Pub Date : 2010-12-01DOI: 10.1109/ICCITECHN.2010.5723847
P. Biswas, S. Rahim
In this blooming age of information technology the web developers always intend to provide a vast information space to the Internet surfers. On the other side, the users always want to reach the desired information by least effort. As a result, the increasing volume of information in each website also enlarges the searching domain for the user. In many cases, the user fails to spot his desired information at a quick outlook and then frequently switches to other similar websites. Some approaches like Sitemap, Footprints etc. give an overview of the site contents but often fail to guide the user to his destined information. This paper proposes a new approach named Pagemap, which can guide a user to the most popular and relevant pages of that website based on user's current location within that domain. With the assistance of the access log file, Pagemap uses the previous browsing history to find the most popular pages in a website. Pagemap uses the vector space model to find out the pages with maximum matching in compare to the current page of the user. Usability analysis method is used to justify the efficiency of Pagemap which shows it's the usefulness of this approach.
{"title":"Pagemap: A dynamic user guiding approach to the most relevant and popular pages in a website","authors":"P. Biswas, S. Rahim","doi":"10.1109/ICCITECHN.2010.5723847","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723847","url":null,"abstract":"In this blooming age of information technology the web developers always intend to provide a vast information space to the Internet surfers. On the other side, the users always want to reach the desired information by least effort. As a result, the increasing volume of information in each website also enlarges the searching domain for the user. In many cases, the user fails to spot his desired information at a quick outlook and then frequently switches to other similar websites. Some approaches like Sitemap, Footprints etc. give an overview of the site contents but often fail to guide the user to his destined information. This paper proposes a new approach named Pagemap, which can guide a user to the most popular and relevant pages of that website based on user's current location within that domain. With the assistance of the access log file, Pagemap uses the previous browsing history to find the most popular pages in a website. Pagemap uses the vector space model to find out the pages with maximum matching in compare to the current page of the user. Usability analysis method is used to justify the efficiency of Pagemap which shows it's the usefulness of this approach.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128719931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-01DOI: 10.1109/ICCITECHN.2010.5723913
Md.Mosaddek Khan, M. T. Hamid, Syed Kutub Uddin Ahmed
The IEEE 802.11 MAC layer protocol is designed for single channel. The improvement of network throughput can be done through the enhancement of spatial reuse and the reduction of transmission collusions by the utilization of multiple channels is important. Channel allocation can exploit the multi-channel missing receiver problem besides there are other problems such as the primordial hidden terminal and exposed terminal problem. Existing multi-channel MAC protocols experience either higher hardware cost (because of applying multiple transceivers) or lower channel utilization (due to limited transmission opportunity). Previous approaches that use RTS/CTS or other modified ideas sometimes are not enough to meet the demands. In this paper, a fully distributed channel hopping solution has been discussed as, The Modified Cyclic-Quorum-based Multichannel (M-CQM) MAC protocol. Cyclic quorum is used here in an efficient way. The proposed protocol has several attractive features. Sender is guaranteed to meet its receiver in a short time. Each node's channel hopping sequence is derived from its node ID and the layer it belongs. This proposed idea also tries to divide the physical location into three basic zones which removes the load of RTS/CTS or other similar approaches. We have evaluated our proposed approach (M-CQM) in network simulator (ns-2.34) and it outperforms existing proposals.
{"title":"A Cyclic Quorum based multi-channel MAC protocol with layered approach for mobile ad-hoc networks","authors":"Md.Mosaddek Khan, M. T. Hamid, Syed Kutub Uddin Ahmed","doi":"10.1109/ICCITECHN.2010.5723913","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723913","url":null,"abstract":"The IEEE 802.11 MAC layer protocol is designed for single channel. The improvement of network throughput can be done through the enhancement of spatial reuse and the reduction of transmission collusions by the utilization of multiple channels is important. Channel allocation can exploit the multi-channel missing receiver problem besides there are other problems such as the primordial hidden terminal and exposed terminal problem. Existing multi-channel MAC protocols experience either higher hardware cost (because of applying multiple transceivers) or lower channel utilization (due to limited transmission opportunity). Previous approaches that use RTS/CTS or other modified ideas sometimes are not enough to meet the demands. In this paper, a fully distributed channel hopping solution has been discussed as, The Modified Cyclic-Quorum-based Multichannel (M-CQM) MAC protocol. Cyclic quorum is used here in an efficient way. The proposed protocol has several attractive features. Sender is guaranteed to meet its receiver in a short time. Each node's channel hopping sequence is derived from its node ID and the layer it belongs. This proposed idea also tries to divide the physical location into three basic zones which removes the load of RTS/CTS or other similar approaches. We have evaluated our proposed approach (M-CQM) in network simulator (ns-2.34) and it outperforms existing proposals.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131209152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-01DOI: 10.1109/ICCITECHN.2010.5723866
A. K. Amirruddin, M. H. Razali, Emishaw D. Iffa
Simplified visualisation of the fuel spray developing process of varied ethanol content in an open spray by the liquid injection technique. For obtaining spray characteristics in the liquid, the visualisation principles were based on spray penetrations images. The video imaging and schlieren technique have been used to investigate the spray development and behaviours at different injection time defined as the delay time from the start of injection (SOI) to the image recording in the viewing area. Five different gasoline-ethanol fuel blend rates by volume are prepared. The Image of the spray is captured using schlieren imaging technique and image processing is employed to extract macro spray characteristics- spray tip penetration and spray cone angle. Based on the extracted tip penetration and cone angles E55 gasoline-ethanol blend found out to have the largest cone angle and tip penetration among the tested blends.
{"title":"Imaging investigation on the spray penetration of Gasohol blends image","authors":"A. K. Amirruddin, M. H. Razali, Emishaw D. Iffa","doi":"10.1109/ICCITECHN.2010.5723866","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723866","url":null,"abstract":"Simplified visualisation of the fuel spray developing process of varied ethanol content in an open spray by the liquid injection technique. For obtaining spray characteristics in the liquid, the visualisation principles were based on spray penetrations images. The video imaging and schlieren technique have been used to investigate the spray development and behaviours at different injection time defined as the delay time from the start of injection (SOI) to the image recording in the viewing area. Five different gasoline-ethanol fuel blend rates by volume are prepared. The Image of the spray is captured using schlieren imaging technique and image processing is employed to extract macro spray characteristics- spray tip penetration and spray cone angle. Based on the extracted tip penetration and cone angles E55 gasoline-ethanol blend found out to have the largest cone angle and tip penetration among the tested blends.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114949314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-01DOI: 10.1109/ICCITECHN.2010.5723838
Md. Nawab Yousuf Ali, Abu Mohammad Nurannabi, M. A. Ali, J. Das, Golum Farook Ahmed
Conversion from Bangla language to another native language using Universal Networking Language (UNL) is highly demanding due to increasing the usage of Internet based application. Since Bangla case structure plays a fundamental role in Bangla grammartical structures, this paper presents some rules for Bangla case structures that will be used to convert Bangla sentence to UNL expression. The theoretical analysis shows that the defined rules can be used successful conversion of Bangla sentence.
{"title":"Conversion of Bangla sentence for Universal Networking Language","authors":"Md. Nawab Yousuf Ali, Abu Mohammad Nurannabi, M. A. Ali, J. Das, Golum Farook Ahmed","doi":"10.1109/ICCITECHN.2010.5723838","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723838","url":null,"abstract":"Conversion from Bangla language to another native language using Universal Networking Language (UNL) is highly demanding due to increasing the usage of Internet based application. Since Bangla case structure plays a fundamental role in Bangla grammartical structures, this paper presents some rules for Bangla case structures that will be used to convert Bangla sentence to UNL expression. The theoretical analysis shows that the defined rules can be used successful conversion of Bangla sentence.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124787314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-01DOI: 10.1109/ICCITECHN.2010.5723891
Fariha Tasmin Jaigirdar, M. Bhuiyan, S. Al Noor
Different approaches have been proposed for digital display of bangla numerals and also characters. But a complete and accurate scheme not has been done yet. We approach a complete low cost and fair design to display bangla numerals, bangla characters (vowel, consonant and shortened form of these characters), also English and Arabic numerals and all English character's represented as 120 character displayed by only 34 segments with tiny bits of binary code and differently usable architecture made this approach favorable. This scheme can be effectively used instead of other alternatives as less complex, economic and complete. With this framework, other characters also can be displayed as manufacturer specification.
{"title":"Sustainable approach to segmented digital display: Complete, precise and economic","authors":"Fariha Tasmin Jaigirdar, M. Bhuiyan, S. Al Noor","doi":"10.1109/ICCITECHN.2010.5723891","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723891","url":null,"abstract":"Different approaches have been proposed for digital display of bangla numerals and also characters. But a complete and accurate scheme not has been done yet. We approach a complete low cost and fair design to display bangla numerals, bangla characters (vowel, consonant and shortened form of these characters), also English and Arabic numerals and all English character's represented as 120 character displayed by only 34 segments with tiny bits of binary code and differently usable architecture made this approach favorable. This scheme can be effectively used instead of other alternatives as less complex, economic and complete. With this framework, other characters also can be displayed as manufacturer specification.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129597520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-01DOI: 10.1109/ICCITECHN.2010.5723873
A. Habib, A. S. M. Latiful Hoque
Considering the rapid expansion of the usage of mobile communication devices in Bangladesh, development of technology and reduction in cost, well designed mobile based e-learning framework is expected to contribute significantly in educational development and thereby having a long term effect on poverty alleviation. This paper shows an M-Learning framework for Bangladesh.
{"title":"Towards mobile based e-learning in Bangladesh: A framework","authors":"A. Habib, A. S. M. Latiful Hoque","doi":"10.1109/ICCITECHN.2010.5723873","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723873","url":null,"abstract":"Considering the rapid expansion of the usage of mobile communication devices in Bangladesh, development of technology and reduction in cost, well designed mobile based e-learning framework is expected to contribute significantly in educational development and thereby having a long term effect on poverty alleviation. This paper shows an M-Learning framework for Bangladesh.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129821480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-01DOI: 10.1109/ICCITECHN.2010.5723883
M. Moniruzzaman, Md. Sadek Ferdous, Roksana Hossain
Internet has gained huge popularity over the last decade. It offers its users reliable, efficient and exciting online services. However, the users reveal a lot of their personal information by using these services. Websites that collect information state their practices with data in their privacy policies. However, it is difficult to ensure if the policies are enforced properly in their practices. This can lead to unintentional leakage of private information to unauthorized parties and thus increase the chance of private data to be misused. Taking the help of legal systems is expensive, time consuming and cannot compensate the loss completely. Therefore, an effective way to protect privacy is to use privacy policy to control data access. In this paper, we review some distinguished research works that address this problem. We also discuss the completeness of the privacy definition used in these works.
{"title":"A study of privacy policy enforcement in access control models","authors":"M. Moniruzzaman, Md. Sadek Ferdous, Roksana Hossain","doi":"10.1109/ICCITECHN.2010.5723883","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723883","url":null,"abstract":"Internet has gained huge popularity over the last decade. It offers its users reliable, efficient and exciting online services. However, the users reveal a lot of their personal information by using these services. Websites that collect information state their practices with data in their privacy policies. However, it is difficult to ensure if the policies are enforced properly in their practices. This can lead to unintentional leakage of private information to unauthorized parties and thus increase the chance of private data to be misused. Taking the help of legal systems is expensive, time consuming and cannot compensate the loss completely. Therefore, an effective way to protect privacy is to use privacy policy to control data access. In this paper, we review some distinguished research works that address this problem. We also discuss the completeness of the privacy definition used in these works.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130186345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Automated Essay Grading (AEG) is a very important research area in educational technology. Latent Semantic Analysis (LSA) is an information retrieval technique used for automated essay grading. LSA forms a word by document matrix and then the matrix is decomposed using Singular Value Decomposition (SVD) technique. Existing AEG systems based on LSA cannot achieve higher level of performance to be a replica of human grader. We have developed an AEG system using Generalized Latent Semantic Analysis (GLSA) which makes n-gram by document matrix instead of word by document matrix. We have evaluated this system using details representation and showed the performance of the system. Experimental results show that our system outperforms the existing system.
{"title":"Automated essay scoring using Generalized Latent Semantic Analysis","authors":"Md. Monjurul Islam, A. S. M. L. Hoque","doi":"10.4304/jcp.7.3.616-626","DOIUrl":"https://doi.org/10.4304/jcp.7.3.616-626","url":null,"abstract":"Automated Essay Grading (AEG) is a very important research area in educational technology. Latent Semantic Analysis (LSA) is an information retrieval technique used for automated essay grading. LSA forms a word by document matrix and then the matrix is decomposed using Singular Value Decomposition (SVD) technique. Existing AEG systems based on LSA cannot achieve higher level of performance to be a replica of human grader. We have developed an AEG system using Generalized Latent Semantic Analysis (GLSA) which makes n-gram by document matrix instead of word by document matrix. We have evaluated this system using details representation and showed the performance of the system. Experimental results show that our system outperforms the existing system.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128754285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-01DOI: 10.1109/ICCITECHN.2010.5723858
Syed Iftekhar Ali, Md. Shafiqul Islam
Ternary content-addressable memory (TCAM) has become popular in high-speed lookup intensive applications. Large dynamic power consumption of TCAMs makes power reduction techniques an active area of research. In this paper we present a new match-line (ML) sensing scheme employing ML segmentation and positive feedback in the sense amplifier of the first segment. Simulation using 130nm 1.2V CMOS logic shows 26% speed enhancement and more than 47% energy reduction compared to conventional current-race sensing scheme at the cost of insignificant area overhead. Additionally, number of control signals required for TCAM operation has been kept minimum.
{"title":"A high-speed and low-power ternary CAM design using match-line segmentation and feedback in sense amplifiers","authors":"Syed Iftekhar Ali, Md. Shafiqul Islam","doi":"10.1109/ICCITECHN.2010.5723858","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723858","url":null,"abstract":"Ternary content-addressable memory (TCAM) has become popular in high-speed lookup intensive applications. Large dynamic power consumption of TCAMs makes power reduction techniques an active area of research. In this paper we present a new match-line (ML) sensing scheme employing ML segmentation and positive feedback in the sense amplifier of the first segment. Simulation using 130nm 1.2V CMOS logic shows 26% speed enhancement and more than 47% energy reduction compared to conventional current-race sensing scheme at the cost of insignificant area overhead. Additionally, number of control signals required for TCAM operation has been kept minimum.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126062247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-01DOI: 10.1109/ICCITECHN.2010.5723824
M. Crochemore, M. Hasan, Tanaeem M. Moosa, M. S. Rahman
In this paper, we present a cache oblivious efficient data structure to solve the two dimensional variant of the Range Minimum/Maximum Query (RMQ) problem.
在本文中,我们提出了一种缓存无关的高效数据结构来解决范围最小/最大查询(RMQ)问题的二维变体。
{"title":"Two dimensional Range Minimum/Maximum Query revisited","authors":"M. Crochemore, M. Hasan, Tanaeem M. Moosa, M. S. Rahman","doi":"10.1109/ICCITECHN.2010.5723824","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723824","url":null,"abstract":"In this paper, we present a cache oblivious efficient data structure to solve the two dimensional variant of the Range Minimum/Maximum Query (RMQ) problem.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122323532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}