Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Conference

PDF

2005

Discipline
Institution
Keyword
Publication

Articles 1 - 30 of 73

Full-Text Articles in Physical Sciences and Mathematics

Quantified Model Of Cobit For Corporate It Governance, M. Sibghatullah Siddiqui, Dr. Syed Jamal Hussain Aug 2005

Quantified Model Of Cobit For Corporate It Governance, M. Sibghatullah Siddiqui, Dr. Syed Jamal Hussain

International Conference on Information and Communication Technologies

Now organizations are more concerned about the appropriate IT governance. The growing dependency on IT due to the increasing volume of business process automation further challenges the role of Information System Auditor. IT Governance Institute has developed COBIT1 as a model for this purpose [1][2]. The model proposed in this research quantifies the COBIT by developing matrices for all four domains of COBIT; hence it provides a quantitative approach for better implementation of corporate IT governance through effective audit and control.


Making Decision In Requirement Change Management, Saffena Ramzan, Naveed Ikram Aug 2005

Making Decision In Requirement Change Management, Saffena Ramzan, Naveed Ikram

International Conference on Information and Communication Technologies

Requirement change management a significant activity, which is performed through out the development of the software and even during the maintenance phase. It is the core activity to obtain one of the main objectives of software development, which is to satisfy the evolving needs of the customers. Software requirements are linked and dependent on other requirements and changing one requirement definitely affects interlinked requirements. Impact analysis is the crux of requirement change management which is to obtain with the change of requirements, so that the scope of that change is identified. Traceability is the pre-requisite to acquire proper impact analysis. …


Enhancement Of Software Engineering By Shifting From Software Product To Software Service, Muhammad Saeed, Muhammad Jaffar-Ur- Rehman Aug 2005

Enhancement Of Software Engineering By Shifting From Software Product To Software Service, Muhammad Saeed, Muhammad Jaffar-Ur- Rehman

International Conference on Information and Communication Technologies

Software development has always been a supply side affair, in which domain experts were the main requirement providers. Software engineers have been creating new technologies, frameworks and methodologies but this has made the software engineering job more complex. Recently all this has been looked at from demand-side prospective. So a new concept of Service Based Software Engineering is shaping up which look at the software as a service rather then a product. This paper is going to analysis the fundamental requirements of such a paradigm shift, by first gathering the concept and then translating this to a workable solution. Different …


An Investigation Into The Skills Gap In The Software Industry Of Pakistan, Zareen Sharf, Dr. Wasim A. Khan Aug 2005

An Investigation Into The Skills Gap In The Software Industry Of Pakistan, Zareen Sharf, Dr. Wasim A. Khan

International Conference on Information and Communication Technologies

Software Industry workers require an adequate skill set to gain maximum output from the effective use of technology. The purpose of this study is to explore the nature of actual and desired software developer, jobs skill set. Survey methodology will be used to obtain reports of actual skill level and those desired to define common dimensions of the software developer skill set. Anticipated results will add to the existing body of IT job skills knowledge and may provide practice with job development and career planning guidance. We also intend to propose a skill standard for the software industry of Pakistan …


Implementation And Analysis Of Cmmi's Configuration Management Process Area; Applicable To "Defined" Level - 3, Ahmad Luqman Aug 2005

Implementation And Analysis Of Cmmi's Configuration Management Process Area; Applicable To "Defined" Level - 3, Ahmad Luqman

International Conference on Information and Communication Technologies

Enterprise Resource Planner (ERP) is a strategically important tool as integrated business application for long-term success in an increasingly competitive global market. This system requires the integration of data and business processes across the whole enterprise. In order to develop a good quality product there is a need of applying proper model. It becomes more costly in terms of training, appraisals, and improvement activities while applying multiple models that are not integrated within and across an organization. Where as Capability Maturity Model Integration is a set of integrated models that successfully addresses multiple disciplines and has integrated training support. Objective …


Opems: Online Peer-To-Peer Expertise Matching System, Sharifullah Khan, S.M. Nabeel Aug 2005

Opems: Online Peer-To-Peer Expertise Matching System, Sharifullah Khan, S.M. Nabeel

International Conference on Information and Communication Technologies

Internet is a vital source to disseminate and share information to the masses. This has made information available in abundance on the Web. However, finding relevant information is difficult if not impossible. This difficulty is bilateral between information providers and seekers in terms of information presentation and accessibility respectively. This paper proposed an online Peer-to-Peer Expertise Matching system. The approach provides a highly scalable and self-organizing system and helps individuals in presenting and accessing the information in a consistent format on the Web. This makes the sharing of information among the autonomous organizations successful.


Enhanced Risk Analysis-Relative Impact Factorization, Basit Shahzad, Tanveer Afzal, Rizwana Irfan Aug 2005

Enhanced Risk Analysis-Relative Impact Factorization, Basit Shahzad, Tanveer Afzal, Rizwana Irfan

International Conference on Information and Communication Technologies

Software engineering is an area of development which always has the risk factor present and software engineering can hardly be done on some straight line. So, the manager has to handle the dynamically changing circumstances in order to complete the job. The target of development team is to develop the software according to the requirements within specified time. Wide variety of risks I are present that may grab the development effort. A good manager must ensure that all measures have been taken against the risks that may possibly come. This paper focuses on determining the relative impact of risk factors …


Fuzzy Logic Control Of Coupled Liquid Tank System, Muhammad Abid Aug 2005

Fuzzy Logic Control Of Coupled Liquid Tank System, Muhammad Abid

International Conference on Information and Communication Technologies

This paper presents a fuzzy control of coupled liquid tank system. The Coupled Liquid Tank system is developed at PIEAS. It has three liquid tanks coupled together. The liquid level in tank 2 is maintained using fuzzy logic. The results are compared with the PID control, mostly used in industries.


A Comparative Study And Analysis Of Pvm And Mpi For Parallel And Distributed Systems, Dr. Syed Jamal Hussain, Ghufran Ahmed Aug 2005

A Comparative Study And Analysis Of Pvm And Mpi For Parallel And Distributed Systems, Dr. Syed Jamal Hussain, Ghufran Ahmed

International Conference on Information and Communication Technologies

Networks of Workstations (NOWs) based on various operating systems are globally accepted as the standard for computing environments in the IT industry. To harness the tremendous potential for computing capability represented by these NOWs, various new tools are being developed. Parallel Virtual Machine (PVM) and Message Passing Interface (MPI) have existed on UNIX workstations for some time, and are maturing in their capability for handling Distributed Parallel Processing (DPP). This research is aimed to explore each of these two vehicles for DPP, considering capability, ease of use, and availability, and compares their distinguishing features; and also explores programmer interface and …


Mapping Ogc Prince 2 To Sei Cmmi 1.1, Ahmad Luqman, Fida Hussain, Dr. S. Tauseef -Ur- Rehman Aug 2005

Mapping Ogc Prince 2 To Sei Cmmi 1.1, Ahmad Luqman, Fida Hussain, Dr. S. Tauseef -Ur- Rehman

International Conference on Information and Communication Technologies

The Capability Maturity Model Integration (CMMI) version 1.1, developed by the Software Engineering Institute (SEI), USA and the PRoject IN Controlled Environment (PRINCE) version 2 developed by Central Computing and Telecommunications Agency (CCTA) now Office of Government Commerce (OGC) as UK Government standard for IT Project Management, share a common concern with Project and Quality management by improved process management. Both are driven by similar concerns and intuitively correlated. Organizations concerned with PRINCE 2 certification often question its overlap with the CMMI. We have looked into OGC PRINCE 2 process/components and map it to the different goals/practices in the SEI …


Service-Oriented E-Learning Architecture Using Web Service-Based Intelligent Agents, Nasir Hussain, M. Khalid Khan Aug 2005

Service-Oriented E-Learning Architecture Using Web Service-Based Intelligent Agents, Nasir Hussain, M. Khalid Khan

International Conference on Information and Communication Technologies

There is no doubt that e-learning has found its way in our lives. From the very start to the Ph.D. level one can find e-learning courses every where and all the big names are supporting it. One thing that is needed to be understood is that e-learning is basically the integration of various technologies. Now this technology is maturing and we can find different standards for e-learning .New technologies such as agents and web services are promising better results. In this paper we have proposed an e-learning architecture that is dependent on multi-agent systems and web services. These communication technologies …


Towards Knowledge Morphing: A Triangulation Approach To Link Tacit And Explicit Knowledge, Fehmida Hussain, Syed Sibte Raza Abidi, Syed Ali Raza Aug 2005

Towards Knowledge Morphing: A Triangulation Approach To Link Tacit And Explicit Knowledge, Fehmida Hussain, Syed Sibte Raza Abidi, Syed Ali Raza

International Conference on Information and Communication Technologies

Current knowledge management systems are largely designed to deal with a single knowledge modality. Given the diversity of knowledge modalities that encompass any given topic/problem it is reasonable to demand access and use of all available knowledge, irrespective of their representation modality, to derive a knowledge-mediated solution. This calls for selecting all knowledge elements (represented in different modalities) that are relevant to the solution of the problem at hand. Thus here we pursue the specification and implementation of such a knowledge-mediated solution using a triangulation approach leading to Knowledge Morphing. In this paper we present a tacit-explicit knowledge morphing (TEKM) …


Using Software Engineering Principles To Develop Reusable Business Rules, Saqib Ali, Ben Soh, Torab Torabi Aug 2005

Using Software Engineering Principles To Develop Reusable Business Rules, Saqib Ali, Ben Soh, Torab Torabi

International Conference on Information and Communication Technologies

Nowadays, businesses need a system that can provide flexibility, reusability and simplicity for their business solutions. However, if business logics or rules are implemented using procedural paradigms, then the business systems will become more complex. In this paper we treat business logics separate from system logics, whereby we analyse a business by describing its rules and developing a set of rule statements. These business rules will be treated as a separate component in the design and implementation of the system. We have found that our proposed method leads to a system, which is more customisable, flexible, efficient, and reusable, in …


Poster Session A: Classification Of Compressed Human Face Images By Using Principle Components, Zahid Riaz, Arif Gilgiti, Zulfiqar Ali Aug 2005

Poster Session A: Classification Of Compressed Human Face Images By Using Principle Components, Zahid Riaz, Arif Gilgiti, Zulfiqar Ali

International Conference on Information and Communication Technologies

This paper describes the novel approach of classifying the humans on the basis of their compressed face images. The compression of the face images is performed using Discrete Wavelet Transform (DWT). While the classification encompass the use of Principal Components Analysis (PCA). Classification technique utilizes PCA in some different way. Only first principal component is used as feature vector out of 92 components (since image size is 112×92), causing a better results of 87.39%. The Euclidean distance is used as distance metric. In the end our results are compared to our previous research of classifying the uncompressed images.


Poster Session A: Address Auto-Configuration In Mobile Ad Hoc Networks Using Olsr, M.U. Saleem, Shoaib Mukhtar Aug 2005

Poster Session A: Address Auto-Configuration In Mobile Ad Hoc Networks Using Olsr, M.U. Saleem, Shoaib Mukhtar

International Conference on Information and Communication Technologies

Mobile Ad Hoc Networks is dynamic multi-hop network that is formed by a set of mobile wireless nodes that are sharing the same bandwidth. So every node possibly acts as a host as well as a router. In traditional networks, hosts can depend on the central servers like DHCP for IP assignment and management, but it cannot be extended to MANET due to its distributed and dynamic nature. Many solutions have been proposed, amongst them some are try to extend the stateless configuration of IPv6 for MANET; others distribute IP addresses among nodes (using binary distribution). Most of these proposed …


Poster Session A: Fingerprint Matching Using Ridge Patterns, Muhammad Umer Munir, Dr. Muhammad Younus Javed Aug 2005

Poster Session A: Fingerprint Matching Using Ridge Patterns, Muhammad Umer Munir, Dr. Muhammad Younus Javed

International Conference on Information and Communication Technologies

This paper presents a fingerprint matching scheme that utilizes a ridge patterns to match fingerprint images. The proposed scheme uses a set of 16 Gabor filters where spatial frequencies correspond to the average inter-ridge spacing in fingerprints. It is used to capture the ridge strength at equally spaced orientations. A circular tessellation of filtered image is then used to construct the ridge feature map. This ridge feature map contains both global and local details in a fingerprint as a compact fixed length feature vector. The fingerprint matching is based on the Euclidean distance between two corresponding feature vectors. The genuine …


Poster Session A: Analyzing & Enhancing Energy Efficient Communication Protocol For Wireless Micro-Sensor Networks, Irfan Majeed Butt, Shoab Ahmed Khan Aug 2005

Poster Session A: Analyzing & Enhancing Energy Efficient Communication Protocol For Wireless Micro-Sensor Networks, Irfan Majeed Butt, Shoab Ahmed Khan

International Conference on Information and Communication Technologies

The paper presents an analysis of energy efficient routing protocols with direct communication protocol. A comparison of these protocols is made analyzing energy consumption at each node and explaining system lifetime after certain rounds. The paper also proposes a novel energy conscious cluster head selection algorithm for making system more reliable and efficient. Simulation shows that our proposed algorithm enhances the system reliability and accuracy.


Poster Session A: Use Of Neural Networks In Multi-Sensor Fusion For Remote Sensing Applications, Engr. S. M. Haider Aejaz Aug 2005

Poster Session A: Use Of Neural Networks In Multi-Sensor Fusion For Remote Sensing Applications, Engr. S. M. Haider Aejaz

International Conference on Information and Communication Technologies

Remote sensing encounters different types of objects with similar spectral signatures. Multi-sensors form the solution of the problem with spectral different parts of the spectrum and the resulting information is then processed using digital signal processing techniques. Artificial neural networks provide another method for processing this information. The research describes how neural networks may be used to classify objects on the basis of their spectral response to different frequencies.


Poster Session A: A Multi-Priority Application Framework For Mobile Ad Hoc Networks, M. Ibrahim Channa, Ahsan Chaudhry, Kashif Sharif, Irum Memon Aug 2005

Poster Session A: A Multi-Priority Application Framework For Mobile Ad Hoc Networks, M. Ibrahim Channa, Ahsan Chaudhry, Kashif Sharif, Irum Memon

International Conference on Information and Communication Technologies

The fast spread of small wireless computers has enabled the design and deployment of wireless Ad Hoc networks. Typical applications proposed for such networks include both Real Time and Non-Real Time applications. We propose an architecture that provides a complete framework for Real Time applications and Best Effort traffic. The proposed architecture comprises of an Ad Hoc Routing Protocol for route setup and route repair, a Bandwidth Allocation and Reservation Scheme for Real Time traffic, and a MAC layer protocol that provides traffic differentiation. The Admission Control module is used to admit or reject a new Real Time flow request …


Poster Session A: Face Recognition Using Sub-Holistic Pca, Muhammad Murtaza Khan, Dr. Muhammad Younus Javed, Muhammad Almas Anjum Aug 2005

Poster Session A: Face Recognition Using Sub-Holistic Pca, Muhammad Murtaza Khan, Dr. Muhammad Younus Javed, Muhammad Almas Anjum

International Conference on Information and Communication Technologies

This paper proposes a face recognition scheme that enhances the correct face recognition rate as compared to conventional Principal Component Analysis (PCA). The proposed scheme, Sub-Holistic PCA (SH-PCA), was tested using ORL database and out performed PCA for all test scenarios. SH-PCA requires more computational power and memory as compared to PCA however it yields an improvement of 6% correct recognition on the complete ORL database of 400 images. The correct recognition rate for the complete ORL database is 90% for the SH-PCA technique.


Keynote: The Use Of Meta-Heuristic Algorithms For Data Mining, Dr. Beatrize De La Iglesia, A. Reynolds Aug 2005

Keynote: The Use Of Meta-Heuristic Algorithms For Data Mining, Dr. Beatrize De La Iglesia, A. Reynolds

International Conference on Information and Communication Technologies

In this paper we explore the application of powerful optimisers known as metaheuristic algorithms to problems within the data mining domain. We introduce some well-known data mining problems, and show how they can be formulated as optimisation problems. We then review the use of metaheuristics in this context. In particular, we focus on the task of partial classification and show how multi-objective metaheuristics have produced results that are comparable to the best known techniques but more scalable to large databases. We conclude by reinforcing the importance of research on the areas of metaheuristics for optimisation and data mining. The combination …


Keynote: Emerging Era Of Cooperative Empowerment: Grid, Peer-To-Peer, And Community Computing, Dr. Javed I. Khan Aug 2005

Keynote: Emerging Era Of Cooperative Empowerment: Grid, Peer-To-Peer, And Community Computing, Dr. Javed I. Khan

International Conference on Information and Communication Technologies

In this paper we discuss an emerging trend in high performance computing-the social or community computing. The emergence of screensaver computing, grid computing, peer-to-peer systems, and their demonstrated ability to garner computing power as potent as the supercomputers seems to be auspicious. In this paper we discuss the new phenomenon of community computing-including their potential applications in solving a new set of grand challenge problems. We also discuss the previously uncharted technological challenges architects of these new paradigms are addressing.


Keynote: The Segmentation Problem In Arabic Character Recognition: The State Of The Art, Ahmed M. Zeki Aug 2005

Keynote: The Segmentation Problem In Arabic Character Recognition: The State Of The Art, Ahmed M. Zeki

International Conference on Information and Communication Technologies

Arabic characters are used in several languages other than Arabic, despite to this fact; Arabic Character Recognition (ACR) has not received enough interests by researchers. Little researchprogress has been achieved comparing to the one done on the Latin or Chinese and the solutions available in the market are still far from being perfect. However, recent years have shown a considerable increase in the number of research papers. The cursive nature of Arabic writing makes the process of recognition a very challenging one. Several methods to segment the Arabic words into characters have been proposed in the past two decades. This …


Tcp Attack Analysis On Packets Captured Using Symantec Decoy Server, Ali Bakhtiar Nizamani, Bahari Belaton Aug 2005

Tcp Attack Analysis On Packets Captured Using Symantec Decoy Server, Ali Bakhtiar Nizamani, Bahari Belaton

International Conference on Information and Communication Technologies

This paper discusses results obtained from Symantec Decoy Server (previously known as Mantrap) with an introduction to honeypots. Lance Spitzner of the Honeynet Project introduced the concept of honeypots. A honeypot is in essence a decoy server, which has no real or strategic value and is only setup to attract crackers towards it. The idea is to trap the crackers and learn cracking techniques from them. Rapid increase in unauthorized intrusions over the Internet provides a great motivation to explore honeypots at a greater depth. We will provide analysis on TCP based denial of service attack carried out on Symantec …


A New Approach For Anti-Aliasing Raster Data In Air Borne Imagery, Fahim Arif, Muhammad Akbar Aug 2005

A New Approach For Anti-Aliasing Raster Data In Air Borne Imagery, Fahim Arif, Muhammad Akbar

International Conference on Information and Communication Technologies

Air borne sensed data is in the form of raster data. Aliasing is always present in a sampled image causing artifact error. To reduce possible aliasing effects, it is a good idea to blur an image slightly before applying a resampling method on it. This paper presents a technique for anti-aliasing remotely sensed images. The technique uses Gaussian low pass filter (GLPF) for generation of slight blur. Then resampling of raster data is performed with the help of bilinear interpolation. Algorithm is developed in MATLAB using some inbuilt functions.


A Visual Tool For Trellis Construction And Decoder Debugging Rac Array Codes, Lami Kaya, Muhammad -Al- Qudah Aug 2005

A Visual Tool For Trellis Construction And Decoder Debugging Rac Array Codes, Lami Kaya, Muhammad -Al- Qudah

International Conference on Information and Communication Technologies

We have developed a visual tool for can be added to a specific RAC array positions and their effect can be easily determined by the help of the visual tool. The program environment has been set in a adaptive manner in order to change different parameters of the RAC codes and see their effect directly. decoding of row and column (RAC) array codes. The visual tool provides interface to view all paths corresponding selected input information bits. Errors constructing trellis diagram and tracing Viterbi.


Secured Network Model For Management Information System Based On Ip Security (Ipsec) Encryption Using Multilayered Approach Of Network Security, Dr. Amir Hassan Pathan, Muniza Irshad Aug 2005

Secured Network Model For Management Information System Based On Ip Security (Ipsec) Encryption Using Multilayered Approach Of Network Security, Dr. Amir Hassan Pathan, Muniza Irshad

International Conference on Information and Communication Technologies

Secured flow of information through the network and play important role in the management information systems. In this paper I describe Secured Network Model For Corporate & Business Organization In Based On Network Level IP Security (IPSec) Encryption & Its Physical Layout Using Multilayered Approach. I have four important considerations for adoption of secured network model as secured network model for management information system.


A Performance Comparison Of Data Encryption Algorithms, Aamer Nadeem, Dr. M. Younus Javed Aug 2005

A Performance Comparison Of Data Encryption Algorithms, Aamer Nadeem, Dr. M. Younus Javed

International Conference on Information and Communication Technologies

The principal goal guiding the design of any encryption algorithm must be security against unauthorized attacks. However, for all practical applications, performance and the cost of implementation are also important concerns. A data encryption algorithm would not be of much use if it is secure enough but slow in performance because it is a common practice to embed encryption algorithms in other applications such as e-commerce, banking, and online transaction processing applications. Embedding of encryption algorithms in other applications also precludes a hardware implementation, and is thus a major cause of degraded overall performance of the system. In this paper, …


Identification Of Ip Information Of Pakistan & Vulnerability Assessment, Nizar Diamond Ali Aug 2005

Identification Of Ip Information Of Pakistan & Vulnerability Assessment, Nizar Diamond Ali

International Conference on Information and Communication Technologies

Detailed IP information of Pakistan was not available prior to this study - at least not to the general public. It was not known how to harvest this information, from where and using which tools. This study came as answer to this challenge and shows how the IP information can be collected, what sources of information to use, methodologies to adopt and tools to utilize for this purpose. The next step was find out areas where network security lapses are present - i.e., to see which servers and which services are vulnerable to known attacks and vulnerabilities. In this way, …


Real Time Object Tracking Using Bma, Zeeshan Hameed Khan, Muhammad Aurangzeb Aug 2005

Real Time Object Tracking Using Bma, Zeeshan Hameed Khan, Muhammad Aurangzeb

International Conference on Information and Communication Technologies

This paper describes real time object tracking using block matching algorithm (BMA). Emphasis is made on the development of techniques for tracking a user-selected object through digital image sequences in multimedia systems. The ability to track objects in sequences is useful in situations where the motion of objects is important. It is also useful when a moving object is difficult to see and needs to be highlighted. A tracking tool is also of benefit to the developers of a multimedia system to automatically 'mark up' a moving object so a user of the system can select it and manipulate it.