Pub Date : 2009-12-01DOI: 10.1109/ICCIT.2009.5407305
A. Mostayed, M. E. Kabir, S. Z. Khan, Md. Mynuddin Gani Mazumder
Biometric authentication refers to the automatic verification of a person's identity from physiological or behavioral characteristics presented by him or her. In this paper an authentication scheme from hand images is presented. Instead of dealing with hand measurements, typically termed as ‘hand geometry’, this method verifies with entire hand shape. Peg free and position invariant features are calculated using Radon Transform. Low resolution hand images captured by a document scanner are processed to extract feature vectors. The proposed scheme is tested on a data set of 136 images with simple Euclidian norm based match score. The method attained an Equal Error Rate (EER) of 5.1%.
{"title":"Biometric authentication from low resolution hand images using radon transform","authors":"A. Mostayed, M. E. Kabir, S. Z. Khan, Md. Mynuddin Gani Mazumder","doi":"10.1109/ICCIT.2009.5407305","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407305","url":null,"abstract":"Biometric authentication refers to the automatic verification of a person's identity from physiological or behavioral characteristics presented by him or her. In this paper an authentication scheme from hand images is presented. Instead of dealing with hand measurements, typically termed as ‘hand geometry’, this method verifies with entire hand shape. Peg free and position invariant features are calculated using Radon Transform. Low resolution hand images captured by a document scanner are processed to extract feature vectors. The proposed scheme is tested on a data set of 136 images with simple Euclidian norm based match score. The method attained an Equal Error Rate (EER) of 5.1%.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130896231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICCIT.2009.5407130
M. Islam, M. Rahman, Muhammad Abdul Goffar Khan
This paper presents an approach of speech enhancement techniques to improve the performance of the robust speaker identification under noisy environments. Start-end points detection, silence part removal, frame segmentation and windowing technique have been used to pre-process and wiener filter has been used to remove the silence parts from the speech utterances. To extract the features from the speech various speech parameterization techniques that is LPC, LPCC, RCC, MFCC, ΔMFCC and ΔΔMFCC have been simulated. Finally, to measure the performance of the proposed speech enhancement techniques, genetic algorithm has been used as a classifier for the noise robust automated speaker identification system and various experiments have performed on genetic algorithm to select the optimum parameters. According to the NOIZEOUS speech database, the highest identification rate of 70.31 [%] for text-dependent and of 61.26 [%] for text-independent speaker identification system have been achieved.
{"title":"Improvement of speech enhancement techniques for robust speaker identification in noise","authors":"M. Islam, M. Rahman, Muhammad Abdul Goffar Khan","doi":"10.1109/ICCIT.2009.5407130","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407130","url":null,"abstract":"This paper presents an approach of speech enhancement techniques to improve the performance of the robust speaker identification under noisy environments. Start-end points detection, silence part removal, frame segmentation and windowing technique have been used to pre-process and wiener filter has been used to remove the silence parts from the speech utterances. To extract the features from the speech various speech parameterization techniques that is LPC, LPCC, RCC, MFCC, ΔMFCC and ΔΔMFCC have been simulated. Finally, to measure the performance of the proposed speech enhancement techniques, genetic algorithm has been used as a classifier for the noise robust automated speaker identification system and various experiments have performed on genetic algorithm to select the optimum parameters. According to the NOIZEOUS speech database, the highest identification rate of 70.31 [%] for text-dependent and of 61.26 [%] for text-independent speaker identification system have been achieved.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132787455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICCIT.2009.5407150
M. Chowdhury, Josef Noll
Social relations are often used to identify an individual. In the digital world, such relations can be exploited to provide controlled access to private or community contents. This paper proposes an access control model that employs the social relations. Semantic technologies are used for formal specification of the model. The semantic access control model is composed of a knowledge base and access policies. The Web Ontology Language represents the knowledge base and the access policies are expressed through semantic rules. Execution of rules derives the access authorization decisions that state which user can access which contents with a specific privilege. The paper provides a detail evaluation of the proposed access control model.
{"title":"A social relation aware semantic access control","authors":"M. Chowdhury, Josef Noll","doi":"10.1109/ICCIT.2009.5407150","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407150","url":null,"abstract":"Social relations are often used to identify an individual. In the digital world, such relations can be exploited to provide controlled access to private or community contents. This paper proposes an access control model that employs the social relations. Semantic technologies are used for formal specification of the model. The semantic access control model is composed of a knowledge base and access policies. The Web Ontology Language represents the knowledge base and the access policies are expressed through semantic rules. Execution of rules derives the access authorization decisions that state which user can access which contents with a specific privilege. The paper provides a detail evaluation of the proposed access control model.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130371718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICCIT.2009.5407307
M. Mottalib, Md Safiur Rahman Mahdi, A. Haque, S.M. Al Mamun, H. A. A. Mamun
Neural network is one of the successful methods for protein secondary structure prediction. Day to day this technology is modified, improved, even other methods also combined with it to get better result. In this paper we trained feed-forward neural network with trans-membrane protein for helix prediction. Using Java Object Oriented Neural Engine (JOONE) our achieved accuracy is 71%. This paper is expected to benefit researchers in proteomics by presenting a summary of developments of neural network in this area.
{"title":"Transmembrane helix prediction using feed-forward neural network","authors":"M. Mottalib, Md Safiur Rahman Mahdi, A. Haque, S.M. Al Mamun, H. A. A. Mamun","doi":"10.1109/ICCIT.2009.5407307","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407307","url":null,"abstract":"Neural network is one of the successful methods for protein secondary structure prediction. Day to day this technology is modified, improved, even other methods also combined with it to get better result. In this paper we trained feed-forward neural network with trans-membrane protein for helix prediction. Using Java Object Oriented Neural Engine (JOONE) our achieved accuracy is 71%. This paper is expected to benefit researchers in proteomics by presenting a summary of developments of neural network in this area.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133107363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICCIT.2009.5407284
Muhammad Mahfuzul Alam, M. Rajib, S. Biswas
Digital Enhanced Cordless Telecommunication (DECT) can be a latent solution for wireless local loop (WLL) based communication system planning. In this paper, the design and simulation of a 8×8 planar microstrip antenna array and signal processing techniques of smart antenna systems for DECT radio base stations are presented. MUltiple SIgnal Classification (MUSIC) and Least Mean Square (LMS) signal processing algorithm techniques are analyzed and simulated for smart antenna system. Simulation results of the radiation characteristics, gain and return loss of the fixed beam planar array antenna have been produced by EM simulation software Zeland IE3D. Signal processing simulations were run in MATLAB. This smart antenna system is designed and simulated for DECT system in 1.88–1.90GHz frequency band.
{"title":"Design and analysis of smart antenna system for DECT radio base station in wireless local loop","authors":"Muhammad Mahfuzul Alam, M. Rajib, S. Biswas","doi":"10.1109/ICCIT.2009.5407284","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407284","url":null,"abstract":"Digital Enhanced Cordless Telecommunication (DECT) can be a latent solution for wireless local loop (WLL) based communication system planning. In this paper, the design and simulation of a 8×8 planar microstrip antenna array and signal processing techniques of smart antenna systems for DECT radio base stations are presented. MUltiple SIgnal Classification (MUSIC) and Least Mean Square (LMS) signal processing algorithm techniques are analyzed and simulated for smart antenna system. Simulation results of the radiation characteristics, gain and return loss of the fixed beam planar array antenna have been produced by EM simulation software Zeland IE3D. Signal processing simulations were run in MATLAB. This smart antenna system is designed and simulated for DECT system in 1.88–1.90GHz frequency band.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122008995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICCIT.2009.5407319
K. Hasan, K. Islam, Mojahidul Islam, T. Tsuji
Multidimensional array is widely used in large number of scientific research and engineering applications for handling large multidimensional data. There exist many data structures to represent multidimensional data. But most of these data structures are static (such as traditional multidimensional array) and can not handle the dynamic extension or reduction of the array. The Traditional Multidimensional Array (TMA) is efficient in terms of accessing the elements of the array by random computing the addressing function but TMA is not extendible during run time. In this paper we propose a new scheme, Karnaugh Representation of Extendible Array (KEA), to represent the multidimensional data. The main idea of this scheme is to represent n dimensional array by a set of two dimensional extendible arrays. The scheme can be extended in any direction during run time. To evaluate our proposed scheme, we implement and compare with the existing systems for different operations with the Traditional Multidimensional Array (TMA), and Traditional Extendible Array (TEA). Our experimental result shows that the KEA scheme outperforms TMA and TEA.
{"title":"An extendible data structure for handling large multidimensional data sets","authors":"K. Hasan, K. Islam, Mojahidul Islam, T. Tsuji","doi":"10.1109/ICCIT.2009.5407319","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407319","url":null,"abstract":"Multidimensional array is widely used in large number of scientific research and engineering applications for handling large multidimensional data. There exist many data structures to represent multidimensional data. But most of these data structures are static (such as traditional multidimensional array) and can not handle the dynamic extension or reduction of the array. The Traditional Multidimensional Array (TMA) is efficient in terms of accessing the elements of the array by random computing the addressing function but TMA is not extendible during run time. In this paper we propose a new scheme, Karnaugh Representation of Extendible Array (KEA), to represent the multidimensional data. The main idea of this scheme is to represent n dimensional array by a set of two dimensional extendible arrays. The scheme can be extended in any direction during run time. To evaluate our proposed scheme, we implement and compare with the existing systems for different operations with the Traditional Multidimensional Array (TMA), and Traditional Extendible Array (TEA). Our experimental result shows that the KEA scheme outperforms TMA and TEA.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115691934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICCIT.2009.5407167
M. M. Hossain, M. Awal, D. Roy, Md. Asraful Islam, Md. Anwar Hossain
CDMA refers to multiple access method in which the individual terminals uses spread spectrum techniques and occupy the entire spectrum whenever they transmit. This feature makes CDMA different from FDMA and TDMA. In the wireless communication, the Signal to Interference Ratio (SIR) and Bit Error Rate (BER) are the predominant parameter that characterizes the system performance. This paper presented here Standard Gaussian Approximation (SGA) methods presented in the international literature concerning the computation of the SIR and the BER in DS-CDMA systems under perfect and imperfect power control over fading and non-fading channel. The content and conclusions of this paper have driven to take many important decisions by varying different DS-CDMA communication parameters such as processing gain, number of interfering cells, multipath components etc. using SGA techniques. As SGA is analytically developed and is very computationally efficient solution for the system performance estimate in terms of SIR and BER, it helps us to avoid the tedious and cost-inefficient simulations.
{"title":"Performance analysis of DS-CDMA under perfect and imperfect power control","authors":"M. M. Hossain, M. Awal, D. Roy, Md. Asraful Islam, Md. Anwar Hossain","doi":"10.1109/ICCIT.2009.5407167","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407167","url":null,"abstract":"CDMA refers to multiple access method in which the individual terminals uses spread spectrum techniques and occupy the entire spectrum whenever they transmit. This feature makes CDMA different from FDMA and TDMA. In the wireless communication, the Signal to Interference Ratio (SIR) and Bit Error Rate (BER) are the predominant parameter that characterizes the system performance. This paper presented here Standard Gaussian Approximation (SGA) methods presented in the international literature concerning the computation of the SIR and the BER in DS-CDMA systems under perfect and imperfect power control over fading and non-fading channel. The content and conclusions of this paper have driven to take many important decisions by varying different DS-CDMA communication parameters such as processing gain, number of interfering cells, multipath components etc. using SGA techniques. As SGA is analytically developed and is very computationally efficient solution for the system performance estimate in terms of SIR and BER, it helps us to avoid the tedious and cost-inefficient simulations.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129436564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICCIT.2009.5407169
Nazia Perwaiz, M. Y. Javed
Energy awareness is an essential design issue in wireless sensor networks (WSN). The routing techniques of WSN are classified into three main categories Data-Centric, hierarchical and location-based. Data-Centric technologies perform in-network aggregation of data to yield energy-efficient dissemination; Sensor Protocols for Information via Negotiation (SPIN) and Directed Diffusion (DD) are basic Data-Centric routing protocols. This paper presents a survey on Data-Centric routing and specifically focuses on the Directed Diffusion and its variants (dissemination and aggregation variants) and the protocols that follow the similar concept like Directed Diffusion.
{"title":"A study on distributed diffusion and its variants","authors":"Nazia Perwaiz, M. Y. Javed","doi":"10.1109/ICCIT.2009.5407169","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407169","url":null,"abstract":"Energy awareness is an essential design issue in wireless sensor networks (WSN). The routing techniques of WSN are classified into three main categories Data-Centric, hierarchical and location-based. Data-Centric technologies perform in-network aggregation of data to yield energy-efficient dissemination; Sensor Protocols for Information via Negotiation (SPIN) and Directed Diffusion (DD) are basic Data-Centric routing protocols. This paper presents a survey on Data-Centric routing and specifically focuses on the Directed Diffusion and its variants (dissemination and aggregation variants) and the protocols that follow the similar concept like Directed Diffusion.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128902680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICCIT.2009.5407144
F. A. Faisal, M. Rahman
A Symmetric Tori connected Torus Network (STTN) is a 2D-torus network of multiple basic modules, in which the basic modules are 2D-torus networks that are hierarchically interconnected for higher-level networks. In this paper, we present the architecture of the STTN, addressing of node, routing of message, and evaluate the static network performance of STTN, TTN, TESH, mesh, and torus networks. It is shown that the STTN possesses several attractive features, including constant degree, small diameter, low cost, small average distance, moderate bisection width, and high fault tolerant performance than that of other conventional and hierarchical interconnection networks.
{"title":"Symmetric Tori connected Torus Network","authors":"F. A. Faisal, M. Rahman","doi":"10.1109/ICCIT.2009.5407144","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407144","url":null,"abstract":"A Symmetric Tori connected Torus Network (STTN) is a 2D-torus network of multiple basic modules, in which the basic modules are 2D-torus networks that are hierarchically interconnected for higher-level networks. In this paper, we present the architecture of the STTN, addressing of node, routing of message, and evaluate the static network performance of STTN, TTN, TESH, mesh, and torus networks. It is shown that the STTN possesses several attractive features, including constant degree, small diameter, low cost, small average distance, moderate bisection width, and high fault tolerant performance than that of other conventional and hierarchical interconnection networks.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123916826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICCIT.2009.5407274
S. Begum, M. Hasanuzzaman
Sign language is a specific area of human gesture communication and a full-edged complex language that is used by various deaf communities. In Bangladesh, there are many deaf and dumb people. It becomes very difficult to communicate with them for the people who are unable to understand the Sign Language. In this case, an interpreter can help a lot. So it is desirable to make computer to understand the Bangladeshi sign language that can serve as an interpreter. In this paper, a Computer Vision-based Bangladeshi Sign Language Recognition System (BdSL) has been proposed. In this system, separate PCA (Principal Component Analysis) is used for Bengali Vowels and Bengali Numbers recognition. The system is tested for 6 Bengali Vowels and 10 Bengali Numbers.
{"title":"Computer Vision-based Bangladeshi Sign Language Recognition System","authors":"S. Begum, M. Hasanuzzaman","doi":"10.1109/ICCIT.2009.5407274","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407274","url":null,"abstract":"Sign language is a specific area of human gesture communication and a full-edged complex language that is used by various deaf communities. In Bangladesh, there are many deaf and dumb people. It becomes very difficult to communicate with them for the people who are unable to understand the Sign Language. In this case, an interpreter can help a lot. So it is desirable to make computer to understand the Bangladeshi sign language that can serve as an interpreter. In this paper, a Computer Vision-based Bangladeshi Sign Language Recognition System (BdSL) has been proposed. In this system, separate PCA (Principal Component Analysis) is used for Bengali Vowels and Bengali Numbers recognition. The system is tested for 6 Bengali Vowels and 10 Bengali Numbers.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133927310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}