In this paper packet transmission performance of USCH has been investigated. Throughput, delay, collision probability and blocking probability are obtained as function of network load for varied number of users. Effect of various other parameters such as retransmission limit, number of resources etc has been investigated. Two enhancements of the protocol are proposed and results are compared with the standard MAC protocol.
{"title":"Uplink Shared Channel in 3rd Generation (UMTS) Cellular System: Performance Analysis and Enhancement","authors":"M. Sarvagya","doi":"10.1109/ICIT.2006.88","DOIUrl":"https://doi.org/10.1109/ICIT.2006.88","url":null,"abstract":"In this paper packet transmission performance of USCH has been investigated. Throughput, delay, collision probability and blocking probability are obtained as function of network load for varied number of users. Effect of various other parameters such as retransmission limit, number of resources etc has been investigated. Two enhancements of the protocol are proposed and results are compared with the standard MAC protocol.","PeriodicalId":161120,"journal":{"name":"9th International Conference on Information Technology (ICIT'06)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128884269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Gopinath, J. D. Sree, Reshmi Mathew, S. J. Rekhila, A. Nair
Naturalness can be achieved in a text-to-speech (TTMP) by incorporating prosodic features which include duration of basic units, intonation patterns and stress. This paper presents the preliminary duration analysis required for a speech synthesis system for Malayalam, one among the 17 languages spoken in India. The statistical analysis of the duration of phonemes has yielded results, which can effectively be used for developing a duration model for the language. The durational patterns of vowels and consonants are compared. The study shows that, it is the duration of vowels that get significantly modified and hence duration modelling has to focus primarily on vowels. For vowels, the positional factors have more effect on duration than the contextual factors. The results obtained in this study can simplify a rather complex task of framing rules for duration variation.
{"title":"Duration Analysis for Malayalam Text-To-Speech Systems","authors":"D. Gopinath, J. D. Sree, Reshmi Mathew, S. J. Rekhila, A. Nair","doi":"10.1109/ICIT.2006.48","DOIUrl":"https://doi.org/10.1109/ICIT.2006.48","url":null,"abstract":"Naturalness can be achieved in a text-to-speech (TTMP) by incorporating prosodic features which include duration of basic units, intonation patterns and stress. This paper presents the preliminary duration analysis required for a speech synthesis system for Malayalam, one among the 17 languages spoken in India. The statistical analysis of the duration of phonemes has yielded results, which can effectively be used for developing a duration model for the language. The durational patterns of vowels and consonants are compared. The study shows that, it is the duration of vowels that get significantly modified and hence duration modelling has to focus primarily on vowels. For vowels, the positional factors have more effect on duration than the contextual factors. The results obtained in this study can simplify a rather complex task of framing rules for duration variation.","PeriodicalId":161120,"journal":{"name":"9th International Conference on Information Technology (ICIT'06)","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132937126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A spanning tree T of a graph G is called a tree t-spanner if the distance between any two vertices in T is at most t-times their distance in G. A graph that has a tree t- spanner is called a tree t-spanner admissible graph. Given a graph G and an integer t, the tree t-spanner problem asks whether G admits a tree t-spanner. It is known that the tree t-spanner problem is NP-complete for chordal bipartite graphs for t ges 5 whereas the complexity status of the cases t = 3 and t = 4 are open. In this paper, we study the tree 3- spanner problem in simple chordal bipartite graphs which is a subclass of chordal bipartite graphs. We have shown that this class need not admit tree 3-spanner in general. First, we present a structural characterization of tree 3- spanner admissible simple chordal bipartite graphs. Based on this characterization, we propose a linear time algorithm to recognize tree 3-spanner admissible simple chordal bipartite graphs. Finally, we present a linear time algorithm to construct a tree 3-spanner of a tree 3-spanner admissible simple chordal bipartite graph.
{"title":"A linear time algorithm for constructing tree 3-spanner in simple chordal bipartite graphs","authors":"Anita Das, B. S. Panda, R. Lal","doi":"10.1109/ICIT.2006.12","DOIUrl":"https://doi.org/10.1109/ICIT.2006.12","url":null,"abstract":"A spanning tree T of a graph G is called a tree t-spanner if the distance between any two vertices in T is at most t-times their distance in G. A graph that has a tree t- spanner is called a tree t-spanner admissible graph. Given a graph G and an integer t, the tree t-spanner problem asks whether G admits a tree t-spanner. It is known that the tree t-spanner problem is NP-complete for chordal bipartite graphs for t ges 5 whereas the complexity status of the cases t = 3 and t = 4 are open. In this paper, we study the tree 3- spanner problem in simple chordal bipartite graphs which is a subclass of chordal bipartite graphs. We have shown that this class need not admit tree 3-spanner in general. First, we present a structural characterization of tree 3- spanner admissible simple chordal bipartite graphs. Based on this characterization, we propose a linear time algorithm to recognize tree 3-spanner admissible simple chordal bipartite graphs. Finally, we present a linear time algorithm to construct a tree 3-spanner of a tree 3-spanner admissible simple chordal bipartite graph.","PeriodicalId":161120,"journal":{"name":"9th International Conference on Information Technology (ICIT'06)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123625908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We propose a novel static slicing algorithm for inter-procedural programs. We use the system dependence graph (SDG) as the intermediate representation. We have implemented our algorithm by using file structures to handle all the statements that compute the static slice.
{"title":"A Novel Approach for Static Slicing of Inter-Procedural Programs","authors":"S. Mohanty, D. Mohapatra, Himansu Sekhar Behara","doi":"10.1109/ICIT.2006.16","DOIUrl":"https://doi.org/10.1109/ICIT.2006.16","url":null,"abstract":"We propose a novel static slicing algorithm for inter-procedural programs. We use the system dependence graph (SDG) as the intermediate representation. We have implemented our algorithm by using file structures to handle all the statements that compute the static slice.","PeriodicalId":161120,"journal":{"name":"9th International Conference on Information Technology (ICIT'06)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127776431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The use of low-level visual features to retrieve relevant information from image and video databases has drawn much research attention in recent years. Color is perhaps the most dominant and distinguishing visual feature. In modern CBIR systems, statistical clustering methods are often used to extract visual features, index the feature space, and classify images into semantic categories. Statistical clustering methods are tools that search and generalize concepts based on a large amount of high dimensional numerical data. Feature space analysis is the procedure of recovering the centers of the high-density regions. The technique for representing the significant image features is based on the mean shift algorithm, a simple nonparametric procedure for estimating density gradients. This paper discusses color image segmentation, which is base to feature extraction for content-based image retrieval.
{"title":"Segmentation of Color Images using Mean Shift Algorithm for Feature Extraction","authors":"M. Sudhamani, C. R. Venugopal","doi":"10.1109/ICIT.2006.82","DOIUrl":"https://doi.org/10.1109/ICIT.2006.82","url":null,"abstract":"The use of low-level visual features to retrieve relevant information from image and video databases has drawn much research attention in recent years. Color is perhaps the most dominant and distinguishing visual feature. In modern CBIR systems, statistical clustering methods are often used to extract visual features, index the feature space, and classify images into semantic categories. Statistical clustering methods are tools that search and generalize concepts based on a large amount of high dimensional numerical data. Feature space analysis is the procedure of recovering the centers of the high-density regions. The technique for representing the significant image features is based on the mean shift algorithm, a simple nonparametric procedure for estimating density gradients. This paper discusses color image segmentation, which is base to feature extraction for content-based image retrieval.","PeriodicalId":161120,"journal":{"name":"9th International Conference on Information Technology (ICIT'06)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126767873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we present an efficient fault-tolerant token-based algorithm for achieving mutual exclusion (ME) in distributed systems. Nishio et al's fault-tolerant mutual exclusion algorithm requires feedbacks from every other site to recover from token loss. This results in considerable amount of waiting time and false token loss detection. Though Manivannan et al's algorithm solves the problems in Nishio et al's, their algorithm cannot work if a failed site is not repaired within a finite time. This paper proposes an approach to remove the drawback of Manivannan et al's method for achieving fault-tolerance. Our algorithm gives better performance in terms of message complexity (MC), Synchronization delay (SD), response time (RT) and degree of fault- tolerance in comparison with Manivannan et al's algorithm.
{"title":"Enhancing Fault-Tolerance in a Distributed Mutual Exclusion Algorithm","authors":"P. Reddy, N. Sarma, R. Das","doi":"10.1109/ICIT.2006.51","DOIUrl":"https://doi.org/10.1109/ICIT.2006.51","url":null,"abstract":"In this paper, we present an efficient fault-tolerant token-based algorithm for achieving mutual exclusion (ME) in distributed systems. Nishio et al's fault-tolerant mutual exclusion algorithm requires feedbacks from every other site to recover from token loss. This results in considerable amount of waiting time and false token loss detection. Though Manivannan et al's algorithm solves the problems in Nishio et al's, their algorithm cannot work if a failed site is not repaired within a finite time. This paper proposes an approach to remove the drawback of Manivannan et al's method for achieving fault-tolerance. Our algorithm gives better performance in terms of message complexity (MC), Synchronization delay (SD), response time (RT) and degree of fault- tolerance in comparison with Manivannan et al's algorithm.","PeriodicalId":161120,"journal":{"name":"9th International Conference on Information Technology (ICIT'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116534692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We present the results of our search to find the performance of the various spectrum based cost functions and the effect of varying its parameter in the design of strong S-Boxes. It is conjectured that good S-Boxes can be obtained, if the search is made with the parameters R > 3.5 and X < 2n/2 and a more consistent performance can be expected if we use non-linearity spread as the annealing function.
{"title":"Performance of Various Cost Functions in the Search for Strong S-Boxes","authors":"Anirban Chakraborty, A. Chatterjee, S. Basu","doi":"10.1109/ICIT.2006.71","DOIUrl":"https://doi.org/10.1109/ICIT.2006.71","url":null,"abstract":"We present the results of our search to find the performance of the various spectrum based cost functions and the effect of varying its parameter in the design of strong S-Boxes. It is conjectured that good S-Boxes can be obtained, if the search is made with the parameters R > 3.5 and X < 2n/2 and a more consistent performance can be expected if we use non-linearity spread as the annealing function.","PeriodicalId":161120,"journal":{"name":"9th International Conference on Information Technology (ICIT'06)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130137556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we present a multiple class model for Web servers when the request to be served are prioritized based on domains from which requests are originated. We evaluate the impact of assigning different priorities to different domains for a single server as well as for multiple servers. The main parameters considered for evaluation are the average waiting time and the standing ratio.
{"title":"A Domain Based Prioritized Model forWeb Servers","authors":"A. Abbas, V. Sharma, A. Jain","doi":"10.1109/ICIT.2006.7","DOIUrl":"https://doi.org/10.1109/ICIT.2006.7","url":null,"abstract":"In this paper, we present a multiple class model for Web servers when the request to be served are prioritized based on domains from which requests are originated. We evaluate the impact of assigning different priorities to different domains for a single server as well as for multiple servers. The main parameters considered for evaluation are the average waiting time and the standing ratio.","PeriodicalId":161120,"journal":{"name":"9th International Conference on Information Technology (ICIT'06)","volume":"30 20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117112777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Simulation is a widely used technique in networking research and a practice that has suffered loss of credibility in recent years due to doubts about its reliability. In this paper, we conduct a simple Ethernet experiment on a test-bed, and try to reproduce the results using three popular network simulators: ns-2, QualNet and OPNET Modeler. We find that after careful simulation we are able to approximate test-bed performance in all three simulators, and we document the simulation process for each one. We also identify blocking socket calls as a behavioral attribute of applications that affects performance, but cannot be set in any of the three simulators used.
{"title":"Bridging the Gap Between Reality and Simulations: An Ethernet Case Study","authors":"P. Rathod, Srinath Perur, R. Rangarajan","doi":"10.1109/ICIT.2006.33","DOIUrl":"https://doi.org/10.1109/ICIT.2006.33","url":null,"abstract":"Simulation is a widely used technique in networking research and a practice that has suffered loss of credibility in recent years due to doubts about its reliability. In this paper, we conduct a simple Ethernet experiment on a test-bed, and try to reproduce the results using three popular network simulators: ns-2, QualNet and OPNET Modeler. We find that after careful simulation we are able to approximate test-bed performance in all three simulators, and we document the simulation process for each one. We also identify blocking socket calls as a behavioral attribute of applications that affects performance, but cannot be set in any of the three simulators used.","PeriodicalId":161120,"journal":{"name":"9th International Conference on Information Technology (ICIT'06)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125049381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a hybrid transform coding technique, where the intraframes of video sequence are coded by discrete wavelet transform and the interframes are coded with discrete cosine transform technique. It also proposes the selection of sequence of frames predicted from the reference intraframes. This proposal consistently minimizes the prediction error for the predicted frame for further processing. The experimental results show that the proposed hybrid transformation coding technique outperforms over conventional transformation coding technique in terms of encoding time and prediction errors.
{"title":"A Hybrid Transform Coding for Video Codec","authors":"M. Ezhilarasan, P. Thambidurai","doi":"10.1109/ICIT.2006.11","DOIUrl":"https://doi.org/10.1109/ICIT.2006.11","url":null,"abstract":"This paper proposes a hybrid transform coding technique, where the intraframes of video sequence are coded by discrete wavelet transform and the interframes are coded with discrete cosine transform technique. It also proposes the selection of sequence of frames predicted from the reference intraframes. This proposal consistently minimizes the prediction error for the predicted frame for further processing. The experimental results show that the proposed hybrid transformation coding technique outperforms over conventional transformation coding technique in terms of encoding time and prediction errors.","PeriodicalId":161120,"journal":{"name":"9th International Conference on Information Technology (ICIT'06)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121499728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}