experimental results suggest that there emph{does not exist a single gestural feature} that can explain the occurrence of semantic miscommunication. Another interesting finding is that gestural cues correlate more with long-term gestural patterns than short-term ones.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125871919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Trustable Software with a Dynamic Loop Control Mechanism 一种具有动态回路控制机制的可信赖软件
2010 5th International Conference on Future Information Technology Pub Date : 2010-05-21 DOI: 10.1504/IJITCC.2012.045805
Nalinrat Srirajun, P. Bhattarakosol, P. Tantasanawong, Sunyoung Han
{"title":"A Trustable Software with a Dynamic Loop Control Mechanism","authors":"Nalinrat Srirajun, P. Bhattarakosol, P. Tantasanawong, Sunyoung Han","doi":"10.1504/IJITCC.2012.045805","DOIUrl":"https://doi.org/10.1504/IJITCC.2012.045805","url":null,"abstract":"NA","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126446905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Virtualization, Is It Worth It? A Technical, Financial and Economic Approach 虚拟化,值得吗?技术、财政和经济方法
2010 5th International Conference on Future Information Technology Pub Date : 2010-05-21 DOI: 10.1109/FUTURETECH.2010.5482713
Errol A. Blake, Victor A. Clincy
{"title":"Virtualization, Is It Worth It? A Technical, Financial and Economic Approach","authors":"Errol A. Blake, Victor A. Clincy","doi":"10.1109/FUTURETECH.2010.5482713","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482713","url":null,"abstract":"As Information Security Professionals we are often thought of as the individuals who implement the necessary technologies to protect the organization. Sometime as InfoSec professionals we are too paranoid about security that we tend to bend over backwards to protect information at ANY cost. Cost is a delineating factor in the protecting the confidentially, integrity and availability of information. Therefore, why not implement technologies that would are in alignment with business strategies, meet compliance and is capable of decreasing the company total cost of ownership? This paper will conduct a thorough research on the advantages and disadvantages of developing a virtual IT infrastructure.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"82 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113970045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Distributed Space-Time Code for Amplify-and-Forward Cooperative Networks 扩和转发合作网络的分布式空时码
2010 5th International Conference on Future Information Technology Pub Date : 2010-05-21 DOI: 10.1109/FUTURETECH.2010.5482702
A. Al-nahari, F. A. Abd El-Samie, M. Dessouky
{"title":"Distributed Space-Time Code for Amplify-and-Forward Cooperative Networks","authors":"A. Al-nahari, F. A. Abd El-Samie, M. Dessouky","doi":"10.1109/FUTURETECH.2010.5482702","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482702","url":null,"abstract":"Cooperative diversity using distributed space-time codes has been recently proposed to form virtual antennas in order to achieve diversity gain. In this paper, we propose a distributed space-time coding with amplify-and-forward relaying. Motivated by protocol (III) presented in [1], we propose a distributed space-time code for an arbitrary number of relay nodes. The pairwise error probability is derived and the theory analysis demonstrates that our protocol achieves a diversity of order where is the number of relay nodes. Quasi-orthogonal space-time codes are used as they give much better performance than random linear-dispersion codes. As the transmission power of the source node is a critical parameter in this protocol because it transmits in both phases, the optimal power allocation is derived using numerical and theoretical analysis. Simulation results demonstrate an improvement over the existing orthogonal protocols for different source-destination channel conditions.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132757289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Decentralized Fault Detection and Management for Wireless Sensor Networks 无线传感器网络的分散故障检测与管理
2010 5th International Conference on Future Information Technology Pub Date : 2010-05-21 DOI: 10.1109/FUTURETECH.2010.5482679
K. Man, Chen Chen, D. Hughes
{"title":"Decentralized Fault Detection and Management for Wireless Sensor Networks","authors":"K. Man, Chen Chen, D. Hughes","doi":"10.1109/FUTURETECH.2010.5482679","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482679","url":null,"abstract":"NA Abstract- Wireless Sensor Networks are increasingly being deployed in long-lived, challenging application scenarios which demand a high level of availability and reliability. To achieve these characteristics in inherently unreliable and resource constrained sensor network environments, fault tolerance is required. This paper presents a generic and efficient fault tolerance algorithm for Wireless Sensor Networks. In contrast to existing approaches, the algorithm presented in this paper is entirely decentralized and can thus be used to support fully autonomic fault tolerance in sensor network environments.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129851463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信