首页 > 最新文献

2011 Frontiers of Information Technology最新文献

英文 中文
A Delay-Scheduler Coupled Game Theoretic Resource Allocation Scheme for LTE Networks LTE网络延迟调度耦合博弈论资源分配方案
Pub Date : 2011-12-19 DOI: 10.1109/FIT.2011.11
Salman Ali, M. Zeeshan
LTE standard defines classes with granular requirements in order to provide QoS with fast connectivity and high data rates. The basic Release-8 of LTE and the subsequent modifications do not specify any scheduling algorithm making the task of improving user satisfaction more difficult. In our work, we proposed a two-level scheduler with game theoretic application that distributes resources among classes with fairness and then implements a delay based scheduler to satisfy the strict levels of delay budget requirements of LTE classes. A coalition is formed between different class flows by use of bargaining cooperative game that allows for distribution of physical resource blocks in a fair manner via Shapely function. The delay based scheduler checks and compares users packet delay in a service class to make scheduling decisions in the downlink utilizing recent user reported channel conditions. Simulation results carried out with key performance matrices like packet loss ratio, throughput, fairness index and system delay prove the effectiveness of the proposed approach as compared to Exponential Rule, Proportional Fair and M-LWDF algorithms and its usefulness for supporting both real time and non-real time traffic is verified.
LTE标准定义了具有粒度要求的类,以便提供具有快速连接和高数据速率的QoS。LTE的基本Release-8和随后的修改没有指定任何调度算法,这使得提高用户满意度的任务更加困难。在我们的工作中,我们提出了一种基于博弈论的两级调度器,该调度器公平地在类之间分配资源,然后实现基于延迟的调度器,以满足LTE类严格的延迟预算要求。利用议价合作博弈,通过shape函数公平分配物理资源块,形成不同阶层流之间的联盟。基于延迟的调度器检查并比较服务类中的用户数据包延迟,以便利用最近用户报告的信道条件在下行链路中做出调度决策。用丢包率、吞吐量、公平指数和系统延迟等关键性能矩阵进行的仿真结果证明,与指数规则、比例公平和M-LWDF算法相比,所提出的方法是有效的,并且验证了它在支持实时和非实时流量方面的有效性。
{"title":"A Delay-Scheduler Coupled Game Theoretic Resource Allocation Scheme for LTE Networks","authors":"Salman Ali, M. Zeeshan","doi":"10.1109/FIT.2011.11","DOIUrl":"https://doi.org/10.1109/FIT.2011.11","url":null,"abstract":"LTE standard defines classes with granular requirements in order to provide QoS with fast connectivity and high data rates. The basic Release-8 of LTE and the subsequent modifications do not specify any scheduling algorithm making the task of improving user satisfaction more difficult. In our work, we proposed a two-level scheduler with game theoretic application that distributes resources among classes with fairness and then implements a delay based scheduler to satisfy the strict levels of delay budget requirements of LTE classes. A coalition is formed between different class flows by use of bargaining cooperative game that allows for distribution of physical resource blocks in a fair manner via Shapely function. The delay based scheduler checks and compares users packet delay in a service class to make scheduling decisions in the downlink utilizing recent user reported channel conditions. Simulation results carried out with key performance matrices like packet loss ratio, throughput, fairness index and system delay prove the effectiveness of the proposed approach as compared to Exponential Rule, Proportional Fair and M-LWDF algorithms and its usefulness for supporting both real time and non-real time traffic is verified.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116171121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Lossless Data Hiding Using Optimized Interpolation Error Expansion 使用优化的插值误差扩展的无损数据隐藏
Pub Date : 2011-12-19 DOI: 10.1109/FIT.2011.59
T. Naheed, I. Usman, A. Dar
Reversible data hiding technique enables the exact recovery of original contents upon extraction of embedding data. Many conventional watermarking algorithms that have been proposed so far, suffer from the problem of low embedding capacity. In many applications huge amount of data is required to embed and exact recovery of host image is also needed. Luo's additive interpolation-error expansion technique [1] is a high capacity reversible method for data embedding without zero loss of host information. In this paper, we focus on improving payload and imperceptibility, and we propose an algorithm which is an extension of interpolation-error scheme using Particle Swarm Optimization (PSO) which better exploits estimation of missing pixel. The experimental results demonstrate that due to slight modification in interpolation-error technique, we achieve large hiding capacity and improved image quality compared with other schemes.
可逆数据隐藏技术可以在提取嵌入数据后准确恢复原始内容。目前提出的许多传统的水印算法都存在嵌入容量低的问题。在许多应用中,嵌入需要大量的数据,并且需要精确地恢复主机图像。Luo的加性插值-误差展开技术[1]是一种不丢失主机信息的高容量可逆数据嵌入方法。在本文中,我们着重于提高有效载荷和不可感知性,并提出了一种基于粒子群优化(PSO)的插值-误差算法的扩展算法,该算法更好地利用了缺失像素的估计。实验结果表明,与其他方案相比,由于对插值误差技术稍加修改,我们实现了更大的隐藏容量和更高的图像质量。
{"title":"Lossless Data Hiding Using Optimized Interpolation Error Expansion","authors":"T. Naheed, I. Usman, A. Dar","doi":"10.1109/FIT.2011.59","DOIUrl":"https://doi.org/10.1109/FIT.2011.59","url":null,"abstract":"Reversible data hiding technique enables the exact recovery of original contents upon extraction of embedding data. Many conventional watermarking algorithms that have been proposed so far, suffer from the problem of low embedding capacity. In many applications huge amount of data is required to embed and exact recovery of host image is also needed. Luo's additive interpolation-error expansion technique [1] is a high capacity reversible method for data embedding without zero loss of host information. In this paper, we focus on improving payload and imperceptibility, and we propose an algorithm which is an extension of interpolation-error scheme using Particle Swarm Optimization (PSO) which better exploits estimation of missing pixel. The experimental results demonstrate that due to slight modification in interpolation-error technique, we achieve large hiding capacity and improved image quality compared with other schemes.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125911872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Real-Time Control of an Inverted Pendulum: A Comparative Study 倒立摆实时控制的比较研究
Pub Date : 2011-12-19 DOI: 10.1109/FIT.2011.41
M. Hamza, Zaka-ur-Rehman, Qamar Zahid, F. Tahir, Zulfiqar Khalid
In this paper, we consider the problem of real-time control of an Inverted Pendulum. We design and implement four different control algorithms, namely PID, Pole placement, LQR and Fuzzy Logic. These controllers are applied to the Inverted Pendulum in real-time and their performance is compared on the basis of Pendulum regulation, disturbance rejection and control energy specifications. We also provide a performance comparison based on the ISE index.
本文研究了倒立摆的实时控制问题。我们设计并实现了四种不同的控制算法,即PID、极点放置、LQR和模糊逻辑。将这些控制器实时应用于倒立摆,并从倒立摆调节、抗扰和控制能量指标等方面对其性能进行了比较。我们还提供了基于ISE指数的性能比较。
{"title":"Real-Time Control of an Inverted Pendulum: A Comparative Study","authors":"M. Hamza, Zaka-ur-Rehman, Qamar Zahid, F. Tahir, Zulfiqar Khalid","doi":"10.1109/FIT.2011.41","DOIUrl":"https://doi.org/10.1109/FIT.2011.41","url":null,"abstract":"In this paper, we consider the problem of real-time control of an Inverted Pendulum. We design and implement four different control algorithms, namely PID, Pole placement, LQR and Fuzzy Logic. These controllers are applied to the Inverted Pendulum in real-time and their performance is compared on the basis of Pendulum regulation, disturbance rejection and control energy specifications. We also provide a performance comparison based on the ISE index.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131690674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Improving Generation in Machine Translation by Separating Syntactic and Morphological Processes 通过句法和形态分离改进机器翻译生成
Pub Date : 2011-12-19 DOI: 10.1109/FIT.2011.43
N. Karamat, M. K. Malik, S. Hussain
This paper presents a generation approach in a Lexical Functional Grammar (LFG) based machine translation system that subdivides the generation process and uses rule based modules to solve the problem. The results show improvement in performance versus earlier work which generates the translation into Urdu using a single integrated process.
本文提出了一种基于词法功能语法(LFG)的机器翻译系统的生成方法,该方法细分了生成过程,并使用基于规则的模块来解决生成问题。结果表明,与使用单一集成过程生成乌尔都语的早期工作相比,性能有所提高。
{"title":"Improving Generation in Machine Translation by Separating Syntactic and Morphological Processes","authors":"N. Karamat, M. K. Malik, S. Hussain","doi":"10.1109/FIT.2011.43","DOIUrl":"https://doi.org/10.1109/FIT.2011.43","url":null,"abstract":"This paper presents a generation approach in a Lexical Functional Grammar (LFG) based machine translation system that subdivides the generation process and uses rule based modules to solve the problem. The results show improvement in performance versus earlier work which generates the translation into Urdu using a single integrated process.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134216856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Trusted Framework for Health Information Exchange 卫生信息交换可信框架
Pub Date : 2011-12-19 DOI: 10.1109/FIT.2011.64
Muhammad Afzal, Maqbool Hussain, Mahmood Ahmad, Z. Anwar
Healthcare Interchange Exchange (HIE) is set of healthcare entities that link regions and nations around the world to share healthcare information about patients. HIE provides a unified interface to various stakeholders to access patient data. For example, individuals want to access personal data, practitioners want to import their patient data from Personal Health Records (PHR) and researchers want to access anonymized patient data for research purposes with ensured individual privacy. Keeping in view requirements of various stakeholders it is challenging to design an HIE system that ensures the security and privacy of patient information, such that the health records remain interoperable and scalable. This paper proposes, an HIE framework that will provide secure access to patient data and adhere to the interoperability rules. Implementation of l-diversity algorithm ensures individual privacy especially when the data is made available publicly for statistical analysis.
医疗保健交换(HIE)是一组医疗保健实体,它们连接世界各地的地区和国家,以共享有关患者的医疗保健信息。HIE为各种利益相关者提供了一个统一的接口来访问患者数据。例如,个人希望访问个人数据,从业人员希望从个人健康记录(personal Health Records, PHR)导入他们的患者数据,研究人员希望访问匿名患者数据以用于研究目的,同时确保个人隐私。考虑到各种利益相关者的需求,设计一个确保患者信息安全和隐私的HIE系统是一项挑战,这样健康记录就可以保持互操作和可扩展。本文提出了一个HIE框架,该框架将提供对患者数据的安全访问并遵守互操作性规则。l-diversity算法的实现确保了个人隐私,特别是当数据公开用于统计分析时。
{"title":"Trusted Framework for Health Information Exchange","authors":"Muhammad Afzal, Maqbool Hussain, Mahmood Ahmad, Z. Anwar","doi":"10.1109/FIT.2011.64","DOIUrl":"https://doi.org/10.1109/FIT.2011.64","url":null,"abstract":"Healthcare Interchange Exchange (HIE) is set of healthcare entities that link regions and nations around the world to share healthcare information about patients. HIE provides a unified interface to various stakeholders to access patient data. For example, individuals want to access personal data, practitioners want to import their patient data from Personal Health Records (PHR) and researchers want to access anonymized patient data for research purposes with ensured individual privacy. Keeping in view requirements of various stakeholders it is challenging to design an HIE system that ensures the security and privacy of patient information, such that the health records remain interoperable and scalable. This paper proposes, an HIE framework that will provide secure access to patient data and adhere to the interoperability rules. Implementation of l-diversity algorithm ensures individual privacy especially when the data is made available publicly for statistical analysis.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116563463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Updating Farmland Satellite Imagery Using High Resolution Aerial Images 利用高分辨率航空图像更新农田卫星图像
Pub Date : 2011-12-19 DOI: 10.1109/FIT.2011.32
S. Saleem, Abdul Bais, Y. M. Khawaja
This paper presents a new approach for updating farmland satellite imagery by registering it with high resolution aerial images. It is based on Field Boundary Junction (FBJ) as feature for registration. Fields connected to FBJ are grouped together to form FBJ descriptor. Fields are described by sampling Field Boundaries (FB) relative to FBJ locations. Every field gets different description for each FBJ connected to it. It makes FBJ descriptor unique and helps in finding the correct FBJ matches reliably. It is invariant to scaling, in-plane rotation and translation. Experimental results also show its invariance to non rigid transformations, splitting/merging of fields and localization errors in FBs and FBJs.
提出了一种利用高分辨率航拍影像配准农田卫星影像的更新方法。它以场边界结(Field Boundary Junction, FBJ)为特征进行配准。连接到FBJ的字段被分组在一起形成FBJ描述符。通过相对于FBJ位置的采样场边界(FB)来描述场。每个字段对于连接到它的每个FBJ都有不同的描述。它使FBJ描述符唯一,并有助于可靠地找到正确的FBJ匹配。它对缩放、平面内旋转和平移是不变的。实验结果还表明,该方法对FBs和FBJs中的非刚性变换、场的分裂/合并和定位误差具有不变性。
{"title":"Updating Farmland Satellite Imagery Using High Resolution Aerial Images","authors":"S. Saleem, Abdul Bais, Y. M. Khawaja","doi":"10.1109/FIT.2011.32","DOIUrl":"https://doi.org/10.1109/FIT.2011.32","url":null,"abstract":"This paper presents a new approach for updating farmland satellite imagery by registering it with high resolution aerial images. It is based on Field Boundary Junction (FBJ) as feature for registration. Fields connected to FBJ are grouped together to form FBJ descriptor. Fields are described by sampling Field Boundaries (FB) relative to FBJ locations. Every field gets different description for each FBJ connected to it. It makes FBJ descriptor unique and helps in finding the correct FBJ matches reliably. It is invariant to scaling, in-plane rotation and translation. Experimental results also show its invariance to non rigid transformations, splitting/merging of fields and localization errors in FBs and FBJs.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130735365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Quantifying Non-functional Requirements in Service Oriented Development 量化面向服务开发中的非功能需求
Pub Date : 2011-12-19 DOI: 10.1109/FIT.2011.48
Jawaria Sadiq, Athar Mohsin, F. Arif
This research is aimed at improving quality in service oriented applications by improving requirement engineering of quality requirements. Idea is to propose quantification mechanism that covers service development from consumer perspective and able to move back for better quality requirement management in service oriented development. Quantification mechanism is a two way affective method, first is to align quality in service development (service identification, service design, service implementation, service usage) and secondly its link with SLA enables both producer and consumer to make a check on quality. In this way, quality requirement are better developed, can be regularly checked and enhanced if required.
本研究旨在通过改进质量需求的需求工程来提高面向服务应用的质量。我们的想法是提出一种量化机制,从消费者的角度涵盖服务开发,并能够在面向服务的开发中进行更好的质量需求管理。量化机制是一种双向有效的方法,一是将服务开发中的质量(服务标识、服务设计、服务实现、服务使用)结合起来,二是它与SLA的联系使生产者和消费者都能够对质量进行检查。这样,质量要求得到了更好的制定,可以定期检查和加强,如果需要的话。
{"title":"Quantifying Non-functional Requirements in Service Oriented Development","authors":"Jawaria Sadiq, Athar Mohsin, F. Arif","doi":"10.1109/FIT.2011.48","DOIUrl":"https://doi.org/10.1109/FIT.2011.48","url":null,"abstract":"This research is aimed at improving quality in service oriented applications by improving requirement engineering of quality requirements. Idea is to propose quantification mechanism that covers service development from consumer perspective and able to move back for better quality requirement management in service oriented development. Quantification mechanism is a two way affective method, first is to align quality in service development (service identification, service design, service implementation, service usage) and secondly its link with SLA enables both producer and consumer to make a check on quality. In this way, quality requirement are better developed, can be regularly checked and enhanced if required.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114361816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Particle Swarm Optimization Based Methodology for Solving Network Selection Problem in Cognitive Radio Networks 基于粒子群优化的认知无线网络网络选择方法
Pub Date : 2011-12-19 DOI: 10.1109/FIT.2011.49
N. Hasan, W. Ejaz, H. Kim, Jae-Hun Kim
Measurements by regulatory bodies has revealed in the last decade that due to fixed spectrum assignment to different network operators has led to the temporal and spatial inefficient spectrum utilization. This underutilization of the most portion of the frequency band under different network operators has created opportunities for the secondary /cognitive radio users to access these unused frequency bands. While accessing the licensed spectrum opportunistically secondary user needs to avoid the harmful interference with the licensed/primary users. When there are multiple primary networks with spare spectrum, secondary user has the option of selecting any of these networks, this is referred to as the network selection problem. This paper presents a novel particle swarm optimization algorithm for network selection problem. This study aims to achieve higher throughput for the secondary users with reduced cost as well as less interference incurred by the licensed users. The experimental results manifest that the proposed method is effective in finding near optimal solution.
在过去十年中,监管机构的测量显示,由于对不同网络运营商的固定频谱分配导致频谱利用在时间和空间上效率低下。不同网络运营商对大部分频带的利用不足,为次级/认知无线电用户利用这些未使用的频带创造了机会。辅助用户在利用许可频谱时,需要避免对许可/主用户造成有害干扰。当有多个主网络有空闲频谱时,辅助用户可以选择其中任何一个网络,这称为网络选择问题。针对网络选择问题,提出了一种新的粒子群优化算法。本研究的目的是在降低成本的情况下,为二级用户提供更高的吞吐量,并减少受授权用户的干扰。实验结果表明,该方法能有效地找到近似最优解。
{"title":"Particle Swarm Optimization Based Methodology for Solving Network Selection Problem in Cognitive Radio Networks","authors":"N. Hasan, W. Ejaz, H. Kim, Jae-Hun Kim","doi":"10.1109/FIT.2011.49","DOIUrl":"https://doi.org/10.1109/FIT.2011.49","url":null,"abstract":"Measurements by regulatory bodies has revealed in the last decade that due to fixed spectrum assignment to different network operators has led to the temporal and spatial inefficient spectrum utilization. This underutilization of the most portion of the frequency band under different network operators has created opportunities for the secondary /cognitive radio users to access these unused frequency bands. While accessing the licensed spectrum opportunistically secondary user needs to avoid the harmful interference with the licensed/primary users. When there are multiple primary networks with spare spectrum, secondary user has the option of selecting any of these networks, this is referred to as the network selection problem. This paper presents a novel particle swarm optimization algorithm for network selection problem. This study aims to achieve higher throughput for the secondary users with reduced cost as well as less interference incurred by the licensed users. The experimental results manifest that the proposed method is effective in finding near optimal solution.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129228944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Vision Based Intelligent Traffic Management System 基于视觉的智能交通管理系统
Pub Date : 2011-12-19 DOI: 10.1109/FIT.2011.33
Muhammad Hassam Malhi, M. H. Aslam, Faisal Saeed, Owais Javed, M. Fraz
Vision based intelligent traffic management system is a robust framework that manages the on road traffic flow in real time by estimating traffic density near traffic signals. We have proposed a simple yet efficient algorithm to calculate the number of vehicles at various signals on a road to efficiently manage the traffic by controlling traffic signals to avoid congestion and traffic jam. The proposed system works by detection of vehicles in video frames acquired by cameras installed on roads and then perform accurate counting of vehicles at the same time. Dynamic background subtraction technique and morphological operations for vehicle detection have been used to achieve better detection efficiency. In order to attain accurate vehicle count in least possible time, we have used Region of Interest based method for vehicle calculation. The proposed framework is designed and implemented in several simulation test cases. It is expected that this work will provide an insight into the design and development of traffic signaling based system and also serves as a basis for practical implementation of a computer vision technology in real-time environment. Furthermore, this work also contributes to new design schemes to increase traffic signaling system's intelligence.
基于视觉的智能交通管理系统是通过估计交通信号附近的交通密度来实时管理道路交通流的一个鲁棒框架。我们提出了一种简单而有效的算法来计算道路上不同信号处的车辆数量,从而通过控制交通信号来有效地管理交通,避免拥堵和交通堵塞。该系统的工作原理是通过安装在道路上的摄像机获取的视频帧来检测车辆,然后同时对车辆进行准确的计数。采用动态背景减除技术和形态学运算对车辆进行检测,提高了检测效率。为了在最短的时间内获得准确的车辆数量,我们采用了基于兴趣区域的车辆计算方法。该框架在多个仿真测试用例中进行了设计和实现。期望这项工作将为交通信号系统的设计和开发提供深入的见解,并为计算机视觉技术在实时环境中的实际实施奠定基础。此外,本文还为提高交通信号系统的智能化提供了新的设计方案。
{"title":"Vision Based Intelligent Traffic Management System","authors":"Muhammad Hassam Malhi, M. H. Aslam, Faisal Saeed, Owais Javed, M. Fraz","doi":"10.1109/FIT.2011.33","DOIUrl":"https://doi.org/10.1109/FIT.2011.33","url":null,"abstract":"Vision based intelligent traffic management system is a robust framework that manages the on road traffic flow in real time by estimating traffic density near traffic signals. We have proposed a simple yet efficient algorithm to calculate the number of vehicles at various signals on a road to efficiently manage the traffic by controlling traffic signals to avoid congestion and traffic jam. The proposed system works by detection of vehicles in video frames acquired by cameras installed on roads and then perform accurate counting of vehicles at the same time. Dynamic background subtraction technique and morphological operations for vehicle detection have been used to achieve better detection efficiency. In order to attain accurate vehicle count in least possible time, we have used Region of Interest based method for vehicle calculation. The proposed framework is designed and implemented in several simulation test cases. It is expected that this work will provide an insight into the design and development of traffic signaling based system and also serves as a basis for practical implementation of a computer vision technology in real-time environment. Furthermore, this work also contributes to new design schemes to increase traffic signaling system's intelligence.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125171482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
A Novel Key-Based Transposition Scheme for Text Encryption 一种新的基于密钥的文本加密换位方案
Pub Date : 2011-12-19 DOI: 10.1109/FIT.2011.44
Sidra Malik
Crypt21 is designed in this paper, a block cipher which uses classical substitution whereas a new transposition scheme. The transposition scheme proposed is entirely dependent on key and induces security by having substitution and transposition both dependant on key. The design is iterative and can be extended to many rounds. Strengths include that it is safe from frequency analysis and dependant on original key in many ways. Weaknesses include possibilities of related key attacks due to weak key schedule. A text based implementation is done and working is explained via example in this paper. Implementation is done in MATLAB. Further directions to make this idea more practical are also proposed in this paper.
本文设计了一种分组密码,它采用了经典的替换方案和一种新的转置方案。所提出的置换方案完全依赖于密钥,并通过替换和置换都依赖于密钥来实现安全性。设计是迭代的,可以扩展到许多回合。它的优点包括不受频率分析的影响,并且在许多方面依赖于原始密钥。弱点包括由于弱密钥调度导致的相关密钥攻击的可能性。本文完成了一个基于文本的实现,并通过实例说明了工作原理。在MATLAB中实现。本文还提出了进一步使这一想法更加实用的方向。
{"title":"A Novel Key-Based Transposition Scheme for Text Encryption","authors":"Sidra Malik","doi":"10.1109/FIT.2011.44","DOIUrl":"https://doi.org/10.1109/FIT.2011.44","url":null,"abstract":"Crypt21 is designed in this paper, a block cipher which uses classical substitution whereas a new transposition scheme. The transposition scheme proposed is entirely dependent on key and induces security by having substitution and transposition both dependant on key. The design is iterative and can be extended to many rounds. Strengths include that it is safe from frequency analysis and dependant on original key in many ways. Weaknesses include possibilities of related key attacks due to weak key schedule. A text based implementation is done and working is explained via example in this paper. Implementation is done in MATLAB. Further directions to make this idea more practical are also proposed in this paper.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127846708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2011 Frontiers of Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1