International Conference on Frontiers of Information Technology最新文献

筛选
英文 中文
Detection of multiuser TCM MC-CDMA with TORC over downlink Rayleigh fading channels 基于TORC的多用户TCM MC-CDMA下行瑞利衰落信道检测
International Conference on Frontiers of Information Technology Pub Date : 2009-12-16 DOI: 10.1145/1838002.1838006
Osama M. Hussain, I. Tasadduq
{"title":"Detection of multiuser TCM MC-CDMA with TORC over downlink Rayleigh fading channels","authors":"Osama M. Hussain, I. Tasadduq","doi":"10.1145/1838002.1838006","DOIUrl":"https://doi.org/10.1145/1838002.1838006","url":null,"abstract":"In this letter, a combination of 16-state 8-QAM trellis codes with multi-carrier code division multiple access (MC-CDMA) and threshold orthogonality restoring combining (TORC) is introduced over downlink Rayleigh fading channels. In literature, minimum mean square error (MMSE) when applied with MC-CDMA is considered to be the optimum single user detection (SUD) technique. We show that the proposed system, in both full and single user load, outperforms an equivalent system that uses MMSE at BER of 10-5 by almost 1.35 and 1.27 dB, respectively. Moreover, as number of active users increase, error performance of proposed system surpasses that with MMSE which suggests its superior robustness to multiple access interference (MAI).","PeriodicalId":434420,"journal":{"name":"International Conference on Frontiers of Information Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121776867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bayesian prior models for vehicle make and model recognition 基于贝叶斯先验模型的车型识别
International Conference on Frontiers of Information Technology Pub Date : 2009-12-16 DOI: 10.1145/1838002.1838041
M. Sarfraz, Ahmed Saeed, M. H. Khan, Z. Riaz
{"title":"Bayesian prior models for vehicle make and model recognition","authors":"M. Sarfraz, Ahmed Saeed, M. H. Khan, Z. Riaz","doi":"10.1145/1838002.1838041","DOIUrl":"https://doi.org/10.1145/1838002.1838041","url":null,"abstract":"Automatic vehicle type recognition (make and model) is very useful in secure access and traffic monitoring applications. It compliments the number plate recognition systems by providing a higher level of security against fraudulent use of number plates in traffic crimes. In this paper we present a simple but powerful probabilistic framework for vehicle type recognition that requires just a single representative car image in the database to recognize any incoming test image exhibiting strong appearance variations, as expected in outdoor image capture e.g. illumination, scale etc. We propose to use a new feature description, local energy based shape histogram 'LESH', in this problem that encodes the underlying shape and is invariant to illumination and other appearance variations such as scale, perspective distortions and color. Our method achieves high accuracy (above 94%) as compared to the state of the art previous approaches on a standard benchmark car dataset. It provides a posterior over possible vehicle type matches which is especially attractive and very useful in practical traffic monitoring and/or surveillance video search (for a specific vehicle type) applications.","PeriodicalId":434420,"journal":{"name":"International Conference on Frontiers of Information Technology","volume":"261 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127061917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
A comparative analysis of similarity measurement techniques through SimReq framework 基于SimReq框架的相似性度量技术比较分析
International Conference on Frontiers of Information Technology Pub Date : 2009-12-16 DOI: 10.1145/1838002.1838056
Muhammad Ilyas, J. Küng
{"title":"A comparative analysis of similarity measurement techniques through SimReq framework","authors":"Muhammad Ilyas, J. Küng","doi":"10.1145/1838002.1838056","DOIUrl":"https://doi.org/10.1145/1838002.1838056","url":null,"abstract":"The study of semantic similarity has long been an essential part of natural language processing. In informational retrieval, usage of similarity measurement is getting popularity day by day, but usage of similarity measurements in requirements engineering is not very common. Previously, we have presented SimReq, a Similarity Measurement Framework for requirements engineering. In this paper, we have used different similarity measurement techniques with SimReq framework, and perform a comparative analysis among those similarity measurement techniques. Results have shown that efficiency of Cosine similarity measurement is always better than rest of other similarity measurement techniques.","PeriodicalId":434420,"journal":{"name":"International Conference on Frontiers of Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129079653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Interactive training framework a new approach to eLearning 交互式培训框架:电子学习的新途径
International Conference on Frontiers of Information Technology Pub Date : 2009-12-16 DOI: 10.1145/1838002.1838093
Syed Muhammad Faraz, S. I. Behlim, S. Khan, S. A. Sattar
{"title":"Interactive training framework a new approach to eLearning","authors":"Syed Muhammad Faraz, S. I. Behlim, S. Khan, S. A. Sattar","doi":"10.1145/1838002.1838093","DOIUrl":"https://doi.org/10.1145/1838002.1838093","url":null,"abstract":"The advent of ICT (Information and Communication Technology) has brought a dramatic change in the distance learning paradigm. Along with formal education, eLearning has played its part in helping people expertise new tools and technologies. Software vendors have been increasing their sales over their competitors by providing its customers better opportunities to learn their software products. In this paper, we present a framework which is aimed at improving the efficiency and management of trainings. We also mention some loopholes of current training methods that do not allow the eLearning model to cope up with the new realities of information age. Thus, the objective of this research is to identify the requirements of trainers and trainee's followed by to identify and analyze the existing eLearning methods and finally to proposed the framework ITF to improve the eLearning system. Intended training types and their usage domains are also discussed. Finally, we present, by experiment, analysis and results, the effectiveness of our design in trainings accessibility.","PeriodicalId":434420,"journal":{"name":"International Conference on Frontiers of Information Technology","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123342211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient resource utilization of FPGAs 高效的fpga资源利用
International Conference on Frontiers of Information Technology Pub Date : 2009-12-16 DOI: 10.1145/1838002.1838031
Kashif Latif, A. Aziz, A. Mahboob
{"title":"Efficient resource utilization of FPGAs","authors":"Kashif Latif, A. Aziz, A. Mahboob","doi":"10.1145/1838002.1838031","DOIUrl":"https://doi.org/10.1145/1838002.1838031","url":null,"abstract":"With growing use of FPGAs it is becoming more and more crucial that how to effectively and efficiently utilize the internal resources of these devices. Normal coding techniques and synthesis tools implement every logic to a LUT based architecture. Which utilizes more area on the chip and some fast and dedicated area of the chip remain unutilized. Which in turn results in slow clock rates and bigger critical path lengths, hence the design remain inefficient in terms of both speed and area. In this paper we will present and discuss some techniques to effectively utilize the FPGA resources in order to speed up the clock rates and reduce the area utilization.","PeriodicalId":434420,"journal":{"name":"International Conference on Frontiers of Information Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115636504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Moving human detection and recognition in videos using adaptive method and support vector machine 基于自适应方法和支持向量机的视频运动人体检测与识别
International Conference on Frontiers of Information Technology Pub Date : 2009-12-16 DOI: 10.1145/1838002.1838043
S. Ali, M. F. Zafar, Moeen Tayyab
{"title":"Moving human detection and recognition in videos using adaptive method and support vector machine","authors":"S. Ali, M. F. Zafar, Moeen Tayyab","doi":"10.1145/1838002.1838043","DOIUrl":"https://doi.org/10.1145/1838002.1838043","url":null,"abstract":"This paper presents a robust adaptive moving human detection and recognition method in videos. The human detection method consists of modified moving average background model with supportive secondary model and an adaptive threshold selection model based on Gaussian distribution. The moving average background model is used for background modeling and the background subtraction system is used to provide foreground image through difference image between current image and background model. The adaptive threshold method is used to simultaneously update the system to environment changes. The modified human model consists of five parts with robust features to facilitate human recognition process. For recognition purpose Support Vector Machine has been used as classifier. Experimental results show the effectiveness of proposed system.","PeriodicalId":434420,"journal":{"name":"International Conference on Frontiers of Information Technology","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132542147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Comparative analysis of data mining techniques for financial data using parallel processing 使用并行处理的金融数据挖掘技术的比较分析
International Conference on Frontiers of Information Technology Pub Date : 2009-12-16 DOI: 10.1145/1838002.1838030
S. Qamar, Syed Hasan Adil
{"title":"Comparative analysis of data mining techniques for financial data using parallel processing","authors":"S. Qamar, Syed Hasan Adil","doi":"10.1145/1838002.1838030","DOIUrl":"https://doi.org/10.1145/1838002.1838030","url":null,"abstract":"The purpose of this research paper is to study the application of data mining techniques in risk analysis of financial credit related data. In the first part we will apply data mining techniques like Classification, Decision Trees, Clustering and Association Rule Mining to identify the risk associated with credit related data. The advantages, disadvantages and accuracy of each technique will be identified. In the second part we will scale and optimize the performance of these techniques using parallel computing based on multi-core CPU and GPU (GPGPU) using NVIDIA CUDA based computing framework for General-Purpose computation on GPU. The final outcome of this research is the results of the application of these algorithms and their performance statistics on CPU and GPU.","PeriodicalId":434420,"journal":{"name":"International Conference on Frontiers of Information Technology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126777529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Mobile agent watermarking (MAW): security properties and attacks revisited 移动代理水印(MAW):安全属性和攻击重访
International Conference on Frontiers of Information Technology Pub Date : 2009-12-16 DOI: 10.1145/1838002.1838038
Abid Khan, X. Niu, W. Anwar, Mansoor Ahmed, Ali Nawaz Khan
{"title":"Mobile agent watermarking (MAW): security properties and attacks revisited","authors":"Abid Khan, X. Niu, W. Anwar, Mansoor Ahmed, Ali Nawaz Khan","doi":"10.1145/1838002.1838038","DOIUrl":"https://doi.org/10.1145/1838002.1838038","url":null,"abstract":"Providing integrity of execution is considered as the most challenging problem in Mobile Agent System (MAs). Mobile agent watermarking (MAW) is a technique that attempts to provide integrity of execution to a mobile agent. We discuss the attacks against MAW technique and how the security properties for MAs data integrity are fulfilled. We try to model the behavior of a malicious host by launching a series of passive attacks against mobile agent and then see to what extent the security properties for mobile agent can be achieved. The experimental results suggest that MAW framework can be used to protect the computations results of mobile agents","PeriodicalId":434420,"journal":{"name":"International Conference on Frontiers of Information Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126490195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QoS-based MPLS multicast tree selection algorithms 基于qos的MPLS组播树选择算法
International Conference on Frontiers of Information Technology Pub Date : 2009-12-16 DOI: 10.1145/1838002.1838013
F. Farooq, S. Aslam, S. Sarwar
{"title":"QoS-based MPLS multicast tree selection algorithms","authors":"F. Farooq, S. Aslam, S. Sarwar","doi":"10.1145/1838002.1838013","DOIUrl":"https://doi.org/10.1145/1838002.1838013","url":null,"abstract":"Identifying a multicast label-switched-path (LSP) tree that satisfy a set of traffic-oriented and resource-oriented QoS constraints such as cost, reliability, bandwidth, jitter, and delay, has become an important research issue in the area of multicast routing in MPLS networks. In general, multi-constrained multicast tree-selection is an NP-complete problem. In this survey, QoS-based multicast tree-selection algorithms from the perspective of optimization techniques are evaluated. The existing algorithms are classified into three dimensions: non-MPLS-/MPLS-based, single/multiple QoS constrained, and heuristic-/unicast-/artificial-intelligence optimization techniques. In addition to state-of-the-art review of existing solutions, this article highlights important characteristics of QoS-based MPLS multicast algorithms and discuss important issues that are worthy of investigation in future research activities.","PeriodicalId":434420,"journal":{"name":"International Conference on Frontiers of Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116058523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
AWGN and Rayleigh channels response for turbo codes and iterative decoding turbo码和迭代译码的AWGN和Rayleigh信道响应
International Conference on Frontiers of Information Technology Pub Date : 2009-12-16 DOI: 10.1145/1838002.1838011
R. Badar, N. Z. Azeemi
{"title":"AWGN and Rayleigh channels response for turbo codes and iterative decoding","authors":"R. Badar, N. Z. Azeemi","doi":"10.1145/1838002.1838011","DOIUrl":"https://doi.org/10.1145/1838002.1838011","url":null,"abstract":"Designing a channel code is always a tradeoff between the complexity of encoder and decoder in conjunction with efficient energy and bandwidth goals. 'Turbo codes' code with mostly high-weight Code Words (hwCW), eventually make the task of the decoder easier. Through a parallel concatenation of two codes separated by an interleaver, turbo codes usually correct significant errors. In this paper, we provide an extended mathematical description for AWGN and Rayleigh channel response for turbo codes. The robustness of description is verified for a 3G communication system to show the effectiveness of iterative processing in extrinsic information. Performance comparison of the optimal decoding technique have been presented which shows that turbo codes have near Shannonian limit over AWGN channel but fading environment is still a challenging task for further improvement.","PeriodicalId":434420,"journal":{"name":"International Conference on Frontiers of Information Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117150828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信