首页 > 最新文献

2009 12th International Conference on Computers and Information Technology最新文献

英文 中文
Performance analysis of Datagram Congestion Control Protocol (DCCP) 数据报拥塞控制协议(DCCP)性能分析
Pub Date : 2009-12-01 DOI: 10.7763/IJCTE.2011.V3.383
Iffat Chowdhury, Jutheka Lahiry, S. Hasan
Applications like streaming audio, Internet telephony and multi-player online games prefer timeliness in packet delivery to reliability. TCP's reliability through packet retransmission and abrupt rate control features are unsuitable for these applications. As a result, these applications prefer UDP as the transport layer protocol. UDP does not have any congestion control mechanism which is vital for the overall stability of the Internet. For this reason, a new transport layer protocol Datagram Congestion Control Protocol (DCCP) has been introduced by the Internet Engineering Task Force (IETF). DCCP is suitable for these applications because of its exclusive characteristics. It can be useful for those applications which need a session and congestion control unlike UDP and do not need reliability or retransmission like TCP. However, since DCCP is a new protocol, its performance for these applications has to be analyzed thoroughly before it emerges as a de facto transport protocol for these applications. This paper describes the basic principle of DCCP, its congestion control mechanism and measures the performance of DCCP. The results show that DCCP provides better performance for those applications that suffers the tradeoff between delay and in-order delivery.
流媒体音频、互联网电话和多人在线游戏等应用更喜欢数据包传输的及时性,而不是可靠性。TCP通过报文重传的可靠性和突然速率控制特性不适合这些应用。因此,这些应用程序更喜欢UDP作为传输层协议。UDP没有任何拥塞控制机制,这对互联网的整体稳定性至关重要。为此,互联网工程任务组(IETF)引入了一个新的传输层协议——数据报拥塞控制协议(DCCP)。DCCP因其独有的特性而适用于这些应用。对于那些不像UDP需要会话和拥塞控制,不像TCP需要可靠性或重传的应用程序,它是有用的。然而,由于DCCP是一种新协议,在它成为这些应用程序的实际传输协议之前,必须对其在这些应用程序中的性能进行彻底的分析。介绍了DCCP的基本原理、拥塞控制机制,并对DCCP的性能进行了测量。结果表明,DCCP为那些在延迟和有序交付之间权衡的应用程序提供了更好的性能。
{"title":"Performance analysis of Datagram Congestion Control Protocol (DCCP)","authors":"Iffat Chowdhury, Jutheka Lahiry, S. Hasan","doi":"10.7763/IJCTE.2011.V3.383","DOIUrl":"https://doi.org/10.7763/IJCTE.2011.V3.383","url":null,"abstract":"Applications like streaming audio, Internet telephony and multi-player online games prefer timeliness in packet delivery to reliability. TCP's reliability through packet retransmission and abrupt rate control features are unsuitable for these applications. As a result, these applications prefer UDP as the transport layer protocol. UDP does not have any congestion control mechanism which is vital for the overall stability of the Internet. For this reason, a new transport layer protocol Datagram Congestion Control Protocol (DCCP) has been introduced by the Internet Engineering Task Force (IETF). DCCP is suitable for these applications because of its exclusive characteristics. It can be useful for those applications which need a session and congestion control unlike UDP and do not need reliability or retransmission like TCP. However, since DCCP is a new protocol, its performance for these applications has to be analyzed thoroughly before it emerges as a de facto transport protocol for these applications. This paper describes the basic principle of DCCP, its congestion control mechanism and measures the performance of DCCP. The results show that DCCP provides better performance for those applications that suffers the tradeoff between delay and in-order delivery.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132986283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
WiMAX security analysis and enhancement WiMAX安全分析与增强
Pub Date : 2009-12-01 DOI: 10.1109/ICCIT.2009.5407321
Muhammad Sakibur Rahman, M. M. S. Kowsar
The importance of IEEE 802.16, Worldwide Interoperability for Microwave Access (WiMAX) is growing and will compete with technologies such as 3G. The acceptance and adoption of technologies also depend on security. Therefore, this article shows security vulnerabilities found in WiMAX and gives possible solutions to eliminate them. We find the initial network procedure is not effectively secured that makes man-in-the-middle attack possible. Focusing on this attack, we propose Diffie-Hellman (DH) key exchange protocol to enhance the security level during network initialization. We modify DH key exchange protocol to fit it into mobile WiMAX network as well as to eliminate existing weakness in original DH key exchange protocol. Finally we found that the proposed algorithm shows 2.5 times better performance in comparison with existing systems.
IEEE 802.16全球微波接入互操作性(WiMAX)的重要性正在增长,并将与3G等技术竞争。技术的接受和采用也取决于安全性。因此,本文将展示在WiMAX中发现的安全漏洞,并给出消除这些漏洞的可能解决方案。我们发现初始网络过程没有得到有效的保护,使得中间人攻击成为可能。针对这种攻击,我们提出了Diffie-Hellman (DH)密钥交换协议来提高网络初始化时的安全级别。我们对DH密钥交换协议进行了修改,使其适应移动WiMAX网络,并消除了原有DH密钥交换协议存在的不足。最后,我们发现该算法的性能是现有系统的2.5倍。
{"title":"WiMAX security analysis and enhancement","authors":"Muhammad Sakibur Rahman, M. M. S. Kowsar","doi":"10.1109/ICCIT.2009.5407321","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407321","url":null,"abstract":"The importance of IEEE 802.16, Worldwide Interoperability for Microwave Access (WiMAX) is growing and will compete with technologies such as 3G. The acceptance and adoption of technologies also depend on security. Therefore, this article shows security vulnerabilities found in WiMAX and gives possible solutions to eliminate them. We find the initial network procedure is not effectively secured that makes man-in-the-middle attack possible. Focusing on this attack, we propose Diffie-Hellman (DH) key exchange protocol to enhance the security level during network initialization. We modify DH key exchange protocol to fit it into mobile WiMAX network as well as to eliminate existing weakness in original DH key exchange protocol. Finally we found that the proposed algorithm shows 2.5 times better performance in comparison with existing systems.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129236297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
An audible Bangla text-entry method in Mobile phones with intelligent keypad 一种基于智能键盘的孟加拉语语音文本输入方法
Pub Date : 2009-12-01 DOI: 10.1109/ICCIT.2009.5407126
Md. Enamul Hoque Prince, G. Hossain, Ali Akbar Dewan, Pijush Debnath
Communication through mobile device is the most effective and fastest way that becomes a part of our daily life nowadays. Particularly, Short Message Service (SMS), is one of the most popular and relatively cheaper application of cell phone. In Bangladesh, there has been an enormous growth of mobile users and in this context, it is quite reasonable that people like to send SMS with their own language. Taking these challenges, a few initiatives were taken to introduce Bangla text in Mobile phones, more specifically, in messaging. But unfortunately, Bangla SMS is not popular yet in our country due to the presence of large number of characters and complex script. In fact, it is very much difficult to map Bangla characters efficiently on a mobile with 12 keys only. That's why, it motivated us to design an intelligent mobile keypad layout, which significantly reduces the number of keystrokes than existing methods, and remove difficulties of entering text. We eliminate traditional multi-tapping on a single button and introduce two key press technique, by arranging characters in two-dimensional matrix. Using this keypad the system becomes faster, reliable and flexible. Predictive text input method is also added in the system for further speeding up messaging. Moreover, our text-entry system ensures accessibility to visual impaired people by avoiding disambiguation caused by multi-tapping and introducing audio feedback for inserting each Bangla characters, which is not supported by existing systems. Finally, after analyzing the result on different sample SMS data, we showed that, our proposed keypad with the predictive input system reduces the number of key presses than the common Bangla keypad by 60.34%.
通过移动设备进行通信是最有效和最快的方式,如今已成为我们日常生活的一部分。特别是短消息服务(SMS),是最受欢迎和相对便宜的手机应用之一。在孟加拉国,移动用户的数量有了巨大的增长,在这种情况下,人们喜欢用自己的语言发送短信是很合理的。面对这些挑战,采取了一些举措,在移动电话中引入孟加拉语文本,更具体地说,在消息传递中。但遗憾的是,孟加拉语短信由于字符多、文字复杂,在我国尚未普及。事实上,在只有12个键的手机上有效地映射孟加拉语字符是非常困难的。这就是为什么它促使我们设计一种智能移动键盘布局,它比现有的方法大大减少了按键次数,并消除了输入文本的困难。我们通过在二维矩阵中排列字符,消除了传统的一键多击,引入了两键按键技术。使用这种键盘,系统变得更快、更可靠、更灵活。系统还增加了预测文本输入法,进一步加快了消息传递的速度。此外,我们的文字输入系统避免了因多次轻敲而造成的消歧问题,并在输入孟加拉文字符时引入了现有系统所不支持的声音反馈,以方便视障人士使用。最后,通过对不同样本短信数据的分析结果表明,我们提出的带有预测输入系统的键盘比普通孟加拉键盘减少了60.34%的按键次数。
{"title":"An audible Bangla text-entry method in Mobile phones with intelligent keypad","authors":"Md. Enamul Hoque Prince, G. Hossain, Ali Akbar Dewan, Pijush Debnath","doi":"10.1109/ICCIT.2009.5407126","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407126","url":null,"abstract":"Communication through mobile device is the most effective and fastest way that becomes a part of our daily life nowadays. Particularly, Short Message Service (SMS), is one of the most popular and relatively cheaper application of cell phone. In Bangladesh, there has been an enormous growth of mobile users and in this context, it is quite reasonable that people like to send SMS with their own language. Taking these challenges, a few initiatives were taken to introduce Bangla text in Mobile phones, more specifically, in messaging. But unfortunately, Bangla SMS is not popular yet in our country due to the presence of large number of characters and complex script. In fact, it is very much difficult to map Bangla characters efficiently on a mobile with 12 keys only. That's why, it motivated us to design an intelligent mobile keypad layout, which significantly reduces the number of keystrokes than existing methods, and remove difficulties of entering text. We eliminate traditional multi-tapping on a single button and introduce two key press technique, by arranging characters in two-dimensional matrix. Using this keypad the system becomes faster, reliable and flexible. Predictive text input method is also added in the system for further speeding up messaging. Moreover, our text-entry system ensures accessibility to visual impaired people by avoiding disambiguation caused by multi-tapping and introducing audio feedback for inserting each Bangla characters, which is not supported by existing systems. Finally, after analyzing the result on different sample SMS data, we showed that, our proposed keypad with the predictive input system reduces the number of key presses than the common Bangla keypad by 60.34%.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"323 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113991316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Steps to defend against DoS attacks 防御DoS攻击的步骤
Pub Date : 2009-12-01 DOI: 10.1109/ICCIT.2009.5407310
A. Habib, Debashish Roy
Defending against DoS attacks is extremely difficult; effective solutions probably require significant changes to the Internet architecture. We present a series of architectural changes aimed at preventing most flooding DoS attacks, and making the remaining attacks easier to defend against. The goal is to stimulate a debate on tradeoffs between the flexibility needed for future Internet evolution and the need to be robust to defend attack.
防御DoS攻击是极其困难的;有效的解决方案可能需要对Internet架构进行重大更改。我们提出了一系列的架构变化,旨在防止大多数洪水DoS攻击,并使其余的攻击更容易防御。其目标是激发人们就未来互联网发展所需的灵活性和防御攻击所需的健壮性之间的权衡进行辩论。
{"title":"Steps to defend against DoS attacks","authors":"A. Habib, Debashish Roy","doi":"10.1109/ICCIT.2009.5407310","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407310","url":null,"abstract":"Defending against DoS attacks is extremely difficult; effective solutions probably require significant changes to the Internet architecture. We present a series of architectural changes aimed at preventing most flooding DoS attacks, and making the remaining attacks easier to defend against. The goal is to stimulate a debate on tradeoffs between the flexibility needed for future Internet evolution and the need to be robust to defend attack.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"261 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116607792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Present status and critical success factors of e-Commerce in Bangladesh 孟加拉国电子商务的现状及关键成功因素
Pub Date : 2009-12-01 DOI: 10.1109/ICCIT.2009.5407313
Md. Raihan Jamil, N. Ahmad
Online trading between businesses or individuals has employed attention of corporations worldwide as they are challenged to remain viable through difficult economic conditions. Despite the losses of so many businesses two years ago when the “dot-com bubble” burst, no serious business analyst disagrees that electronic commerce is steadily transforming how business is done, hence changing the business environment globally. Businesses everywhere need to understand if, when and how to use electronic commerce. The organizational factors, which are critical to the success of e-commerce, are investigated in this research. Different pieces of literature report different factors as key to success and generally based on subjective, perceptual data. A synthesis of existing literature is a basis for survey questions. The data is collected from Bangladesh e-commerce based organizations who are offering their goods & services on electronic channels, using postal questionnaires and Interview technique. The top factors found to be most critical for the success in e-commerce are: quick responsive products/services, organizational flexibility, services expansion, systems integration and enhanced customer service. An important lesson from this research is that organizations need to view the e-commerce initiative as a business critical area rather that just a technical issue. They need to give attention to internal integration, which may include channels, technology and business process integration, and improving the overall services to their customers.
企业或个人之间的网上交易已经引起了全球公司的关注,因为它们面临着在困难的经济条件下保持生存的挑战。尽管两年前“网络泡沫”破裂时,许多企业都亏损了,但严肃的商业分析人士都认为,电子商务正在稳步改变商业运作方式,从而改变全球商业环境。各地的企业都需要了解是否、何时以及如何使用电子商务。本文对电子商务成功的关键组织因素进行了研究。不同的文献报告了不同的因素作为成功的关键,通常基于主观的,感性的数据。对现有文献的综合是调查问题的基础。这些数据是从孟加拉国电子商务组织收集的,这些组织在电子渠道上提供商品和服务,使用邮政问卷调查和访谈技术。在电子商务中取得成功的最重要因素是:产品/服务的快速反应、组织的灵活性、服务的扩展、系统集成和增强的客户服务。从这项研究中得到的一个重要教训是,组织需要将电子商务计划视为一个业务关键领域,而不仅仅是一个技术问题。他们需要关注内部整合,包括渠道、技术和业务流程的整合,提高对客户的整体服务。
{"title":"Present status and critical success factors of e-Commerce in Bangladesh","authors":"Md. Raihan Jamil, N. Ahmad","doi":"10.1109/ICCIT.2009.5407313","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407313","url":null,"abstract":"Online trading between businesses or individuals has employed attention of corporations worldwide as they are challenged to remain viable through difficult economic conditions. Despite the losses of so many businesses two years ago when the “dot-com bubble” burst, no serious business analyst disagrees that electronic commerce is steadily transforming how business is done, hence changing the business environment globally. Businesses everywhere need to understand if, when and how to use electronic commerce. The organizational factors, which are critical to the success of e-commerce, are investigated in this research. Different pieces of literature report different factors as key to success and generally based on subjective, perceptual data. A synthesis of existing literature is a basis for survey questions. The data is collected from Bangladesh e-commerce based organizations who are offering their goods & services on electronic channels, using postal questionnaires and Interview technique. The top factors found to be most critical for the success in e-commerce are: quick responsive products/services, organizational flexibility, services expansion, systems integration and enhanced customer service. An important lesson from this research is that organizations need to view the e-commerce initiative as a business critical area rather that just a technical issue. They need to give attention to internal integration, which may include channels, technology and business process integration, and improving the overall services to their customers.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126224425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Minimized reversible synthesis of non-reversible quinary logic function 非可逆五元逻辑函数的最小可逆合成
Pub Date : 2009-12-01 DOI: 10.1109/ICCIT.2009.5407142
Mozammel H. A. Khan, Raqibul Hasan
Reversible multiple-valued logic circuit has several advantages over reversible binary logic circuit. In this paper, we propose a method of minimization of Galois field sum of products (GFSOP) expression for non-reversible quinary logic function. We also propose a method of reversible realization of quinary GFSOP expression as cascade of quinary reversible gates. Experimental results show that a significant minimization can be achieved using the proposed minimization method.
可逆多值逻辑电路与可逆二进制逻辑电路相比具有许多优点。本文给出了非可逆五元逻辑函数的伽罗瓦域积和表达式的一种最小化方法。我们还提出了一种五元可逆门级联可逆实现五元GFSOP表达式的方法。实验结果表明,所提出的最小化方法可以实现显著的最小化。
{"title":"Minimized reversible synthesis of non-reversible quinary logic function","authors":"Mozammel H. A. Khan, Raqibul Hasan","doi":"10.1109/ICCIT.2009.5407142","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407142","url":null,"abstract":"Reversible multiple-valued logic circuit has several advantages over reversible binary logic circuit. In this paper, we propose a method of minimization of Galois field sum of products (GFSOP) expression for non-reversible quinary logic function. We also propose a method of reversible realization of quinary GFSOP expression as cascade of quinary reversible gates. Experimental results show that a significant minimization can be achieved using the proposed minimization method.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121813363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
FM-Chord: Fault-tolerant Chord supporting misspelled queries FM-Chord:支持拼写错误查询的容错Chord
Pub Date : 2009-12-01 DOI: 10.1109/ICCIT.2009.5407316
Md. Rakibul Haque, Reaz Ahmed
Searching with partial knowledge and misspelled keywords is a challenging problem in Peer-to-Peer networks. This paper presents FM-Chord, a novel searching mechanism for information retrieval with queries containing spelling and pronunciation mistakes in keywords using a widely-used structured overlay Chord. FM-Chord uses Double Metaphone encoding and 3-grams of keywords to reduce the effect of edit distance between the advertisement and query keywords. FM-Chord replicates advertisement to achieve fault tolerance to node failures. We evaluate the performance of our proposed mechanism in FM-Chord with necessary simulation results.
在点对点网络中,使用部分知识和拼写错误的关键字进行搜索是一个具有挑战性的问题。本文提出了一种新的搜索机制FM-Chord,该机制使用一种广泛使用的结构化覆盖Chord来处理包含关键字拼写和发音错误的信息检索。FM-Chord采用双变音位编码和3克关键词,减少广告与查询关键词之间编辑距离的影响。FM-Chord通过复制广告来实现对节点故障的容错。我们用必要的仿真结果来评估我们提出的机制在FM-Chord中的性能。
{"title":"FM-Chord: Fault-tolerant Chord supporting misspelled queries","authors":"Md. Rakibul Haque, Reaz Ahmed","doi":"10.1109/ICCIT.2009.5407316","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407316","url":null,"abstract":"Searching with partial knowledge and misspelled keywords is a challenging problem in Peer-to-Peer networks. This paper presents FM-Chord, a novel searching mechanism for information retrieval with queries containing spelling and pronunciation mistakes in keywords using a widely-used structured overlay Chord. FM-Chord uses Double Metaphone encoding and 3-grams of keywords to reduce the effect of edit distance between the advertisement and query keywords. FM-Chord replicates advertisement to achieve fault tolerance to node failures. We evaluate the performance of our proposed mechanism in FM-Chord with necessary simulation results.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116689940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Extracting unique patterns from human actions 从人类行为中提取独特的模式
Pub Date : 2009-12-01 DOI: 10.1109/ICCIT.2009.5407127
H. M. I. Hassan, M. Hasan, Md. Fazle Elahi Khan, M. Shahjahan
Human walks, runs, dances and left behind interesting information on their actions. This paper presents how chaotic dynamics help to interpret and classify human actions. The trajectories of two legs are extracted during a motion such as walk. These trajectories of foot points are collected from an artificial human video arrangement. Each dimension of trajectory represents a time series. The phase space for each time series is reconstructed using appropriate time delay and dimension. The plot exhibited a characteristic trajectory representing the regularity of the time series. Analysis of time series obtained in human with three different motions revealed that the trajectory behaves in such a way that the time series is governed with a deterministic rule. Unique patterns are observed for a particular motion. This can be revealed from the phase space and self organizing map (SOM) network. The motions (walk, run, and jump) can be categorized in terms of different shape of phase space and output of the SOM network. The results are validated with correlation dimension. These representations are very useful in classifying the human motions.
人类走路、跑步、跳舞,并在他们的行动中留下有趣的信息。本文介绍了混沌动力学如何帮助解释和分类人类行为。两条腿的运动轨迹是在运动过程中提取的,比如走路。这些脚点的轨迹是从人工视频中收集的。轨迹的每一个维度代表一个时间序列。利用适当的时间延迟和维数重构每个时间序列的相空间。该图表现出表征时间序列规律性的特征轨迹。对人体三种不同运动的时间序列进行分析,发现运动轨迹具有确定性规律。对于一个特定的运动,可以观察到独特的模式。这可以从相空间和自组织映射(SOM)网络中揭示出来。这些运动(走、跑、跳)可以根据相空间的不同形状和SOM网络的输出进行分类。用相关维数对结果进行了验证。这些表示在对人体运动进行分类时非常有用。
{"title":"Extracting unique patterns from human actions","authors":"H. M. I. Hassan, M. Hasan, Md. Fazle Elahi Khan, M. Shahjahan","doi":"10.1109/ICCIT.2009.5407127","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407127","url":null,"abstract":"Human walks, runs, dances and left behind interesting information on their actions. This paper presents how chaotic dynamics help to interpret and classify human actions. The trajectories of two legs are extracted during a motion such as walk. These trajectories of foot points are collected from an artificial human video arrangement. Each dimension of trajectory represents a time series. The phase space for each time series is reconstructed using appropriate time delay and dimension. The plot exhibited a characteristic trajectory representing the regularity of the time series. Analysis of time series obtained in human with three different motions revealed that the trajectory behaves in such a way that the time series is governed with a deterministic rule. Unique patterns are observed for a particular motion. This can be revealed from the phase space and self organizing map (SOM) network. The motions (walk, run, and jump) can be categorized in terms of different shape of phase space and output of the SOM network. The results are validated with correlation dimension. These representations are very useful in classifying the human motions.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129045911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Can Information Retrieval techniques automatic assessment challenges? 信息检索技术能否自动评估挑战?
Pub Date : 2009-12-01 DOI: 10.1109/ICCIT.2009.5407259
M. Hasan
In Information Retrieval (IR), the similarity scores between a query and a set of documents are calculated, and the relevant documents are ranked based on their similarity scores. IR systems often consider queries as short documents containing only a few words in calculating document similarity score. In Computer Aided Assessment (CAA) of narrative answers, when model answers are available, the similarity score between Students' Answers and the respective Model Answer may be a good quality-indicator. With such an analogy in mind, we applied basic IR techniques in the context of automatic assessment and discussed our findings. In this paper, we explain the development of a web-based automatic assessment system that incorporates 5 different text analysis techniques for automatic assessment of narrative answers using vector space framework. We apply Uni-gram, Bi-gram, TF.IDF, Keyphrase Extraction, and Keyphrase with Synonym Resolution before representing model answers and students' answers as document vectors; and then we compute document similarity scores. The experimental results based on 30 narrative questions with 30 model answers, and 300 student's answers (from 10 students) show that the correlation of automatic assessment with human assessment is higher when advanced text processing techniques such as Keyphrase Extraction and Synonym Resolution are applied.
在信息检索(Information Retrieval, IR)中,计算查询与一组文档之间的相似度分数,并根据相似度分数对相关文档进行排序。在计算文档相似度评分时,IR系统通常将查询视为只包含几个单词的短文档。在记叙性答案的计算机辅助评估(CAA)中,当模型答案可用时,学生答案与各自的模型答案之间的相似度得分可能是一个很好的质量指标。考虑到这样的类比,我们在自动评估的背景下应用了基本的红外技术,并讨论了我们的发现。在本文中,我们解释了基于web的自动评估系统的开发,该系统结合了5种不同的文本分析技术,用于使用向量空间框架自动评估叙述性答案。我们使用一元,双元,TF。在将模型答案和学生答案表示为文档向量之前进行IDF、关键词提取和关键词同义词解析然后我们计算文档相似度分数。基于30个叙事题、30个模型答案和300个学生答案(来自10名学生)的实验结果表明,当采用关键词提取和同义词解析等高级文本处理技术时,自动评估与人工评估的相关性更高。
{"title":"Can Information Retrieval techniques automatic assessment challenges?","authors":"M. Hasan","doi":"10.1109/ICCIT.2009.5407259","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407259","url":null,"abstract":"In Information Retrieval (IR), the similarity scores between a query and a set of documents are calculated, and the relevant documents are ranked based on their similarity scores. IR systems often consider queries as short documents containing only a few words in calculating document similarity score. In Computer Aided Assessment (CAA) of narrative answers, when model answers are available, the similarity score between Students' Answers and the respective Model Answer may be a good quality-indicator. With such an analogy in mind, we applied basic IR techniques in the context of automatic assessment and discussed our findings. In this paper, we explain the development of a web-based automatic assessment system that incorporates 5 different text analysis techniques for automatic assessment of narrative answers using vector space framework. We apply Uni-gram, Bi-gram, TF.IDF, Keyphrase Extraction, and Keyphrase with Synonym Resolution before representing model answers and students' answers as document vectors; and then we compute document similarity scores. The experimental results based on 30 narrative questions with 30 model answers, and 300 student's answers (from 10 students) show that the correlation of automatic assessment with human assessment is higher when advanced text processing techniques such as Keyphrase Extraction and Synonym Resolution are applied.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114242285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A probabilistic position-based routing scheme for delay-tolerant networks 时延容忍网络中基于概率位置的路由方案
Pub Date : 2009-12-01 DOI: 10.1109/ICCIT.2009.5407159
Farzana Yasmeen, S. Urushidani, S. Yamada
Observably, participants in realistic scenarios repeatedly navigate specific locations based on routine behavior, leading to inherently structured movement patterns. In this paper we propose a delay-tolerant routing scheme, called Probabilistic Routing with Minimum Proximity (PRMP), which aims to utilize prior movement patterns of peers to predict future probability of forwarding messages to a location proximal to a destinations home address. A source considers next-hop forwarding based on a probabilistic benefit-metric; which takes into account a nodes frequented trajectories and current position, its spatial distance from a destinations stationary home location and the probability of any of its immediate trajectories minimizing the spatial distance to the destinations home. Delivering a message to a nodes' home address in the network is synonyms to delivering mail to an individual's designated mailbox. The protocol avoids flooding completely in efforts to optimize use of network resources. Simulations of PRMP reflect low buffer occupancy at both high and low loads in the network. It also maintains resource optimization in varying node densities compared to two prominent DTN flooding protocols - Epidemic and PRoPHET.
可以观察到,现实场景中的参与者根据日常行为反复导航特定位置,从而导致固有的结构化运动模式。在本文中,我们提出了一种延迟容忍路由方案,称为最小邻近概率路由(PRMP),该方案旨在利用对等体的先前移动模式来预测未来将消息转发到目的地家庭地址附近位置的概率。源考虑基于概率效益度量的下一跳转发;它考虑了一个节点的频繁轨迹和当前位置,它到目标固定位置的空间距离,以及它的任何一个直接轨迹使到目标位置的空间距离最小的概率。将消息发送到网络中节点的家庭地址相当于将邮件发送到个人指定的邮箱。该协议完全避免了泛洪,以优化网络资源的使用。PRMP的仿真反映了网络在高负荷和低负荷下的低缓冲区占用率。与两种著名的DTN洪水协议(Epidemic和PRoPHET)相比,它还保持了不同节点密度下的资源优化。
{"title":"A probabilistic position-based routing scheme for delay-tolerant networks","authors":"Farzana Yasmeen, S. Urushidani, S. Yamada","doi":"10.1109/ICCIT.2009.5407159","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407159","url":null,"abstract":"Observably, participants in realistic scenarios repeatedly navigate specific locations based on routine behavior, leading to inherently structured movement patterns. In this paper we propose a delay-tolerant routing scheme, called Probabilistic Routing with Minimum Proximity (PRMP), which aims to utilize prior movement patterns of peers to predict future probability of forwarding messages to a location proximal to a destinations home address. A source considers next-hop forwarding based on a probabilistic benefit-metric; which takes into account a nodes frequented trajectories and current position, its spatial distance from a destinations stationary home location and the probability of any of its immediate trajectories minimizing the spatial distance to the destinations home. Delivering a message to a nodes' home address in the network is synonyms to delivering mail to an individual's designated mailbox. The protocol avoids flooding completely in efforts to optimize use of network resources. Simulations of PRMP reflect low buffer occupancy at both high and low loads in the network. It also maintains resource optimization in varying node densities compared to two prominent DTN flooding protocols - Epidemic and PRoPHET.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125598536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2009 12th International Conference on Computers and Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1