Pub Date : 2010-12-01DOI: 10.1109/ICCITECHN.2010.5723865
N. Begum, M. Alam, M. I. Islam
Fingerprint detection is one of the most important applications of image processing in a security system. Recent literature deals with fingerprint detection based on pattern recognition, moment based image recognition and discrete wavelet transform (DWT). Among them DWT based analysis requires the least amount of memory space which considers only wavelet coefficient of an image in matching with preserved coefficient. This paper proposes a new approach, which combines image filtering and color inversion in enhancement of contrast along with two dimensional DWT to get the matrix of the image. Finally four statistical parameters: cross correlation coefficient, skewness, kurtosis and convolution of approximate coefficient of one dimensional DWT are compared in detection of fingerprint of a person.
{"title":"Application of Canny filter and DWT in fingerprint detection a new approach","authors":"N. Begum, M. Alam, M. I. Islam","doi":"10.1109/ICCITECHN.2010.5723865","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723865","url":null,"abstract":"Fingerprint detection is one of the most important applications of image processing in a security system. Recent literature deals with fingerprint detection based on pattern recognition, moment based image recognition and discrete wavelet transform (DWT). Among them DWT based analysis requires the least amount of memory space which considers only wavelet coefficient of an image in matching with preserved coefficient. This paper proposes a new approach, which combines image filtering and color inversion in enhancement of contrast along with two dimensional DWT to get the matrix of the image. Finally four statistical parameters: cross correlation coefficient, skewness, kurtosis and convolution of approximate coefficient of one dimensional DWT are compared in detection of fingerprint of a person.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127227100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-01DOI: 10.1109/ICCITECHN.2010.5723862
I. Jahangir, A. Das
Quaternary logic requires a dedicated comparator circuit besides the usual add/sub unit which may not be optimal due to several reasons. In this paper, we have thoroughly discussed various alternative expressions for equality operator which serves as the basis for quaternary comparator. Then we have derived the necessary equations for single qudit comparator and extended it to serial multi qudit comparator. We have also shown the equations and design of single stage parallel comparator where restriction of fan-in is sacrificed for constant speed. We have ended our discussion with the design of a logarithmic stage parallel comparator which can compute the comparator output within log2(n) time delay for n qudits.
{"title":"On the design of quaternary comparators","authors":"I. Jahangir, A. Das","doi":"10.1109/ICCITECHN.2010.5723862","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723862","url":null,"abstract":"Quaternary logic requires a dedicated comparator circuit besides the usual add/sub unit which may not be optimal due to several reasons. In this paper, we have thoroughly discussed various alternative expressions for equality operator which serves as the basis for quaternary comparator. Then we have derived the necessary equations for single qudit comparator and extended it to serial multi qudit comparator. We have also shown the equations and design of single stage parallel comparator where restriction of fan-in is sacrificed for constant speed. We have ended our discussion with the design of a logarithmic stage parallel comparator which can compute the comparator output within log2(n) time delay for n qudits.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114292439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-01DOI: 10.1109/ICCITECHN.2010.5723914
S. Iqbal, M. I. Monir, S.M.R. Osmani, F. Chowdhury, A. K. Chowdhury, Kingshuk Dhar
Integrating nodes in a MANET to the Internet require either a connection to the Internet or they can connect to the Internet through the Internet gateways or servers. For the second case a node in a MANET has to find out the gateway or server to connect to the fixed nodes in the Internet. End to end packet delay and throughput are strongly dependent on the time needed to discover the gateways. A source node in a MANET can discover a gateway either by broadcasting a gateway discovery message or it may depend on periodic gateway advertisement messages from the gateways. The first one is renowned as reactive gateway discovery strategy and with this one a gateway in a MANET may receive the same gateway discovery message from different intermediate nodes. This paper presents a novel solution for connecting nodes in ad hoc network to the Internet. Here a gateway sends separate reply to the requestor for each request message having the same Broadcast ID it receives from that source in stead of sending only one unicast reply to the requestor. The AODV routing protocol has been used for routing in the MANET domain. We investigated our new strategy of gateway discovery in NS-2. Simulation results show that our one has better performance having lower delay and fewer packets drop.
{"title":"A novel strategy to discover Internet gateways in mobile ad hoc networks","authors":"S. Iqbal, M. I. Monir, S.M.R. Osmani, F. Chowdhury, A. K. Chowdhury, Kingshuk Dhar","doi":"10.1109/ICCITECHN.2010.5723914","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723914","url":null,"abstract":"Integrating nodes in a MANET to the Internet require either a connection to the Internet or they can connect to the Internet through the Internet gateways or servers. For the second case a node in a MANET has to find out the gateway or server to connect to the fixed nodes in the Internet. End to end packet delay and throughput are strongly dependent on the time needed to discover the gateways. A source node in a MANET can discover a gateway either by broadcasting a gateway discovery message or it may depend on periodic gateway advertisement messages from the gateways. The first one is renowned as reactive gateway discovery strategy and with this one a gateway in a MANET may receive the same gateway discovery message from different intermediate nodes. This paper presents a novel solution for connecting nodes in ad hoc network to the Internet. Here a gateway sends separate reply to the requestor for each request message having the same Broadcast ID it receives from that source in stead of sending only one unicast reply to the requestor. The AODV routing protocol has been used for routing in the MANET domain. We investigated our new strategy of gateway discovery in NS-2. Simulation results show that our one has better performance having lower delay and fewer packets drop.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122455145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-01DOI: 10.1109/ICCITECHN.2010.5723909
Badrun Nahar, Md Liakot Ali
In today's world, ensuring security for important locations is a burning issue. Different surveillance methodologies such as alarm system, CCTV, PC based video system are used to ensure this security. But using all these systems, it is not possible for a person to monitor the security of his or her desired location when they are outside. Now-a-days anybody can communicate with anyone at anytime around the globe with the help of mobile phone technology. By keeping the technological facility of mobile phone in mind, a mobile phone based surveillance system has been described in this paper. This paper will give a solution for the security of corporate houses as well as corporate personnel. In this system there are server and client end. Server will store images being captured by the webcam of an important location. Then based on clients request sending from their mobile phone to the server, clients will be able to view the images from their mobile phone that is stored in the server. Clients are also able to move the webcam by sending control instruction from their mobile phone to view the images of their desired position. The developed system has been tested first using the GUI (emulator) designed by NetBeans IDE. It has also been tested using different mobile phones to see the images in real time and it provides the true sense of real mobility and security by accessing the desired location from the mobile phone anytime anywhere whenever wishes. This surveillance system can also be implemented for other handheld devices like PDA.
{"title":"Development of mobile phone based surveillance system","authors":"Badrun Nahar, Md Liakot Ali","doi":"10.1109/ICCITECHN.2010.5723909","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723909","url":null,"abstract":"In today's world, ensuring security for important locations is a burning issue. Different surveillance methodologies such as alarm system, CCTV, PC based video system are used to ensure this security. But using all these systems, it is not possible for a person to monitor the security of his or her desired location when they are outside. Now-a-days anybody can communicate with anyone at anytime around the globe with the help of mobile phone technology. By keeping the technological facility of mobile phone in mind, a mobile phone based surveillance system has been described in this paper. This paper will give a solution for the security of corporate houses as well as corporate personnel. In this system there are server and client end. Server will store images being captured by the webcam of an important location. Then based on clients request sending from their mobile phone to the server, clients will be able to view the images from their mobile phone that is stored in the server. Clients are also able to move the webcam by sending control instruction from their mobile phone to view the images of their desired position. The developed system has been tested first using the GUI (emulator) designed by NetBeans IDE. It has also been tested using different mobile phones to see the images in real time and it provides the true sense of real mobility and security by accessing the desired location from the mobile phone anytime anywhere whenever wishes. This surveillance system can also be implemented for other handheld devices like PDA.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133118819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-01DOI: 10.1109/ICCITECHN.2010.5723850
M. Rana
Single carrier-frequency division multiple access (SC-FDMA) utilizes single carrier modulation at the transmitter and frequency domain equalization at the receiver. It has almost similar performance and essentially the same overall structure of an orthogonal frequency division multiple access (OFDMA) system with low peak to average power ratio (PAPR). Recently, the SC-FDMA has drawn great attention as an attractive alternative to OFDMA, in the uplink communications where lower PAPR greatly benefits the mobile terminal in terms of manufacturing cost as well as transmit power efficiency. Such power efficiency can provide considerable performance improvements in future wireless communication networks. This article outlines the basic principles of SC-FDMA systems with different types of sub-carrier mapping schemes. Simulation results demonstrate the performance of different sub-carrier mapping schemes under ideal and pedestrian channel condition.
{"title":"Performance of sub-carrier mapping in single carrier FDMA systems under radio mobile channels","authors":"M. Rana","doi":"10.1109/ICCITECHN.2010.5723850","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723850","url":null,"abstract":"Single carrier-frequency division multiple access (SC-FDMA) utilizes single carrier modulation at the transmitter and frequency domain equalization at the receiver. It has almost similar performance and essentially the same overall structure of an orthogonal frequency division multiple access (OFDMA) system with low peak to average power ratio (PAPR). Recently, the SC-FDMA has drawn great attention as an attractive alternative to OFDMA, in the uplink communications where lower PAPR greatly benefits the mobile terminal in terms of manufacturing cost as well as transmit power efficiency. Such power efficiency can provide considerable performance improvements in future wireless communication networks. This article outlines the basic principles of SC-FDMA systems with different types of sub-carrier mapping schemes. Simulation results demonstrate the performance of different sub-carrier mapping schemes under ideal and pedestrian channel condition.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132188813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-01DOI: 10.1109/ICCITECHN.2010.5723851
Thomas Kvamme, S. Ahmed
A novel SQL Tunnelling system to allow communication with an SQL database is developed by utilising the standard Internet protocol HTTP. The communication with the database is allowed by a client interacting with a Web Service running on a standard off-the-shelf HTTP Server. With this tunnelling system, access to a database can be provided without providing access to the database native communication port. This can be useful if a database application needs to be made available on insecure networks, such as Internet, or if firewalls between client and server does not accept anything other than the normal HTTP communications.
{"title":"SQL Tunnelling through HTTP","authors":"Thomas Kvamme, S. Ahmed","doi":"10.1109/ICCITECHN.2010.5723851","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723851","url":null,"abstract":"A novel SQL Tunnelling system to allow communication with an SQL database is developed by utilising the standard Internet protocol HTTP. The communication with the database is allowed by a client interacting with a Web Service running on a standard off-the-shelf HTTP Server. With this tunnelling system, access to a database can be provided without providing access to the database native communication port. This can be useful if a database application needs to be made available on insecure networks, such as Internet, or if firewalls between client and server does not accept anything other than the normal HTTP communications.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"20 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132287197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-01DOI: 10.1109/ICCITECHN.2010.5723893
S. U. Ahmed, M. Shahjahan, K. Murase
It is important to study the neural network (NN) when it falls into chaos, because brain dynamics involve chaos. In this paper, the several chaotic behaviors of supervised neural networks using Hurst Exponent (H), fractal dimension (FD) and bifurcation diagram are studied. The update rule for NN trained with back-propagation (BP) algorithm absorbs the function of the form x(1-x) which is responsible for exhibiting chaos in the output of the NN at increased learning rate. The H is computed with the time series obtained from the output of NN. One can comment on the classification of the network from the values of Hs. The chaotic dynamics for two bit parity, cancer, and diabetes problems are examined. The result is validated with the help of bifurcation diagram. It is found that the values of H are repositioned marginally depending on the size of NN. The effect of the size of NN on chaos is also investigated.
{"title":"Chaotic dynamics of supervised neural network","authors":"S. U. Ahmed, M. Shahjahan, K. Murase","doi":"10.1109/ICCITECHN.2010.5723893","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723893","url":null,"abstract":"It is important to study the neural network (NN) when it falls into chaos, because brain dynamics involve chaos. In this paper, the several chaotic behaviors of supervised neural networks using Hurst Exponent (H), fractal dimension (FD) and bifurcation diagram are studied. The update rule for NN trained with back-propagation (BP) algorithm absorbs the function of the form x(1-x) which is responsible for exhibiting chaos in the output of the NN at increased learning rate. The H is computed with the time series obtained from the output of NN. One can comment on the classification of the network from the values of Hs. The chaotic dynamics for two bit parity, cancer, and diabetes problems are examined. The result is validated with the help of bifurcation diagram. It is found that the values of H are repositioned marginally depending on the size of NN. The effect of the size of NN on chaos is also investigated.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129757954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-01DOI: 10.1109/ICCITECHN.2010.5723910
J. Kamal, M. S. Hasan, A. Carrington, Hongnian Yu
Although more than a decade of research has been done but pure general-purpose MANET is still not available rather than few prototypes within laboratory due to both technical and socio-economic point of view. Lacking in appropriate guidelines for realistic user traces, mobility models, routing protocols and considering real-life challenges, it is difficult to reproduce any typical scenario in reality apart from simulation. In this paper, difficulties faced to regenerate real-life scenarios have been discussed to clearly identify the gaps in simulation and real-time experiments. Four laptops are used in an open field environment for different scenarios to evaluate a TCP based streaming video application using real OLSR implementation within a IEEE 802.11g wireless network. Corresponding simulations are performed in ns-2 based on the realistic setup parameters achieved from real experiments and finally a comprehensive analysis identifies the generic gaps between these two approaches to evaluate network protocols. Simulation results show better performance than the real-life results due to differ in external influences and protocol implementation although maintaining realistic simulation setups.
{"title":"Lessons learned from real MANET experiments and simulation-based evaluation of UDP and TCP","authors":"J. Kamal, M. S. Hasan, A. Carrington, Hongnian Yu","doi":"10.1109/ICCITECHN.2010.5723910","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723910","url":null,"abstract":"Although more than a decade of research has been done but pure general-purpose MANET is still not available rather than few prototypes within laboratory due to both technical and socio-economic point of view. Lacking in appropriate guidelines for realistic user traces, mobility models, routing protocols and considering real-life challenges, it is difficult to reproduce any typical scenario in reality apart from simulation. In this paper, difficulties faced to regenerate real-life scenarios have been discussed to clearly identify the gaps in simulation and real-time experiments. Four laptops are used in an open field environment for different scenarios to evaluate a TCP based streaming video application using real OLSR implementation within a IEEE 802.11g wireless network. Corresponding simulations are performed in ns-2 based on the realistic setup parameters achieved from real experiments and finally a comprehensive analysis identifies the generic gaps between these two approaches to evaluate network protocols. Simulation results show better performance than the real-life results due to differ in external influences and protocol implementation although maintaining realistic simulation setups.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123797751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-01DOI: 10.1109/ICCITECHN.2010.5723918
A. Al-Mamun, M. R. Ullah
Cognitive radio (CR) has been proposed as a promising and effective technology to improve radio spectrum utilization. The primary objective of the CR is to handle the non-interference rules with any primary users (PUs). Highly sensitive and optimal spectrum sensing detectors are required in order to avoid harmful interference to PUs. Multitaper spectrum seems to be the most appealing one for spectrum sensing CR because of its accurate identification and estimation and low computational complexity. Mulitaper uses small set of tapers and multiple orthogonal prototype filters to reduce the variance. The Fourier transform of a Slepian sequence, originally known as discrete prolate spheroidal sequences (DPSS), gives maximum energy density inside a given bandwidth and less spectral leakage with better specifications has been investigated in this paper and shows that no other window in signal processing can satisfy this property.
{"title":"Multitaper spectrum: A promising method in spectrum sensing cognitive radio","authors":"A. Al-Mamun, M. R. Ullah","doi":"10.1109/ICCITECHN.2010.5723918","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723918","url":null,"abstract":"Cognitive radio (CR) has been proposed as a promising and effective technology to improve radio spectrum utilization. The primary objective of the CR is to handle the non-interference rules with any primary users (PUs). Highly sensitive and optimal spectrum sensing detectors are required in order to avoid harmful interference to PUs. Multitaper spectrum seems to be the most appealing one for spectrum sensing CR because of its accurate identification and estimation and low computational complexity. Mulitaper uses small set of tapers and multiple orthogonal prototype filters to reduce the variance. The Fourier transform of a Slepian sequence, originally known as discrete prolate spheroidal sequences (DPSS), gives maximum energy density inside a given bandwidth and less spectral leakage with better specifications has been investigated in this paper and shows that no other window in signal processing can satisfy this property.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128716966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-01DOI: 10.1109/ICCITECHN.2010.5723915
Md.Mosaddek Khan, M. Mamun-Or-Rashid
The Routing Approaches in Mobile Ad-hoc Network have almost entered the saturated arena. But still there are available options of perfection in this meadow. The task of improving the clustering technique is one of the fields which is under rated as a research topic for further improvement of routing. Clustering based MANET routing protocols, which are popular in terms of efficiency, simplicity and usability mostly use circular based clustering techniques. And the election of cluster head is done through the use conventional approaches. This particular paper is mainly focused to launch a new-fangled clustering technique through which it is possible to improve the routing performance of existing protocols. Another important aspect of this paper is to provide a cluster head selection algorithm which can effectively maintain the clusters and provides more stability. Proposed clustering idea is useful for geographically related nodes effectively in different turf of routing. To maintain the clusters and their stability, it provides a new idea to select cluster head within the cluster, also the election of secondary cluster head for avoiding further election immediately after the unavailability of primary cluster head. This idea is evaluated in network simulator and it outperforms the existing clustering techniques.
{"title":"A stable clustering method for efficient geographic routing in Mobile Ad-Hoc Networks","authors":"Md.Mosaddek Khan, M. Mamun-Or-Rashid","doi":"10.1109/ICCITECHN.2010.5723915","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723915","url":null,"abstract":"The Routing Approaches in Mobile Ad-hoc Network have almost entered the saturated arena. But still there are available options of perfection in this meadow. The task of improving the clustering technique is one of the fields which is under rated as a research topic for further improvement of routing. Clustering based MANET routing protocols, which are popular in terms of efficiency, simplicity and usability mostly use circular based clustering techniques. And the election of cluster head is done through the use conventional approaches. This particular paper is mainly focused to launch a new-fangled clustering technique through which it is possible to improve the routing performance of existing protocols. Another important aspect of this paper is to provide a cluster head selection algorithm which can effectively maintain the clusters and provides more stability. Proposed clustering idea is useful for geographically related nodes effectively in different turf of routing. To maintain the clusters and their stability, it provides a new idea to select cluster head within the cluster, also the election of secondary cluster head for avoiding further election immediately after the unavailability of primary cluster head. This idea is evaluated in network simulator and it outperforms the existing clustering techniques.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"57 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125829795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}