首页 > 最新文献

2010 13th International Conference on Computer and Information Technology (ICCIT)最新文献

英文 中文
An agent-based cooperative communication method in wireless sensor network for port logistics 港口物流无线传感器网络中基于agent的协同通信方法
Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723907
Haosong Gou, Md. Kafil Uddin, M. Hossen
Cooperative communication has been considered as a promising method for benefiting the advantages from MIMO (multiple-input multiple-output) system for single antenna mobiles in the wireless network, and many important milestones in this area have been achieved, leading to a flurry of research activity. Especially, cooperative communication in wireless sensor networks (WSNs) has gained so much interest due to the limitations of WSNs. This paper proposes a new cooperative communication method for WSNs in port logistics according to the observation of real application in port. In our proposed method, we use some fixed agents to help the sensor nodes to gain more efficient communication in the network. The simulation results and analysis show that our method achieves a good performance in enhancing the transmission and energy efficiency, resulting in improvement of the communication performance of the whole network.
协作通信被认为是利用无线网络中单天线移动设备多输入多输出(MIMO)系统优势的一种很有前途的方法,在这一领域已经取得了许多重要的里程碑式的成就,导致了一系列的研究活动。由于无线传感器网络自身的局限性,无线传感器网络中的协同通信受到了广泛的关注。通过对港口物流中无线传感器网络实际应用情况的观察,提出了一种新的港口物流无线传感器网络协同通信方法。在我们提出的方法中,我们使用一些固定的代理来帮助传感器节点在网络中获得更有效的通信。仿真结果和分析表明,该方法在提高传输效率和能量效率方面取得了良好的效果,从而提高了整个网络的通信性能。
{"title":"An agent-based cooperative communication method in wireless sensor network for port logistics","authors":"Haosong Gou, Md. Kafil Uddin, M. Hossen","doi":"10.1109/ICCITECHN.2010.5723907","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723907","url":null,"abstract":"Cooperative communication has been considered as a promising method for benefiting the advantages from MIMO (multiple-input multiple-output) system for single antenna mobiles in the wireless network, and many important milestones in this area have been achieved, leading to a flurry of research activity. Especially, cooperative communication in wireless sensor networks (WSNs) has gained so much interest due to the limitations of WSNs. This paper proposes a new cooperative communication method for WSNs in port logistics according to the observation of real application in port. In our proposed method, we use some fixed agents to help the sensor nodes to gain more efficient communication in the network. The simulation results and analysis show that our method achieves a good performance in enhancing the transmission and energy efficiency, resulting in improvement of the communication performance of the whole network.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122827464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optical encryption system employing orthogonal code and multiple reference-based joint transform correlation 采用正交码和基于多参考的联合变换相关的光学加密系统
Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723903
M. Islam, M. Karim
The paper proposes a new technology to ensure enhanced security of personal identification information or binary images through the use of encryption and multiplexing processes. Orthogonal codes are employed to encrypt the given input images so that multiple encoded images can then be mixed together to save storage space or transmission bandwidth. The multiplexed and encoded image is further encrypted employing multiple reference-based joint transform correlation. The address code is fed into four channels after performing phase shifting on them by different amount. The input image is introduced to the channels to obtain joint power spectra (JPS) signals through Fourier transformation. The resultant signals are phase-shifted and then combined to form a modified JPS signal which is then inverse Fourier transformed to yield the final and highly secure encrypted image. At the receiver, the image is Fourier transformed and multiplied by the address code used in encryption. Inverse Fourier transformation yields the multiplexed and encoded image which is then decoded using orthogonal codes. The proposed technique enhances the security performance by implementing orthogonal coding and nonlinear encryption algorithms so that no unauthorized access to or interception of information is possible. Performance of the technique is evaluated through computer simulation.
本文提出了一种新的技术,通过使用加密和复用处理来提高个人身份信息或二值图像的安全性。采用正交码对给定的输入图像进行加密,以便将多个编码后的图像混合在一起,从而节省存储空间或传输带宽。采用基于多个参考的联合变换相关对复用编码后的图像进行进一步加密。将地址码按不同的量进行相移后送入四个信道。将输入图像引入信道,通过傅里叶变换得到联合功率谱信号。由此产生的信号相移,然后组合形成一个修改的JPS信号,然后进行傅里叶反变换,以产生最终的和高度安全的加密图像。在接收端,图像经过傅里叶变换并乘以用于加密的地址码。傅里叶反变换产生复用和编码图像,然后使用正交编码解码。该技术通过实现正交编码和非线性加密算法来提高安全性能,从而防止信息被非法访问或截获。通过计算机仿真对该技术的性能进行了评价。
{"title":"Optical encryption system employing orthogonal code and multiple reference-based joint transform correlation","authors":"M. Islam, M. Karim","doi":"10.1109/ICCITECHN.2010.5723903","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723903","url":null,"abstract":"The paper proposes a new technology to ensure enhanced security of personal identification information or binary images through the use of encryption and multiplexing processes. Orthogonal codes are employed to encrypt the given input images so that multiple encoded images can then be mixed together to save storage space or transmission bandwidth. The multiplexed and encoded image is further encrypted employing multiple reference-based joint transform correlation. The address code is fed into four channels after performing phase shifting on them by different amount. The input image is introduced to the channels to obtain joint power spectra (JPS) signals through Fourier transformation. The resultant signals are phase-shifted and then combined to form a modified JPS signal which is then inverse Fourier transformed to yield the final and highly secure encrypted image. At the receiver, the image is Fourier transformed and multiplied by the address code used in encryption. Inverse Fourier transformation yields the multiplexed and encoded image which is then decoded using orthogonal codes. The proposed technique enhances the security performance by implementing orthogonal coding and nonlinear encryption algorithms so that no unauthorized access to or interception of information is possible. Performance of the technique is evaluated through computer simulation.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125442187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Session management protocol for virtual classroom in teleteaching 远程教学中虚拟课堂的会话管理协议
Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723879
Pallab Biswas, V. Nair, Soumen Nandi, S. Biswas, Amit Biswas, Animesh Dutta
Classroom teaching has always been a face to face interaction between students and teachers and here in the proposed system we would like to preserve this aspect of teaching with help of information and communication technology. We like to bring this quality along with the concept of geographical independence in a distributed system. Teleteaching as in any collaborative system is difficult to model. Before any implementation we need to model the system. Here we have used ontology to create a level of abstraction which broadly defines a model and the dependencies of activities, thus, making the system easy to interact and modify.
课堂教学一直是学生和老师面对面的互动,在这个系统中,我们希望通过信息和通信技术的帮助来保留这方面的教学。我们喜欢将这种特性与分布式系统中地理独立性的概念结合起来。远程教学在任何协作系统中都很难建模。在任何实现之前,我们需要对系统建模。在这里,我们使用本体来创建一个抽象级别,它广泛地定义了一个模型和活动的依赖关系,从而使系统易于交互和修改。
{"title":"Session management protocol for virtual classroom in teleteaching","authors":"Pallab Biswas, V. Nair, Soumen Nandi, S. Biswas, Amit Biswas, Animesh Dutta","doi":"10.1109/ICCITECHN.2010.5723879","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723879","url":null,"abstract":"Classroom teaching has always been a face to face interaction between students and teachers and here in the proposed system we would like to preserve this aspect of teaching with help of information and communication technology. We like to bring this quality along with the concept of geographical independence in a distributed system. Teleteaching as in any collaborative system is difficult to model. Before any implementation we need to model the system. Here we have used ontology to create a level of abstraction which broadly defines a model and the dependencies of activities, thus, making the system easy to interact and modify.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125577114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Theoretical maximum throughput of IEEE 802.11e EDCA mechanism IEEE 802.11e EDCA机制的理论最大吞吐量
Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723927
N. M. Shafiul Kabir Chowdhury, Md. Shahriar Hussain, Farruk Ahmed
The goal of this paper is to validate a formulae, originally derived to calculate the throughout upper bound of the IEEE 802.11 networks, over a single Access Point (AP) based WLAN system combined with the IEEE 802.11e EDCA mechanism. In this paper some important assumptions are made to keep the formulae very simple. The most important assumption is that, the AP is providing service to client nodes with only one type of Access Category (AC) traffic at an instant. Comparing both the theoretically achieved maximum throughput and simulation results, for different access categories (ACs) and for different packet sizes we observed that the formulae is pretty much accurate except for only one test case.
本文的目标是验证一个公式,该公式最初推导用于计算基于单一接入点(AP)的WLAN系统与IEEE 802.11e EDCA机制相结合的IEEE 802.11网络的整个上界。为了使公式简单,本文做了一些重要的假设。最重要的假设是,AP在同一时刻仅以一种AC (Access Category)流量向客户端节点提供服务。比较理论实现的最大吞吐量和模拟结果,对于不同的访问类别(ac)和不同的数据包大小,我们观察到公式非常准确,除了一个测试用例。
{"title":"Theoretical maximum throughput of IEEE 802.11e EDCA mechanism","authors":"N. M. Shafiul Kabir Chowdhury, Md. Shahriar Hussain, Farruk Ahmed","doi":"10.1109/ICCITECHN.2010.5723927","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723927","url":null,"abstract":"The goal of this paper is to validate a formulae, originally derived to calculate the throughout upper bound of the IEEE 802.11 networks, over a single Access Point (AP) based WLAN system combined with the IEEE 802.11e EDCA mechanism. In this paper some important assumptions are made to keep the formulae very simple. The most important assumption is that, the AP is providing service to client nodes with only one type of Access Category (AC) traffic at an instant. Comparing both the theoretically achieved maximum throughput and simulation results, for different access categories (ACs) and for different packet sizes we observed that the formulae is pretty much accurate except for only one test case.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121130518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A low cost realization of quantum double qutrit multiplier using ion-trap scheme 离子阱方案低成本实现量子双量程倍增器
Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723820
Faisal Mohsin
In this paper, we have shown a new design for double qutrit multiplier for quantum computer. This multiplier can be an essential part of quantum arithmetic logic unit (ALU). This proposal is based on ion-trap scheme of quantum computer, which is practically realizable using current technology.
本文提出了一种用于量子计算机的双量程乘法器的新设计。该乘法器可作为量子算术逻辑单元(ALU)的重要组成部分。该方案基于量子计算机的离子阱方案,在现有技术条件下是可以实际实现的。
{"title":"A low cost realization of quantum double qutrit multiplier using ion-trap scheme","authors":"Faisal Mohsin","doi":"10.1109/ICCITECHN.2010.5723820","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723820","url":null,"abstract":"In this paper, we have shown a new design for double qutrit multiplier for quantum computer. This multiplier can be an essential part of quantum arithmetic logic unit (ALU). This proposal is based on ion-trap scheme of quantum computer, which is practically realizable using current technology.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122194495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Shared key vulnerability in IEEE 802.16e: Analysis & solution IEEE 802.16e共享密钥漏洞分析与解决方案
Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723926
A.K.M. Nazmus Sakib, M. M. S. Kowsar
As a promising broadband wireless technology, WiMAX has many salient advantages over such as: high data rates, quality of service, scalability, security and mobility. Many sophisticated authentication and encryption techniques have been embedded into WiMAX but it still facing a lot of challenging situations. This paper shows different security vulnerabilities found in IEEE 802.16e and gives possible solutions to eliminate them. These vulnerabilities are the possibilities to forge key messages in Multi- and Broadcast operation, some unauthenticated messages which are susceptible to forgery and the unencrypted management communication which reveals important management information. We modify DH key exchange protocol to fit it into mobile WiMAX network as well as eliminate existing weakness in original DH key exchange protocol.
作为一种极具发展前景的宽带无线技术,WiMAX具有数据传输速率高、服务质量好、可扩展性强、安全性好、移动性强等显著优点。许多复杂的认证和加密技术已经嵌入到WiMAX中,但它仍然面临着许多具有挑战性的情况。本文展示了IEEE 802.16e中发现的不同安全漏洞,并给出了消除这些漏洞的可能解决方案。这些漏洞包括多播操作中关键消息被伪造的可能性,一些未经认证的消息容易被伪造,以及未加密的管理通信泄露了重要的管理信息。我们对DH密钥交换协议进行了修改,使其适应移动WiMAX网络,并消除了原有DH密钥交换协议存在的不足。
{"title":"Shared key vulnerability in IEEE 802.16e: Analysis & solution","authors":"A.K.M. Nazmus Sakib, M. M. S. Kowsar","doi":"10.1109/ICCITECHN.2010.5723926","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723926","url":null,"abstract":"As a promising broadband wireless technology, WiMAX has many salient advantages over such as: high data rates, quality of service, scalability, security and mobility. Many sophisticated authentication and encryption techniques have been embedded into WiMAX but it still facing a lot of challenging situations. This paper shows different security vulnerabilities found in IEEE 802.16e and gives possible solutions to eliminate them. These vulnerabilities are the possibilities to forge key messages in Multi- and Broadcast operation, some unauthenticated messages which are susceptible to forgery and the unencrypted management communication which reveals important management information. We modify DH key exchange protocol to fit it into mobile WiMAX network as well as eliminate existing weakness in original DH key exchange protocol.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114632825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Performance comparison of Selection Combining diversity receivers for different modulation schemes in OFDM system OFDM系统中不同调制方案的选择组合分集接收机性能比较
Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723922
Nadia Nowshin, A. Arifuzzman, Md. Anwar Hossain, M. Tarique
This paper deals with the performance analysis (i.e., Symbol Error Rate) of M-ary Phase-shift-keying (M-PSK) and M-ary Quadrature Amplitude Modulation (M-QAM) to transmit information using Selection Combining (SC) diversity technique over flat Rayleigh communication channel with Orthogonal Frequency Division Multiplexing (OFDM). It is well known that the multipath fading phenomenon is an inherent characteristic of wireless channel. In this paper, it is shown how selection combining diversity scheme enhances reliability in wireless communication by minimizing the channel fluctuations due to fading. The simulation results show that the Signal-to-Noise Ration (SNR) varies between M-PSK and M-QAM but better SNR gain achieved as the number of receiving antenna increases like for two, three and four receiving antennas around 20–27 dB, 22–30 dB, 23–31 dB diversity gains are found respectively.
本文研究了在正交频分复用(OFDM)的平坦瑞利通信信道上,利用选择组合(SC)分集技术,利用移相键控(M-PSK)和正交调幅(M-QAM)传输信息的性能分析(即码元错误率)。众所周知,多径衰落现象是无线信道的固有特性。本文介绍了选择组合分集方案如何通过减小信道因衰落引起的波动来提高无线通信的可靠性。仿真结果表明,M-PSK和M-QAM的信噪比(SNR)不同,但随着接收天线数量的增加,信噪比增益有所提高,两根、三根和四根接收天线的分集增益分别约为20-27 dB、22-30 dB和23-31 dB。
{"title":"Performance comparison of Selection Combining diversity receivers for different modulation schemes in OFDM system","authors":"Nadia Nowshin, A. Arifuzzman, Md. Anwar Hossain, M. Tarique","doi":"10.1109/ICCITECHN.2010.5723922","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723922","url":null,"abstract":"This paper deals with the performance analysis (i.e., Symbol Error Rate) of M-ary Phase-shift-keying (M-PSK) and M-ary Quadrature Amplitude Modulation (M-QAM) to transmit information using Selection Combining (SC) diversity technique over flat Rayleigh communication channel with Orthogonal Frequency Division Multiplexing (OFDM). It is well known that the multipath fading phenomenon is an inherent characteristic of wireless channel. In this paper, it is shown how selection combining diversity scheme enhances reliability in wireless communication by minimizing the channel fluctuations due to fading. The simulation results show that the Signal-to-Noise Ration (SNR) varies between M-PSK and M-QAM but better SNR gain achieved as the number of receiving antenna increases like for two, three and four receiving antennas around 20–27 dB, 22–30 dB, 23–31 dB diversity gains are found respectively.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130030720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An encoding technique for design and optimization of combinational logic circuit 一种用于组合逻辑电路设计与优化的编码技术
Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723860
D. Bhadra, T. A. Tarique, S. U. Ahmed, M. Shahjahan, K. Murase
A neural representation of combinational logic circuit is proposed, called ‘Logical Neural Network’ (LNN). LNN is a feed-forward neural network (NN) where the weights of the network indicate the connections of digital circuit. The logic operations of the circuit such as AND, OR, NOR etc are performed with the neurons of LNN. A modification of Simple Genetic Algorithm (mSGA) is applied to design and optimize the LNN for a given truth table. The proposed technique is experimentally studied on four bit parity checker, two bit multiplexer, two bit full adder, full subtractor, and two bit multiplier circuits. LNN is compared with conventional ‘Cell Array’ method. LNN outperforms the Cell Array method in terms of number of required gates.
提出了一种组合逻辑电路的神经表示,称为“逻辑神经网络”(LNN)。LNN是一种前馈神经网络,网络的权值表示数字电路的连接。电路的与、或、非或等逻辑运算是通过LNN的神经元来完成的。采用一种改进的简单遗传算法(mSGA)对给定真值表设计和优化LNN。该技术在四位奇偶校验器、两位多路复用器、两位全加法器、全减法器和两位乘法器电路上进行了实验研究。将LNN与传统的“单元阵列”方法进行了比较。LNN在所需门的数量方面优于单元阵列方法。
{"title":"An encoding technique for design and optimization of combinational logic circuit","authors":"D. Bhadra, T. A. Tarique, S. U. Ahmed, M. Shahjahan, K. Murase","doi":"10.1109/ICCITECHN.2010.5723860","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723860","url":null,"abstract":"A neural representation of combinational logic circuit is proposed, called ‘Logical Neural Network’ (LNN). LNN is a feed-forward neural network (NN) where the weights of the network indicate the connections of digital circuit. The logic operations of the circuit such as AND, OR, NOR etc are performed with the neurons of LNN. A modification of Simple Genetic Algorithm (mSGA) is applied to design and optimize the LNN for a given truth table. The proposed technique is experimentally studied on four bit parity checker, two bit multiplexer, two bit full adder, full subtractor, and two bit multiplier circuits. LNN is compared with conventional ‘Cell Array’ method. LNN outperforms the Cell Array method in terms of number of required gates.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"2419 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130770312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Efficient computation for k-dominant skyline queries with domination power index 具有支配权指数的k-支配天际线查询的高效计算
Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723888
Md. Anisuzzaman Siddique, Y. Morimoto
Skyline queries have recently attracted a lot of attention for its intuitive query formulation. It can act as a filter to discard sub-optimal objects. However, a major drawback of skyline is that, in datasets with many dimensions, the number of skyline objects becomes large and no longer offer any interesting insights. To solve the problem, recently k-dominant skyline queries have been introduced, which can reduce the number of skyline objects by relaxing the definition of the dominance. This paper addresses the problem of k-dominant skyline objects for high dimensional dataset. We propose algorithms for k-dominant skyline computation. Through extensive experiments with real and synthetic datasets, we show that our algorithms can efficiently compute k-dominant skyline queries.
Skyline查询最近因其直观的查询公式而引起了很多关注。它可以作为一个过滤器来丢弃次优对象。然而,天际线的一个主要缺点是,在多维数据集中,天际线对象的数量变得很大,不再提供任何有趣的见解。为了解决这个问题,最近引入了k主导的天际线查询,它可以通过放松主导的定义来减少天际线对象的数量。本文研究了高维数据集的k-显性天际线对象问题。我们提出了k-主导型天际线计算算法。通过对真实和合成数据集的大量实验,我们表明我们的算法可以有效地计算k主导的天际线查询。
{"title":"Efficient computation for k-dominant skyline queries with domination power index","authors":"Md. Anisuzzaman Siddique, Y. Morimoto","doi":"10.1109/ICCITECHN.2010.5723888","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723888","url":null,"abstract":"Skyline queries have recently attracted a lot of attention for its intuitive query formulation. It can act as a filter to discard sub-optimal objects. However, a major drawback of skyline is that, in datasets with many dimensions, the number of skyline objects becomes large and no longer offer any interesting insights. To solve the problem, recently k-dominant skyline queries have been introduced, which can reduce the number of skyline objects by relaxing the definition of the dominance. This paper addresses the problem of k-dominant skyline objects for high dimensional dataset. We propose algorithms for k-dominant skyline computation. Through extensive experiments with real and synthetic datasets, we show that our algorithms can efficiently compute k-dominant skyline queries.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"07 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134009736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimization of control parameter of Differential Evolution algorithm for efficient design of FIR filter 差分进化算法控制参数的优化,以实现FIR滤波器的高效设计
Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723867
S. Chattopadhyay, S. K. Sanyal, A. Chandra
Modern signal processing applications invoke various evolutionary algorithms in different areas such as aerodynamic shape optimization, pattern recognition, digital filter design, automated mirror design etc. Presently, Differential Evolution (DE) algorithm has proved to be quite efficient in these areas. Digital filters of various kinds can be designed using this particular evolutionary technique. In this paper, we have studied the effect of an important control parameter namely, the Weighting Factor, on the convergence speed of the DE algorithm, associated with the efficient design of low-pass FIR filter being used subsequently as a pulse-shaping filter in a QPSK modulated system. Finally, the optimized value of the Weighting Factor for this specific design problem has been suggested. Experimentally measured Eye diagrams confirm the optimized value.
现代信号处理应用在不同领域调用了各种进化算法,如气动形状优化、模式识别、数字滤波器设计、自动反射镜设计等。目前,差分进化(DE)算法在这些领域已经被证明是非常有效的。使用这种特殊的进化技术可以设计各种数字滤波器。在本文中,我们研究了一个重要的控制参数,即加权因子,对DE算法的收敛速度的影响,并与低通FIR滤波器的有效设计相关联,随后在QPSK调制系统中用作脉冲整形滤波器。最后,针对这一具体设计问题,提出了加权系数的优化值。实验测量的眼图证实了优化值。
{"title":"Optimization of control parameter of Differential Evolution algorithm for efficient design of FIR filter","authors":"S. Chattopadhyay, S. K. Sanyal, A. Chandra","doi":"10.1109/ICCITECHN.2010.5723867","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723867","url":null,"abstract":"Modern signal processing applications invoke various evolutionary algorithms in different areas such as aerodynamic shape optimization, pattern recognition, digital filter design, automated mirror design etc. Presently, Differential Evolution (DE) algorithm has proved to be quite efficient in these areas. Digital filters of various kinds can be designed using this particular evolutionary technique. In this paper, we have studied the effect of an important control parameter namely, the Weighting Factor, on the convergence speed of the DE algorithm, associated with the efficient design of low-pass FIR filter being used subsequently as a pulse-shaping filter in a QPSK modulated system. Finally, the optimized value of the Weighting Factor for this specific design problem has been suggested. Experimentally measured Eye diagrams confirm the optimized value.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133814981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2010 13th International Conference on Computer and Information Technology (ICCIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1