首页 > 最新文献

2011 World Congress on Information and Communication Technologies最新文献

英文 中文
Experimental analysis of horizontal and vertical handovers in wireless access networks using NS2 基于NS2的无线接入网中水平和垂直切换的实验分析
Pub Date : 2011-12-01 DOI: 10.1109/WICT.2011.6141312
Sahana Bhosale, R. Daruwala
In broadband wireless access network, continuous high speed data communication can be provided to mobile subscribers by well designed mobility management, where handover is a key element in maintaining air link to base station even in high velocity. When a mobile station changes its geographical position, it may also need to change its attachment point in the network in order to retain the quality of the connection. Currently, the mobility of a terminal is a requirement of great importance, supported by a procedure known as handover. Horizontal Handover (HHO) is a symmetric process and happens within the same technology e.g between different Wifi cells. If it is executed between different technologies, for example, WiMAX to Wi-Fi, then it is called vertical HO. In this paper, initially we have investigated the performance of horizontal handovers within Wifi cells and then that of vertical handover between Wi-Fi and WiMAX. Evaluation of packet loss is done while transferring constant bit rate traffic (CBR) for UDP protocol This experiment can be used for academic purpose to help students understand the concept of handover.
在宽带无线接入网中,通过设计良好的移动性管理,可以为移动用户提供连续的高速数据通信,其中切换是在高速下保持与基站的空中链路的关键因素。当移动站改变其地理位置时,它可能还需要改变其在网络中的附着点,以保持连接的质量。目前,终端的移动性是一个非常重要的要求,由一个称为移交的过程来支持。水平切换(HHO)是一个对称的过程,发生在相同的技术中,例如在不同的Wifi蜂窝之间。如果它在不同的技术之间执行,例如,WiMAX到Wi-Fi,那么它被称为垂直HO。在本文中,我们首先研究了Wifi小区内的水平切换性能,然后研究了Wi-Fi和WiMAX之间的垂直切换性能。在UDP协议传输恒定比特率流量(CBR)时进行了丢包评估,该实验可用于学术目的,帮助学生理解切换的概念。
{"title":"Experimental analysis of horizontal and vertical handovers in wireless access networks using NS2","authors":"Sahana Bhosale, R. Daruwala","doi":"10.1109/WICT.2011.6141312","DOIUrl":"https://doi.org/10.1109/WICT.2011.6141312","url":null,"abstract":"In broadband wireless access network, continuous high speed data communication can be provided to mobile subscribers by well designed mobility management, where handover is a key element in maintaining air link to base station even in high velocity. When a mobile station changes its geographical position, it may also need to change its attachment point in the network in order to retain the quality of the connection. Currently, the mobility of a terminal is a requirement of great importance, supported by a procedure known as handover. Horizontal Handover (HHO) is a symmetric process and happens within the same technology e.g between different Wifi cells. If it is executed between different technologies, for example, WiMAX to Wi-Fi, then it is called vertical HO. In this paper, initially we have investigated the performance of horizontal handovers within Wifi cells and then that of vertical handover between Wi-Fi and WiMAX. Evaluation of packet loss is done while transferring constant bit rate traffic (CBR) for UDP protocol This experiment can be used for academic purpose to help students understand the concept of handover.","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"17a 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128190910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Neuro-Fuzzy integrated system and its VLSI design for generating membership function 神经模糊集成系统及其生成隶属函数的VLSI设计
Pub Date : 2011-12-01 DOI: 10.1109/WICT.2011.6141449
A. Q. Ansari, N. Gupta
In this paper, a Neuro-Fuzzy integrated system, which is based on fuzzy inference system using on-line learning ability of neural network is presented. By using on-line learning procedure, the proposed neuro-fuzzy integrated system (NFIS) can be used to construct an input-output mapping based on fuzzy if-then rules and the tuning of the parameters of membership function. The membership functions for NFIS have been realized using operational transconductance amplifier (OTA). Attention is given to design the circuits with low power consumption 2.91mW and size less than 0.65 mm2 within the neuro-fuzzy chip. SPICE simulations showed that they are suitable to real time application.
本文利用神经网络的在线学习能力,提出了一种基于模糊推理系统的神经-模糊集成系统。通过在线学习过程,该神经模糊集成系统可以基于模糊if-then规则和隶属函数参数的整定来构造输入-输出映射。利用运算跨导放大器(OTA)实现了NFIS的隶属函数。在神经模糊芯片内设计低功耗2.91mW、尺寸小于0.65 mm2的电路。SPICE仿真结果表明,该方法适合于实时应用。
{"title":"Neuro-Fuzzy integrated system and its VLSI design for generating membership function","authors":"A. Q. Ansari, N. Gupta","doi":"10.1109/WICT.2011.6141449","DOIUrl":"https://doi.org/10.1109/WICT.2011.6141449","url":null,"abstract":"In this paper, a Neuro-Fuzzy integrated system, which is based on fuzzy inference system using on-line learning ability of neural network is presented. By using on-line learning procedure, the proposed neuro-fuzzy integrated system (NFIS) can be used to construct an input-output mapping based on fuzzy if-then rules and the tuning of the parameters of membership function. The membership functions for NFIS have been realized using operational transconductance amplifier (OTA). Attention is given to design the circuits with low power consumption 2.91mW and size less than 0.65 mm2 within the neuro-fuzzy chip. SPICE simulations showed that they are suitable to real time application.","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124255722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Classification of proteins in intracellular and secretory pathway using global descriptors of amino acid sequence 利用氨基酸序列的全局描述符对细胞内和分泌途径中的蛋白质进行分类
Pub Date : 2011-12-01 DOI: 10.1109/WICT.2011.6141236
G. Govindan, A. Nair
It is widely recognized that the information from the amino acid sequence can serve as crucial pointers in predicting subcellular location of proteins. We introduce a new feature vector for predicting proteins targeted to various compartments in the intracellular and secretory pathway from protein sequence. Features are based on the global Composition, Transition and Distribution (CTD) of amino acid attributes such as hydrophobicity, normalized van der Waals volume, polarity, polarizability, charge, secondary structure and solvent accessibility. Sequences are considered in three equal parts and the features are extracted separately for all the three parts. Based on the feature vectors, we have trained a Support Vector Machine to classify intracellular and secretory proteins. Our method gives an accuracy of 92% in human, 88% in plant and 95% in fungi with independent dataset at root level of the protein sorting pathway.
人们普遍认为,氨基酸序列的信息可以作为预测蛋白质亚细胞定位的关键指标。我们引入了一种新的特征向量,用于从蛋白质序列中预测细胞内和分泌途径中针对不同区室的蛋白质。这些特征是基于氨基酸属性的整体组成、过渡和分布(CTD),如疏水性、标准化范德华体积、极性、极化率、电荷、二级结构和溶剂可及性。将序列分成三个相等的部分,并分别提取三个部分的特征。基于特征向量,我们训练了一个支持向量机对细胞内和分泌蛋白进行分类。我们的方法在蛋白质分选途径的根水平上具有独立的数据集,人类的准确率为92%,植物的准确率为88%,真菌的准确率为95%。
{"title":"Classification of proteins in intracellular and secretory pathway using global descriptors of amino acid sequence","authors":"G. Govindan, A. Nair","doi":"10.1109/WICT.2011.6141236","DOIUrl":"https://doi.org/10.1109/WICT.2011.6141236","url":null,"abstract":"It is widely recognized that the information from the amino acid sequence can serve as crucial pointers in predicting subcellular location of proteins. We introduce a new feature vector for predicting proteins targeted to various compartments in the intracellular and secretory pathway from protein sequence. Features are based on the global Composition, Transition and Distribution (CTD) of amino acid attributes such as hydrophobicity, normalized van der Waals volume, polarity, polarizability, charge, secondary structure and solvent accessibility. Sequences are considered in three equal parts and the features are extracted separately for all the three parts. Based on the feature vectors, we have trained a Support Vector Machine to classify intracellular and secretory proteins. Our method gives an accuracy of 92% in human, 88% in plant and 95% in fungi with independent dataset at root level of the protein sorting pathway.","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128963107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semi fragile watermarking using Gaussian mixture model for malicious image attacks 基于高斯混合模型的半脆弱水印恶意图像攻击
Pub Date : 2011-12-01 DOI: 10.1109/WICT.2011.6141229
T. Gopalakrishnan, S. Ramakrishnan, K. Balasamy, A.S. Muthananda Murugavel
In this paper, the requirements, techniques and applications of digital watermarking for high-quality images were discussed. The several classes of digital watermarking techniques defined by their appearance and application domains specify the requirements and summarize the current research efforts in the image applications. An optimal watermark embedding method is developed to achieve minimum watermarking distortion. A secret embedding key is designed to securely embed the fragile watermarks so that the method is robust to counterfeiting, even when the malicious attackers are fully aware of the watermark embedding algorithm. For robustness this algorithm should resist all kinds of attacks, such as common signal processing operators, geometric attacks and so on.
本文讨论了高质量图像数字水印的要求、技术和应用。根据数字水印技术的外观和应用领域定义了数字水印技术的几种类型,明确了数字水印技术在图像应用中的要求,并对目前的研究工作进行了总结。为了使水印失真最小,提出了一种最优的水印嵌入方法。设计了一个秘密嵌入密钥来安全地嵌入脆弱的水印,使该方法即使在恶意攻击者完全知道水印嵌入算法的情况下也具有抗伪造的鲁棒性。为了保证算法的鲁棒性,该算法应抵抗各种攻击,如常见的信号处理算子、几何攻击等。
{"title":"Semi fragile watermarking using Gaussian mixture model for malicious image attacks","authors":"T. Gopalakrishnan, S. Ramakrishnan, K. Balasamy, A.S. Muthananda Murugavel","doi":"10.1109/WICT.2011.6141229","DOIUrl":"https://doi.org/10.1109/WICT.2011.6141229","url":null,"abstract":"In this paper, the requirements, techniques and applications of digital watermarking for high-quality images were discussed. The several classes of digital watermarking techniques defined by their appearance and application domains specify the requirements and summarize the current research efforts in the image applications. An optimal watermark embedding method is developed to achieve minimum watermarking distortion. A secret embedding key is designed to securely embed the fragile watermarks so that the method is robust to counterfeiting, even when the malicious attackers are fully aware of the watermark embedding algorithm. For robustness this algorithm should resist all kinds of attacks, such as common signal processing operators, geometric attacks and so on.","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126472950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Improving the image reconstruction in Electrical Impedance Tomography (EIT) with block matrix-based Multiple Regularization (BMMR): A practical phantom study 基于分块矩阵的多重正则化(BMMR)改进电阻抗断层成像(EIT)的图像重建:一个实用的幻像研究
Pub Date : 2011-12-01 DOI: 10.1109/WICT.2011.6141444
T. Bera, S. K. Biswas, K. Rajan, N. Jampana
Conductivity image reconstruction is studied with a Block Matrix based Multiple Regularization (BMMR) technique in Electrical Impedance Tomography (EIT) using practical phantoms. The response matrix (JTJ) is partitioned into several sub-block matrices and the largest element of each sub-block matrices is taken as regularization parameter for the nodes of the FEM mesh contained by that sub-block. Boundary potential data are collected from practical phantoms with different inhomogeneity configurations and the conductivity images are reconstructed in a Model Based Iterative Image Reconstruction (MoBIIR) algorithm. Conductivity images, reconstructed with BMMR technique, are compared with the images obtained with Single-step Tikhonov Regularization (STR) and modified Levenberg-Marquardt Regularization (LMR) methods. Results show that BMMR technique reduces the reconstruction error and reconstruct the better conductivity images by improving the conductivity profile of the domain under test for all the phantoms. Image analysis showed that the BMMR method improves image contrast parameters, conductivity profiles, and spatial resolution of the reconstructed images.
研究了基于分块矩阵的多重正则化(BMMR)技术在电阻抗断层成像(EIT)中的应用。将响应矩阵(JTJ)划分为若干个子块矩阵,并将每个子块矩阵中最大的元素作为该子块所包含的有限元网格节点的正则化参数。采用基于模型的迭代图像重建(MoBIIR)算法,对具有不同非均匀性结构的实际模型进行了边界电位数据的采集和电导率图像的重建。利用BMMR技术重建的电导率图像,与单步Tikhonov正则化(STR)和改进的Levenberg-Marquardt正则化(LMR)方法获得的图像进行了比较。结果表明,BMMR技术通过改善被测区域的电导率分布,降低了重建误差,重建出了更好的电导率图像。图像分析表明,BMMR方法提高了图像对比度参数、电导率曲线和重建图像的空间分辨率。
{"title":"Improving the image reconstruction in Electrical Impedance Tomography (EIT) with block matrix-based Multiple Regularization (BMMR): A practical phantom study","authors":"T. Bera, S. K. Biswas, K. Rajan, N. Jampana","doi":"10.1109/WICT.2011.6141444","DOIUrl":"https://doi.org/10.1109/WICT.2011.6141444","url":null,"abstract":"Conductivity image reconstruction is studied with a Block Matrix based Multiple Regularization (BMMR) technique in Electrical Impedance Tomography (EIT) using practical phantoms. The response matrix (JTJ) is partitioned into several sub-block matrices and the largest element of each sub-block matrices is taken as regularization parameter for the nodes of the FEM mesh contained by that sub-block. Boundary potential data are collected from practical phantoms with different inhomogeneity configurations and the conductivity images are reconstructed in a Model Based Iterative Image Reconstruction (MoBIIR) algorithm. Conductivity images, reconstructed with BMMR technique, are compared with the images obtained with Single-step Tikhonov Regularization (STR) and modified Levenberg-Marquardt Regularization (LMR) methods. Results show that BMMR technique reduces the reconstruction error and reconstruct the better conductivity images by improving the conductivity profile of the domain under test for all the phantoms. Image analysis showed that the BMMR method improves image contrast parameters, conductivity profiles, and spatial resolution of the reconstructed images.","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126428535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Classification of brain tumors using PCA-ANN 应用PCA-ANN对脑肿瘤进行分类
Pub Date : 2011-12-01 DOI: 10.1109/WICT.2011.6141398
Vinod Kumar, J. Sachdeva, I. Gupta, N. Khandelwal, C. Ahuja
The present study is conducted to assist radiologists in marking tumor boundaries and in decision making process for multiclass classification of brain tumors. Primary brain tumors and secondary brain tumors along with normal regions are segmented by Gradient Vector Flow (GVF)-a boundary based technique. GVF is a user interactive model for extracting tumor boundaries. These segmented regions of interest (ROIs) are than classified by using Principal Component Analysis-Artificial Neural Network (PCA-ANN) approach. The study is performed on diversified dataset of 856 ROIs from 428 post contrast T1- weighted MR images of 55 patients. 218 texture and intensity features are extracted from ROIs. PCA is used for reduction of dimensionality of the feature space. Six classes which include primary tumors such as Astrocytoma (AS), Glioblastoma Multiforme (GBM), child tumor-Medulloblastoma (MED) and Meningioma (MEN), secondary tumor-Metastatic (MET) along with normal regions (NR) are discriminated using ANN. Test results show that the PCA-ANN approach has enhanced the overall accuracy of ANN from 72.97 % to 95.37%. The proposed method has delivered a high accuracy for each class: AS-90.74%, GBM-88.46%, MED-85.00%, MEN-90.70%, MET-96.67%and NR-93.78%. It is observed that PCA-ANN provides better results than the existing methods.
本研究旨在协助放射科医师在脑肿瘤的多类别分类中进行肿瘤边界的标记和决策。采用梯度矢量流(Gradient Vector Flow, GVF)技术对原发性脑肿瘤和继发性脑肿瘤以及正常区域进行分割。GVF是一种用于肿瘤边界提取的用户交互模型。然后利用主成分分析-人工神经网络(PCA-ANN)方法对这些分割的兴趣区域(roi)进行分类。该研究是在55名患者的428张对比后T1加权MR图像的856个roi的多样化数据集上进行的。从roi中提取218个纹理和强度特征。PCA用于特征空间的降维。利用神经网络对星形细胞瘤(as)、多形性胶质母细胞瘤(GBM)、儿童肿瘤-髓母细胞瘤(MED)和脑膜瘤(MEN)、继发性肿瘤-转移瘤(MET)和正常区(NR)等6类肿瘤进行了区分。实验结果表明,PCA-ANN方法将ANN的整体准确率从72.97%提高到95.37%。该方法的准确率分别为AS-90.74%、GBM-88.46%、MED-85.00%、MEN-90.70%、met -96.67%和NR-93.78%。实验结果表明,PCA-ANN比现有的方法具有更好的效果。
{"title":"Classification of brain tumors using PCA-ANN","authors":"Vinod Kumar, J. Sachdeva, I. Gupta, N. Khandelwal, C. Ahuja","doi":"10.1109/WICT.2011.6141398","DOIUrl":"https://doi.org/10.1109/WICT.2011.6141398","url":null,"abstract":"The present study is conducted to assist radiologists in marking tumor boundaries and in decision making process for multiclass classification of brain tumors. Primary brain tumors and secondary brain tumors along with normal regions are segmented by Gradient Vector Flow (GVF)-a boundary based technique. GVF is a user interactive model for extracting tumor boundaries. These segmented regions of interest (ROIs) are than classified by using Principal Component Analysis-Artificial Neural Network (PCA-ANN) approach. The study is performed on diversified dataset of 856 ROIs from 428 post contrast T1- weighted MR images of 55 patients. 218 texture and intensity features are extracted from ROIs. PCA is used for reduction of dimensionality of the feature space. Six classes which include primary tumors such as Astrocytoma (AS), Glioblastoma Multiforme (GBM), child tumor-Medulloblastoma (MED) and Meningioma (MEN), secondary tumor-Metastatic (MET) along with normal regions (NR) are discriminated using ANN. Test results show that the PCA-ANN approach has enhanced the overall accuracy of ANN from 72.97 % to 95.37%. The proposed method has delivered a high accuracy for each class: AS-90.74%, GBM-88.46%, MED-85.00%, MEN-90.70%, MET-96.67%and NR-93.78%. It is observed that PCA-ANN provides better results than the existing methods.","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127226385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Security analysis of WiMAX network: With Misbehavior Node attack WiMAX网络的安全性分析:基于错误行为节点攻击
Pub Date : 2011-12-01 DOI: 10.1109/WICT.2011.6141278
R. Jha, U. Dalal
Security has grown to be a major concern in regulate to provide restricted communication in Wireless as well as wired environment. As far as security concern related to WiMAX network i.e for PHY Layer (Jamming and scrambling) and MAC Layer attack protection has been provided by (AES, PKM etc) one separate Layer(Security Layer). In current scenario Network Layer security is more vital and we have analyzed and simulated the effect of misbehaving node (Without MAC Layer). It misbehaves in the sense that the node does not respect its MAC protocols and avariciously sends its packets without any restriction (Flooding of packets) because it doesn't follow any protocol. Using OPNET we investigate the performance comparison analysis with and without misbehavior node. The packets transmitted in a network from Servers to Clients not only indicate the maximum amount of information provided but how much secure information is present in the network is the major point of deliberation. So many unauthorized clients are present in the network which can destroy a packets flowing to authorize node. One of the attacks is Misbehavior Node attack (Network Layer), in which the node does not follow any protocol but continuously transmits Constant Bit Rate (CBR) packets, which introduces noise in the network and upset the performance of the network.
在无线和有线环境中提供受限通信的监管中,安全性已成为一个主要问题。至于与WiMAX网络有关的安全问题,即物理层(干扰和加扰)和MAC层的攻击保护已由(AES, PKM等)一个单独的层(安全层)提供。在当前的场景中,网络层的安全更为重要,我们分析和模拟了行为不端的节点(无MAC层)的影响。它的错误行为是节点不尊重它的MAC协议,并且贪婪地发送它的数据包而没有任何限制(数据包泛滥),因为它不遵循任何协议。利用OPNET进行了有和无不当行为节点的性能比较分析。网络中从服务器到客户端传输的数据包不仅表明所提供的最大信息量,而且表明网络中存在多少安全信息是主要的考虑点。网络中存在许多未经授权的客户端,这可能会破坏流向授权节点的数据包。其中一种攻击是网络层错误行为节点攻击(Misbehavior Node attack, Network Layer),该攻击是指节点不遵循任何协议,连续发送CBR (Constant Bit Rate)报文,在网络中引入噪声,影响网络性能。
{"title":"Security analysis of WiMAX network: With Misbehavior Node attack","authors":"R. Jha, U. Dalal","doi":"10.1109/WICT.2011.6141278","DOIUrl":"https://doi.org/10.1109/WICT.2011.6141278","url":null,"abstract":"Security has grown to be a major concern in regulate to provide restricted communication in Wireless as well as wired environment. As far as security concern related to WiMAX network i.e for PHY Layer (Jamming and scrambling) and MAC Layer attack protection has been provided by (AES, PKM etc) one separate Layer(Security Layer). In current scenario Network Layer security is more vital and we have analyzed and simulated the effect of misbehaving node (Without MAC Layer). It misbehaves in the sense that the node does not respect its MAC protocols and avariciously sends its packets without any restriction (Flooding of packets) because it doesn't follow any protocol. Using OPNET we investigate the performance comparison analysis with and without misbehavior node. The packets transmitted in a network from Servers to Clients not only indicate the maximum amount of information provided but how much secure information is present in the network is the major point of deliberation. So many unauthorized clients are present in the network which can destroy a packets flowing to authorize node. One of the attacks is Misbehavior Node attack (Network Layer), in which the node does not follow any protocol but continuously transmits Constant Bit Rate (CBR) packets, which introduces noise in the network and upset the performance of the network.","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"662 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122966110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Effective ICTs in agricultural value chains to improve food security: An international perspective 农业价值链中的有效信息通信技术改善粮食安全:国际视角
Pub Date : 2011-12-01 DOI: 10.1109/WICT.2011.6141422
L. Armstrong, D. Diepeveen, N. Gandhi
This paper examines the grains value chain in agriculture, and identifies the importance in developing strategies which could better secure food production. The study highlights examples of successful integration of ICTs in agricultural supply and value chains. The development of strategies to integrate these ICTs into the supply chain will be proposed. It will be argued that the use of high powered computing for data mining and other technologies such as sensor networks, mobile communications, and GPS technologies can revolutionize the efficiency of these supply chains and therefore improve the food security. The study carried out a situational analysis of agricultural resources using standard internet search engines and applying data mining techniques in order to demonstrate how such technologies can be used to show difference in value chains across different situations. An assessment of the study found that the results from the grain-industry dataset support the similar supply chain grouping reported for other research studies. These groupings reflect the more-developed food-industry supply chains and may not capture all the interactions in less-developed supply chains. For example, when several of the food production processes are carried out by one food-producer, the activities will be more difficult to identify.
本文考察了农业中的谷物价值链,并确定了制定能够更好地保障粮食生产的战略的重要性。该研究强调了信息通信技术在农业供应链和价值链中成功整合的例子。将提出制定将这些信息通信技术纳入供应链的战略。将高性能计算用于数据挖掘和其他技术,如传感器网络、移动通信和GPS技术,可以彻底改变这些供应链的效率,从而改善粮食安全。该研究使用标准的互联网搜索引擎和应用数据挖掘技术对农业资源进行了情景分析,以展示如何使用这些技术来显示不同情况下价值链的差异。对该研究的评估发现,粮食工业数据集的结果支持其他研究报告的类似供应链分组。这些分组反映了较发达的食品工业供应链,可能无法捕捉到欠发达供应链中的所有相互作用。例如,当几个食品生产过程由一个食品生产商进行时,这些活动将更难以确定。
{"title":"Effective ICTs in agricultural value chains to improve food security: An international perspective","authors":"L. Armstrong, D. Diepeveen, N. Gandhi","doi":"10.1109/WICT.2011.6141422","DOIUrl":"https://doi.org/10.1109/WICT.2011.6141422","url":null,"abstract":"This paper examines the grains value chain in agriculture, and identifies the importance in developing strategies which could better secure food production. The study highlights examples of successful integration of ICTs in agricultural supply and value chains. The development of strategies to integrate these ICTs into the supply chain will be proposed. It will be argued that the use of high powered computing for data mining and other technologies such as sensor networks, mobile communications, and GPS technologies can revolutionize the efficiency of these supply chains and therefore improve the food security. The study carried out a situational analysis of agricultural resources using standard internet search engines and applying data mining techniques in order to demonstrate how such technologies can be used to show difference in value chains across different situations. An assessment of the study found that the results from the grain-industry dataset support the similar supply chain grouping reported for other research studies. These groupings reflect the more-developed food-industry supply chains and may not capture all the interactions in less-developed supply chains. For example, when several of the food production processes are carried out by one food-producer, the activities will be more difficult to identify.","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126960603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Data mining and wireless sensor network for agriculture pest/disease predictions 用于农业病虫害预测的数据挖掘和无线传感器网络
Pub Date : 2011-12-01 DOI: 10.1109/WICT.2011.6141424
A. Tripathy, J. Adinarayana, D. Sudharsan, S. Merchant, U. Desai, K. Vijayalakshmi, D. Raji Reddy, G. Sreenivas, S. Ninomiya, M. Hirafuji, T. Kiura, K. Tanaka
Data driven precision agriculture aspects, particularly the pest/disease management, require a dynamic crop-weather data. An experiment was conducted in a semi-arid region to understand the crop-weather-pest/disease relations using wireless sensory and field-level surveillance data on closely related and interdependent pest (Thrips) - disease (Bud Necrosis) dynamics of groundnut crop. Data mining techniques were used to turn the data into useful information/knowledge/relations/trends and correlation of crop-weather-pest/disease continuum. These dynamics obtained from the data mining techniques and trained through mathematical models were validated with corresponding surveillance data. Results obtained from 2009 & 2010 kharif seasons (monsoon) and 2009–10 & 2010–11 rabi seasons (post monsoon) data could be used to develop a real to near real-time decision support system for pest/disease predictions.
数据驱动的精准农业方面,特别是病虫害管理,需要动态的作物天气数据。利用无线传感和田间监测数据,在半干旱区对花生病虫害(蓟马)-病虫害(芽坏死)动态进行了研究,以了解作物-天气-病虫害之间的关系。利用数据挖掘技术将数据转化为作物-天气-病虫害连续体的有用信息/知识/关系/趋势和相关性。通过数据挖掘技术获得的这些动态,并通过数学模型进行训练,用相应的监测数据进行验证。从2009年和2010年的丰收季节(季风)和2009 - 10年和2010 - 11年的拉比季节(季风后)数据获得的结果可用于开发一个真实到接近实时的病虫害预测决策支持系统。
{"title":"Data mining and wireless sensor network for agriculture pest/disease predictions","authors":"A. Tripathy, J. Adinarayana, D. Sudharsan, S. Merchant, U. Desai, K. Vijayalakshmi, D. Raji Reddy, G. Sreenivas, S. Ninomiya, M. Hirafuji, T. Kiura, K. Tanaka","doi":"10.1109/WICT.2011.6141424","DOIUrl":"https://doi.org/10.1109/WICT.2011.6141424","url":null,"abstract":"Data driven precision agriculture aspects, particularly the pest/disease management, require a dynamic crop-weather data. An experiment was conducted in a semi-arid region to understand the crop-weather-pest/disease relations using wireless sensory and field-level surveillance data on closely related and interdependent pest (Thrips) - disease (Bud Necrosis) dynamics of groundnut crop. Data mining techniques were used to turn the data into useful information/knowledge/relations/trends and correlation of crop-weather-pest/disease continuum. These dynamics obtained from the data mining techniques and trained through mathematical models were validated with corresponding surveillance data. Results obtained from 2009 & 2010 kharif seasons (monsoon) and 2009–10 & 2010–11 rabi seasons (post monsoon) data could be used to develop a real to near real-time decision support system for pest/disease predictions.","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122861477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
Bangla ASR design by suppressing gender factor with gender-independent and gender-based HMM classifiers 用性别独立和基于性别的HMM分类器抑制性别因素设计孟加拉语ASR
Pub Date : 2011-12-01 DOI: 10.1109/WICT.2011.6141432
Foyzul Hassan, Mohammed Rokibul Alam Kotwal, M. N. Huda
Hidden factor such as gender characteristic plays an important role on the performance of Bangla (widely used as Bengali) automatic speech recognition (ASR). If there is a suppression process that represses the decrease of differences in acoustic-likelihood among categories resulted from gender factors, a robust ASR system can be realized. In our previous paper, we proposed a technique of gender effects suppression that composed of two hidden Markov model (HMM)-based classifiers that focused on a gender factor. In the proposed study, we have designed a new ASR for Bangla by suppressing the gender effects, which embeds three HMM-based classifiers for corresponding male, female and geneder-independent (GI) characteristics. In an experiment on Bangla speech database prepared by us, the proposed system that incorporates GI-classifier has achieved a significant improvement of word correct rate, word accuracy and sentence correct rate in comparison with our previous method that did not incorporate GI-classifier.
性别特征等隐性因素对孟加拉语自动语音识别(ASR)的性能起着重要作用。如果存在一个抑制过程,可以抑制由性别因素导致的类别间声学似然差异的减少,则可以实现一个鲁棒的ASR系统。在我们之前的论文中,我们提出了一种性别效应抑制技术,该技术由两个基于隐马尔可夫模型(HMM)的分类器组成,这些分类器专注于性别因素。在本研究中,我们通过抑制性别效应为孟加拉语设计了一个新的ASR,该ASR嵌入了三个基于hmm的分类器,用于对应的男性、女性和性别独立(GI)特征。在我们准备的孟加拉语语音数据库上进行的实验中,我们提出的系统加入了gi分类器,与我们之前没有加入gi分类器的方法相比,在单词正确率、单词正确率和句子正确率上都有了显著的提高。
{"title":"Bangla ASR design by suppressing gender factor with gender-independent and gender-based HMM classifiers","authors":"Foyzul Hassan, Mohammed Rokibul Alam Kotwal, M. N. Huda","doi":"10.1109/WICT.2011.6141432","DOIUrl":"https://doi.org/10.1109/WICT.2011.6141432","url":null,"abstract":"Hidden factor such as gender characteristic plays an important role on the performance of Bangla (widely used as Bengali) automatic speech recognition (ASR). If there is a suppression process that represses the decrease of differences in acoustic-likelihood among categories resulted from gender factors, a robust ASR system can be realized. In our previous paper, we proposed a technique of gender effects suppression that composed of two hidden Markov model (HMM)-based classifiers that focused on a gender factor. In the proposed study, we have designed a new ASR for Bangla by suppressing the gender effects, which embeds three HMM-based classifiers for corresponding male, female and geneder-independent (GI) characteristics. In an experiment on Bangla speech database prepared by us, the proposed system that incorporates GI-classifier has achieved a significant improvement of word correct rate, word accuracy and sentence correct rate in comparison with our previous method that did not incorporate GI-classifier.","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127733269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2011 World Congress on Information and Communication Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1