Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Computer Engineering

Poster Session A: A Multi-Priority Application Framework For Mobile Ad Hoc Networks, M. Ibrahim Channa, Ahsan Chaudhry, Kashif Sharif, Irum Memon Aug 2005

Poster Session A: A Multi-Priority Application Framework For Mobile Ad Hoc Networks, M. Ibrahim Channa, Ahsan Chaudhry, Kashif Sharif, Irum Memon

International Conference on Information and Communication Technologies

The fast spread of small wireless computers has enabled the design and deployment of wireless Ad Hoc networks. Typical applications proposed for such networks include both Real Time and Non-Real Time applications. We propose an architecture that provides a complete framework for Real Time applications and Best Effort traffic. The proposed architecture comprises of an Ad Hoc Routing Protocol for route setup and route repair, a Bandwidth Allocation and Reservation Scheme for Real Time traffic, and a MAC layer protocol that provides traffic differentiation. The Admission Control module is used to admit or reject a new Real Time flow request …


Secured Network Model For Management Information System Based On Ip Security (Ipsec) Encryption Using Multilayered Approach Of Network Security, Dr. Amir Hassan Pathan, Muniza Irshad Aug 2005

Secured Network Model For Management Information System Based On Ip Security (Ipsec) Encryption Using Multilayered Approach Of Network Security, Dr. Amir Hassan Pathan, Muniza Irshad

International Conference on Information and Communication Technologies

Secured flow of information through the network and play important role in the management information systems. In this paper I describe Secured Network Model For Corporate & Business Organization In Based On Network Level IP Security (IPSec) Encryption & Its Physical Layout Using Multilayered Approach. I have four important considerations for adoption of secured network model as secured network model for management information system.


G-Value Decoding Of Greedy Codes, Khalil Ahmad Aug 2005

G-Value Decoding Of Greedy Codes, Khalil Ahmad

International Conference on Information and Communication Technologies

Error-correcting codes are widely used to increase the reliability of transmission of information over various forms of communication channels. Codes with a given minimum distance d can be constructed by a greedy algorithm [2]. In this paper, I proposed a new algorithm for the allocation of g-values to the binary vectors. Hamming (7, 4, 3) code can be generated by the application of greedy algorithm on the binary vectors of length 7 arranged in B-ordering. This code is used to demonstrate a new decoding technique for linear codes in addition to the schemes already known for decoding such as Syndrome …


A Review Study On Digital Watermarking, Jian Liu, Xiangjian He Aug 2005

A Review Study On Digital Watermarking, Jian Liu, Xiangjian He

International Conference on Information and Communication Technologies

There has been a rapid development in the growth of multimedia and communications in the past few years. With the widespread use of the networks, intellectual properties can be obtained, reproduced or redistributed easily. This creates a high demand for content protection techniques. Watermarking, one of the most efficient ways to protect the digital properties has won more and more concern in recent years. This paper reviews several aspects about digital watermarking. Among them, we mainly focus on three processes of digital watermarking. Also, we will examine the properties of watermarking and several applications of watermarking. At last, this paper …


Keynote: Role Of Values & Culture In Information Technology, Prof. Dr. Anis Ahmad Aug 2005

Keynote: Role Of Values & Culture In Information Technology, Prof. Dr. Anis Ahmad

International Conference on Information and Communication Technologies

It is no longer unusual to see, in a remote town in northern area in Pakistan, a practically non-literate wagon driver calling from his Nokia cell phone his uncle in Dubai or in Karachi. He enjoys sharing with him about his success in business and the settlement of family disputes. While he is driving on dangerous curvy roads and having this conversation, in the back seat of the wagon a comparatively young person is playing games on his cell phone. All this was unimaginable a quarter of a century ago.


Keynote: Research And Education In Telecommunication Engineering, Akhtar Kalam Aug 2005

Keynote: Research And Education In Telecommunication Engineering, Akhtar Kalam

International Conference on Information and Communication Technologies

Telecommunications over the past one hundred years has had a major influence on the development of society. Telecommunications will continue to play an increasingly important role in nearly every human endeavour in all nations of the earth. Telecommunication industry is currently facing a technological revolution. In many countries, the number of cellular radio subscribers exceeds the subscribers of fixed telephony services. Internet technologies, such as VoIP and SIP, allow the convergence of traditional switched telephony services and data services of the internet to converge. New wireless access technologies compete and complete the services provided by the modern cellular radio networks. …