Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

2015

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 31 - 60 of 145

Full-Text Articles in Digital Communications and Networking

Labeled-Image Captcha: Concept Of A Secured And Universally Useful Captcha, Mokter Hossain, Ken Nguyen, Muhammad Asadur Rahman Nov 2015

Labeled-Image Captcha: Concept Of A Secured And Universally Useful Captcha, Mokter Hossain, Ken Nguyen, Muhammad Asadur Rahman

UBT International Conference

Captcha (Completely Automated Public Turing test to tell Computers and Humans Apart) is a widely used online security tool that ensures that a computer program is not posing as a human user. While smart programs with advanced image processing capability have already cracked picture based captcha systems there is a need for making the test harder. This paper presents a design prototype of a simplified type of labeled-image captcha where a picture of a common animal or household item is marked with a number of different labels and the users will be asked to provide the correct label for specific …


Dual Tone Multi Frequency (Dtmf) Signal Generation And Detection Using Matlab Software, Nihat Pamuk, Ziynet Pamuk Nov 2015

Dual Tone Multi Frequency (Dtmf) Signal Generation And Detection Using Matlab Software, Nihat Pamuk, Ziynet Pamuk

UBT International Conference

In this study, Dual Tone Multi Frequency (DTMF) signal generation and detection is implemented by using Goertzel Algorithm in MATLAB software. The DTMF signals are generated by using Cool Edit Pro Version 2.0 program for DTMF tone detection. The DTMF signal generation and detection algorithm are based on International Telecommunication Union (ITU) recommendations. Frequency deviation, twist, energy and time duration tests are performed on the DTMF signals. The algorithm recognizes the DTMF tones if they satisfy the recommendations, otherwise they are rejected.


10 W Dc-Dc Converter Based Led Driver Circuit Design, Ö. Faruk Farsakoğlu, H. Yusuf Hasrici, Ibrahim Çelik Nov 2015

10 W Dc-Dc Converter Based Led Driver Circuit Design, Ö. Faruk Farsakoğlu, H. Yusuf Hasrici, Ibrahim Çelik

UBT International Conference

Considering the total amount of energy consumed in the world, energy used in lighting is of utmost importance. For this reason, systems used in lighting should be energy efficient, and mıre efficient lighting elements should be preferred. LED, as a solid-state lighting system, is more energy efficient than the lighting systems with conventional lighting elements. Some of the LEDs used in solid-state lighting systems are named as standard 5mm LEDs and power LEDs. Because power LEDs have more light efficiency than standard 5 mm LEDs, they are produced as an alternative to conventional light sources. Power LEDs draw much more …


Hybrid Modelling In System Simulation, Andreas Körner Nov 2015

Hybrid Modelling In System Simulation, Andreas Körner

UBT International Conference

In times of increasing power and capacity in computer simulation mathematical models are getting more and more important. For different technical applications and in natural science but also in economic systems and management processes appropriate mathematical model descriptions are necessary. Hybrid modelling is a special technique for more complex model descriptions in order to reduce the degree of complexity. In different fields of interest the behavior of a model is dependent on the active state. When the model description is changing from one state to another a so-called state event takes place. State event modelling is the overall term to …


Definition, Validation And Comparison Of Two Population Models For Austria, Martin Bicher, Barbara Glock, Florian Miksch, Niki Popper, Günter Schneckenreither Nov 2015

Definition, Validation And Comparison Of Two Population Models For Austria, Martin Bicher, Barbara Glock, Florian Miksch, Niki Popper, Günter Schneckenreither

UBT International Conference

In this work we present two structurally different mathematical models for the prognostic simulation of Austria’s population: A time-continuous, macroscopic system dynamics approach and a time-discrete, microscopic agent-based approach. Both models were developed as case studies of a series of population concepts in order to support models for decision-support in Austria’s health care system. In the present work we want to focus on the definition, the parametrisation as well as especially the validation process of both population-models. The latter was of special interest as it included a cross-model validation with Statistics Austria’s own prognostic model SIKURS.


Security Concerns Of New Alternative Telecommunication Services, Arbnora Hyseni, Krenare Pireva, Miranda Kajtazi Nov 2015

Security Concerns Of New Alternative Telecommunication Services, Arbnora Hyseni, Krenare Pireva, Miranda Kajtazi

UBT International Conference

With the advancing new era of communication, the so-called era of ‘being always online’ many providers offer their services for free. In that sense a small company or a virtual company becomes a huge competitor for different traditional telecommunication providers. Using the same services such as: voice calls, video calls, chat and similar services, the internet technology has made huge changes how users make use of such services . Instead of using these services, users shall install applications that are specialized for offering these services via applications, such as: Viber, WhatsApp, Facebook, Google Talk etc.. During the installation and update …


The Analytic Hierarchic Process: A Model To Evaluate The Risk Of Getting Cancer, Daniela (Halidini) Qendraj, Markela Muca Nov 2015

The Analytic Hierarchic Process: A Model To Evaluate The Risk Of Getting Cancer, Daniela (Halidini) Qendraj, Markela Muca

UBT International Conference

The aim of this study is to classify the risk factors of being with a type of cancer by applying the AHP (analytic hierarchy process) scale. The Saaty’s analytic hierarchy process is applied for computing weights for the factors, is a modeling for classification. A case study of QSUT Tirana hospital data base is presented to rank four cancer types. By the data collect from the hospital during the years 2011-2015, the results show that lung cancer is mostly spread in humans, and the prostate cancer is lower spread in humans.


Introduction To Stratospheric Communication Platforms (Scp), Dimov Stojce Ilcev Nov 2015

Introduction To Stratospheric Communication Platforms (Scp), Dimov Stojce Ilcev

UBT International Conference

In this paper are introduced the modern airship techniques and technologies as cost effective solutions of Stratospheric Communication Platforms (SCP). The launch or putting in position the airship is not critical point such as launch of satellite and controlling support services in the creation of space-based communication technology and the most expensive phase of the total system cost. Therefore, with few cost effective remote controlled and solar powered airships can be covered some region or country including urban, suburban and rural areas, mobile, farms and other environments with low density of population. The airship SCP network offers better solutions than …


The Importance Of Big Data Analytics, Eljona Proko Nov 2015

The Importance Of Big Data Analytics, Eljona Proko

UBT International Conference

Identified as the tendency of IT, Big Data gained global attention. Advances in data analytics are changing the way businesses compete, enabling them to make faster and better decisions based on real-time analysis. Big Data introduces a new set of challenges. Three characteristics define Big Data: volume, variety, and velocity. Big Data requires tools and methods that can be applied to analyze and extract patterns from large-scale data. Companies generate enormous volumes of polystructured data from Web, social network posts, sensors, mobile devices, emails, and many other sources. Companies need a cost-effective, massively scalable solution for capturing, storing, and analyzing …


Perfect Metamaterial Absorber Based Energy Harvesting Application In Ism Band, Furkan Dincer, Mehmet Bakir, Muharrem Karaaslan, Kemal Delihacioglu, Cumali Sabah Nov 2015

Perfect Metamaterial Absorber Based Energy Harvesting Application In Ism Band, Furkan Dincer, Mehmet Bakir, Muharrem Karaaslan, Kemal Delihacioglu, Cumali Sabah

UBT International Conference

An electromagnetic (EM) energy harvesting application based on metamaterial absorber (MA) is introduced and discussed in this paper. This application is operating at ISM band (2.40 GHz) which is especially chosen due to its wide usage area. Square ring resonator (SRR) which has two gaps and resistors across the gaps on it is used. Chips resistors are used to deliver power to any active component. Transmission and reflection characteristics of metamaterial absorber (MA) for energy harvesting application are investigated. 83.6% efficient for energy harvesting application is realized in this study.


Implementation Of The Aodv Routing In An Energy-Constrained Mesh Network, Altin Zejnullahu, Zhilbert Tafa Nov 2015

Implementation Of The Aodv Routing In An Energy-Constrained Mesh Network, Altin Zejnullahu, Zhilbert Tafa

UBT International Conference

Wireless sensor networks (WSNs) compose the fundamental platform for a number of Internet of Things (IoT) applications, especially those related to the environmental, health, and military surveillance. While being autonomous in power supply, the main challenge in node’s processing and communication architecture design remains the energy efficiency. However, this goal should not limit the main functionality of the system which is often related to the network coverage and connectivity. This paper shows the implementation of the Ad-hoc On-demand Distance Vector (AODV) routing algorithm in an XBee based platform. As shown, the network can achieve low power consumption per node primarily …


Microsimulation Models For Simulating Pathways Of Patients With Mental Diseases, Andreas Bauer, Felix Breitenecker, Christoph Urach Nov 2015

Microsimulation Models For Simulating Pathways Of Patients With Mental Diseases, Andreas Bauer, Felix Breitenecker, Christoph Urach

UBT International Conference

Predicting demand for care is necessary to provide sufficient capacities in hospitals and enable better planning to cope with challenges like changes in the structure of the population. Emphasis in this work is put on the analysis of the data and on the parametrization of a simulation model for the paths of patients with mental diseases through the health care system. Survival analysis and model selection methods are used for this purpose. Data on patients and their treatments is analyzed with methods of survival analysis. Different methods for modelling the survival and hazard function are presented and compared. Hereby, the …


Digital Long-Term Preservation In Albania, Determining The Right File Formats, Ardiana Topi, Aleksandër Xhuvani Nov 2015

Digital Long-Term Preservation In Albania, Determining The Right File Formats, Ardiana Topi, Aleksandër Xhuvani

UBT International Conference

The National Archive of Albania (NAA) is the main institution in Albania, according to legislation, responsible to create the rules for document life management produced by any organization, and preserve them. Almost all archival documents stored in archival institutions, must be saved for unlimited period of time, or forever. Preservation of digital documents is different from preservation of paper documents. It is a very complex procedure directly connected with the inevitable phenomenon of hardware and software obsolesces. A successful mission of the NAA must have a well-defined strategy regarding the Digital Long-term Preservation. This paper aims to present the possible …


Bounty Techniques For Web Vulnerability Scanning, Tanzer Abazi, Mentor Hoxhaj, Edmond Hajrizi, Gazmend Krasniqi Nov 2015

Bounty Techniques For Web Vulnerability Scanning, Tanzer Abazi, Mentor Hoxhaj, Edmond Hajrizi, Gazmend Krasniqi

UBT International Conference

With the advancement of technology and the raising of massive amount of data, the used techniques for data security are continually a challenge. This paper contributes on identifying the gaps and evaluating security level on web portals hosted or managed by Republic of Kosovo institutions or businesses, whose data privacy and security could be a big business concern. The results have been obtained from real case scenario, where 25 security researchers have contributed in white hack activities. These activities, were part of a one day conference called. “The DAY when hacking is legal”, held in Pristine.


Randomizing Ensemble-Based Approaches For Outlier, Lediona Nishani, Marenglen Biba Nov 2015

Randomizing Ensemble-Based Approaches For Outlier, Lediona Nishani, Marenglen Biba

UBT International Conference

The data size is increasing dramatically every day, therefore, it has emerged the need of detecting abnormal behaviors, which can harm seriously our systems. Outlier detection refers to the process of identifying outlying activities, which diverge from the remaining group of data. This process, an integral part of data mining field, has experienced recently a substantial interest from the data mining community. An outlying activity or an outlier refers to a data point, which significantly deviates and appears to be inconsistent compared to other data members. Ensemble-based outlier detection is a line of research employed in order to reduce the …


The Influence Of Cloud Computing And Mobile Technology In Our Activities, Ramadan Cikaqi, Ilir Morina Nov 2015

The Influence Of Cloud Computing And Mobile Technology In Our Activities, Ramadan Cikaqi, Ilir Morina

UBT International Conference

Through this paper we present the development of information technology especially in cloud computing and mobile technology as an integral part of everyday life, as well as the advantages that cloud computing and mobile technology offers to the business community and the private one. Furthermore, it presents the possibilities offered by this technology on the data preservation compared with the traditional ones. Due to the increased demand for big space, it was necessary to establish a centralized data storage which has brought with it more innovation and advantage, in comparison with other media for data storage in personal memories. This …


Internet Of Things: From Applications, Challenges And Standardization To Industry Implementations, Xhafer Krasniqi Nov 2015

Internet Of Things: From Applications, Challenges And Standardization To Industry Implementations, Xhafer Krasniqi

UBT International Conference

The Internet of Things that is defined as anything that can be accessible anytime and anywhere provides connectivity to different objects and sensors around us and which will enable the transfer of different data between these objects and devices. A thing in the Internet of Things can be any natural or man-made object that can be assigned an IP address with a capability to exchange date over a network. There is a huge number of applications of IoT to benefit users, such as health monitors, smart homes, connected cars etc. If everything around us is connected and information about these …


Xml For Business To Business Data Exchange, Geraldine Gray, David Kerwick Nov 2015

Xml For Business To Business Data Exchange, Geraldine Gray, David Kerwick

The ITB Journal

This paper examines to use of XML for business to business data exchange. Starting with creating an XML document from an existing data source and transmitting that document, we explain some of the supporting standards for XML which facilitate automated processing and transformation of an XML document. Finally we look at the advantages of using XML, and why it is expected to revolutionise electronic data interchange.


Shopminer: Mining Customer Shopping Behavior In Physical Clothing Stores With Passive Rfids, Longfei Shangguan, Zimu Zhou, Xiaolong Zheng, Lei Yang, Yunhao Liu, Jinsong Han Nov 2015

Shopminer: Mining Customer Shopping Behavior In Physical Clothing Stores With Passive Rfids, Longfei Shangguan, Zimu Zhou, Xiaolong Zheng, Lei Yang, Yunhao Liu, Jinsong Han

Research Collection School Of Computing and Information Systems

Shopping behavior data are of great importance to understand the effectiveness of marketing and merchandising efforts. Online clothing stores are capable capturing customer shopping behavior by analyzing the click stream and customer shopping carts. Retailers with physical clothing stores, however, still lack effective methods to identify comprehensive shopping behaviors. In this paper, we show that backscatter signals of passive RFID tags can be exploited to detect and record how customers browse stores, which items of clothes they pay attention to, and which items of clothes they usually match with. The intuition is that the phase readings of tags attached on …


Effective Node Clustering And Data Dissemination In Large-Scale Wireless Sensor Networks, Mariam Saeed Ai Nuaimi Nov 2015

Effective Node Clustering And Data Dissemination In Large-Scale Wireless Sensor Networks, Mariam Saeed Ai Nuaimi

Theses

The denseness and random distribution of large-scale WSNs makes it quite difficult to replace or recharge nodes. Energy efficiency and management is a major design goal in these networks. In addition, reliability and scalability are two other major goals that have been identified by researchers as necessary in order to further expand the deployment of such networks for their use in various applications. This thesis aims to provide an energy efficient and effective node clustering and data dissemination algorithm in large-scale wireless sensor networks. In the area of clustering, the proposed research prolongs the lifetime of the network by saving …


Big Data Proteogenomics And High Performance Computing: Challenges And Opportunities, Fahad Saeed Oct 2015

Big Data Proteogenomics And High Performance Computing: Challenges And Opportunities, Fahad Saeed

Parallel Computing and Data Science Lab Technical Reports

Proteogenomics is an emerging field of systems biology research at the intersection of proteomics and genomics. Two high-throughput technologies, Mass Spectrometry (MS) for proteomics and Next Generation Sequencing (NGS) machines for genomics are required to conduct proteogenomics studies. Independently both MS and NGS technologies are inflicted with data deluge which creates problems of storage, transfer, analysis and visualization. Integrating these big data sets (NGS+MS) for proteogenomics studies compounds all of the associated computational problems. Existing sequential algorithms for these proteogenomics datasets analysis are inadequate for big data and high performance computing (HPC) solutions are almost non-existent. The purpose of this …


Employee Hr Connect Portal, Aparna Allusivala, Sindhura Reddy Mandadi, Sri Vidya Rani Mudunuri Oct 2015

Employee Hr Connect Portal, Aparna Allusivala, Sindhura Reddy Mandadi, Sri Vidya Rani Mudunuri

All Capstone Projects

Employee HR Connect Portal is essential in order to track employee time, project time. This portal can be hosted on any java based web server or application server and will be accessible via web-browsers. This portal is very user- friendly. Employee HR Connect Portal will be a useful tool to identify supply and demand of human resources. We have three main modules to maintain records of employee, department and project. Employee HR Connect Portal is very helpful for auditing. Through this portal we can judge the potentiality of the employee.


Real-Time Detection System For Suspicious Urls, Krishna Prasad Chouty, Anup Chandra Thogiti, Kranthi Sudha Vudatha Oct 2015

Real-Time Detection System For Suspicious Urls, Krishna Prasad Chouty, Anup Chandra Thogiti, Kranthi Sudha Vudatha

All Capstone Projects

Twitter is prone to malicious tweets containing URLs for spam, phishing, and malware distribution. Conventional Twitter spam detection schemes utilize account features such as the ratio of tweets containing URLs and the account creation date, or relation features in the Twitter graph. These detection schemes are ineffective against feature fabrications or consume much time and resources. Conventional suspicious URL detection schemes utilize several features including lexical features of URLs, URL redirection, HTML content, and dynamic behavior. However, evading techniques such as time-based evasion and crawler evasion exist. In this paper, we propose WARNINGBIRD, a suspicious Real-Time URL detection system for …


Social Signal Processing For Real-Time Situational Understanding: A Vision And Approach, Kasthuri Jeyarajah, Shuchao Yao, Raghava Muthuraju, Archan Misra, Geeth De Mel, Julie Skipper, Tarek Abdelzaher, Michael Kolodny Oct 2015

Social Signal Processing For Real-Time Situational Understanding: A Vision And Approach, Kasthuri Jeyarajah, Shuchao Yao, Raghava Muthuraju, Archan Misra, Geeth De Mel, Julie Skipper, Tarek Abdelzaher, Michael Kolodny

Research Collection School Of Computing and Information Systems

The US Army Research Laboratory (ARL) and the Air Force Research Laboratory (AFRL) have established a collaborative research enterprise referred to as the Situational Understanding Research Institute (SURI). The goal is to develop an information processing framework to help the military obtain real-time situational awareness of physical events by harnessing the combined power of multiple sensing sources to obtain insights about events and their evolution. It is envisioned that one could use such information to predict behaviors of groups, be they local transient groups (e.g., protests) or widespread, networked groups, and thus enable proactive prevention of nefarious activities. This paper …


Dynamic Deployment For Hybrid Sensor Networks Based On Potential Field-Directed Particle Swarm Optimization, Ying Zhang, Yunlong Qiao, Wei Zhao, Wei Chen, Jinde Cao Sep 2015

Dynamic Deployment For Hybrid Sensor Networks Based On Potential Field-Directed Particle Swarm Optimization, Ying Zhang, Yunlong Qiao, Wei Zhao, Wei Chen, Jinde Cao

Computer Science Faculty Research

For a hybrid sensor network, the effective coverage rate can be optimized by adjusting the location of the mobile nodes. For many deployments by APF (artificial potential field), due to the common problem of barrier effect, it is difficult for mobile nodes to diffuse by the weaker attraction when the nodes initially distribute densely in some places. The proposed deployment algorithm PFPSO (Potential Field-Directed Particle Swarm Optimization) can overcome this problem and guide the mobile nodes to the optimal positions. Normally the requirement is different for the effective coverage rate between the hotspot area and the ordinary area. On the …


Network Analysis Of The Sardex Community Currency, Georgios Iosifidis, Yanick Charette, Giuseppe Littera, Leandros Tassiulas, Nicholas Christakis Sep 2015

Network Analysis Of The Sardex Community Currency, Georgios Iosifidis, Yanick Charette, Giuseppe Littera, Leandros Tassiulas, Nicholas Christakis

Yale Day of Data

We present a transaction dataset and preliminary analysis results about Sardex, a complementary currency (CC) in Sardinia, Italy. Sardex is currently considered one of the most successful CCs in Europe, as it grows continuously in terms of transactions’ volume and membership, and has been already replicated in 8 other regions in Italy. We model Sardex as a transaction network and study its basic properties.


Novel Techniques For Secure Use Of Public Cloud Computing Resources, Kyle E. Stewart Sep 2015

Novel Techniques For Secure Use Of Public Cloud Computing Resources, Kyle E. Stewart

Theses and Dissertations

The federal government has an expressed interest in moving data and services to third party service providers in order to take advantage of the flexibility, scalability, and potential cost savings. This approach is called cloud computing. The thesis for this research is that efficient techniques exist to support the secure use of public cloud computing resources by a large, federated enterprise. The primary contributions of this research are the novel cryptographic system MA-AHASBE (Multi-Authority Anonymous Hierarchical Attribute-Set Based Encryption), and the techniques used to incorporate MA-AHASBE in a real world application. Performance results indicate that while there is a cost …


Enhancing Wifi-Based Localization With Visual Clues, Han Xu, Zheng Yang, Zimu Zhou, Longfei Shangguan, Yunhao Liu, Ke Yi Sep 2015

Enhancing Wifi-Based Localization With Visual Clues, Han Xu, Zheng Yang, Zimu Zhou, Longfei Shangguan, Yunhao Liu, Ke Yi

Research Collection School Of Computing and Information Systems

Indoor localization is of great importance to a wide range of applications in the era of mobile computing. Current mainstream solutions rely on Received Signal Strength (RSS) of wireless signals as fingerprints to distinguish and infer locations. However, those methods suffer from fingerprint ambiguity that roots in multipath fading and temporal dynamics of wireless signals. Though pioneer efforts have resorted to motion-assisted or peer-assisted localization, they neither work in real time nor work without the help of peer users, which introduces extra costs and constraints, and thus degrades their practicality. To get over these limitations, we propose Argus, an image-assisted …


Migration From Copper To Fiber Access Network Using Passive Optical Network For Green And Dry Field Areas Of Pakistan, Umar Farooq Sep 2015

Migration From Copper To Fiber Access Network Using Passive Optical Network For Green And Dry Field Areas Of Pakistan, Umar Farooq

Umar Farooq

Passive Optical Networks (PON) technology brings an evolution in the industry of Telecommunication for the provisioning of High Speed Internet (HSI) and Triple Play bundled Services that includes Voice, Data, and Video Streaming throughout the world. In Pakistan most of the service providers are offering broadband services on traditional copper OSP (Outside Plant) network since 2000. Demand for the high speed internet and broadband is increasing rapidly, it is desired with great need to migrate from traditional copper based OSP network to PON – FTTx (Fiber To The x) infrastructure. Considering the geographical requirements in Pakistan a scalable fiber network …


Sandra Helps You Learn: The More You Walk, The More Battery Your Phone Drains, Chulhong Min, Chungkuk Yoo, Inseok Hwang, Seungwoo Kang, Youngki Lee, Seungchul Lee, Pillsoon Park, Changhun Lee, Seungpyo Choi Choi Sep 2015

Sandra Helps You Learn: The More You Walk, The More Battery Your Phone Drains, Chulhong Min, Chungkuk Yoo, Inseok Hwang, Seungwoo Kang, Youngki Lee, Seungchul Lee, Pillsoon Park, Changhun Lee, Seungpyo Choi Choi

Research Collection School Of Computing and Information Systems

Emerging continuous sensing apps introduce new major factors governing phones’ overall battery consumption behaviors: (1) added nontrivial persistent battery drain, and more importantly (2) different battery drain rate depending on the user’s different mobility condition. In this paper, we address the new battery impacting factors significant enough to outdate users’ existing battery model in real life. We explore an initial approach to help users understand the cause and effect between their physical activity and phones’ battery life. To this end, we present Sandra, a novel mobility-aware smartphone battery information advisor, and study its potential to help users redevelop their battery …