首页 > 最新文献

2010 13th International Conference on Computer and Information Technology (ICCIT)最新文献

英文 中文
Performance evaluation of AODVH: An Ad hoc networking scheme for hybrid nodes AODVH的性能评估:一种混合节点的Ad hoc网络方案
Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723848
Yasmin Jahir, Mohammed Atiquzzaman, H. Refai, P. Lopresti
Mobile Ad hoc networks (MANETs) are composed of a collection of independent nodes usually connected by low bandwidth Radio Frequency (RF) links which are challenging for transmitting video and high bandwidth applications for rescue workers in emergency situations. Earlier we proposed a routing protocol, called AODVH to use for high bandwidth communication for search and rescue operations in a disaster area which consists of hybrid nodes using Free Space Optical (FSO) and RF links, with FSO being the primary link and RF as backup in the case of failure of “FSO only” paths. The objective of this paper is to evaluate the performance of AODVH using ns-2 simulations with varying network size and compare with three other Ad hoc routing protocols. We also implemented and tested AODVH in the laboratory using a testbed consisting of Linux based Ad hoc nodes. Results show that AODVH performs better in terms of packet loss, end-to-end delay, overhead, packet delivery ratio, route discovery frequency and throughput when compared to with the other three protocols.
移动自组织网络(manet)由一组独立节点组成,通常由低带宽射频(RF)链路连接,这对紧急情况下救援人员传输视频和高带宽应用具有挑战性。早些时候,我们提出了一种名为AODVH的路由协议,用于灾区搜索和救援行动的高带宽通信,该协议由使用自由空间光(FSO)和RF链路的混合节点组成,其中FSO是主要链路,RF作为“仅FSO”路径失败时的备份。本文的目的是使用ns-2模拟来评估AODVH在不同网络规模下的性能,并与其他三种Ad hoc路由协议进行比较。我们还在实验室中使用由基于Linux的Ad hoc节点组成的测试平台实现和测试了AODVH。结果表明,与其他三种协议相比,AODVH在丢包率、端到端延迟、开销、分组分发率、路由发现频率和吞吐量方面表现更好。
{"title":"Performance evaluation of AODVH: An Ad hoc networking scheme for hybrid nodes","authors":"Yasmin Jahir, Mohammed Atiquzzaman, H. Refai, P. Lopresti","doi":"10.1109/ICCITECHN.2010.5723848","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723848","url":null,"abstract":"Mobile Ad hoc networks (MANETs) are composed of a collection of independent nodes usually connected by low bandwidth Radio Frequency (RF) links which are challenging for transmitting video and high bandwidth applications for rescue workers in emergency situations. Earlier we proposed a routing protocol, called AODVH to use for high bandwidth communication for search and rescue operations in a disaster area which consists of hybrid nodes using Free Space Optical (FSO) and RF links, with FSO being the primary link and RF as backup in the case of failure of “FSO only” paths. The objective of this paper is to evaluate the performance of AODVH using ns-2 simulations with varying network size and compare with three other Ad hoc routing protocols. We also implemented and tested AODVH in the laboratory using a testbed consisting of Linux based Ad hoc nodes. Results show that AODVH performs better in terms of packet loss, end-to-end delay, overhead, packet delivery ratio, route discovery frequency and throughput when compared to with the other three protocols.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122847420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Character recognition using wavelet compression 小波压缩字符识别
Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723900
Hayder Ali, Y. Ali, Eklas Hossain, S. Sultana
The objective of this project is to build a character recognition system, which is able to recognize printed and handwritten character from A to Z. the typical optical character recognition systems, regardless the character's nature, are based mainly on three stages, preprocessing, features extraction, and discrimination. Each stage has its own problems and effects on the system efficiency which is the time consuming and the recognition errors. In order to avoid these difficulties this project presents new construction of character recognition tool using the technique similar to that is used in image compression such as wavelet compression or JPEG compression. Wavelet compression is chosen as the technique implemented for this project. Wavelet compression technique extracted the important coefficient from the images. The Euclidean distance between the coefficient of the test images and training images is computed. Character is considered recognized if the Euclidean distance calculated is smaller than the Global threshold value of 258. This character recognition system also has 18.81% of false rejection rate and 21.88% for false acceptance rate.
本课题的目标是构建一个能够识别从a到z的印刷和手写字符的字符识别系统。典型的光学字符识别系统,无论字符的性质如何,主要是基于预处理、特征提取和识别三个阶段。每个阶段都有自己的问题和对系统效率的影响,主要是耗时和识别误差。为了避免这些困难,本项目提出了一种新的字符识别工具,使用类似于图像压缩的技术,如小波压缩或JPEG压缩。本课题采用小波压缩技术。小波压缩技术从图像中提取重要系数。计算了测试图像与训练图像系数之间的欧氏距离。如果计算的欧几里得距离小于全局阈值258,则认为特征被识别。该字符识别系统的错误拒绝率为18.81%,错误接受率为21.88%。
{"title":"Character recognition using wavelet compression","authors":"Hayder Ali, Y. Ali, Eklas Hossain, S. Sultana","doi":"10.1109/ICCITECHN.2010.5723900","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723900","url":null,"abstract":"The objective of this project is to build a character recognition system, which is able to recognize printed and handwritten character from A to Z. the typical optical character recognition systems, regardless the character's nature, are based mainly on three stages, preprocessing, features extraction, and discrimination. Each stage has its own problems and effects on the system efficiency which is the time consuming and the recognition errors. In order to avoid these difficulties this project presents new construction of character recognition tool using the technique similar to that is used in image compression such as wavelet compression or JPEG compression. Wavelet compression is chosen as the technique implemented for this project. Wavelet compression technique extracted the important coefficient from the images. The Euclidean distance between the coefficient of the test images and training images is computed. Character is considered recognized if the Euclidean distance calculated is smaller than the Global threshold value of 258. This character recognition system also has 18.81% of false rejection rate and 21.88% for false acceptance rate.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123163602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Subscribers fluctuations of different cell operators based on different offers 不同手机运营商的用户波动取决于不同的报价
Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723886
G. M. M. Bashir, Md. Golam Rabiul Alam, Mahabub Sikder, Md. Milon Gazi
In this paper the authors have shown the ebb and flow of subscribers of different cell operators in Bangladesh based on their call rate, network, and other external facilities and suggests a new approach for the constituency of these operators to find out how all the operators can ensure customer satisfaction. Performance of a cellular system mainly depends on circuit merits (CM) of voice quality, service quality, special feature such as call waiting, voice stored box, automatic roaming and other opportunities. In the recent year cellular communication has been explored tremendously in Bangladesh. Existing six mobile operators plays a vital role in our social and economical life. So every operator should be careful about their call rate, network & other external facilities.
在本文中,作者根据孟加拉国不同手机运营商的通话率、网络和其他外部设施显示了用户的消长和流动,并为这些运营商的选民提出了一种新的方法,以找出所有运营商如何确保客户满意度。蜂窝系统的性能主要取决于语音质量、服务质量、特殊功能(如呼叫等待、语音存储盒、自动漫游等)的电路性能。近年来,孟加拉国对蜂窝通信进行了极大的探索。现有六大移动运营商在我们的社会和经济生活中起着至关重要的作用。因此,每个运营商都应该小心他们的通话率,网络和其他外部设施。
{"title":"Subscribers fluctuations of different cell operators based on different offers","authors":"G. M. M. Bashir, Md. Golam Rabiul Alam, Mahabub Sikder, Md. Milon Gazi","doi":"10.1109/ICCITECHN.2010.5723886","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723886","url":null,"abstract":"In this paper the authors have shown the ebb and flow of subscribers of different cell operators in Bangladesh based on their call rate, network, and other external facilities and suggests a new approach for the constituency of these operators to find out how all the operators can ensure customer satisfaction. Performance of a cellular system mainly depends on circuit merits (CM) of voice quality, service quality, special feature such as call waiting, voice stored box, automatic roaming and other opportunities. In the recent year cellular communication has been explored tremendously in Bangladesh. Existing six mobile operators plays a vital role in our social and economical life. So every operator should be careful about their call rate, network & other external facilities.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121568331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Speech segmentation using divergence algorithm with Zero Crossing property 具有过零特性的散度语音分割算法
Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723906
M. Salam, D. Mohamad, S. Salleh
Divergence algorithm is a statistical segmentation approach which finds segmentation point via detection of abrupt changes without any previous information of the acoustic signal. The approach could get high match of segmentation but also gives a lot of false segmentation points. This work introduced a property based on the usage of Zero Crossing Rate (ZCR) in enhancing segmentation by divergence algorithm. The work starts via optimizing divergence algorithm segmentation performance via parameters tuning. Then the proposed property based on ZCR is applied to divergence algorithm to reduce insertion points. The results of tuning divergence parameters achieved match rate of 99.4% at time tolerance of 0.09 seconds with 69% insertion rate occurrences in comparisons to reference points. The result in applying the introduced ZCR property to divergence algorithm shows that tuning of some ZCR property parameters could reduce insertion between 4% to 45%. However, it would also reduce the match rate. Nevertheless, the method could reduced insertion rate by 5.5% while maintaining match rate of 99.4%.
散度算法是一种统计分割方法,它在没有任何声信号先验信息的情况下,通过检测突变来找到分割点。该方法可以获得较高的分割匹配度,但也会产生大量的假分割点。本文介绍了一种基于零交叉率(Zero Crossing Rate, ZCR)的散度分割增强算法。首先通过参数调优优化发散算法的分割性能。然后将提出的基于ZCR的特性应用到散度算法中,以减少插入点。与参考点相比,调整发散参数的结果在0.09秒的时间公差下达到99.4%的匹配率,插入率为69%。将引入的ZCR特性应用于散度算法的结果表明,调整一些ZCR特性参数可以减少4% ~ 45%的插入量。然而,这也会降低匹配率。该方法在保持99.4%的匹配率的同时,可将插入率降低5.5%。
{"title":"Speech segmentation using divergence algorithm with Zero Crossing property","authors":"M. Salam, D. Mohamad, S. Salleh","doi":"10.1109/ICCITECHN.2010.5723906","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723906","url":null,"abstract":"Divergence algorithm is a statistical segmentation approach which finds segmentation point via detection of abrupt changes without any previous information of the acoustic signal. The approach could get high match of segmentation but also gives a lot of false segmentation points. This work introduced a property based on the usage of Zero Crossing Rate (ZCR) in enhancing segmentation by divergence algorithm. The work starts via optimizing divergence algorithm segmentation performance via parameters tuning. Then the proposed property based on ZCR is applied to divergence algorithm to reduce insertion points. The results of tuning divergence parameters achieved match rate of 99.4% at time tolerance of 0.09 seconds with 69% insertion rate occurrences in comparisons to reference points. The result in applying the introduced ZCR property to divergence algorithm shows that tuning of some ZCR property parameters could reduce insertion between 4% to 45%. However, it would also reduce the match rate. Nevertheless, the method could reduced insertion rate by 5.5% while maintaining match rate of 99.4%.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116348534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Multi-objective optimisation for multi-drug chemotherapy scheduling 多药化疗方案的多目标优化
Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723902
S. Algoul, M. Alam, M. A. Hossain, M. Majumder
This paper presents a multi-drug chemotherapy scheduling method for cancer treatment using multi-objective optimisation technique. Cancer cells, very often, grows resistance to a drug if it is administered alone for a long time and drug resistance eventually causes failure to treatment in most cases. The adaptation of multi-drug treatment in cancer increases the drug performance by reducing the drug resistance. But care must be taken to design the multi-drug scheduling so as to equilibrium the drug beneficial and adverse side effects of the treatment. Conventional clinical methods can hardly find optimum dosages of drugs that can kill maximum cancerous cells with minimum toxic side effects. This is because of the inherent conflict between the cell killing and the toxic side effects in case of cancer. This paper presents a novel method of multi-drug scheduling using multi-objective genetic algorithm (MOGA) that can trading-off between the cell killing and toxic side effects during the whole period of treatment. A close-loop control method, namely Integral-Proportional-Derivative (I-PD) is designed to control dosages of drugs to be infused to the patient's body and MOGA is used to find suitable/acceptable parameters of the controller. A cell compartments model is developed and used to describe the effects of the drugs on different type of cells, plasma drug concentration and toxic side effects. Results show that drug scheduling obtained through the proposed method can reduce the tumour size more than 99% with relatively lower toxic side effects. Moreover, the drug dosage and drug concentration remain at low level throughout the whole period.
本文提出了一种基于多目标优化技术的多药物化疗方案。如果长期单独给药,癌细胞通常会对药物产生耐药性,耐药性最终导致大多数情况下治疗失败。多药治疗在癌症中的适应性通过降低耐药来提高药物性能。但必须注意设计多药计划,以平衡药物的有益和不良副作用的治疗。传统的临床方法很难找到最佳剂量的药物,可以杀死最大的癌细胞和最小的毒副作用。这是因为在癌症的情况下,细胞杀伤和毒性副作用之间存在固有的冲突。本文提出了一种利用多目标遗传算法(MOGA)在整个治疗过程中权衡细胞杀伤和毒副作用的多药调度新方法。设计了一种闭环控制方法,即积分-比例-导数(I-PD)来控制输注到患者体内的药物剂量,并使用MOGA来寻找合适/可接受的控制器参数。建立了细胞室模型,用于描述药物对不同类型细胞的作用、血浆药物浓度和毒副作用。结果表明,通过该方法获得的药物调度可使肿瘤大小减小99%以上,毒副作用相对较小。而且,在整个疗程中,药物的剂量和浓度都保持在较低的水平。
{"title":"Multi-objective optimisation for multi-drug chemotherapy scheduling","authors":"S. Algoul, M. Alam, M. A. Hossain, M. Majumder","doi":"10.1109/ICCITECHN.2010.5723902","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723902","url":null,"abstract":"This paper presents a multi-drug chemotherapy scheduling method for cancer treatment using multi-objective optimisation technique. Cancer cells, very often, grows resistance to a drug if it is administered alone for a long time and drug resistance eventually causes failure to treatment in most cases. The adaptation of multi-drug treatment in cancer increases the drug performance by reducing the drug resistance. But care must be taken to design the multi-drug scheduling so as to equilibrium the drug beneficial and adverse side effects of the treatment. Conventional clinical methods can hardly find optimum dosages of drugs that can kill maximum cancerous cells with minimum toxic side effects. This is because of the inherent conflict between the cell killing and the toxic side effects in case of cancer. This paper presents a novel method of multi-drug scheduling using multi-objective genetic algorithm (MOGA) that can trading-off between the cell killing and toxic side effects during the whole period of treatment. A close-loop control method, namely Integral-Proportional-Derivative (I-PD) is designed to control dosages of drugs to be infused to the patient's body and MOGA is used to find suitable/acceptable parameters of the controller. A cell compartments model is developed and used to describe the effects of the drugs on different type of cells, plasma drug concentration and toxic side effects. Results show that drug scheduling obtained through the proposed method can reduce the tumour size more than 99% with relatively lower toxic side effects. Moreover, the drug dosage and drug concentration remain at low level throughout the whole period.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127652371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Evolutionary multi-objective clustering with adaptive local search 基于自适应局部搜索的进化多目标聚类
Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723829
Kazi Shah Nawaz Ripon, K. Glette, M. Høvin, J. Tørresen
In many real-world applications, the accurate number of clusters in the data set may be unknown in advance. In addition, clustering criteria are usually high dimensional, nonlinear and multi-model functions and most existing clustering algorithms are only able to achieve a clustering solution that locally optimizes them. Therefore, a single clustering criterion sometimes fails to identify all clusters in a data set successfully. This paper presents a novel multi-objective evolutionary clustering algorithm based on adaptive local search that mitigates the above disadvantages of existing clustering algorithms. Unlike the conventional local search, the proposed adaptive local search scheme automatically determines whether local search is used in an evolutionary cycle or not. Experimental results on several artificial and real data sets demonstrate that the proposed algorithm can identify the accurate number of clusters in the data sets automatically and simultaneously achieves a high quality clustering solution. The superiority of the proposed algorithm over some single-objective clustering algorithms and existing multi-objective evolutionary clustering algorithms is also confirmed by the experimental results.
在许多实际应用程序中,数据集中集群的准确数量可能是事先未知的。此外,聚类标准通常是高维、非线性和多模型的函数,现有的大多数聚类算法只能得到局部优化的聚类解。因此,单个聚类标准有时不能成功地识别数据集中的所有聚类。本文提出了一种基于自适应局部搜索的多目标进化聚类算法,克服了现有聚类算法的上述缺点。与传统的局部搜索不同,本文提出的自适应局部搜索方案能够自动判断进化周期中是否使用局部搜索。在多个人工数据集和真实数据集上的实验结果表明,该算法能够自动准确识别数据集中的聚类数量,同时获得高质量的聚类解。实验结果也证实了该算法相对于一些单目标聚类算法和现有多目标进化聚类算法的优越性。
{"title":"Evolutionary multi-objective clustering with adaptive local search","authors":"Kazi Shah Nawaz Ripon, K. Glette, M. Høvin, J. Tørresen","doi":"10.1109/ICCITECHN.2010.5723829","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723829","url":null,"abstract":"In many real-world applications, the accurate number of clusters in the data set may be unknown in advance. In addition, clustering criteria are usually high dimensional, nonlinear and multi-model functions and most existing clustering algorithms are only able to achieve a clustering solution that locally optimizes them. Therefore, a single clustering criterion sometimes fails to identify all clusters in a data set successfully. This paper presents a novel multi-objective evolutionary clustering algorithm based on adaptive local search that mitigates the above disadvantages of existing clustering algorithms. Unlike the conventional local search, the proposed adaptive local search scheme automatically determines whether local search is used in an evolutionary cycle or not. Experimental results on several artificial and real data sets demonstrate that the proposed algorithm can identify the accurate number of clusters in the data sets automatically and simultaneously achieves a high quality clustering solution. The superiority of the proposed algorithm over some single-objective clustering algorithms and existing multi-objective evolutionary clustering algorithms is also confirmed by the experimental results.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128009605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A safe system with safe logistics support for Chittagong Port 为吉大港提供安全后勤保障的安全系统
Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723882
Md. Kafil Uddin, M. Kamal Hossen
This paper presents a prototype implementation of an intelligent system called safe system that monitors container security in the port logistics. Logistics supports in the port require safe container status. The main focus of our contribution is to design a system that supports RFID (Radio Frequency Identification) Readers of all types (such as Reader Protocol complaint and vendor provided Readers), real time monitoring of sensing information and notify management about the status of the container in harbor logistics.
本文介绍了港口物流中集装箱安全监控智能系统“安全系统”的原型实现。港口的物流支持需要安全的集装箱状态。我们贡献的主要重点是设计一个支持所有类型的RFID(射频识别)阅读器(如阅读器协议投诉和供应商提供的阅读器)的系统,实时监控传感信息并通知管理港口物流中集装箱的状态。
{"title":"A safe system with safe logistics support for Chittagong Port","authors":"Md. Kafil Uddin, M. Kamal Hossen","doi":"10.1109/ICCITECHN.2010.5723882","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723882","url":null,"abstract":"This paper presents a prototype implementation of an intelligent system called safe system that monitors container security in the port logistics. Logistics supports in the port require safe container status. The main focus of our contribution is to design a system that supports RFID (Radio Frequency Identification) Readers of all types (such as Reader Protocol complaint and vendor provided Readers), real time monitoring of sensing information and notify management about the status of the container in harbor logistics.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134575163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Shared key vulnerability in IEEE 802.16e: Analysis & solution IEEE 802.16e共享密钥漏洞分析与解决方案
Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723926
A.K.M. Nazmus Sakib, M. M. S. Kowsar
As a promising broadband wireless technology, WiMAX has many salient advantages over such as: high data rates, quality of service, scalability, security and mobility. Many sophisticated authentication and encryption techniques have been embedded into WiMAX but it still facing a lot of challenging situations. This paper shows different security vulnerabilities found in IEEE 802.16e and gives possible solutions to eliminate them. These vulnerabilities are the possibilities to forge key messages in Multi- and Broadcast operation, some unauthenticated messages which are susceptible to forgery and the unencrypted management communication which reveals important management information. We modify DH key exchange protocol to fit it into mobile WiMAX network as well as eliminate existing weakness in original DH key exchange protocol.
作为一种极具发展前景的宽带无线技术,WiMAX具有数据传输速率高、服务质量好、可扩展性强、安全性好、移动性强等显著优点。许多复杂的认证和加密技术已经嵌入到WiMAX中,但它仍然面临着许多具有挑战性的情况。本文展示了IEEE 802.16e中发现的不同安全漏洞,并给出了消除这些漏洞的可能解决方案。这些漏洞包括多播操作中关键消息被伪造的可能性,一些未经认证的消息容易被伪造,以及未加密的管理通信泄露了重要的管理信息。我们对DH密钥交换协议进行了修改,使其适应移动WiMAX网络,并消除了原有DH密钥交换协议存在的不足。
{"title":"Shared key vulnerability in IEEE 802.16e: Analysis & solution","authors":"A.K.M. Nazmus Sakib, M. M. S. Kowsar","doi":"10.1109/ICCITECHN.2010.5723926","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723926","url":null,"abstract":"As a promising broadband wireless technology, WiMAX has many salient advantages over such as: high data rates, quality of service, scalability, security and mobility. Many sophisticated authentication and encryption techniques have been embedded into WiMAX but it still facing a lot of challenging situations. This paper shows different security vulnerabilities found in IEEE 802.16e and gives possible solutions to eliminate them. These vulnerabilities are the possibilities to forge key messages in Multi- and Broadcast operation, some unauthenticated messages which are susceptible to forgery and the unencrypted management communication which reveals important management information. We modify DH key exchange protocol to fit it into mobile WiMAX network as well as eliminate existing weakness in original DH key exchange protocol.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114632825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Optical encryption system employing orthogonal code and multiple reference-based joint transform correlation 采用正交码和基于多参考的联合变换相关的光学加密系统
Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723903
M. Islam, M. Karim
The paper proposes a new technology to ensure enhanced security of personal identification information or binary images through the use of encryption and multiplexing processes. Orthogonal codes are employed to encrypt the given input images so that multiple encoded images can then be mixed together to save storage space or transmission bandwidth. The multiplexed and encoded image is further encrypted employing multiple reference-based joint transform correlation. The address code is fed into four channels after performing phase shifting on them by different amount. The input image is introduced to the channels to obtain joint power spectra (JPS) signals through Fourier transformation. The resultant signals are phase-shifted and then combined to form a modified JPS signal which is then inverse Fourier transformed to yield the final and highly secure encrypted image. At the receiver, the image is Fourier transformed and multiplied by the address code used in encryption. Inverse Fourier transformation yields the multiplexed and encoded image which is then decoded using orthogonal codes. The proposed technique enhances the security performance by implementing orthogonal coding and nonlinear encryption algorithms so that no unauthorized access to or interception of information is possible. Performance of the technique is evaluated through computer simulation.
本文提出了一种新的技术,通过使用加密和复用处理来提高个人身份信息或二值图像的安全性。采用正交码对给定的输入图像进行加密,以便将多个编码后的图像混合在一起,从而节省存储空间或传输带宽。采用基于多个参考的联合变换相关对复用编码后的图像进行进一步加密。将地址码按不同的量进行相移后送入四个信道。将输入图像引入信道,通过傅里叶变换得到联合功率谱信号。由此产生的信号相移,然后组合形成一个修改的JPS信号,然后进行傅里叶反变换,以产生最终的和高度安全的加密图像。在接收端,图像经过傅里叶变换并乘以用于加密的地址码。傅里叶反变换产生复用和编码图像,然后使用正交编码解码。该技术通过实现正交编码和非线性加密算法来提高安全性能,从而防止信息被非法访问或截获。通过计算机仿真对该技术的性能进行了评价。
{"title":"Optical encryption system employing orthogonal code and multiple reference-based joint transform correlation","authors":"M. Islam, M. Karim","doi":"10.1109/ICCITECHN.2010.5723903","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723903","url":null,"abstract":"The paper proposes a new technology to ensure enhanced security of personal identification information or binary images through the use of encryption and multiplexing processes. Orthogonal codes are employed to encrypt the given input images so that multiple encoded images can then be mixed together to save storage space or transmission bandwidth. The multiplexed and encoded image is further encrypted employing multiple reference-based joint transform correlation. The address code is fed into four channels after performing phase shifting on them by different amount. The input image is introduced to the channels to obtain joint power spectra (JPS) signals through Fourier transformation. The resultant signals are phase-shifted and then combined to form a modified JPS signal which is then inverse Fourier transformed to yield the final and highly secure encrypted image. At the receiver, the image is Fourier transformed and multiplied by the address code used in encryption. Inverse Fourier transformation yields the multiplexed and encoded image which is then decoded using orthogonal codes. The proposed technique enhances the security performance by implementing orthogonal coding and nonlinear encryption algorithms so that no unauthorized access to or interception of information is possible. Performance of the technique is evaluated through computer simulation.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125442187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
TCO model for server operating system 服务器操作系统的TCO模型
Pub Date : 2010-12-01 DOI: 10.1109/ICCITECHN.2010.5723887
T. Jensen, Shakil Ahmed
Over the last decade many but totally different Total Cost of Ownership reports were generated for a same system. It was even more puzzling since most of the times these reports were sponsored by the vendors themselves. There is more or less a war between Windows and Linux about which one has the best TCO. It is highly likely that the generated TCO is based on vendors' feelings for their operating system rather than the exact calculated costs. In the research a novel mathematical model as well as a tool is developed which can be used as standard for creating reliable TCO reports for server operating systems.
在过去十年中,同一系统产生了许多但完全不同的总拥有成本报告。更令人困惑的是,大多数时候这些报告是由供应商自己赞助的。Windows和Linux之间或多或少有一场关于哪一个拥有最好的TCO的战争。生成的TCO很可能是基于供应商对其操作系统的感觉,而不是精确计算的成本。本研究提出了一种新的数学模型和工具,可作为创建可靠的服务器操作系统TCO报告的标准。
{"title":"TCO model for server operating system","authors":"T. Jensen, Shakil Ahmed","doi":"10.1109/ICCITECHN.2010.5723887","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2010.5723887","url":null,"abstract":"Over the last decade many but totally different Total Cost of Ownership reports were generated for a same system. It was even more puzzling since most of the times these reports were sponsored by the vendors themselves. There is more or less a war between Windows and Linux about which one has the best TCO. It is highly likely that the generated TCO is based on vendors' feelings for their operating system rather than the exact calculated costs. In the research a novel mathematical model as well as a tool is developed which can be used as standard for creating reliable TCO reports for server operating systems.","PeriodicalId":149135,"journal":{"name":"2010 13th International Conference on Computer and Information Technology (ICCIT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124803723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2010 13th International Conference on Computer and Information Technology (ICCIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1