首页 > 最新文献

2010 13th International Conference on Computer and Information Technology (ICCIT)最新文献

英文 中文
Application of Canny filter and DWT in fingerprint detection a new approach Canny滤波和DWT在指纹检测中的应用是一种新的方法
Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723865
N. Begum, M. Alam, M. I. Islam
Fingerprint detection is one of the most important applications of image processing in a security system. Recent literature deals with fingerprint detection based on pattern recognition, moment based image recognition and discrete wavelet transform (DWT). Among them DWT based analysis requires the least amount of memory space which considers only wavelet coefficient of an image in matching with preserved coefficient. This paper proposes a new approach, which combines image filtering and color inversion in enhancement of contrast along with two dimensional DWT to get the matrix of the image. Finally four statistical parameters: cross correlation coefficient, skewness, kurtosis and convolution of approximate coefficient of one dimensional DWT are compared in detection of fingerprint of a person.
指纹检测是图像处理在安防系统中的重要应用之一。最近的文献讨论了基于模式识别、基于矩的图像识别和离散小波变换(DWT)的指纹检测。其中基于小波变换的分析只考虑图像的小波系数与保留系数的匹配,占用的存储空间最小。本文提出了一种结合图像滤波和颜色反演增强对比度以及二维DWT来得到图像矩阵的新方法。最后比较了一维小波变换的相关系数、偏度、峰度和近似系数卷积4个统计参数在人的指纹检测中的应用。
{"title":"Application of Canny filter and DWT in fingerprint detection a new approach","authors":"N. Begum, M. Alam, M. I. Islam","doi":"10.1109/ICCITECHN.2010.5723865","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723865","url":null,"abstract":"Fingerprint detection is one of the most important applications of image processing in a security system. Recent literature deals with fingerprint detection based on pattern recognition, moment based image recognition and discrete wavelet transform (DWT). Among them DWT based analysis requires the least amount of memory space which considers only wavelet coefficient of an image in matching with preserved coefficient. This paper proposes a new approach, which combines image filtering and color inversion in enhancement of contrast along with two dimensional DWT to get the matrix of the image. Finally four statistical parameters: cross correlation coefficient, skewness, kurtosis and convolution of approximate coefficient of one dimensional DWT are compared in detection of fingerprint of a person.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127227100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On the design of quaternary comparators 四元比较器的设计
Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723862
I. Jahangir, A. Das
Quaternary logic requires a dedicated comparator circuit besides the usual add/sub unit which may not be optimal due to several reasons. In this paper, we have thoroughly discussed various alternative expressions for equality operator which serves as the basis for quaternary comparator. Then we have derived the necessary equations for single qudit comparator and extended it to serial multi qudit comparator. We have also shown the equations and design of single stage parallel comparator where restriction of fan-in is sacrificed for constant speed. We have ended our discussion with the design of a logarithmic stage parallel comparator which can compute the comparator output within log2(n) time delay for n qudits.
第四元逻辑除了通常的加/子单元外,还需要一个专用的比较器电路,由于几个原因,这可能不是最佳的。本文深入讨论了作为四元比较器基础的相等算子的各种替代表达式。然后推导了单量程比较器的必要方程,并将其推广到串行多量程比较器。我们还展示了单级并联比较器的方程和设计,其中牺牲了风扇的限制,以获得恒定的速度。我们已经结束了我们的讨论,设计了一个对数级并行比较器,它可以在log2(n)的时间延迟内计算n个量值的比较器输出。
{"title":"On the design of quaternary comparators","authors":"I. Jahangir, A. Das","doi":"10.1109/ICCITECHN.2010.5723862","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723862","url":null,"abstract":"Quaternary logic requires a dedicated comparator circuit besides the usual add/sub unit which may not be optimal due to several reasons. In this paper, we have thoroughly discussed various alternative expressions for equality operator which serves as the basis for quaternary comparator. Then we have derived the necessary equations for single qudit comparator and extended it to serial multi qudit comparator. We have also shown the equations and design of single stage parallel comparator where restriction of fan-in is sacrificed for constant speed. We have ended our discussion with the design of a logarithmic stage parallel comparator which can compute the comparator output within log2(n) time delay for n qudits.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114292439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A novel strategy to discover Internet gateways in mobile ad hoc networks 移动自组网中发现Internet网关的一种新策略
Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723914
S. Iqbal, M. I. Monir, S.M.R. Osmani, F. Chowdhury, A. K. Chowdhury, Kingshuk Dhar
Integrating nodes in a MANET to the Internet require either a connection to the Internet or they can connect to the Internet through the Internet gateways or servers. For the second case a node in a MANET has to find out the gateway or server to connect to the fixed nodes in the Internet. End to end packet delay and throughput are strongly dependent on the time needed to discover the gateways. A source node in a MANET can discover a gateway either by broadcasting a gateway discovery message or it may depend on periodic gateway advertisement messages from the gateways. The first one is renowned as reactive gateway discovery strategy and with this one a gateway in a MANET may receive the same gateway discovery message from different intermediate nodes. This paper presents a novel solution for connecting nodes in ad hoc network to the Internet. Here a gateway sends separate reply to the requestor for each request message having the same Broadcast ID it receives from that source in stead of sending only one unicast reply to the requestor. The AODV routing protocol has been used for routing in the MANET domain. We investigated our new strategy of gateway discovery in NS-2. Simulation results show that our one has better performance having lower delay and fewer packets drop.
将MANET中的节点集成到Internet需要连接到Internet,或者它们可以通过Internet网关或服务器连接到Internet。对于第二种情况,MANET中的节点必须找到连接到Internet中的固定节点的网关或服务器。端到端数据包延迟和吞吐量强烈依赖于发现网关所需的时间。MANET中的源节点可以通过广播网关发现消息或依赖于来自网关的定期网关发布消息来发现网关。第一种被称为响应式网关发现策略,使用这种策略,MANET中的网关可以从不同的中间节点接收相同的网关发现消息。本文提出了一种将自组织网络中的节点连接到Internet的新方案。在这里,网关为从该源接收到的具有相同Broadcast ID的每个请求消息向请求者发送单独的应答,而不是仅向请求者发送一个单播应答。在MANET域中,AODV路由协议已被用于路由。我们在NS-2中研究了新的网关发现策略。仿真结果表明,该算法具有较低的时延和较低的丢包率。
{"title":"A novel strategy to discover Internet gateways in mobile ad hoc networks","authors":"S. Iqbal, M. I. Monir, S.M.R. Osmani, F. Chowdhury, A. K. Chowdhury, Kingshuk Dhar","doi":"10.1109/ICCITECHN.2010.5723914","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723914","url":null,"abstract":"Integrating nodes in a MANET to the Internet require either a connection to the Internet or they can connect to the Internet through the Internet gateways or servers. For the second case a node in a MANET has to find out the gateway or server to connect to the fixed nodes in the Internet. End to end packet delay and throughput are strongly dependent on the time needed to discover the gateways. A source node in a MANET can discover a gateway either by broadcasting a gateway discovery message or it may depend on periodic gateway advertisement messages from the gateways. The first one is renowned as reactive gateway discovery strategy and with this one a gateway in a MANET may receive the same gateway discovery message from different intermediate nodes. This paper presents a novel solution for connecting nodes in ad hoc network to the Internet. Here a gateway sends separate reply to the requestor for each request message having the same Broadcast ID it receives from that source in stead of sending only one unicast reply to the requestor. The AODV routing protocol has been used for routing in the MANET domain. We investigated our new strategy of gateway discovery in NS-2. Simulation results show that our one has better performance having lower delay and fewer packets drop.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122455145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Development of mobile phone based surveillance system 基于手机的监控系统开发
Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723909
Badrun Nahar, Md Liakot Ali
In today's world, ensuring security for important locations is a burning issue. Different surveillance methodologies such as alarm system, CCTV, PC based video system are used to ensure this security. But using all these systems, it is not possible for a person to monitor the security of his or her desired location when they are outside. Now-a-days anybody can communicate with anyone at anytime around the globe with the help of mobile phone technology. By keeping the technological facility of mobile phone in mind, a mobile phone based surveillance system has been described in this paper. This paper will give a solution for the security of corporate houses as well as corporate personnel. In this system there are server and client end. Server will store images being captured by the webcam of an important location. Then based on clients request sending from their mobile phone to the server, clients will be able to view the images from their mobile phone that is stored in the server. Clients are also able to move the webcam by sending control instruction from their mobile phone to view the images of their desired position. The developed system has been tested first using the GUI (emulator) designed by NetBeans IDE. It has also been tested using different mobile phones to see the images in real time and it provides the true sense of real mobility and security by accessing the desired location from the mobile phone anytime anywhere whenever wishes. This surveillance system can also be implemented for other handheld devices like PDA.
在当今世界,确保重要地点的安全是一个亟待解决的问题。不同的监控方法,如报警系统,闭路电视,基于PC的视频系统,以确保这种安全。但是,使用所有这些系统,当一个人在外面时,不可能监控他或她想要的位置的安全。如今,在移动电话技术的帮助下,任何人都可以在全球任何时间与任何人进行通信。本文考虑到手机的技术优势,设计了一种基于手机的监控系统。本文将为企业房屋安全以及企业人员安全提供一个解决方案。本系统分为服务器端和客户端。服务器将存储由重要位置的网络摄像头捕获的图像。然后,根据客户从移动电话发送到服务器的请求,客户可以查看存储在服务器中的移动电话上的图像。客户还可以通过手机发送控制指令来移动网络摄像头,以查看他们想要的位置的图像。所开发的系统首先使用NetBeans IDE设计的GUI(仿真器)进行了测试。它也被测试使用不同的手机实时看到的图像,它提供了真正意义上的真正的流动性和安全性,从手机访问所需的位置,随时随地,无论何时希望。该监控系统也可以用于其他手持设备,如PDA。
{"title":"Development of mobile phone based surveillance system","authors":"Badrun Nahar, Md Liakot Ali","doi":"10.1109/ICCITECHN.2010.5723909","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723909","url":null,"abstract":"In today's world, ensuring security for important locations is a burning issue. Different surveillance methodologies such as alarm system, CCTV, PC based video system are used to ensure this security. But using all these systems, it is not possible for a person to monitor the security of his or her desired location when they are outside. Now-a-days anybody can communicate with anyone at anytime around the globe with the help of mobile phone technology. By keeping the technological facility of mobile phone in mind, a mobile phone based surveillance system has been described in this paper. This paper will give a solution for the security of corporate houses as well as corporate personnel. In this system there are server and client end. Server will store images being captured by the webcam of an important location. Then based on clients request sending from their mobile phone to the server, clients will be able to view the images from their mobile phone that is stored in the server. Clients are also able to move the webcam by sending control instruction from their mobile phone to view the images of their desired position. The developed system has been tested first using the GUI (emulator) designed by NetBeans IDE. It has also been tested using different mobile phones to see the images in real time and it provides the true sense of real mobility and security by accessing the desired location from the mobile phone anytime anywhere whenever wishes. This surveillance system can also be implemented for other handheld devices like PDA.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133118819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Performance of sub-carrier mapping in single carrier FDMA systems under radio mobile channels 无线移动信道下单载波FDMA系统的子载波映射性能
Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723850
M. Rana
Single carrier-frequency division multiple access (SC-FDMA) utilizes single carrier modulation at the transmitter and frequency domain equalization at the receiver. It has almost similar performance and essentially the same overall structure of an orthogonal frequency division multiple access (OFDMA) system with low peak to average power ratio (PAPR). Recently, the SC-FDMA has drawn great attention as an attractive alternative to OFDMA, in the uplink communications where lower PAPR greatly benefits the mobile terminal in terms of manufacturing cost as well as transmit power efficiency. Such power efficiency can provide considerable performance improvements in future wireless communication networks. This article outlines the basic principles of SC-FDMA systems with different types of sub-carrier mapping schemes. Simulation results demonstrate the performance of different sub-carrier mapping schemes under ideal and pedestrian channel condition.
单载波频分多址(SC-FDMA)在发送端使用单载波调制,在接收端使用频域均衡。它与低峰值平均功率比(PAPR)的正交频分多址(OFDMA)系统具有几乎相同的性能和基本相同的总体结构。近年来,SC-FDMA作为OFDMA的一种有吸引力的替代方案受到了广泛关注,在上行通信中,较低的PAPR大大有利于移动终端的制造成本和发射功率效率。这样的功率效率可以为未来的无线通信网络提供相当大的性能改进。本文概述了具有不同类型子载波映射方案的SC-FDMA系统的基本原理。仿真结果验证了不同子载波映射方案在理想信道和行人信道条件下的性能。
{"title":"Performance of sub-carrier mapping in single carrier FDMA systems under radio mobile channels","authors":"M. Rana","doi":"10.1109/ICCITECHN.2010.5723850","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723850","url":null,"abstract":"Single carrier-frequency division multiple access (SC-FDMA) utilizes single carrier modulation at the transmitter and frequency domain equalization at the receiver. It has almost similar performance and essentially the same overall structure of an orthogonal frequency division multiple access (OFDMA) system with low peak to average power ratio (PAPR). Recently, the SC-FDMA has drawn great attention as an attractive alternative to OFDMA, in the uplink communications where lower PAPR greatly benefits the mobile terminal in terms of manufacturing cost as well as transmit power efficiency. Such power efficiency can provide considerable performance improvements in future wireless communication networks. This article outlines the basic principles of SC-FDMA systems with different types of sub-carrier mapping schemes. Simulation results demonstrate the performance of different sub-carrier mapping schemes under ideal and pedestrian channel condition.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132188813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
SQL Tunnelling through HTTP SQL通过HTTP隧道
Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723851
Thomas Kvamme, S. Ahmed
A novel SQL Tunnelling system to allow communication with an SQL database is developed by utilising the standard Internet protocol HTTP. The communication with the database is allowed by a client interacting with a Web Service running on a standard off-the-shelf HTTP Server. With this tunnelling system, access to a database can be provided without providing access to the database native communication port. This can be useful if a database application needs to be made available on insecure networks, such as Internet, or if firewalls between client and server does not accept anything other than the normal HTTP communications.
利用标准的Internet协议HTTP,开发了一种新的SQL隧道系统,允许与SQL数据库进行通信。与数据库的通信是通过客户机与运行在标准的现成HTTP服务器上的Web服务进行交互来实现的。使用这种隧道系统,可以在不提供对数据库本地通信端口的访问的情况下提供对数据库的访问。如果数据库应用程序需要在不安全的网络(如Internet)上可用,或者客户机和服务器之间的防火墙除了正常的HTTP通信之外不接受任何其他通信,那么这将非常有用。
{"title":"SQL Tunnelling through HTTP","authors":"Thomas Kvamme, S. Ahmed","doi":"10.1109/ICCITECHN.2010.5723851","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723851","url":null,"abstract":"A novel SQL Tunnelling system to allow communication with an SQL database is developed by utilising the standard Internet protocol HTTP. The communication with the database is allowed by a client interacting with a Web Service running on a standard off-the-shelf HTTP Server. With this tunnelling system, access to a database can be provided without providing access to the database native communication port. This can be useful if a database application needs to be made available on insecure networks, such as Internet, or if firewalls between client and server does not accept anything other than the normal HTTP communications.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"20 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132287197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Chaotic dynamics of supervised neural network 监督神经网络的混沌动力学
Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723893
S. U. Ahmed, M. Shahjahan, K. Murase
It is important to study the neural network (NN) when it falls into chaos, because brain dynamics involve chaos. In this paper, the several chaotic behaviors of supervised neural networks using Hurst Exponent (H), fractal dimension (FD) and bifurcation diagram are studied. The update rule for NN trained with back-propagation (BP) algorithm absorbs the function of the form x(1-x) which is responsible for exhibiting chaos in the output of the NN at increased learning rate. The H is computed with the time series obtained from the output of NN. One can comment on the classification of the network from the values of Hs. The chaotic dynamics for two bit parity, cancer, and diabetes problems are examined. The result is validated with the help of bifurcation diagram. It is found that the values of H are repositioned marginally depending on the size of NN. The effect of the size of NN on chaos is also investigated.
当神经网络处于混沌状态时,对其进行研究是非常重要的,因为大脑动力学涉及到混沌。本文利用赫斯特指数(H)、分形维数(FD)和分岔图研究了监督神经网络的几种混沌行为。用BP算法训练的神经网络的更新规则吸收了x(1-x)形式的函数,该函数负责以更高的学习率在神经网络的输出中显示混沌。H由神经网络输出的时间序列计算。我们可以从Hs的值来评价网络的分类。混沌动力学的两位宇称,癌症,和糖尿病的问题进行了检查。利用分岔图对结果进行了验证。我们发现H的值会根据NN的大小被重新定位。研究了神经网络大小对混沌的影响。
{"title":"Chaotic dynamics of supervised neural network","authors":"S. U. Ahmed, M. Shahjahan, K. Murase","doi":"10.1109/ICCITECHN.2010.5723893","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723893","url":null,"abstract":"It is important to study the neural network (NN) when it falls into chaos, because brain dynamics involve chaos. In this paper, the several chaotic behaviors of supervised neural networks using Hurst Exponent (H), fractal dimension (FD) and bifurcation diagram are studied. The update rule for NN trained with back-propagation (BP) algorithm absorbs the function of the form x(1-x) which is responsible for exhibiting chaos in the output of the NN at increased learning rate. The H is computed with the time series obtained from the output of NN. One can comment on the classification of the network from the values of Hs. The chaotic dynamics for two bit parity, cancer, and diabetes problems are examined. The result is validated with the help of bifurcation diagram. It is found that the values of H are repositioned marginally depending on the size of NN. The effect of the size of NN on chaos is also investigated.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129757954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lessons learned from real MANET experiments and simulation-based evaluation of UDP and TCP 从真实的MANET实验和基于仿真的UDP和TCP评估中获得的经验教训
Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723910
J. Kamal, M. S. Hasan, A. Carrington, Hongnian Yu
Although more than a decade of research has been done but pure general-purpose MANET is still not available rather than few prototypes within laboratory due to both technical and socio-economic point of view. Lacking in appropriate guidelines for realistic user traces, mobility models, routing protocols and considering real-life challenges, it is difficult to reproduce any typical scenario in reality apart from simulation. In this paper, difficulties faced to regenerate real-life scenarios have been discussed to clearly identify the gaps in simulation and real-time experiments. Four laptops are used in an open field environment for different scenarios to evaluate a TCP based streaming video application using real OLSR implementation within a IEEE 802.11g wireless network. Corresponding simulations are performed in ns-2 based on the realistic setup parameters achieved from real experiments and finally a comprehensive analysis identifies the generic gaps between these two approaches to evaluate network protocols. Simulation results show better performance than the real-life results due to differ in external influences and protocol implementation although maintaining realistic simulation setups.
尽管已经进行了十多年的研究,但由于技术和社会经济的观点,纯通用的MANET仍然没有可用,而不是实验室中的几个原型。缺乏对真实用户轨迹、移动模型、路由协议的适当指导,并考虑到现实生活中的挑战,除了模拟之外,很难在现实中再现任何典型场景。本文讨论了再生现实场景所面临的困难,以清楚地识别模拟和实时实验中的差距。在不同场景的开放现场环境中使用四台笔记本电脑,在IEEE 802.11g无线网络中使用真正的OLSR实现来评估基于TCP的流媒体视频应用程序。基于从实际实验中获得的实际设置参数,在ns-2中进行了相应的模拟,最后进行了全面的分析,确定了这两种方法在评估网络协议方面的一般差距。在保持真实仿真设置的情况下,由于外部影响和协议实现的差异,仿真结果显示出比实际结果更好的性能。
{"title":"Lessons learned from real MANET experiments and simulation-based evaluation of UDP and TCP","authors":"J. Kamal, M. S. Hasan, A. Carrington, Hongnian Yu","doi":"10.1109/ICCITECHN.2010.5723910","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723910","url":null,"abstract":"Although more than a decade of research has been done but pure general-purpose MANET is still not available rather than few prototypes within laboratory due to both technical and socio-economic point of view. Lacking in appropriate guidelines for realistic user traces, mobility models, routing protocols and considering real-life challenges, it is difficult to reproduce any typical scenario in reality apart from simulation. In this paper, difficulties faced to regenerate real-life scenarios have been discussed to clearly identify the gaps in simulation and real-time experiments. Four laptops are used in an open field environment for different scenarios to evaluate a TCP based streaming video application using real OLSR implementation within a IEEE 802.11g wireless network. Corresponding simulations are performed in ns-2 based on the realistic setup parameters achieved from real experiments and finally a comprehensive analysis identifies the generic gaps between these two approaches to evaluate network protocols. Simulation results show better performance than the real-life results due to differ in external influences and protocol implementation although maintaining realistic simulation setups.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123797751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Multitaper spectrum: A promising method in spectrum sensing cognitive radio 多锥度频谱:一种很有前途的频谱感知认知无线电方法
Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723918
A. Al-Mamun, M. R. Ullah
Cognitive radio (CR) has been proposed as a promising and effective technology to improve radio spectrum utilization. The primary objective of the CR is to handle the non-interference rules with any primary users (PUs). Highly sensitive and optimal spectrum sensing detectors are required in order to avoid harmful interference to PUs. Multitaper spectrum seems to be the most appealing one for spectrum sensing CR because of its accurate identification and estimation and low computational complexity. Mulitaper uses small set of tapers and multiple orthogonal prototype filters to reduce the variance. The Fourier transform of a Slepian sequence, originally known as discrete prolate spheroidal sequences (DPSS), gives maximum energy density inside a given bandwidth and less spectral leakage with better specifications has been investigated in this paper and shows that no other window in signal processing can satisfy this property.
认知无线电(CR)被认为是提高无线电频谱利用率的一种有前途的有效技术。CR的主要目标是处理与任何主用户(pu)之间的互不干扰规则。为了避免对pu的有害干扰,需要高灵敏度和最佳的频谱传感探测器。多锥度频谱以其识别和估计准确、计算复杂度低等优点成为频谱感知CR最具吸引力的一种方法。Mulitaper使用小锥集和多个正交原型滤波器来减小方差。Slepian序列的傅里叶变换,最初被称为离散长球面序列(DPSS),在给定的带宽内具有最大的能量密度和更少的频谱泄漏和更好的规格,本文已经研究了,并表明在信号处理中没有其他窗口可以满足这一性质。
{"title":"Multitaper spectrum: A promising method in spectrum sensing cognitive radio","authors":"A. Al-Mamun, M. R. Ullah","doi":"10.1109/ICCITECHN.2010.5723918","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723918","url":null,"abstract":"Cognitive radio (CR) has been proposed as a promising and effective technology to improve radio spectrum utilization. The primary objective of the CR is to handle the non-interference rules with any primary users (PUs). Highly sensitive and optimal spectrum sensing detectors are required in order to avoid harmful interference to PUs. Multitaper spectrum seems to be the most appealing one for spectrum sensing CR because of its accurate identification and estimation and low computational complexity. Mulitaper uses small set of tapers and multiple orthogonal prototype filters to reduce the variance. The Fourier transform of a Slepian sequence, originally known as discrete prolate spheroidal sequences (DPSS), gives maximum energy density inside a given bandwidth and less spectral leakage with better specifications has been investigated in this paper and shows that no other window in signal processing can satisfy this property.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128716966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A stable clustering method for efficient geographic routing in Mobile Ad-Hoc Networks 移动Ad-Hoc网络中高效地理路由的稳定聚类方法
Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723915
Md.Mosaddek Khan, M. Mamun-Or-Rashid
The Routing Approaches in Mobile Ad-hoc Network have almost entered the saturated arena. But still there are available options of perfection in this meadow. The task of improving the clustering technique is one of the fields which is under rated as a research topic for further improvement of routing. Clustering based MANET routing protocols, which are popular in terms of efficiency, simplicity and usability mostly use circular based clustering techniques. And the election of cluster head is done through the use conventional approaches. This particular paper is mainly focused to launch a new-fangled clustering technique through which it is possible to improve the routing performance of existing protocols. Another important aspect of this paper is to provide a cluster head selection algorithm which can effectively maintain the clusters and provides more stability. Proposed clustering idea is useful for geographically related nodes effectively in different turf of routing. To maintain the clusters and their stability, it provides a new idea to select cluster head within the cluster, also the election of secondary cluster head for avoiding further election immediately after the unavailability of primary cluster head. This idea is evaluated in network simulator and it outperforms the existing clustering techniques.
移动自组网中的路由方法几乎已经进入饱和状态。但在这片草地上,仍然有一些完美的选择。改进聚类技术的任务是路由进一步改进的研究课题之一。基于聚类的MANET路由协议在效率、简单性和可用性方面都很流行,它们大多使用基于循环的聚类技术。并采用常规方法进行簇头的选择。本文主要介绍了一种新颖的聚类技术,通过这种技术可以提高现有协议的路由性能。本文的另一个重要方面是提供了一种簇头选择算法,该算法可以有效地维护簇并提供更多的稳定性。所提出的聚类思想对地理上相关的节点在不同的路由范围内有效地起作用。为了维护集群及其稳定性,提出了在集群内选择簇头的新思路,同时提出了选择副簇头的新思路,以避免在主簇头不可用后立即进行再次选举。在网络模拟器上对该方法进行了评估,结果表明该方法优于现有的聚类技术。
{"title":"A stable clustering method for efficient geographic routing in Mobile Ad-Hoc Networks","authors":"Md.Mosaddek Khan, M. Mamun-Or-Rashid","doi":"10.1109/ICCITECHN.2010.5723915","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723915","url":null,"abstract":"The Routing Approaches in Mobile Ad-hoc Network have almost entered the saturated arena. But still there are available options of perfection in this meadow. The task of improving the clustering technique is one of the fields which is under rated as a research topic for further improvement of routing. Clustering based MANET routing protocols, which are popular in terms of efficiency, simplicity and usability mostly use circular based clustering techniques. And the election of cluster head is done through the use conventional approaches. This particular paper is mainly focused to launch a new-fangled clustering technique through which it is possible to improve the routing performance of existing protocols. Another important aspect of this paper is to provide a cluster head selection algorithm which can effectively maintain the clusters and provides more stability. Proposed clustering idea is useful for geographically related nodes effectively in different turf of routing. To maintain the clusters and their stability, it provides a new idea to select cluster head within the cluster, also the election of secondary cluster head for avoiding further election immediately after the unavailability of primary cluster head. This idea is evaluated in network simulator and it outperforms the existing clustering techniques.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"57 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125829795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2010 13th International Conference on Computer and Information Technology (ICCIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1