首页 > 最新文献

2012 15th International Conference on Computer and Information Technology (ICCIT)最新文献

英文 中文
Performance of decode and forward MIMO relaying for wireless uplink 无线上行链路的解码和转发MIMO中继性能
Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509777
M. Kamruzzaman
In this paper, performance of relay assisted wireless link is evaluated in the presence of rayleigh fading where mobile handset is equipped with single transmit antenna, relay is equipped with multiple transmit and receive antennas, and destination has multiple receive antennas. Data are modulated using QPSK or 16 QAM or 64 QAM modulator at handset and send to relay which combined and decode the incoming signal using Maximum Likelihood decoding and further encode the symbols using STBC, and the encoded data are split into n streams which are simultaneously transmitted using n transmit antennas of relay. It is observed that relay with 2 transmit antennas and 2,3,4,5 and 6 receive antennas provides 13 dB, 11 dB, 9 dB, 6 dB and 5 dB gains respectively compared to direct link at 10−5. And there are around 1.5 dB to 6 dB gains for increasing number of receiving antennas of relay from 2 to 3 or 3 to 4 but there are very little gains for increasing number of receiving antennas of relay from 4 to 5 or 5 to 6.
本文研究了在瑞利衰落情况下,手机采用单发射天线,中继采用多发射和多接收天线,目的地采用多接收天线的中继辅助无线链路的性能。在手持设备上使用QPSK或16 QAM或64 QAM调制器对数据进行调制,发送给中继,中继使用最大似然解码对输入信号进行组合解码,并使用STBC对符号进行编码,编码后的数据分成n个流,并使用中继的n个发射天线同时传输。可以观察到,与直接链路相比,具有2个发射天线和2、3、4、5和6个接收天线的中继在10−5处分别提供13 dB、11 dB、9 dB、6 dB和5 dB增益。接收天线从2个增加到3个或从3个增加到4个,增益在1.5 dB到6db左右,但接收天线从4个增加到5个或从5个增加到6个,增益很小。
{"title":"Performance of decode and forward MIMO relaying for wireless uplink","authors":"M. Kamruzzaman","doi":"10.1109/ICCITECHN.2012.6509777","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509777","url":null,"abstract":"In this paper, performance of relay assisted wireless link is evaluated in the presence of rayleigh fading where mobile handset is equipped with single transmit antenna, relay is equipped with multiple transmit and receive antennas, and destination has multiple receive antennas. Data are modulated using QPSK or 16 QAM or 64 QAM modulator at handset and send to relay which combined and decode the incoming signal using Maximum Likelihood decoding and further encode the symbols using STBC, and the encoded data are split into n streams which are simultaneously transmitted using n transmit antennas of relay. It is observed that relay with 2 transmit antennas and 2,3,4,5 and 6 receive antennas provides 13 dB, 11 dB, 9 dB, 6 dB and 5 dB gains respectively compared to direct link at 10−5. And there are around 1.5 dB to 6 dB gains for increasing number of receiving antennas of relay from 2 to 3 or 3 to 4 but there are very little gains for increasing number of receiving antennas of relay from 4 to 5 or 5 to 6.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128317371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Analysis of Proxy Mobile IPv6: A network-based mobility solution 代理移动IPv6分析:基于网络的移动解决方案
Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509795
Md. Shohrab Hossain, Mohammed Atiquzzaman
Terminal-based mobility protocols require mobile devices to participate in mobility signaling that consumes lots of processing power and memory. Network-based mobility protocol, such as, Proxy Mobile IPv6, solves this problem by excluding low-end mobile devices from signaling requirement. In this paper, we have explained Proxy Mobile IPv6 architecture along with its detailed signaling diagram. We have identified the major advantages and limitations of this protocol. We have also performed the signaling cost analysis of its key mobility entities to obtain the amount of overhead on them. Results show interesting relationships among various network parameters, such as, network size, mobility rate, traffic rate. Our critical analysis can help researchers better understand the strengths and weaknesses of this protocol and our signaling analysis can be used by network engineers to estimate the resource requirements of its entities in actual deployment.
基于终端的移动性协议要求移动设备参与移动性信令,这需要消耗大量的处理能力和内存。基于网络的移动协议,如代理移动IPv6,解决了这一问题,将低端移动设备排除在信令需求之外。在本文中,我们解释了代理移动IPv6架构及其详细的信令图。我们已经确定了该方案的主要优点和局限性。我们还对其关键移动实体进行了信令成本分析,以获得它们的开销量。结果显示了各种网络参数之间的有趣关系,如网络规模、移动速率、流量速率。我们的批判性分析可以帮助研究人员更好地理解该协议的优点和缺点,我们的信令分析可以被网络工程师用来估计其实体在实际部署中的资源需求。
{"title":"Analysis of Proxy Mobile IPv6: A network-based mobility solution","authors":"Md. Shohrab Hossain, Mohammed Atiquzzaman","doi":"10.1109/ICCITECHN.2012.6509795","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509795","url":null,"abstract":"Terminal-based mobility protocols require mobile devices to participate in mobility signaling that consumes lots of processing power and memory. Network-based mobility protocol, such as, Proxy Mobile IPv6, solves this problem by excluding low-end mobile devices from signaling requirement. In this paper, we have explained Proxy Mobile IPv6 architecture along with its detailed signaling diagram. We have identified the major advantages and limitations of this protocol. We have also performed the signaling cost analysis of its key mobility entities to obtain the amount of overhead on them. Results show interesting relationships among various network parameters, such as, network size, mobility rate, traffic rate. Our critical analysis can help researchers better understand the strengths and weaknesses of this protocol and our signaling analysis can be used by network engineers to estimate the resource requirements of its entities in actual deployment.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123777254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Agent based framework for providing security to data storage in cloud 基于代理的框架,为云中的数据存储提供安全性
Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509712
M. Islam, M. Habiba
Cloud system framework must ensure appropriate security for data storages along with satisfied timing constrain and performance. Usually, data in cloud are very dynamic and different types of data demand different level of security. Hence, if different cloud data storages can be provided with different level of security, managing data will be more flexible and efficient; the performance of system will increase as well. Therefore, in order to ensure adequate security for different data storages in cloud, we have proposed a three tier security framework. We have analyzed the performance with respect to overhead for different security services such as confidentiality, integrity and authenticity and showed that data classification according to different level of security enhances the performance of the system that provides security services to the data in cloud.
云系统框架必须保证数据存储的适当安全性以及满足时间约束和性能要求。通常,云中的数据是非常动态的,不同类型的数据需要不同级别的安全。因此,如果能够为不同的云数据存储提供不同的安全级别,管理数据将更加灵活和高效;系统的性能也会随之提高。因此,为了保证云中不同的数据存储有足够的安全性,我们提出了一个三层安全框架。我们分析了不同安全服务(如机密性、完整性和真实性)的性能开销,并表明根据不同的安全级别对数据进行分类可以增强为云中的数据提供安全服务的系统的性能。
{"title":"Agent based framework for providing security to data storage in cloud","authors":"M. Islam, M. Habiba","doi":"10.1109/ICCITECHN.2012.6509712","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509712","url":null,"abstract":"Cloud system framework must ensure appropriate security for data storages along with satisfied timing constrain and performance. Usually, data in cloud are very dynamic and different types of data demand different level of security. Hence, if different cloud data storages can be provided with different level of security, managing data will be more flexible and efficient; the performance of system will increase as well. Therefore, in order to ensure adequate security for different data storages in cloud, we have proposed a three tier security framework. We have analyzed the performance with respect to overhead for different security services such as confidentiality, integrity and authenticity and showed that data classification according to different level of security enhances the performance of the system that provides security services to the data in cloud.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132592798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
A Location Based Advertisement scheme using OpenStreetMap 基于OpenStreetMap的位置广告方案
Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509801
Md. Rashidujjaman Rifat, Shubrami Moutushy, H. Ferdous
Location Based Advertisement (LBA) has become today's most personal and direct marketing channel that provides customers more relevant information, personalized message, targeted offer about products and allows marketers to reach a specific target audience by creating campaigns. Location-based advertising (LBA) is a new form of advertising that integrates mobile advertising with location based services (LBS) to provide location-specific advertisements on consumer's devices. With the help of LBA, it is possible to target population at the right place and the right time. By taking advantage of a consumer's real world position, location based advertising delivers relevant ads for products and services. In this paper the features and usability of the application, “Location Based Intelligent Advertisement using OpenStreetMap” are explained and how this type of OpenStreetMap (OSM) based LBS application is effective for Bangladesh is discussed. The application helps the registered shop owners to introduce the offers to a consumer who is in close proximity to make them take those final steps to enter his store and let the consumer know what is around him with audio and map support. Additional feature of this application is for visually impaired people so that they can shop easily. We also focus on the benefits of using an open source map over a commercial one in this respect.
基于位置的广告(LBA)已经成为当今最个性化和最直接的营销渠道,它为客户提供更相关的信息,个性化的信息,有针对性的产品报价,并允许营销人员通过创建活动来接触特定的目标受众。基于位置的广告(LBA)是一种新的广告形式,它将移动广告与基于位置的服务(LBS)相结合,在消费者的设备上提供特定位置的广告。在LBA的帮助下,可以在正确的地点和正确的时间瞄准人群。通过利用消费者在现实世界中的位置,基于位置的广告为产品和服务提供相关的广告。在本文中,解释了应用程序的功能和可用性,“使用OpenStreetMap的基于位置的智能广告”,并讨论了这种基于OpenStreetMap (OSM)的LBS应用程序如何对孟加拉国有效。该应用程序帮助注册店主向距离很近的消费者介绍优惠,使他们采取最后步骤进入他的商店,并通过音频和地图支持让消费者了解他周围的情况。这个应用程序的附加功能是为视障人士,使他们可以轻松购物。在这方面,我们还关注使用开源地图比使用商业地图的好处。
{"title":"A Location Based Advertisement scheme using OpenStreetMap","authors":"Md. Rashidujjaman Rifat, Shubrami Moutushy, H. Ferdous","doi":"10.1109/ICCITECHN.2012.6509801","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509801","url":null,"abstract":"Location Based Advertisement (LBA) has become today's most personal and direct marketing channel that provides customers more relevant information, personalized message, targeted offer about products and allows marketers to reach a specific target audience by creating campaigns. Location-based advertising (LBA) is a new form of advertising that integrates mobile advertising with location based services (LBS) to provide location-specific advertisements on consumer's devices. With the help of LBA, it is possible to target population at the right place and the right time. By taking advantage of a consumer's real world position, location based advertising delivers relevant ads for products and services. In this paper the features and usability of the application, “Location Based Intelligent Advertisement using OpenStreetMap” are explained and how this type of OpenStreetMap (OSM) based LBS application is effective for Bangladesh is discussed. The application helps the registered shop owners to introduce the offers to a consumer who is in close proximity to make them take those final steps to enter his store and let the consumer know what is around him with audio and map support. Additional feature of this application is for visually impaired people so that they can shop easily. We also focus on the benefits of using an open source map over a commercial one in this respect.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131965274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Issues in implementing electronic governance: Bangladesh perspective 实施电子治理的问题:孟加拉国的观点
Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509710
S. Rajon, Md. Mahbubur Rahman
This paper focuses on various approaches of implementing electronic governance in developing countries and explores the specific factors related to the challenges and opportunities in implementing electronic governance. Since, the models for implementation of electronic governance greatly varies because of certain technical and socio-economic aspects, it is essential to analyze the features related to implementing electronic governance not as a whole rather on a specific basis. As a developing country with lots of limitations like extreme shortage of resources, limitations in financing, absence of proper development planning, lack of skilled human resources, unavailability of stable and fair democracy and more importantly, a number of unavoidable circumstances including natural disasters, it is a must to analyze the concerns. In this paper, we especially present the adaptability of e-governance in the prime sectors of government for developing countries. Moreover, we provide specific recommendations for implementing e-governance in the most feasible, cost-effective, and efficient manner. Analyzing the conducted survey result through statistical procedures also derives a couple of significant factors in implementing e-governance. This paper also aims to point the possible solutions in handling the barriers to implement electronic governance. The supporting framework for integrating the overall socio-economic activities under the information and communication technology framework is also conveyed in this paper.
本文重点介绍了发展中国家实施电子政务的各种途径,并探讨了与实施电子政务的挑战和机遇相关的具体因素。由于某些技术和社会经济方面的原因,实施电子治理的模式有很大的不同,因此有必要分析与实施电子治理有关的特征,而不是作为一个整体,而是在特定的基础上。作为一个发展中国家,有很多限制,如资源极度短缺,资金限制,缺乏适当的发展规划,缺乏熟练的人力资源,无法获得稳定和公平的民主,更重要的是,一些不可避免的情况,包括自然灾害,必须分析这些问题。在本文中,我们特别提出了电子政务在发展中国家政府主要部门的适应性。此外,我们还就如何以最可行、最具成本效益和最有效的方式实施电子政务提出了具体建议。通过统计程序分析所进行的调查结果,还得出了实施电子政务的几个重要因素。本文还旨在指出处理实现电子治理的障碍的可能解决方案。本文还阐述了在信息和通信技术框架下整合整体社会经济活动的支持框架。
{"title":"Issues in implementing electronic governance: Bangladesh perspective","authors":"S. Rajon, Md. Mahbubur Rahman","doi":"10.1109/ICCITECHN.2012.6509710","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509710","url":null,"abstract":"This paper focuses on various approaches of implementing electronic governance in developing countries and explores the specific factors related to the challenges and opportunities in implementing electronic governance. Since, the models for implementation of electronic governance greatly varies because of certain technical and socio-economic aspects, it is essential to analyze the features related to implementing electronic governance not as a whole rather on a specific basis. As a developing country with lots of limitations like extreme shortage of resources, limitations in financing, absence of proper development planning, lack of skilled human resources, unavailability of stable and fair democracy and more importantly, a number of unavoidable circumstances including natural disasters, it is a must to analyze the concerns. In this paper, we especially present the adaptability of e-governance in the prime sectors of government for developing countries. Moreover, we provide specific recommendations for implementing e-governance in the most feasible, cost-effective, and efficient manner. Analyzing the conducted survey result through statistical procedures also derives a couple of significant factors in implementing e-governance. This paper also aims to point the possible solutions in handling the barriers to implement electronic governance. The supporting framework for integrating the overall socio-economic activities under the information and communication technology framework is also conveyed in this paper.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134531704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Human authentication process using finger knuckle surface with artificial Neural Networks based on a hybrid feature selection method 基于人工神经网络的人体指关节面认证过程混合特征选择方法
Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509771
Mobarakol Islam, M. Hasan, M. M. Farhad, T. R. Tanni
An improved human authentication process using knuckle surface for personal identification has shown promising results. The texture pattern produced by the finger knuckle bending is highly unique and makes the surface a distinctive biometric identifier. In this paper we proposed a new approach for efficient and more secure personal identification using knuckle surface. A specific data acquisition device is constructed to capture the finger knuckle surface images, and then an efficient finger knuckle print algorithm is presented with trained neural network. The finger back surface images from each of the users are normalized to minimize the scale, translation and rotational variations in the knuckle images. The main attraction of this proposed method is that a hybrid feature selection method of Lempel-Ziv Feature Selection and Principle Component Analysis is used for feature extraction and an artificial Neural Network based on Scaled Conjugate Gradient is used for the recognition. The experimental results from the proposed approach are promising and confirm. Compared with the other existing finger-back surface based biometric systems, the proposed system is more efficient and can achieve higher recognition rate in real time.
一种利用指关节面进行个人身份识别的改进的人体认证过程显示出了良好的效果。手指关节弯曲产生的纹理图案是高度独特的,使表面成为独特的生物识别标识。本文提出了一种利用关节面进行高效、安全的个人身份识别的新方法。构造了一种特定的数据采集装置来采集指关节表面图像,并利用训练好的神经网络提出了一种高效的指关节指纹算法。来自每个用户的手指背面表面图像被归一化,以最小化指关节图像的缩放、平移和旋转变化。该方法的主要优点是将Lempel-Ziv特征选择与主成分分析相结合的混合特征选择方法用于特征提取,并使用基于缩放共轭梯度的人工神经网络进行识别。实验结果表明,该方法是有效的。与现有的其他基于指背表面的生物识别系统相比,该系统具有更高的效率,可以实现更高的实时识别率。
{"title":"Human authentication process using finger knuckle surface with artificial Neural Networks based on a hybrid feature selection method","authors":"Mobarakol Islam, M. Hasan, M. M. Farhad, T. R. Tanni","doi":"10.1109/ICCITECHN.2012.6509771","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509771","url":null,"abstract":"An improved human authentication process using knuckle surface for personal identification has shown promising results. The texture pattern produced by the finger knuckle bending is highly unique and makes the surface a distinctive biometric identifier. In this paper we proposed a new approach for efficient and more secure personal identification using knuckle surface. A specific data acquisition device is constructed to capture the finger knuckle surface images, and then an efficient finger knuckle print algorithm is presented with trained neural network. The finger back surface images from each of the users are normalized to minimize the scale, translation and rotational variations in the knuckle images. The main attraction of this proposed method is that a hybrid feature selection method of Lempel-Ziv Feature Selection and Principle Component Analysis is used for feature extraction and an artificial Neural Network based on Scaled Conjugate Gradient is used for the recognition. The experimental results from the proposed approach are promising and confirm. Compared with the other existing finger-back surface based biometric systems, the proposed system is more efficient and can achieve higher recognition rate in real time.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132292820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance analysis of a coherent chaos-shift keying technique 相干混沌移键控技术的性能分析
Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509721
Md. Zahid Hasan, Iftekhar Idris, A. F. M. Nokib Uddin, M. Shahjahan
The transmission of binary information by using chaotic switching named as chaos-shift keying (CSK) with the generation of chaos using cubic map is presented. A system has been proposed for calculating the analytical bit-error rate (BER) of a coherent chaos-shift keying (CSK) digital communication system under an additive white Gaussian noise environment with the consideration of ideal synchronization at the receivers. The bit-error rate of the CSK system is compared with the conventional modulation techniques like ASK, FSK, and PSK. Generating the chaos with the simple cubic map, it is shown that the performance of coherent CSK system can be improved with the variations of the initial conditions of chaos generation. The bit-error rate of the CSK system is improved for both single-user and multiple-user environment.
提出了一种利用混沌交换传输二进制信息的方法,称为混沌移位键控(CSK),并利用三次映射生成混沌。提出了一种在加性高斯白噪声环境下考虑接收机理想同步的相干混沌移键控(CSK)数字通信系统的分析误码率(BER)计算方法。将CSK系统的误码率与传统的ASK、FSK、PSK调制技术进行了比较。用简单的三次映射生成混沌,结果表明混沌生成初始条件的变化可以提高相干CSK系统的性能。在单用户和多用户环境下,CSK系统的误码率都得到了提高。
{"title":"Performance analysis of a coherent chaos-shift keying technique","authors":"Md. Zahid Hasan, Iftekhar Idris, A. F. M. Nokib Uddin, M. Shahjahan","doi":"10.1109/ICCITECHN.2012.6509721","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509721","url":null,"abstract":"The transmission of binary information by using chaotic switching named as chaos-shift keying (CSK) with the generation of chaos using cubic map is presented. A system has been proposed for calculating the analytical bit-error rate (BER) of a coherent chaos-shift keying (CSK) digital communication system under an additive white Gaussian noise environment with the consideration of ideal synchronization at the receivers. The bit-error rate of the CSK system is compared with the conventional modulation techniques like ASK, FSK, and PSK. Generating the chaos with the simple cubic map, it is shown that the performance of coherent CSK system can be improved with the variations of the initial conditions of chaos generation. The bit-error rate of the CSK system is improved for both single-user and multiple-user environment.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130648876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Composite pattern matching in time series 时间序列的复合模式匹配
Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509784
A. Salekin, Md. Mustafizur Rahman, Raihanul Islam
For last few years many research have been taken place to recognize various meaningful patterns from time series data. These researches are based on recognizing basic time series patterns. Most of these works used template based, rule based and neural network based techniques to recognize basic patterns. But in time series there exist many composite patterns comprise of simple basic patterns. In this paper we propose two novel approaches of recognizing composite patterns from time series data. In our proposed approach we use combination of template based and rule based approaches and neural network and rule based approaches to recognize these composite patterns.
在过去的几年里,人们进行了许多研究,从时间序列数据中识别出各种有意义的模式。这些研究都是基于对基本时间序列模式的识别。这些工作大多使用基于模板、基于规则和基于神经网络的技术来识别基本模式。但在时间序列中存在着许多由简单基本模式组成的复合模式。本文提出了两种从时间序列数据中识别复合模式的新方法。在我们提出的方法中,我们使用基于模板和基于规则的方法以及基于神经网络和基于规则的方法的组合来识别这些复合模式。
{"title":"Composite pattern matching in time series","authors":"A. Salekin, Md. Mustafizur Rahman, Raihanul Islam","doi":"10.1109/ICCITECHN.2012.6509784","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509784","url":null,"abstract":"For last few years many research have been taken place to recognize various meaningful patterns from time series data. These researches are based on recognizing basic time series patterns. Most of these works used template based, rule based and neural network based techniques to recognize basic patterns. But in time series there exist many composite patterns comprise of simple basic patterns. In this paper we propose two novel approaches of recognizing composite patterns from time series data. In our proposed approach we use combination of template based and rule based approaches and neural network and rule based approaches to recognize these composite patterns.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114106851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Android mobile application: Remote monitoring of blood pressure Android移动应用:远程监测血压
Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509753
Md. Kamrul Hasan, Nova Ahmed, A. Islam
There has been an exponential increase in health care costs in the last decade. Seniors have to make frequent visits to their doctor to get their vital signs measured. There is a huge market for non-invasive methods of measurement of these vital signs. The objective of this paper is to design and implement a reliable, cheap, low powered, non-intrusive, and accurate system that can be worn on a regular basis and monitors the vital signs and displays the output to the user's cell phone. This paper specifically deals with the signal conditioning and data acquisition of vital sign: blood pressure. Blood pressure combines the methodologies of Electrocardiography to continuously monitor the systolic and diastolic blood pressure. Here remote monitoring of a patient's blood pressure (BP) is described. The data is transferred to a central monitoring station using a wireless sensor network for displaying and storing.
在过去十年中,医疗保健费用呈指数级增长。老年人必须经常去看医生,让医生测量他们的生命体征。这些生命体征的非侵入性测量方法有着巨大的市场。本文的目标是设计和实现一个可靠、廉价、低功耗、非侵入性和精确的系统,该系统可以定期佩戴,监测生命体征并将输出显示到用户的手机上。本文具体论述了生命体征血压的信号调理和数据采集。血压结合心电图的方法,连续监测收缩压和舒张压。这里描述了对患者血压(BP)的远程监测。使用无线传感器网络将所述数据传输到用于显示和存储的中央监测站。
{"title":"Android mobile application: Remote monitoring of blood pressure","authors":"Md. Kamrul Hasan, Nova Ahmed, A. Islam","doi":"10.1109/ICCITECHN.2012.6509753","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509753","url":null,"abstract":"There has been an exponential increase in health care costs in the last decade. Seniors have to make frequent visits to their doctor to get their vital signs measured. There is a huge market for non-invasive methods of measurement of these vital signs. The objective of this paper is to design and implement a reliable, cheap, low powered, non-intrusive, and accurate system that can be worn on a regular basis and monitors the vital signs and displays the output to the user's cell phone. This paper specifically deals with the signal conditioning and data acquisition of vital sign: blood pressure. Blood pressure combines the methodologies of Electrocardiography to continuously monitor the systolic and diastolic blood pressure. Here remote monitoring of a patient's blood pressure (BP) is described. The data is transferred to a central monitoring station using a wireless sensor network for displaying and storing.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114223537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An efficient grid algorithm for faster clustering using K medoids approach 一种基于K介质的快速聚类网格算法
Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509704
G. M. Daiyan, F. Abid, Md. Ataur Rahman Khan, A. Tareq
Clustering is the methodology to separate similar objects of data set in one cluster and dissimilar objects of data set in another cluster. K means and K medoids are most widely used Clustering algorithms for selecting group of objects for data sets. k means clustering has less time complexity than k medoids method, but k means clustering method suffers from extreme values. So, we have focused our view to k medoids clustering method. Conventional k-medoids clustering algorithm suffers from many limitations. We have done analysis on these limitations such as the problem of finding natural clusters, the dependency of output on the order of input data. In this paper we have proposed a new algorithm named Grid Multidimensional K medoids which is designed to overcome the above limitations and provide a faster clustering than K medoids.
聚类是一种将数据集的相似对象从一个聚类中分离出来,而将数据集的不同对象从另一个聚类中分离出来的方法。K均值和K介质是最常用的聚类算法,用于选择数据集的对象组。K均值聚类的时间复杂度比K媒质方法小,但K均值聚类存在极值问题。因此,我们将注意力集中在k介质聚类方法上。传统的k- medium聚类算法存在许多局限性。我们已经对这些限制进行了分析,比如寻找自然聚类的问题,输出对输入数据顺序的依赖。本文提出了一种新的网格多维K形聚类算法,该算法克服了上述限制,提供了比K形聚类更快的聚类速度。
{"title":"An efficient grid algorithm for faster clustering using K medoids approach","authors":"G. M. Daiyan, F. Abid, Md. Ataur Rahman Khan, A. Tareq","doi":"10.1109/ICCITECHN.2012.6509704","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509704","url":null,"abstract":"Clustering is the methodology to separate similar objects of data set in one cluster and dissimilar objects of data set in another cluster. K means and K medoids are most widely used Clustering algorithms for selecting group of objects for data sets. k means clustering has less time complexity than k medoids method, but k means clustering method suffers from extreme values. So, we have focused our view to k medoids clustering method. Conventional k-medoids clustering algorithm suffers from many limitations. We have done analysis on these limitations such as the problem of finding natural clusters, the dependency of output on the order of input data. In this paper we have proposed a new algorithm named Grid Multidimensional K medoids which is designed to overcome the above limitations and provide a faster clustering than K medoids.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116289885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2012 15th International Conference on Computer and Information Technology (ICCIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1