Pub Date : 2011-03-20DOI: 10.1109/ISCI.2011.5958937
S. Choudhary, S. Qureshi
A new network on chip (NoC) topology called partially interconnected mesh network is proposed and a routing algorithm supporting the proposed architecture is also developed. The proposed architecture is based on standard mesh networks, here four extra bidirectional channels are added which remove the congestion and hotspots compare to standard mesh networks with fewer channels. The proposed architecture and routing algorithm are compared to measure performance benefits over standard mesh network in terms of delay and throughput. Significant improvement in delay (60% reduction) and throughput (60% increased) were observed when using the proposed network. An increase in number of channels makes the switches expensive and could increase the area and power consumption. However, the proposed network can be useful in high speed applications with some compromise in area and power.
{"title":"A new NoC architecture based on partial interconnection of mesh networks","authors":"S. Choudhary, S. Qureshi","doi":"10.1109/ISCI.2011.5958937","DOIUrl":"https://doi.org/10.1109/ISCI.2011.5958937","url":null,"abstract":"A new network on chip (NoC) topology called partially interconnected mesh network is proposed and a routing algorithm supporting the proposed architecture is also developed. The proposed architecture is based on standard mesh networks, here four extra bidirectional channels are added which remove the congestion and hotspots compare to standard mesh networks with fewer channels. The proposed architecture and routing algorithm are compared to measure performance benefits over standard mesh network in terms of delay and throughput. Significant improvement in delay (60% reduction) and throughput (60% increased) were observed when using the proposed network. An increase in number of channels makes the switches expensive and could increase the area and power consumption. However, the proposed network can be useful in high speed applications with some compromise in area and power.","PeriodicalId":166647,"journal":{"name":"2011 IEEE Symposium on Computers & Informatics","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125245020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-03-20DOI: 10.1109/ISCI.2011.5958878
N. Sarkar, Eric Lo
Using indoor radio propagation measurements, the impact of access point (AP) configuration as well as placement on throughput of IEEE 802.11g (“802.11g”) wireless local area networks (WLANs) is investigated. By using a pair of wireless laptops and APs we conducted several experiments involving 802.11g computer links, which were carried out in a controlled environment at AUT University within the School of Computing and Mathematical Sciences office building. The AP configuration and placement is found to have the significant effect on the link throughput of 802.11g. Results obtained show that a different throughput performance be achieved with a different AP configuration and placement, the resulting throughput variation is found to be significant. By using an appropriate AP configuration and placement, an optimum system performance can be achieved.
{"title":"Performance studies of 802.11g for various AP configuration and placement","authors":"N. Sarkar, Eric Lo","doi":"10.1109/ISCI.2011.5958878","DOIUrl":"https://doi.org/10.1109/ISCI.2011.5958878","url":null,"abstract":"Using indoor radio propagation measurements, the impact of access point (AP) configuration as well as placement on throughput of IEEE 802.11g (“802.11g”) wireless local area networks (WLANs) is investigated. By using a pair of wireless laptops and APs we conducted several experiments involving 802.11g computer links, which were carried out in a controlled environment at AUT University within the School of Computing and Mathematical Sciences office building. The AP configuration and placement is found to have the significant effect on the link throughput of 802.11g. Results obtained show that a different throughput performance be achieved with a different AP configuration and placement, the resulting throughput variation is found to be significant. By using an appropriate AP configuration and placement, an optimum system performance can be achieved.","PeriodicalId":166647,"journal":{"name":"2011 IEEE Symposium on Computers & Informatics","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121792919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper describes the conceptual design of G-Flash, an authoring tool for supporting guided digital storytelling among young children. The basic idea of G-Flash revolves around guidance concept with the aim of assisting young children quickly generate a story according to the intended learning objectives. Tutored condition, a mid-level form of guidance giving was selected as the guided learning approach to allow the student getting only the right amount of assistance without compromising on the learner's creativity and motivation as well as to learn on their own within the assistance withholding condition. An important feature of G-Flash is the use of flashcards, a familiar and widely used tool to teach children, as the main media element to create the digital story was highlighted. A review of existing tools was provided and benefits of guidance concept, not present in existing digital storytelling tool, were discussed.
{"title":"G-Flash: An authoring tool for guided digital storytelling","authors":"Dayang Jumail, Awang Rohaya, Suziah Rambli, Sulaiman","doi":"10.1109/ISCI.2011.5958948","DOIUrl":"https://doi.org/10.1109/ISCI.2011.5958948","url":null,"abstract":"This paper describes the conceptual design of G-Flash, an authoring tool for supporting guided digital storytelling among young children. The basic idea of G-Flash revolves around guidance concept with the aim of assisting young children quickly generate a story according to the intended learning objectives. Tutored condition, a mid-level form of guidance giving was selected as the guided learning approach to allow the student getting only the right amount of assistance without compromising on the learner's creativity and motivation as well as to learn on their own within the assistance withholding condition. An important feature of G-Flash is the use of flashcards, a familiar and widely used tool to teach children, as the main media element to create the digital story was highlighted. A review of existing tools was provided and benefits of guidance concept, not present in existing digital storytelling tool, were discussed.","PeriodicalId":166647,"journal":{"name":"2011 IEEE Symposium on Computers & Informatics","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123813426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-03-20DOI: 10.1109/ISCI.2011.5958966
Yasir Salih, A. Malik
In the recent years, 3D tracking has gained attention due to the perforation of powerful computers and the increasing interest in tracking applications. One of the most common tracking algorithms used is the Kalman filter. Kalman filter is a linear estimator that is based on approximating system's dynamics using Gaussian probability distribution. In this paper, we provide a detailed evaluation of the most common Kalman filters, their use in the literature and their implementation for 3D visual tracking. The main types of Kalman filters discussed are linear Kalman filter, extended Kalman filer and unscented Kalman filter.
{"title":"3D object tracking using three Kalman filters","authors":"Yasir Salih, A. Malik","doi":"10.1109/ISCI.2011.5958966","DOIUrl":"https://doi.org/10.1109/ISCI.2011.5958966","url":null,"abstract":"In the recent years, 3D tracking has gained attention due to the perforation of powerful computers and the increasing interest in tracking applications. One of the most common tracking algorithms used is the Kalman filter. Kalman filter is a linear estimator that is based on approximating system's dynamics using Gaussian probability distribution. In this paper, we provide a detailed evaluation of the most common Kalman filters, their use in the literature and their implementation for 3D visual tracking. The main types of Kalman filters discussed are linear Kalman filter, extended Kalman filer and unscented Kalman filter.","PeriodicalId":166647,"journal":{"name":"2011 IEEE Symposium on Computers & Informatics","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126450221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-03-20DOI: 10.1109/ISCI.2011.5959010
Feng Chen, Rui Ni, Leixin Mai, Xiaowei Qin, Guo Wei
How to popularize the own Mobile Value-added Services (MVSs) in current mobile networks is interesting and important to many SP/CPs (Service Providers/Content Providers). In this paper, we focus on the study of service diffusion of MVSs and provide a novel methodology, which investigate that from a new perspective of epidemic spread. Firstly, we argue about the characteristics of Mobile Social Network (MSN), which is composed of mobile users, and analyze various factors that impact the subscribers to customize the MVSs. Then epidemic dynamics is used to depict the service diffusion and some conclusions including marketing strategy have been carried out thereinafter. Finally, through a series of experiments, we find that: 1) by using Acquaintance-First marketing strategy, the MVSs will quickly pop up at a low cost; 2) SP/CPs should do efforts to the effective spreading rate, which can result in a higher popularity of the service.
如何在当前的移动网络中推广自己的移动增值业务(MVSs)是许多SP/CPs(服务提供商/内容提供商)感兴趣和重要的问题。本文从传染病传播的新视角出发,着重研究了传染病服务扩散问题,并提出了一种新的研究方法。本文首先论述了由移动用户组成的移动社交网络(Mobile Social Network, MSN)的特点,分析了影响用户定制移动社交网络服务的各种因素。然后用流行动力学来描述服务扩散,并得出了包括营销策略在内的一些结论。最后,通过一系列的实验,我们发现:1)采用熟人优先的营销策略,可以以较低的成本快速地弹出MVSs;2) SP/CPs应该在有效传播率上下功夫,这样可以提高服务的知名度。
{"title":"Study on service diffusion in Mobile Social Network","authors":"Feng Chen, Rui Ni, Leixin Mai, Xiaowei Qin, Guo Wei","doi":"10.1109/ISCI.2011.5959010","DOIUrl":"https://doi.org/10.1109/ISCI.2011.5959010","url":null,"abstract":"How to popularize the own Mobile Value-added Services (MVSs) in current mobile networks is interesting and important to many SP/CPs (Service Providers/Content Providers). In this paper, we focus on the study of service diffusion of MVSs and provide a novel methodology, which investigate that from a new perspective of epidemic spread. Firstly, we argue about the characteristics of Mobile Social Network (MSN), which is composed of mobile users, and analyze various factors that impact the subscribers to customize the MVSs. Then epidemic dynamics is used to depict the service diffusion and some conclusions including marketing strategy have been carried out thereinafter. Finally, through a series of experiments, we find that: 1) by using Acquaintance-First marketing strategy, the MVSs will quickly pop up at a low cost; 2) SP/CPs should do efforts to the effective spreading rate, which can result in a higher popularity of the service.","PeriodicalId":166647,"journal":{"name":"2011 IEEE Symposium on Computers & Informatics","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131866925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-03-20DOI: 10.1109/ISCI.2011.5958978
D. Bansal, S. Sofat, Prafulla Kumar
Earlier research efforts mainly focused on securing adhoc routing mechanisms. However, recently there has also been growing research interest in studying the security of the medium access control (MAC) and its impact on network performance. The impact will be even more severe in case of multi hop wireless networks. IEEE 802.11s being a multihop technology also derives similar security concerns. It also hence needs to ensure correct route establishment mechanisms, protection of routing information, and security of packet forwarding. In this paper two new schemes have been proposed to protect the IEEE 802.11s (draft) routing protocol: HWMP which is currently defined as the default protocol. The proposed schemes have been implemented in a simulation environment and the results have been compared with the existing protocol.
{"title":"SL2R-HT and SL2R-LH: Securing layer-2 routing protocol for WMN","authors":"D. Bansal, S. Sofat, Prafulla Kumar","doi":"10.1109/ISCI.2011.5958978","DOIUrl":"https://doi.org/10.1109/ISCI.2011.5958978","url":null,"abstract":"Earlier research efforts mainly focused on securing adhoc routing mechanisms. However, recently there has also been growing research interest in studying the security of the medium access control (MAC) and its impact on network performance. The impact will be even more severe in case of multi hop wireless networks. IEEE 802.11s being a multihop technology also derives similar security concerns. It also hence needs to ensure correct route establishment mechanisms, protection of routing information, and security of packet forwarding. In this paper two new schemes have been proposed to protect the IEEE 802.11s (draft) routing protocol: HWMP which is currently defined as the default protocol. The proposed schemes have been implemented in a simulation environment and the results have been compared with the existing protocol.","PeriodicalId":166647,"journal":{"name":"2011 IEEE Symposium on Computers & Informatics","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124600408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-03-20DOI: 10.1109/ISCI.2011.5958965
I. I. Abdalla, K. S. R. Rao, N. Perumal
This paper presents a compensating system for the harmonics and the reactive power using four-leg shunt active power filter (SAPF) in a three-phase four-wire distribution network and aims to minimize the harmonics and neutral current. Two control approaches p-q theory based hysteresis current control and load current detection based hysteresis current control are proposed. To validate the compensation performance of SAPF a distribution network with nonlinear loads is simulated using MATLAB/Simulink software. Simulation results are presented to assess the performance of SAPF to minimize the total harmonics distortion (THD) and neutral current, as well as to compensate the reactive power.
{"title":"Three-phase four-leg shunt active power filter to compensate harmonics and reactive power","authors":"I. I. Abdalla, K. S. R. Rao, N. Perumal","doi":"10.1109/ISCI.2011.5958965","DOIUrl":"https://doi.org/10.1109/ISCI.2011.5958965","url":null,"abstract":"This paper presents a compensating system for the harmonics and the reactive power using four-leg shunt active power filter (SAPF) in a three-phase four-wire distribution network and aims to minimize the harmonics and neutral current. Two control approaches p-q theory based hysteresis current control and load current detection based hysteresis current control are proposed. To validate the compensation performance of SAPF a distribution network with nonlinear loads is simulated using MATLAB/Simulink software. Simulation results are presented to assess the performance of SAPF to minimize the total harmonics distortion (THD) and neutral current, as well as to compensate the reactive power.","PeriodicalId":166647,"journal":{"name":"2011 IEEE Symposium on Computers & Informatics","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129417163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-03-20DOI: 10.1109/ISCI.2011.5958894
B. Vasumathi, S. Moorthi
Algorithms are well developed for adaptive estimation of selected harmonic components in Digital Signal Processing. In power electronic applications, objectives like fast response of a system is of primary importance. An effective active power filtering for estimation of instantaneous harmonic components is presented in this paper. A signal processing technique using Modified Adaptive Neural Network (Modified ANN) algorithm has been proposed for harmonic estimation. Its primary function is to estimate harmonic components from selected signal (Current or Voltage) and it requires only the knowledge of the frequency of the component to be estimated. This method can be applied to a wide range of equipments. The validity of the proposed method to estimate voltage harmonics is proved with a dc/ac inverter as an example and the simulation results are compared with ADALINE algorithm for illustrating its effectiveness.
{"title":"Harmonic estimation using Modified ADALINE algorithm with Time-Variant Widrow — Hoff (TVWH) learning rule","authors":"B. Vasumathi, S. Moorthi","doi":"10.1109/ISCI.2011.5958894","DOIUrl":"https://doi.org/10.1109/ISCI.2011.5958894","url":null,"abstract":"Algorithms are well developed for adaptive estimation of selected harmonic components in Digital Signal Processing. In power electronic applications, objectives like fast response of a system is of primary importance. An effective active power filtering for estimation of instantaneous harmonic components is presented in this paper. A signal processing technique using Modified Adaptive Neural Network (Modified ANN) algorithm has been proposed for harmonic estimation. Its primary function is to estimate harmonic components from selected signal (Current or Voltage) and it requires only the knowledge of the frequency of the component to be estimated. This method can be applied to a wide range of equipments. The validity of the proposed method to estimate voltage harmonics is proved with a dc/ac inverter as an example and the simulation results are compared with ADALINE algorithm for illustrating its effectiveness.","PeriodicalId":166647,"journal":{"name":"2011 IEEE Symposium on Computers & Informatics","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129620492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-03-20DOI: 10.1109/ISCI.2011.5958960
James Osuru Mark, B. Samir, M. Naufal
Multicarrier code division multiple access (MC-CDMA) system has received a considerable attention from researchers owing to its great potential in achieving high data rates transmission in wireless communications. Due to the detrimental effects of multipath fading the performance of the system degrades. Similarly, the impact of non-orthogonality of spreading codes can exist and cause interference. This paper addresses the performance of multicarrier code division multiple access system under the influence of frequency selective generalized k-μ fading channel and multiple access interference caused by other active users to the desired one. The average bit error rate is derived and expressed in Gauss hypergeometric functions. Maximal ratio combining diversity technique is utilized to alleviate the deleterious effect of multipath fading.
{"title":"BER performance evaluation for multicarrier code division multiple access over generalized k-μ fading channels","authors":"James Osuru Mark, B. Samir, M. Naufal","doi":"10.1109/ISCI.2011.5958960","DOIUrl":"https://doi.org/10.1109/ISCI.2011.5958960","url":null,"abstract":"Multicarrier code division multiple access (MC-CDMA) system has received a considerable attention from researchers owing to its great potential in achieving high data rates transmission in wireless communications. Due to the detrimental effects of multipath fading the performance of the system degrades. Similarly, the impact of non-orthogonality of spreading codes can exist and cause interference. This paper addresses the performance of multicarrier code division multiple access system under the influence of frequency selective generalized k-μ fading channel and multiple access interference caused by other active users to the desired one. The average bit error rate is derived and expressed in Gauss hypergeometric functions. Maximal ratio combining diversity technique is utilized to alleviate the deleterious effect of multipath fading.","PeriodicalId":166647,"journal":{"name":"2011 IEEE Symposium on Computers & Informatics","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129742809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-03-20DOI: 10.1109/ISCI.2011.5958913
Satish K. Shah, Nimit Shah
Image transformation is one of the important digital image processing techniques widely used in medical science. Typical applications of image transformation include creation of three dimensional volumetric models from two dimensional images. The two dimension images may be obtained energy source used for hard tissue imaging are x-rays. The three dimension models of hard tissue are created by traditional tomography using CT scans. Since scanners are very expensive they are not easily available at most of health care centers. The algorithm presented in the paper is based on two dimensional image data of hard tissues obtained from basic x-rays equipments. It is unique in context of data gathering collected via arbitrary path to impart maximum flexibility for three dimensional models compared to some other approaches. A series of experiments performed with various data sets validates claim MATLAB® platform is used for implementation.
{"title":"Development of user interface for 3D reconstruction algorithm using modified grangeat method","authors":"Satish K. Shah, Nimit Shah","doi":"10.1109/ISCI.2011.5958913","DOIUrl":"https://doi.org/10.1109/ISCI.2011.5958913","url":null,"abstract":"Image transformation is one of the important digital image processing techniques widely used in medical science. Typical applications of image transformation include creation of three dimensional volumetric models from two dimensional images. The two dimension images may be obtained energy source used for hard tissue imaging are x-rays. The three dimension models of hard tissue are created by traditional tomography using CT scans. Since scanners are very expensive they are not easily available at most of health care centers. The algorithm presented in the paper is based on two dimensional image data of hard tissues obtained from basic x-rays equipments. It is unique in context of data gathering collected via arbitrary path to impart maximum flexibility for three dimensional models compared to some other approaches. A series of experiments performed with various data sets validates claim MATLAB® platform is used for implementation.","PeriodicalId":166647,"journal":{"name":"2011 IEEE Symposium on Computers & Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131365068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}