Notification:
We are currently experiencing intermittent issues impacting performance. We apologize for the inconvenience.
By Topic

Advances in Computer Engineering (ACE), 2010 International Conference on

Date 20-21 June 2010

Filter Results

Displaying Results 1 - 25 of 99
  • [Front cover]

    Publication Year: 2010 , Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (297 KB)  
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (84 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010 , Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (162 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (114 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010 , Page(s): v - xi
    Save to Project icon | Request Permissions | PDF file iconPDF (164 KB)  
    Freely Available from IEEE
  • Message from the General Chairs

    Publication Year: 2010 , Page(s): xii
    Save to Project icon | Request Permissions | PDF file iconPDF (228 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Committee Members

    Publication Year: 2010 , Page(s): xiii - xiv
    Save to Project icon | Request Permissions | PDF file iconPDF (120 KB)  
    Freely Available from IEEE
  • Program Committee Members

    Publication Year: 2010 , Page(s): xv
    Save to Project icon | Request Permissions | PDF file iconPDF (133 KB)  
    Freely Available from IEEE
  • Multi Hashing Low Power Bloom Filter Architectures for Network Applications

    Publication Year: 2010 , Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (436 KB) |  | HTML iconHTML  

    A Bloom filter is a simple space-efficient randomized data structure for representing a set in order to support network and database query systems. Although Bloom filters were invented in the 1970's and have been heavily used in database applications, they have only recently received widespread attention in the networking literature. Software applications frequently fail to identify so many signatures through comparisons at very high speeds. We introduce a low power bloom filter architectures which is space and power effective in hardware platforms. Instead of working on programming phase or technology, our work concentrated on look up techniques of Bloom filters. We have chosen better hash function to be utilized in hardware applications of Bloom filter by FPGA implementation. Power analysis shows that decrement in number of hash functions per stage results in power gain. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Linear Prediction Modelling for the Analysis of the Epileptic EEG

    Publication Year: 2010 , Page(s): 6 - 9
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (409 KB) |  | HTML iconHTML  

    Epilepsy is a chronic neurological disorder characterized by recurrent, unprovoked seizures. This study deals with a preliminary investigation to detect epileptic components in the electroencephalogram (EEG) waveform, which results in a reduction of analysis time by the expert neurologist. As an alternative to the Fast Fourier Transform (FFT) spectral analysis approach, an Auto Regressive (AR), a Moving Average (MA) and an Auto Regressive Moving Average (ARMA) model-based spectral estimators can be used to process the EEG signal. An AR signal-processing model for the epileptic EEG is proposed. The AR modelling has been used to analyse physiological signals such as the human EEG. The interpretation of an autoregressive model as a recursive digital filter and its use in spectral estimation are considered. This is used to formulate an analysis model, based on Linear Prediction Coding (LPC). The theory behind the method is explained and the implementation is described. The algorithm is computationally efficient and can be implemented in real-time on a small microcomputer system for on-line analysis. Results produced by this method may be used for further analysis. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Single-Fault Detection Technique for Micro-fluidic Based Biochips

    Publication Year: 2010 , Page(s): 10 - 14
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (292 KB) |  | HTML iconHTML  

    This paper presents a new fault detection technique for digital micro-fluidic based biochips. Due to recent advances in microfluidics, digital micro-fluidic biochips are revolutionizing laboratory procedures, e.g., biosensing, clinical diagnostics etc. Because of the underlying mixed-technology and mixed energy domains, biochips exhibit unique failure mechanisms and defects. Off-line and on-line test techniques are required to ensure system dependability. In this paper, a new technique is presented to traverse all the cells and cell boundary, for the purpose of detecting a single fault within the bio-chip. Experimental results show that the proposed technique improves the fault detection time to a great extent. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Protocol for Minimizing Jitter for Guaranteed QoS in Network Multimedia Communication

    Publication Year: 2010 , Page(s): 15 - 18
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (225 KB) |  | HTML iconHTML  

    Multimedia data are sensed by human[6]. These types of data are delay intolerable but error tolerable to some extend. Two important parameters that degrade the quality of service (QoS) of multimedia services are Skew and Jitter. In a previous work of us we described a technique which successfully removes skew. Different researchers proposed different techniques for removing jitter. Accelerating and De accelerating technique, Buffer size estimation technique[5] and Clock synchronization between sender and receiver are some suitable techniques. But all of the techniques have some advantages and disadvantages. We described the advantages and disadvantages of each of the techniques in a previous work of us. In our current work we have proposed a new protocol and a technique which will minimize jitter in network multimedia communication. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Signed Array Multiplier

    Publication Year: 2010 , Page(s): 19 - 23
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (265 KB) |  | HTML iconHTML  

    A new architecture for the signed binary multiplier is presented in this paper. The proposed signed array multiplier has 54% area overhead as compared to Baugh Wooley multiplier but is 25% faster than the previous designs. The new design works with the operands in two’s complement format. The multiplier is based on a basic 2x2 multiplier. The final product is adjusted for negative operands. The design is implemented in TSMC 0.18um process technology node and TSPICE is used for design and simulation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Effective Gateway Discovery Mechanism in an Integrated Internet-MANET (IIM)

    Publication Year: 2010 , Page(s): 24 - 28
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (649 KB) |  | HTML iconHTML  

    The Integration of the MANETs and infrastructure networks such as Internet, known as heterogeneous network, extends the network coverage and increases the application domain of the MANET. Communication between a mobile device in an ad hoc network and a fixed device on the Internet is achieved using gateways, which acts as a bridge between them. The ad hoc routing protocol AODV is extended and used to achieve interconnection between a MANET and the Internet. In the existing approaches of gateway discovery either interface queue length or the minimum hop metric criteria or a combination is used for selecting the gateway by the mobile nodes. In the proposed approach, an efficient proactive gateway discovery algorithm is devised that takes into account the length of the routing queue in addition to the minimum hop count metric for selecting an efficient gateway and also selecting the routes to other mobile nodes. This is a novel strategy of gateway discovery. This approach is implemented by calculating the load along a path and updating the routing entry as the route requests are processed from one mobile node to the other. This allows usage of updated routes without waiting for the gateway advertisements for updating the routing entries. It also reduces the delay along the path for the packets traversing within the ad hoc network. The use of this concept increases the throughput by choosing the less congested paths and reduces the routing overhead. In this paper the impact of this new approach is investigated. Simulation results indicate that our protocol outperforms other approaches. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Architectural Framework of a Crawler for Retrieving Highly Relevant Web Documents by Filtering Replicated Web Collections

    Publication Year: 2010 , Page(s): 29 - 33
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (383 KB) |  | HTML iconHTML  

    As the Web continues to grow, it has become a difficult task to search for the relevant information using traditional search engines. There are many index based web search engines to search information in various domains on the Web. By using such search engines the retrieved documents (URLs) related to the searched topic are of poor quality also as the amount of Web pages is growing at a rapid speed, the issue of devising a personalized Web search is of great importance. This paper proposes a method to reduce the time spend on browsing search results by providing a personalized Web Search Agent (MetaCrawler). In the proposed technique of personalized Web searching, Web pages relevant to user interests will be ranked in the front of the result list, thus facilitating the user to get a quick to get access those links ranked in the front of the list. An experiment was designed and conducted to test the performance of proposed Web-Filtering approach. The experimental results suggest substantial improvement in the crawling strategy, especially when the search strings are small. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Revised Secure Authentication Protocol for IEEE 802.16 (e)

    Publication Year: 2010 , Page(s): 34 - 38
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (308 KB) |  | HTML iconHTML  

    The WiMAX IEEE 802.16 (e) is defined as the Worldwide Interoperability for Microwave Access by the WiMAX Forum, formed in April 2001 to promote conformance and interoperability of the IEEE 802.16 standard, and it is officially known as Wireless MAN. The absence of physical boundaries makes in general a wireless network more vulnerable than a wired network. The IEEE 802.16 provides a security sublayer in the MAC layer to address the privacy issues across the fixed BWA (Broadband Wireless Access). Several proposals have been published to address the flaws in IEEE802.16 security after the release of IEEE802.16-2001. However, even with the modified version IEEE802.16-2004, the security problems still persist and many additional flaws have emerged. This paper examines the threats against the authentication protocols of WiMAX and proposes a new authentication protocol which is more reliable and secure. The proposed protocol is rigid against the attacks like Denial of service (DOS), Man-in-the-middle and replay. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quantum Mechanical Characterization of Single Walled Carbon Nanotube (SWCNT) to Evaluate Stability and Conductivity

    Publication Year: 2010 , Page(s): 39 - 42
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (419 KB) |  | HTML iconHTML  

    Single Walled Carbon Nanotube (SWCNT) is known to have unique thermodynamic and electrical properties which mainly depends upon the chiral index values (n, m). Quantum mechanical modeling and simulation studies were conducted for these samples to characterize the above properties. The energy gap of conducting carbon nano tubes has been found to be negligibly small. Armchair configuration with (n=m) is found to be highly stable. All these samples are found to be conducting. Structures with n and m values (8,7), (7,8), (7,6), (7,2), (6,5), (5,3) (4,5) and (3,5) are found to be unstable and are all semiconductors. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unsupervised Color Image Segmentation Using Constrained Compound MRF Model with Bi-level Line Field

    Publication Year: 2010 , Page(s): 43 - 47
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (362 KB) |  | HTML iconHTML  

    In this paper, we propose an unsupervised color image segmentation scheme using homotopy continuation method and Compound Markov Random Field (CMRF) model with Bilevel Binary Line Fields. The scheme is specifically meant to preserve weak edges besides the well defined strong edges. The proposed scheme is recursive in nature where model parameter estimation and the image label estimation are alternated. Ohta (I1, I2, I3) model is used as the color model for image segmentation and we propose a compound MRF model taking care of intra-color and inter-color plane interactions. The CMRF model parameters are estimated using Maximum Conditional Pseudo Likelihood (MCPL) criterion and the MCPL estimates are obtained using homotopy continuation method. The image label estimation is formulated using Maximum a Posteriori criterion and the MAP estimates are obtained using hybrid algorithm. In the context of misclassification error, the proposed unsupervised scheme with CMRF model exhibited improved segmentation accuracy as compared to Yu and Clausi ’s method. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detection and Prevention of Layer-3 Wormhole Attacks on Boundary State Routing in Ad Hoc Networks

    Publication Year: 2010 , Page(s): 48 - 53
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (305 KB) |  | HTML iconHTML  

    Wormhole attacks in networks consist in two malicious nodes tunneling traffic from one end of the network to the other. Boundary State Routing (BSR) is a geographic routing protocol which routes the data using the location of the nodes. In this paper we present the possible attacks on BSR protocol. These attacks are difficult to be detected. To avoid the attacks on BSR protocol, we propose two schemes namely Reverse Routing Scheme (RRS) and Authentication of Nodes Scheme (ANS). The RRS method uses no methodology for the detection of the malicious nature of the intermediate nodes. ANS method uses cryptographic concepts. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Low Power Folding and Interpolating ADC Using 0.18 mu-m Technology

    Publication Year: 2010 , Page(s): 54 - 58
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (325 KB) |  | HTML iconHTML  

    Folding and interpolating A/D converters have been shown to be an effective means of digitization of high bandwidth signals at intermediate resolution. The paper focuses on design of low power 5-bit folding & interpolating ADC. The folding amplifier can be used to produce more than one zero-crossing point to reduce required number of comparators. The converter is designed using novel low voltage, low power folding amplifier with folding factor=4. The folding amplifier is used in the design of coarse and fine converter both. To reduce the power consumption, encoder based on XOR-OR logic is used. The design is implemented using 0.18mm technology at 1.7V supply voltage. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Introducing Trust Establishment Protocol in Contract Net Protocol

    Publication Year: 2010 , Page(s): 59 - 63
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (273 KB) |  | HTML iconHTML  

    Contract Net Protocol (CNP) is a means to specify problem-solving communication required in a distributed multi-agent environment. Although, FIPA standardized CNP addresses most of the issues with respect to communication happening among agents in a Multi-Agent Environment (MAE), issues related to establishing trust-worthy communication amongst agents is still prevailing. This work introduces a new Trust Establishment Protocol (TEP) in CNP, thereby improving CNP. The proposed new version shall be referred to as CNTEP Architecture. Introduction of TEP in existing CNP would help in ensuring truthfulness of agents which is crucial for open, dynamic and heterogeneous multi-agent systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development and Performance Evaluation of an Efficient Multimedia Communication Scheme Using DWT and Adaptive Channel Equalization

    Publication Year: 2010 , Page(s): 64 - 68
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1953 KB) |  | HTML iconHTML  

    Bandwidth conservation is an important issue in case of multimedia communication. To alleviate this problem an efficient multimedia communication scheme is proposed in this paper by incorporating wavelet based lossy compressor and a combination of adaptive channel equalizer and an expander at the receiver. The performance of proposed scheme is evaluated by transmitting images at different noise conditions of the channel and by assessing the quality of the image at the receiver. The paper also evaluates the effects of compression ratio (CR), number of bits used in representing the compressed coefficients and the strength of additive noise in the channel. Extensive simulation results demonstrate that the DWT and equalizer based combined scheme outperforms the DCT and ANN based schemes. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Learning Based Single Image Super Resolution Method Using Directionlets

    Publication Year: 2010 , Page(s): 69 - 73
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (465 KB) |  | HTML iconHTML  

    In this paper, a novel directionally adaptive, learning based, single image super resolution method using multiple direction wavelet transform, called Directionlets is presented. The property of Directionlets to efficiently capture directional features and to extract edge information along different directions is used here to super resolve an image. The Directionlet coefficients at finer scales of the unknown high-resolution image are learned locally from a set of high-resolution training images and the inverse Directionlet transform recovers the super-resolved image. The experiments show that the proposed approach outperforms standard interpolation techniques like Cubic spline interpolation as well as standard Wavelet-based learning, both visually and in terms of the mean squared error (mse) values View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Channel Condition and Mobility Based Choice of Neighbor Node for Routing in MANET

    Publication Year: 2010 , Page(s): 74 - 78
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (185 KB) |  | HTML iconHTML  

    In this paper, the vulnerability and instability of links and nodes in MANETs are shown to be minimized by augmenting problem of reliability pair between two neighboring nodes. Precisely, we address a process of neighbor node selection in MANETs with the help of various models such as node power model, mobility model and differential received signal power model. The models are used to define a metric known as reliability pair factor of reliability pair. The margin over reliability pair factor is assessed through simulation in various network scenarios to illustrate the effectiveness of the proposed scheme. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Adaptive Energy Saving and Reliable Routing Protocol for Limited Power Sensor Networks

    Publication Year: 2010 , Page(s): 79 - 85
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (294 KB) |  | HTML iconHTML  

    In wireless sensor networks, the value of transmission range has a direct impact on energy utilization. A sensor node makes use of the maximum transmission power and transmission range to send packets in a network which results in wastage of energy, since maximum transmission range is mostly longer than the distance between node and its extreme neighbor due to node distribution. In this paper, we present an adaptive energy saving and reliable routing protocol (AESRR) for wireless sensor networks. In AESRR, sensor node reduces its maximum transmission range in order to reach the extreme neighbor for saving energy before sending the first packet. The route discovery process of AESRR is on-demand. In the route discovery process, a combined link weight is determined based on the parameters transmission success ratio and node’s residual energy. The best route is selected based on this link weight value. The sensor node must readjust the transmission range when remaining energy reaches bellow a threshold link weight value. Our proposed protocol saves energy, and prolongs the lifetime of node while enhancing the reliability. By simulation results, we demonstrate that AESRR has better delivery ratio and less energy consumption and delay. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.