Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Bandwidth (3)
- Authentication (2)
- Computer networks (2)
- Cryptography (2)
- Decoding (2)
-
- Delay (2)
- GSM (2)
- Information technology (2)
- Protocols (2)
- Routing protocols (2)
- System testing (2)
- Wireless LAN (2)
- 3G mobile communication (1)
- AFDMA (1)
- Admission control (1)
- Arch ware tool (1)
- Artificial neural networks (1)
- Asymmetric cryptography (1)
- AuC (1)
- Automated negotiations (1)
- Backpropagation algorithms (1)
- Bandwidth allocation and reservation scheme (1)
- Broadcasting (1)
- CGM (1)
- Channel capacity (1)
- Chipskills programme (1)
- Circuit faults (1)
- Circuit testing (1)
- Clustering algorithms (1)
- Codecs (1)
Articles 1 - 25 of 25
Full-Text Articles in Engineering
Networks - Ii: Closed-Form Expressions For Correlation Function And Power Density Spectrum In Mimo Mobile-To-Mobile Channels Using Two-Erose-Ring Model, Muahammad Riaz, Noor M. Khan
Networks - Ii: Closed-Form Expressions For Correlation Function And Power Density Spectrum In Mimo Mobile-To-Mobile Channels Using Two-Erose-Ring Model, Muahammad Riaz, Noor M. Khan
International Conference on Information and Communication Technologies
This paper presents an extensive study of MIMO channels in mobile-to-mobile environment. Recently proposed two-erose-ring model is reviewed for more details, and closed-form mathematical expressions for space-time correlations and power spectral density for MIMO mobile-to-mobile communication channels are derived. Using the correlation function, we analyze and compare capacity and diversity gains for two-ring model and two-erose-ring model. Furthermore, we compared the results with the existing models.
Networks - Ii: A High Bandwidth Covert Channel In Network Protocol, Mehdi Hussain
Networks - Ii: A High Bandwidth Covert Channel In Network Protocol, Mehdi Hussain
International Conference on Information and Communication Technologies
Covert channel is secret communication path, which existence is not expected in original system of design. It allows different users access to the same information, at the same time, but from different points-of-view. It is being more and more studying due to the grooming of internet. Always high-bandwidth network covert channel pose the significant risk of detection over network. Although the existing technique utilized the reserved bits of header, timestamp, initial sequence number, packet length etc for network covert channel, to some extend these have good temper resistance. But when increase their covert data capacity they becomes to fail to …
Network Security: A Review Of Salient Security Aspects Of The Universal Mobile Telecommunication System (Umts), F. Imran, M. Hussain
Network Security: A Review Of Salient Security Aspects Of The Universal Mobile Telecommunication System (Umts), F. Imran, M. Hussain
International Conference on Information and Communication Technologies
Wireless communication is known as key to global development. Wireless and mobile communication is gaining more importance in our life. Protecting information is one the aspects which we need to focus on the wireless networks. Universal mobile telecommunication system (UMTS) is evolution of the third generation mobile communication system. It was built on the success of global system for mobile communication (GSM). Universal mobile telecommunication system's security is also built on global system for mobile communication (GSM). The paper reviews the literature of the security aspects of the Universal mobile telecommunication system. A critical evaluation of the proposed solutions is …
Networks - Ii: Modified On Demand Transmission Power Control For Wireless Sensor Networks, Mirza M Yasir Masood, Ghufran Ahmed, Noor M. Khan
Networks - Ii: Modified On Demand Transmission Power Control For Wireless Sensor Networks, Mirza M Yasir Masood, Ghufran Ahmed, Noor M. Khan
International Conference on Information and Communication Technologies
On Demand Transmission Power Control (ODTPC) is a well known transmission power control strategy that is used to reduce high power consumption in wireless sensor networks (WSNs). In this paper, we propose an extension to ODTPC and thus, a modified version of ODTPC is proposed named MODTPC. Simulation results show that performance of MODTPC is better than ODTPC in terms of efficiency and energy saving.
Image Processing – I: Spatial Domain Lossless Image Data Compression Method, Syed Ali Hassan, Mehdi Hussain
Image Processing – I: Spatial Domain Lossless Image Data Compression Method, Syed Ali Hassan, Mehdi Hussain
International Conference on Information and Communication Technologies
Images has very significant role in digital media. However, generally digital imaging generates large amounts of data it need to be compressed, without loss of relevant information or simply lossless compression. This paper presents a novel lossless image compression technique in spatial domain. The proposed algorithm divide the image into no. of blocks uses variable bits to store each block pixels. Calculation of variable bits is dependent on pixel values of each block. The advantage of proposed scheme, it is dependent upon pixels correlation with in a block. Experimental results show that our proposed algorithm gives better compression efficiency as …
Network Security: A Secure Architecture For Open Source Voip Solutions, Fahad Sattar, M. Hussain, Kashif Nisar
Network Security: A Secure Architecture For Open Source Voip Solutions, Fahad Sattar, M. Hussain, Kashif Nisar
International Conference on Information and Communication Technologies
Voice over IP “VoIP” is a form of voice speech that uses data networks, for transmission of voice traffic over IP-based networks to transmit voice signals. The signal is correctly encoded at one end of the communication channel, sent as packets through the data network, then decoded at the receiving end and transformed back into a voice signal. It has a potential and offering a choice to the traditional telephony systems due to its high resource utilization and cost efficiency. Meanwhile, Wireless Local Area Networks (WLANs) have become an ever present networking technology that has been deployed around the world. …
Networks - I: Interference Mitigation In 4g System Using Smart Antenna, Asad Ali Siddiqui, Muhammad Mazhar Manzoor, Aamir Ijaz, Adnan Umar Khan, Imran Ahmed Awan, Sangita Lal Chand
Networks - I: Interference Mitigation In 4g System Using Smart Antenna, Asad Ali Siddiqui, Muhammad Mazhar Manzoor, Aamir Ijaz, Adnan Umar Khan, Imran Ahmed Awan, Sangita Lal Chand
International Conference on Information and Communication Technologies
Emerging trends of mobile communication and ever growing demand of mobile users with high speed data requirements and migrating towards 4G, Co-Channel interference and multipath in urban/dense urban environment will limit the capacity of the network. Smart antenna is now recognized by its higher user capacity in 4G wireless networks by efficiently reducing multipath and co-channel interference. Smart Antenna use adaptive beam forming algorithms in a dynamic environment continuously adjusting the weight of antenna arrays for creating a beam to track desired users automatically, and minimize interference from other users by placing nulls in their directions. This research work provides …
Networks - I: An Optimal Mutual Authentication Scheme In Gsm Networks, Abdul Haleem, Muhammad Usman
Networks - I: An Optimal Mutual Authentication Scheme In Gsm Networks, Abdul Haleem, Muhammad Usman
International Conference on Information and Communication Technologies
GSM is one of the most dominating networks for wireless mobile communication. With the passage of time, financial institutions have started using this network for providing their services. Beginning from basic services like balance enquiry, the trend is increasing to provide financial transactions on mobile. This trend establishes the need of strengthening user authentication and requirement of network authentication as well. In this paper, we have proposed a mutual authentication approach using asymmetric cryptography. In the proposed technique, user and network are authenticated with minimal computation and signaling overhead.
Artificial Intelligence – I: A Preliminary Framework For Human-Agent Communication In Electronic Negotiations, Moez Ur Rehman, Nosheen Riaz
Artificial Intelligence – I: A Preliminary Framework For Human-Agent Communication In Electronic Negotiations, Moez Ur Rehman, Nosheen Riaz
International Conference on Information and Communication Technologies
Electronic negotiations are business negotiations conducted via electronic means using information and communications technologies (ICT). Two dominant types of electronic negotiation systems are automated negotiation systems for software agents and negotiation support systems (NSSs) for humans. However, the integration of two types for human-agent negotiations is an important task. In this paper, an extended communication model for human-agent business negotiations is presented. For this purpose, the underlying communication models of automated negotiations and NSSs are analyzed. The extended communication model is based on a common negotiation ontology which captures the negotiation agenda and paves the way for such hybrid communication, …
Wireless Networks: Spert: A Stateless Protocol For Energy-Sensitive Real-Time Routing For Wireless Sensor Network, Sohail Jabbar, Abid Ali Minhas, Raja Adeel Akhtar
Wireless Networks: Spert: A Stateless Protocol For Energy-Sensitive Real-Time Routing For Wireless Sensor Network, Sohail Jabbar, Abid Ali Minhas, Raja Adeel Akhtar
International Conference on Information and Communication Technologies
Putting constraints on performance of a system in the temporal domain, some times turns right into wrong and update into outdate. These are the scenarios where apposite value of time inveterate in the reality. But such timing precision not only requires tightly scheduled performance constraints but also requires optimal design and operation of all system components. Any malfunctioning at any relevant aspect may causes a serious disaster and even loss of human lives. Managing and interacting with such real-time system becomes much intricate when the resources are limited as in wireless sensor nodes. A wireless sensor node is typically comprises …
Wireless Networks: Automated Frequency Distribution, Management & Assignment (Afdma) In Ieee 802.16, Khurram Shehzad, A. Ali, F. Rasool, R. M. Hashmi, A. Zubair, R. L. Ali
Wireless Networks: Automated Frequency Distribution, Management & Assignment (Afdma) In Ieee 802.16, Khurram Shehzad, A. Ali, F. Rasool, R. M. Hashmi, A. Zubair, R. L. Ali
International Conference on Information and Communication Technologies
Frequency is amongst the most exclusive and most costly resources in wireless communication networks, especially, while considering the demands of broadband wireless access (BWA). In BWA, the management of frequency distribution and its effective utilization is of utmost importance. This research explores possible ways to ensure the most effective allocation of bandwidth resources and their best possible utilization on need basis. The model for static frequency allocation has been optimized and the dynamic frequency management has been calculated while dividing the users in different user classes on the basis of their needs and requirements. The effect of ping-pong handovers has …
Networks - Ii: Formal Modeling Of Trust In Semantic Grid Registry, Saba Mahmood, Saman Iftikhar, Hafiz Farooq Ahmad, Farah Mahmood
Networks - Ii: Formal Modeling Of Trust In Semantic Grid Registry, Saba Mahmood, Saman Iftikhar, Hafiz Farooq Ahmad, Farah Mahmood
International Conference on Information and Communication Technologies
In this paper we have analyzed and developed a formal specification of a trust model in semantic grid registry. This paper formalizes the basic requirements of a trust model in case of semantic grid registry. We have described the flow of operations of our system through links and processes in the system architecture. The system is formally modeled in pi-calculus. Finally we transformed the specification to pi- ADL and generated code using Archware tool. We have already developed a semantic grid registry.
Application Of Ict - I: Power Optimization Of Relay Channels, F Ahmed, Z Howard
Application Of Ict - I: Power Optimization Of Relay Channels, F Ahmed, Z Howard
International Conference on Information and Communication Technologies
Relaying in wireless communication can improve power and quality of service. Multiple nodes share channel resources to achieve optimized power. We consider a model with fixed source, destination and relay nodes. Our model finds the optimal values for power transmission for direct and relayed transmitting nodes. In our problem we compare amplify and forward and decode and forward transmission protocols. Unlike other researchers who use constant achievable rates as objective function and power as constraint, we use the strategy of minimizing relay and source power with achievable and target rates as constraints. We simulate various scenarios and our results indicate …
Application Of Ict - I: A Framework For Finding Minimal Test Vectors For Stuck-At-Faults, Azam Beg, S.K. Hasnain
Application Of Ict - I: A Framework For Finding Minimal Test Vectors For Stuck-At-Faults, Azam Beg, S.K. Hasnain
International Conference on Information and Communication Technologies
This paper presents a framework that utilizes Boolean difference theory to find test vectors for stuck-at-fault detection. The framework reads in structural-style Verilog models, and automatically injects single stuck-at-faults (either stuck-at-zero or stuck-at-one) into the models. The simulations are then performed to find minimal sets of test vectors. Using this setup, we conducted experiments on more than 4000 different circuits. The results show that an appreciable savings in test time and effort can be achieved using the method. The same setup can also be used for didactic purposes, specifically for digital design and test courses.
Application Of Ict - I: Using Point-To-Point 1550nm Laser For Outdoor Mobility, Roshan A. Shaikh, Abdul Basit
Application Of Ict - I: Using Point-To-Point 1550nm Laser For Outdoor Mobility, Roshan A. Shaikh, Abdul Basit
International Conference on Information and Communication Technologies
Significant implementation challenges exist in wireless backbone connectivity. Typical optical wireless communication topologies are evaluated. A fresh approach using 1550nm Wavelength laser to design protocol and topology for point-to-point outdoor connectivity is carried out. Matlab simulation results support the 1550nm laser as a good choice for outdoor connectivity for optical wireless communication. New design and topology for an optical wireless communication system is suggested with special consideration of security and recommendation for the optimal use of such a technology is suggested.
Networks - I: Networks-On-Chip: Challenges, Trends And Mechanisms For Enhancements, Omer Tayan
Networks - I: Networks-On-Chip: Challenges, Trends And Mechanisms For Enhancements, Omer Tayan
International Conference on Information and Communication Technologies
The rate of increase of silicon capacity in integrated circuits (IC) will enable system integration of several billion transistors to reside on a single chip in the near future. Future system-on-chip (SoC) systems must therefore integrate up to several hundreds of cores within a single chip, and SoC designs will employ on-chip communication networks (NoCs) as a result. This paper discusses the problems with many current SoC systems, surveys the challenges and trends facing future SoC designs and proposes a mechanism for enhancing NoC strategies of the future by enhancing memory management and utilization techniques within an NoC.
Networks - I: An Instantiation Of Way Point Routing For Mobile Ad Hoc Networks, Waseem M. Arain, Sayeed Ghani
Networks - I: An Instantiation Of Way Point Routing For Mobile Ad Hoc Networks, Waseem M. Arain, Sayeed Ghani
International Conference on Information and Communication Technologies
Mobile ad hoc networks are increasingly finding their existence in the marketplace heading to a new paradigm of pervasive computing. However there are many areas open to research in the field. Due to node mobility resulting in an ever-changing network topology, conventional routing methods cannot be applied in MANETS. Therefore, this is one of the core areas of research. Researchers are challenged to design protocols that can potentially scale to anything from thousand to tens of thousands of nodes and to reduce the route discovery latency. In this paper a different instantiation of way point routing (WPR) model is proposed, …
Networks - I: A Comparative Analysis Of Dccp Variants (Ccid2, Ccid3), Tcp And Udp For Mpeg4 Video Applications, Muhammad Ajmal Azad, Rashid Mahmood, Tahir Mehmood
Networks - I: A Comparative Analysis Of Dccp Variants (Ccid2, Ccid3), Tcp And Udp For Mpeg4 Video Applications, Muhammad Ajmal Azad, Rashid Mahmood, Tahir Mehmood
International Conference on Information and Communication Technologies
New emerging technologies like Multimedia applications require timely delivery of information as compared to reliability. The most widely used protocols over transport layer are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Both of these have some drawbacks while using in real time applications. TCP increases delay in transfer of data but achieving reliable transfer of data while UDP does not provide any acknowledgment, hence it overcomes the problem of delay but lacking congestion control mechanism. To provide congestion control over transport layer using UDP, Datagram Congestion Control Protocol (DCCP) has been designed to provide timely delivery of data …
Artificial Intelligence – I: A Two-Step Approach For Improving Efficiency Of Feedforward Multilayer Perceptrons Network, Shoukat Ullah, Zakia Hussain
Artificial Intelligence – I: A Two-Step Approach For Improving Efficiency Of Feedforward Multilayer Perceptrons Network, Shoukat Ullah, Zakia Hussain
International Conference on Information and Communication Technologies
An artificial neural network has got greater importance in the field of data mining. Although it may have complex structure, long training time, and uneasily understandable representation of results, neural network has high accuracy and is preferable in data mining. This research paper is aimed to improve efficiency and to provide accurate results on the basis of same behaviour data. To achieve these objectives, an algorithm is proposed that uses two data mining techniques, that is, attribute selection method and cluster analysis. The algorithm works by applying attribute selection method to eliminate irrelevant attributes, so that input dimensionality is reduced …
Poster Session A: A Multi-Priority Application Framework For Mobile Ad Hoc Networks, M. Ibrahim Channa, Ahsan Chaudhry, Kashif Sharif, Irum Memon
Poster Session A: A Multi-Priority Application Framework For Mobile Ad Hoc Networks, M. Ibrahim Channa, Ahsan Chaudhry, Kashif Sharif, Irum Memon
International Conference on Information and Communication Technologies
The fast spread of small wireless computers has enabled the design and deployment of wireless Ad Hoc networks. Typical applications proposed for such networks include both Real Time and Non-Real Time applications. We propose an architecture that provides a complete framework for Real Time applications and Best Effort traffic. The proposed architecture comprises of an Ad Hoc Routing Protocol for route setup and route repair, a Bandwidth Allocation and Reservation Scheme for Real Time traffic, and a MAC layer protocol that provides traffic differentiation. The Admission Control module is used to admit or reject a new Real Time flow request …
Secured Network Model For Management Information System Based On Ip Security (Ipsec) Encryption Using Multilayered Approach Of Network Security, Dr. Amir Hassan Pathan, Muniza Irshad
Secured Network Model For Management Information System Based On Ip Security (Ipsec) Encryption Using Multilayered Approach Of Network Security, Dr. Amir Hassan Pathan, Muniza Irshad
International Conference on Information and Communication Technologies
Secured flow of information through the network and play important role in the management information systems. In this paper I describe Secured Network Model For Corporate & Business Organization In Based On Network Level IP Security (IPSec) Encryption & Its Physical Layout Using Multilayered Approach. I have four important considerations for adoption of secured network model as secured network model for management information system.
G-Value Decoding Of Greedy Codes, Khalil Ahmad
G-Value Decoding Of Greedy Codes, Khalil Ahmad
International Conference on Information and Communication Technologies
Error-correcting codes are widely used to increase the reliability of transmission of information over various forms of communication channels. Codes with a given minimum distance d can be constructed by a greedy algorithm [2]. In this paper, I proposed a new algorithm for the allocation of g-values to the binary vectors. Hamming (7, 4, 3) code can be generated by the application of greedy algorithm on the binary vectors of length 7 arranged in B-ordering. This code is used to demonstrate a new decoding technique for linear codes in addition to the schemes already known for decoding such as Syndrome …
A Review Study On Digital Watermarking, Jian Liu, Xiangjian He
A Review Study On Digital Watermarking, Jian Liu, Xiangjian He
International Conference on Information and Communication Technologies
There has been a rapid development in the growth of multimedia and communications in the past few years. With the widespread use of the networks, intellectual properties can be obtained, reproduced or redistributed easily. This creates a high demand for content protection techniques. Watermarking, one of the most efficient ways to protect the digital properties has won more and more concern in recent years. This paper reviews several aspects about digital watermarking. Among them, we mainly focus on three processes of digital watermarking. Also, we will examine the properties of watermarking and several applications of watermarking. At last, this paper …
Keynote: Role Of Values & Culture In Information Technology, Prof. Dr. Anis Ahmad
Keynote: Role Of Values & Culture In Information Technology, Prof. Dr. Anis Ahmad
International Conference on Information and Communication Technologies
It is no longer unusual to see, in a remote town in northern area in Pakistan, a practically non-literate wagon driver calling from his Nokia cell phone his uncle in Dubai or in Karachi. He enjoys sharing with him about his success in business and the settlement of family disputes. While he is driving on dangerous curvy roads and having this conversation, in the back seat of the wagon a comparatively young person is playing games on his cell phone. All this was unimaginable a quarter of a century ago.
Keynote: Research And Education In Telecommunication Engineering, Akhtar Kalam
Keynote: Research And Education In Telecommunication Engineering, Akhtar Kalam
International Conference on Information and Communication Technologies
Telecommunications over the past one hundred years has had a major influence on the development of society. Telecommunications will continue to play an increasingly important role in nearly every human endeavour in all nations of the earth. Telecommunication industry is currently facing a technological revolution. In many countries, the number of cellular radio subscribers exceeds the subscribers of fixed telephony services. Internet technologies, such as VoIP and SIP, allow the convergence of traditional switched telephony services and data services of the internet to converge. New wireless access technologies compete and complete the services provided by the modern cellular radio networks. …