Pub Date : 2010-12-01DOI: 10.1109/ICCITECHN.2010.5723924
M. Rashed, S.U.M. Joni, M. Siddique
This paper, proposes a Radio Network Planning for Fixed WiMax Network for Dhaka City. To develop the plan a cell radius of 400 meter is assumed. For the justification of this assumption several numbers of experimental analyses are done. Two experiments are executed to know the data speed with respect to the distance both for uplink and downlink communication. Another two experiments are executed for both downlink and uplink to know the most preferable WiMax frequency band for Dhaka city. The experiments are done for different types of modulation schemes. From the performance tests it is decided that the designed network will perform pretty well with the cell radius of 400 meter and at the frequency band of 2.5 GHz.
{"title":"Radio Network Planning for Fixed WiMax in Dhaka City and it's performance analysis","authors":"M. Rashed, S.U.M. Joni, M. Siddique","doi":"10.1109/ICCITECHN.2010.5723924","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723924","url":null,"abstract":"This paper, proposes a Radio Network Planning for Fixed WiMax Network for Dhaka City. To develop the plan a cell radius of 400 meter is assumed. For the justification of this assumption several numbers of experimental analyses are done. Two experiments are executed to know the data speed with respect to the distance both for uplink and downlink communication. Another two experiments are executed for both downlink and uplink to know the most preferable WiMax frequency band for Dhaka city. The experiments are done for different types of modulation schemes. From the performance tests it is decided that the designed network will perform pretty well with the cell radius of 400 meter and at the frequency band of 2.5 GHz.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123071742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-01DOI: 10.1109/ICCITECHN.2010.5723917
A. F. Fazlul Haque, S. Kar, K. Adnan, K. Ahammed
The emergence of WiMAX has attracted significant interests from all fields of wireless communications. WiMAX has been tipped to bring a revolution in the way where broadband services have been used today; those have been strengthened by the optimization of RF. The systematic investigation to establish facts of necessary modification about the theory for smooth optimization is targeted. This paper has considered the map outage factor of the objective function for the invention of a method to produce suitable values which help to realize better output. Simulation results found to be more precise over conventional RF of WiMAX in finding the modification of the existing theory.
{"title":"Map outage factor optimization for WiMAX","authors":"A. F. Fazlul Haque, S. Kar, K. Adnan, K. Ahammed","doi":"10.1109/ICCITECHN.2010.5723917","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723917","url":null,"abstract":"The emergence of WiMAX has attracted significant interests from all fields of wireless communications. WiMAX has been tipped to bring a revolution in the way where broadband services have been used today; those have been strengthened by the optimization of RF. The systematic investigation to establish facts of necessary modification about the theory for smooth optimization is targeted. This paper has considered the map outage factor of the objective function for the invention of a method to produce suitable values which help to realize better output. Simulation results found to be more precise over conventional RF of WiMAX in finding the modification of the existing theory.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114653754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-01DOI: 10.1109/ICCITECHN.2010.5723874
M.A.R. Mustafa, M. M. Elahi, M. Alamgir Hossain, M. Islam
Many recommendations are proposed for accommodating multimedia content into wireless media with lower bandwidth. These formats of the content have been developed with different objectives. Now it has become really challenging to compare all these diversified formats. In this paper, we proposed an algorithm to compare the FLV, MPEG4 and 3GP format of multimedia content using the parameters that determines their performance in wireless network. Finally, exhaustive experiments are done and the results are shown to demonstrate the merits and capabilities of the different file formats.
{"title":"Comparative performance analysis of MPEG4, FLV and 3GP multimedia file formats using wireless network parameters","authors":"M.A.R. Mustafa, M. M. Elahi, M. Alamgir Hossain, M. Islam","doi":"10.1109/ICCITECHN.2010.5723874","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723874","url":null,"abstract":"Many recommendations are proposed for accommodating multimedia content into wireless media with lower bandwidth. These formats of the content have been developed with different objectives. Now it has become really challenging to compare all these diversified formats. In this paper, we proposed an algorithm to compare the FLV, MPEG4 and 3GP format of multimedia content using the parameters that determines their performance in wireless network. Finally, exhaustive experiments are done and the results are shown to demonstrate the merits and capabilities of the different file formats.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128535931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-01DOI: 10.1109/ICCITECHN.2010.5723836
K. H. Talukder, M. Rahman, Toukir Ahmed
In this paper we present a method for Bangla speech generation from Bangla PDF document. Our main goal is to generate almost natural speech from Bangla PDF document. For this we have proposed a method which performs three major tasks. One is PDF to text conversion, then text to ASCII conversion, and then follows the character and modifier rules while reading text and finally speech generation from the concatenate sound files of text. We have analyzed the proposed method and the existing methods with respect to error rate of reading all the Bangla words and also the time complexity.
{"title":"An efficient speech generation method based on character and modifier of Bangla PDF Document","authors":"K. H. Talukder, M. Rahman, Toukir Ahmed","doi":"10.1109/ICCITECHN.2010.5723836","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723836","url":null,"abstract":"In this paper we present a method for Bangla speech generation from Bangla PDF document. Our main goal is to generate almost natural speech from Bangla PDF document. For this we have proposed a method which performs three major tasks. One is PDF to text conversion, then text to ASCII conversion, and then follows the character and modifier rules while reading text and finally speech generation from the concatenate sound files of text. We have analyzed the proposed method and the existing methods with respect to error rate of reading all the Bangla words and also the time complexity.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131435513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-01DOI: 10.1109/ICCITECHN.2010.5723908
Md. Shohrab Hossain, Mohammed Atiquzzaman, W. Ivancic
To support IP-mobility of networks in motion, IETF proposed Network Mobility (NEMO) protocol that uses various signaling messages to ensure connectivity of the mobile nodes with the Internet. However, there has been no comprehensive cost analysis of mobility protocol entities that considers all possible costs. In this paper, we have developed analytical models to estimate total costs of key mobility management entities of NEMO. We have presented numerical results to demonstrate the impact of network size, mobility rate, traffic rate and data volume on these costs. Our cost analysis will thus help network engineers in estimating actual resource requirements for the key entities of the network in future design.
{"title":"Cost analysis of NEMO protocol entities","authors":"Md. Shohrab Hossain, Mohammed Atiquzzaman, W. Ivancic","doi":"10.1109/ICCITECHN.2010.5723908","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723908","url":null,"abstract":"To support IP-mobility of networks in motion, IETF proposed Network Mobility (NEMO) protocol that uses various signaling messages to ensure connectivity of the mobile nodes with the Internet. However, there has been no comprehensive cost analysis of mobility protocol entities that considers all possible costs. In this paper, we have developed analytical models to estimate total costs of key mobility management entities of NEMO. We have presented numerical results to demonstrate the impact of network size, mobility rate, traffic rate and data volume on these costs. Our cost analysis will thus help network engineers in estimating actual resource requirements for the key entities of the network in future design.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131469656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-01DOI: 10.1109/ICCITECHN.2010.5723921
M. Islam
3rd Generation Partnership Project Long Term Evolution (3GPP LTE) has adopted orthogonal frequency division multiple access (OFDMA) as downlink and single carrier frequency division multiple access (SC-FDMA) as uplink for multiple access scheme. SC-FDMA is adopted in uplink due to its low peak to average power ratio (PAPR). To reduce PAPR in OFDMA, several techniques are used in literature. SC-FDMA is adopted in 3GPP as it shows better PAPR characteristics than OFDMA. Many researches are still going on to find the impact of different parameters on PAPR in SC-FDMA. In this paper, a PAPR reduction technique is proposed where the precoding is done in the first step and at the second step, clipping is performed using SC-FDMA environment. Result shows that the PAPR is reduced at the increase in number of clips.
{"title":"Peak to average power reduction using precoding with clipping and filtering","authors":"M. Islam","doi":"10.1109/ICCITECHN.2010.5723921","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723921","url":null,"abstract":"3rd Generation Partnership Project Long Term Evolution (3GPP LTE) has adopted orthogonal frequency division multiple access (OFDMA) as downlink and single carrier frequency division multiple access (SC-FDMA) as uplink for multiple access scheme. SC-FDMA is adopted in uplink due to its low peak to average power ratio (PAPR). To reduce PAPR in OFDMA, several techniques are used in literature. SC-FDMA is adopted in 3GPP as it shows better PAPR characteristics than OFDMA. Many researches are still going on to find the impact of different parameters on PAPR in SC-FDMA. In this paper, a PAPR reduction technique is proposed where the precoding is done in the first step and at the second step, clipping is performed using SC-FDMA environment. Result shows that the PAPR is reduced at the increase in number of clips.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132814232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-01DOI: 10.1109/ICCITECHN.2010.5723885
Saifullah M. Dewan
The increased prevalence of mobile phones provides exciting opportunities for the growth of mobile banking (m-banking). This article reviews the emerging research literature on m-banking. It presents a classification framework for m-banking research based on 65 m-banking articles published between 2000 and mid-2010 in Information Systems (IS), technology innovation, management, and marketing journals, and major IS conferences. These articles are classified into five main categories: m-banking overview and conceptual issues, m-banking applications and cases, m-banking behavioural issues, infrastructures of mobile users and networks, and strategic, legal and ethical issues. It is expected that the comprehensive list of references and assessments presented in this article will provide a useful anatomy of young m-banking literature to anyone who is interested in m-banking and help stimulate further interest.
{"title":"Issues in M-banking: Challenges and opportunities","authors":"Saifullah M. Dewan","doi":"10.1109/ICCITECHN.2010.5723885","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723885","url":null,"abstract":"The increased prevalence of mobile phones provides exciting opportunities for the growth of mobile banking (m-banking). This article reviews the emerging research literature on m-banking. It presents a classification framework for m-banking research based on 65 m-banking articles published between 2000 and mid-2010 in Information Systems (IS), technology innovation, management, and marketing journals, and major IS conferences. These articles are classified into five main categories: m-banking overview and conceptual issues, m-banking applications and cases, m-banking behavioural issues, infrastructures of mobile users and networks, and strategic, legal and ethical issues. It is expected that the comprehensive list of references and assessments presented in this article will provide a useful anatomy of young m-banking literature to anyone who is interested in m-banking and help stimulate further interest.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130873927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-01DOI: 10.1109/ICCITECHN.2010.5723912
N. Sarkar
This paper proposes a cross-layer design (CLD) framework called channel-aware buffer unit multiple access (C-BUMA) for improving wireless local area network (WLAN) performance. In the framework, the radio propagation (i.e. PHY layer) is combined with the medium access control (MAC) protocol for packet transmissions. By sharing channel information with the MAC protocol, the approach reduced unnecessary packet transmissions and hence improved system performance. Through performance evaluation, we demonstrate that our CLD can significantly improve network throughput and packet delay. The proposed C-BUMA is simple and can easily be implemented in 802.11 networks without changing hardware infrastructure and no additional costs. In this paper we describe C-BUMA and present two algorithms for the implementation of the framework.
{"title":"A cross layer framework for WLANs: Joint radio propagation and MAC protocol","authors":"N. Sarkar","doi":"10.1109/ICCITECHN.2010.5723912","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723912","url":null,"abstract":"This paper proposes a cross-layer design (CLD) framework called channel-aware buffer unit multiple access (C-BUMA) for improving wireless local area network (WLAN) performance. In the framework, the radio propagation (i.e. PHY layer) is combined with the medium access control (MAC) protocol for packet transmissions. By sharing channel information with the MAC protocol, the approach reduced unnecessary packet transmissions and hence improved system performance. Through performance evaluation, we demonstrate that our CLD can significantly improve network throughput and packet delay. The proposed C-BUMA is simple and can easily be implemented in 802.11 networks without changing hardware infrastructure and no additional costs. In this paper we describe C-BUMA and present two algorithms for the implementation of the framework.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121988835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-01DOI: 10.1109/ICCITECHN.2010.5723822
M. Rahman, A. K. Mia
This paper presents an efficient O(n3) time algorithm for solving the seeded tree alignment problem that finds the similarity score of two RNA secondary structures. In the seeded tree alignment problem, a large tree, representing an RNA secondary structure, is converted into a small tree known as seeded tree. After conversion, a comparison operation is being placed to find the similarity score of necessary seed pair of two seeded trees and finally the overall trees. The algorithm is more efficient than the best known algorithm that needs O(n3.5) time.
{"title":"An efficient seeded tree alignment algorithm for finding the similarity score of two RNA secondary structures","authors":"M. Rahman, A. K. Mia","doi":"10.1109/ICCITECHN.2010.5723822","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723822","url":null,"abstract":"This paper presents an efficient O(n3) time algorithm for solving the seeded tree alignment problem that finds the similarity score of two RNA secondary structures. In the seeded tree alignment problem, a large tree, representing an RNA secondary structure, is converted into a small tree known as seeded tree. After conversion, a comparison operation is being placed to find the similarity score of necessary seed pair of two seeded trees and finally the overall trees. The algorithm is more efficient than the best known algorithm that needs O(n3.5) time.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117208071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-01DOI: 10.1109/ICCITECHN.2010.5723853
Sanchita Mal-Sarkar, I. Sikder, V. Konangi
This paper proposes a soft computing approach to manage uncertainty and rule discovery by reasoning over inconsistent, incomplete and fragmentary information using dominance-based rough set theories. A methodological and computational basis is illustrated in a sensor network application scenario of a forest fire detection system.
{"title":"Application of wireless sensor networks in forest fire detection under uncertainty","authors":"Sanchita Mal-Sarkar, I. Sikder, V. Konangi","doi":"10.1109/ICCITECHN.2010.5723853","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723853","url":null,"abstract":"This paper proposes a soft computing approach to manage uncertainty and rule discovery by reasoning over inconsistent, incomplete and fragmentary information using dominance-based rough set theories. A methodological and computational basis is illustrated in a sensor network application scenario of a forest fire detection system.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117216832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}