2012 World Congress on Information and Communication Technologies最新文献

筛选
英文 中文
Optimization of OFDM systems resources using multi-objective Estimation Distribution Algorithms 基于多目标估计分布算法的OFDM系统资源优化
2012 World Congress on Information and Communication Technologies Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409166
R. Annauth, H. Rughooputh
{"title":"Optimization of OFDM systems resources using multi-objective Estimation Distribution Algorithms","authors":"R. Annauth, H. Rughooputh","doi":"10.1109/WICT.2012.6409166","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409166","url":null,"abstract":"OFDM has been recognized as a promising technique for providing high spectral efficiency in future wireless system. In this paper, a novel optimization technique, the Estimation Distribution Algorithm (EDA) is proposed for multi-objective optimization of OFDM systems resources. The performance and effectiveness of the optimizer are analyzed and compared with the state of art NSGA II and multi-objective particle swarm optimization algorithm.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130029731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A novel approach for malicious nodes detection in ad-hoc networks based on cellular learning automata 基于元胞学习自动机的自组织网络恶意节点检测新方法
2012 World Congress on Information and Communication Technologies Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409055
Amir Bagheri Aghababa, Amirhosein Fathinavid, Abdolreza Salari, Seyedeh Elaheh Haghayegh Zavareh
{"title":"A novel approach for malicious nodes detection in ad-hoc networks based on cellular learning automata","authors":"Amir Bagheri Aghababa, Amirhosein Fathinavid, Abdolreza Salari, Seyedeh Elaheh Haghayegh Zavareh","doi":"10.1109/WICT.2012.6409055","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409055","url":null,"abstract":"There are some fields in ad-hoc networks that are more highlighted these days, such as energy consumption, quality of service and security. Among these, security has been predominantly concerned in military, civil and educational applications. In security problem, suspect nodes detection or abnormal behavior nodes is one of the most important parts. We have addressed the malicious nodes detection problem in ad-hoc networks using special type of learning automata in an irregular network. We have used the irregular cellular learning automata to detect anomalies in two levels. We have also rigorously evaluated the performance of our approach by simulating it with MATLAB and Glomosim simulator and have compared our solution with a powerful similar learning automata-based protocol named LAID. The simulation results proofs that our approach is more promising.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130102251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Development of advanced contrast enhancement technique for mammographie images 乳房x线摄影影像先进对比增强技术的发展
2012 World Congress on Information and Communication Technologies Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409072
A. Das, M. Bhattacharya
{"title":"Development of advanced contrast enhancement technique for mammographie images","authors":"A. Das, M. Bhattacharya","doi":"10.1109/WICT.2012.6409072","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409072","url":null,"abstract":"In the present study, we have applied the process of image enhancement to mammographic images. This study has examined the problem of fuzziness/impreciseness of mammograms such as inhomogeneous background, low contrast, indistinct borders, small and ill-defined shapes, varying intensities of the suspicious regions and low distinguishability from their surroundings. Though fuzzy logic based contrast enhancement technique has good potential to handle the problem of impreciseness in mammograms, more generalized and flexible Vague Set theory is appropriate to capture the vagueness of mammograms.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131826384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
VLDD: Vindictive Link detection in Distance Vector Routine for ad hoc network 自组网中距离矢量例程的报复性链路检测
2012 World Congress on Information and Communication Technologies Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409200
K. Sreenivasulu, E. Prasad, A. Subramanyam
{"title":"VLDD: Vindictive Link detection in Distance Vector Routine for ad hoc network","authors":"K. Sreenivasulu, E. Prasad, A. Subramanyam","doi":"10.1109/WICT.2012.6409200","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409200","url":null,"abstract":"In this paper we present a novel Vindictive Link detection enabled Distance Vector Routing Protocol (VLDD) for mobile ad hoc networks, through which the cost of working out and consumption of resources is bounded. While most of the existing models go for Digital Signature the proposed protocol is based on adept symmetric key cryptography with proactive routing topology called DSDV. This proposed protocol offers an efficient hash chaining technique in which each node in the routing path stores only one arcanum where as the hash chained based protocols obliges high storage memory as it requires to preserve multiple numbers of Aracnums. The other hash chaining protocols like SEAD uses multiple user authentications where as VLDD uses only one authentication tag for giving acknowledgements, and for fault declarations. By the efficient use of hash chain elements the metric values and the sequence numbers on the path can be secured from logical tampering. In contrast with the proactive routing topology called SEAD that cited frequently in literature about secure ad hoc routing provides security that limited to lower bound of the evaluation metrics, VLDD can provide total protection. We evaluated scalability of VLDD by comparing with state-of-the-art algorithms and observed that it is scalable, adaptive over a wide range of divergent situations under different number of assessment measures. In particular, we show that it scales better on networks with dense in node count. In this regard simulation model developed inNS-2 environment.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133640953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rough sets and genetic algorithms: A hybrid approach to breast cancer classification 粗糙集和遗传算法:乳腺癌分类的混合方法
2012 World Congress on Information and Communication Technologies Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409085
Hanaa Ismail Elshazly, N. Ghali, Abir M. El Korany, A. Hassanien
{"title":"Rough sets and genetic algorithms: A hybrid approach to breast cancer classification","authors":"Hanaa Ismail Elshazly, N. Ghali, Abir M. El Korany, A. Hassanien","doi":"10.1109/WICT.2012.6409085","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409085","url":null,"abstract":"The use of computational intelligence systems such as rough sets, neural networks, fuzzy set, genetic algorithms, etc., for predictions and classification has been widely established. This paper presents a generic classification model based on a rough set approach and decision rules. To increase the efficiency of the classification process, boolean reasoning discretization algorithm is used to discretize the data sets. The approach is tested by a comparative study of three different classifiers (decision rules, naive bayes and k-nearest neighbor) over three distinct discretization techniques (equal bigning, entropy and boolean reasoning). The rough set reduction technique is applied to find all the reducts of the data which contains the minimal subset of attributes that are associated with a class label for prediction. In this paper we adopt the genetic algorithms approach to reach reducts. Finally, decision rules were used as a classifier to evaluate the performance of the predicted reducts and classes. To evaluate the performance of our approach, we present tests on breast cancer data set. The experimental results obtained, show that the overall classification accuracy offered by the employed rough set approach and decision rules is high compared with other classification techniques including Bayes and k-nearest neighbor.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133674390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
On modeling the multirate sensor array 多速率传感器阵列的建模
2012 World Congress on Information and Communication Technologies Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409150
P. Neenu, S. Kumari, R. Dhuli
{"title":"On modeling the multirate sensor array","authors":"P. Neenu, S. Kumari, R. Dhuli","doi":"10.1109/WICT.2012.6409150","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409150","url":null,"abstract":"In this paper we derive a model for a sensor. Such a model can form the basis of characterising the multirate sensor array in terms of a nonuniform filter bank structure. The capabilities and limitations of the model are also highlighted. Two approaches for obtaining the modeling error are presented. The model is extended for the case when the sensor sampling rate is a rational factor of the observation signal Nyquist rate. The additional error that results in this scenario is analysed.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131871302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comparison between analytic and numerical solution of linear Black-Scholes equation governing option pricing: Using BANKNIFTY 控制期权定价的Black-Scholes线性方程解析解与数值解的比较:基于BANKNIFTY
2012 World Congress on Information and Communication Technologies Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409117
M. S. Kumar, Satyajit Das, M. Reza
{"title":"A comparison between analytic and numerical solution of linear Black-Scholes equation governing option pricing: Using BANKNIFTY","authors":"M. S. Kumar, Satyajit Das, M. Reza","doi":"10.1109/WICT.2012.6409117","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409117","url":null,"abstract":"Black Scholes(B-S) model is one of the popular methods of calculating the option prices. It consists of the closed form solution of the linear Black Scholes equation. Researchers have also found the numerical solutions of the Black Scholes equation which is much more intuitive compared to its closed form solution. In this paper, we have compared the analytical solution with the numerical solution of linear Black-Scholes equation governing option pricing. Finite Difference methods (FDMs) are used to discretize B-S equation base on three different schemes namely, Explicit, Implicit and the Crank Nicholson scheme. We have also tried to found out whether this solution are validate to compute the price the options of the higher strike prices such as those of BANKNIFTY options. It is also showed that numerical solutions are independent of number of grids.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115508743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A cognitive based context-aware personalized medical assistance, A mobile application 一个基于认知的情境感知个性化医疗援助,一个移动应用程序
2012 World Congress on Information and Communication Technologies Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409153
K. Patii, B. P. Vijayakumar
{"title":"A cognitive based context-aware personalized medical assistance, A mobile application","authors":"K. Patii, B. P. Vijayakumar","doi":"10.1109/WICT.2012.6409153","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409153","url":null,"abstract":"Ubiquitous computing is shifting healthcare from treatment by professionals in hospitals to self-care, mobile care, home care and preventive care. In order to support the healthcare evolution. a global healthcare system, which links healthcare service providers to an individual's personal and physical spaces, is expected to provide personalized healthcare services at the right time, right place and right manner. Developing a personalized, user-centric system to provide a peaceful and a better quality life is one of today's challenging issue. This paper discusses on Cognition based context-aware personal medical assistance application. The idea of how we can use a smart phone to learn about the user's daily life pattern in a cognitive way and provide him assistance wherein a smartphone learns about user's daily life pattern in a cognitive way and provide him assistance based on contextual input. This research work describes design and development of mobile application based on cognitive algorithm. The project is designed, developed and being tested at Nokia N-900 device.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115684780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of a transaction recovery instance based on bi-directional ring election algorithm for crashed coordinator in distributed database systems 基于双向环选举算法的分布式数据库系统崩溃协调器事务恢复实例设计
2012 World Congress on Information and Communication Technologies Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409169
D. Ramesh, K. Kumar, B. Ramji
{"title":"Design of a transaction recovery instance based on bi-directional ring election algorithm for crashed coordinator in distributed database systems","authors":"D. Ramesh, K. Kumar, B. Ramji","doi":"10.1109/WICT.2012.6409169","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409169","url":null,"abstract":"In a distributed database environment, when the coordinator site (root node or process) is not working, the environment needs to choose or elect a new one in order to perform the transactional tasks. The elected coordinator takes the lead to perform the activities as well and continues the functioning. If the previous (crashed) site is recovered from the failures then again it leads the system by taking the responsibility. In this paper, a recovery instance based on bi-directional ring election algorithm for the crashed coordinator was brought up. The new algorithm for the recovered site quickly brings the state back by sending messages in parallel instances. This work shows that how the algorithm makes the recovered site faster and takes less time to make the system quickly to handle transactions normally.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116861914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Tumor demarcation by VQ based clustering and augmentation with KMCG and KFCG codebook generation algorithms 基于VQ的聚类和KMCG和KFCG码本生成算法增强的肿瘤划分
2012 World Congress on Information and Communication Technologies Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409219
H. B. Kekre, P. Shrinath
{"title":"Tumor demarcation by VQ based clustering and augmentation with KMCG and KFCG codebook generation algorithms","authors":"H. B. Kekre, P. Shrinath","doi":"10.1109/WICT.2012.6409219","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409219","url":null,"abstract":"Ultrasound (US) imaging is important modality to examine the clinical problems and also used as complimentary to the mammogram images to understand nature and shape of the breast tumor. Accurate and efficient segmentation method helps radiologists to understand and observe the volume of a tumor (growth or shrinkage). Inherent artifact present in US images, such as speckle, attenuation and shadows are major hurdles in achieving proper segmentation. Along with the accuracy, computational efficiency is also major concern in the segmentation process. Here, in this paper, VQ based clustering technique is proposed for US image segmentation with KMCG and KFCG as codebook generation algorithms. A novel technique of sequential cluster clubbing is used on clusters obtained from codebook generation algorithms and appropriate cluster has been selected as segmentation result. Besides original KMCG and KFCG, augmented KMCG and KFCG are also proposed for clustering with different block sizes. The results of all proposed methods are compared with each other and best result is selected based on two criteria's, one is computational efficiency and other is accuracy. Finally, best results amongst our methods are compared with results of original watershed and improved watershed transforms.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122108984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信