Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 26 of 26

Full-Text Articles in Physical Sciences and Mathematics

Networks - Ii: Optimal Fractional Frequency Reuse (Ffr) And Resource Allocation In Multiuser Ofdma System, Naveed Ul Hassan, Mohamad Assaad Sep 2009

Networks - Ii: Optimal Fractional Frequency Reuse (Ffr) And Resource Allocation In Multiuser Ofdma System, Naveed Ul Hassan, Mohamad Assaad

International Conference on Information and Communication Technologies

In this paper we determine the optimal fractional frequency reuse (FFR) and resource allocation in OFDMA system. Since the users at the cell edge are more exposed to inter-cell interference therefore each cell is partitioned into two regions; inner region and outer region. We determine the optimal FFR factor for the outer region, bandwidth assigned to each region and subcarrier and power allocation to all the users in the cell. The problem is formulated as sum-power minimization problem subject to minimum rate constraints in both the regions. This is a mixed linear integer programming problem which is relaxed into a …


Wireless Networks: Spert: A Stateless Protocol For Energy-Sensitive Real-Time Routing For Wireless Sensor Network, Sohail Jabbar, Abid Ali Minhas, Raja Adeel Akhtar Aug 2009

Wireless Networks: Spert: A Stateless Protocol For Energy-Sensitive Real-Time Routing For Wireless Sensor Network, Sohail Jabbar, Abid Ali Minhas, Raja Adeel Akhtar

International Conference on Information and Communication Technologies

Putting constraints on performance of a system in the temporal domain, some times turns right into wrong and update into outdate. These are the scenarios where apposite value of time inveterate in the reality. But such timing precision not only requires tightly scheduled performance constraints but also requires optimal design and operation of all system components. Any malfunctioning at any relevant aspect may causes a serious disaster and even loss of human lives. Managing and interacting with such real-time system becomes much intricate when the resources are limited as in wireless sensor nodes. A wireless sensor node is typically comprises …


Software Engineering: Security Characterization For Evaluation Of Software Architectures Using Atam, Asad Raza, Haider Abbas, Louise Yngstrom, Ahmed Hemani Aug 2009

Software Engineering: Security Characterization For Evaluation Of Software Architectures Using Atam, Asad Raza, Haider Abbas, Louise Yngstrom, Ahmed Hemani

International Conference on Information and Communication Technologies

Significant technological advancement in the current electronic era has influenced the work processes of private and government business entities. E-Government is one such area where almost every country is emphasizing and automating their work processes. Software architecture is the integral constituent of any software system with not only cumbersome modeling and development but require heedful evaluation. Considering this aspect we have highlighted in this paper, security evaluation of an ongoing e-society project ESAM using Architectural Tradeoff Analysis Method (ATAM). ESAM is a Web based system intended to provide e-services to the Swedish community residents. ATAM is primarily used for architectural …


Wireless Networks: Certificateless Id-Based Authentication Using Threshold Signature For P2p Manets, Aasia Samreen, Seema Ansari Aug 2009

Wireless Networks: Certificateless Id-Based Authentication Using Threshold Signature For P2p Manets, Aasia Samreen, Seema Ansari

International Conference on Information and Communication Technologies

As far as the security of MANET (mobile and ad hoc network) is concerned, it depends upon the secure authentication especially for P2P MANETs. Identity based encryption was introduced to construct Public Key without requiring a certificate. Therefore, certificateless authentication combined with threshold digital signature and efficient key generation using identities such as IP address, are the challenging issues in front of researchers. In this paper we have addressed the problem of identity based secure authentication employing well-known RSA algorithm and secret sharing to generate threshold signature on a message.


Software Engineering: An Open Source Service Oriented Mobile Business Intelligence Tool (Mbit), Bushra Sajjad, A. Mir, A. Khawar, F. Bashir, A. Tariq Aug 2009

Software Engineering: An Open Source Service Oriented Mobile Business Intelligence Tool (Mbit), Bushra Sajjad, A. Mir, A. Khawar, F. Bashir, A. Tariq

International Conference on Information and Communication Technologies

Corporate executives require relevant and intelligent business information in real-time to take strategic decisions. They require the freedom to access this information anywhere and anytime. There is a need to extend this functionality beyond the office and on the fingertips of the decision makers. Mobile Business Intelligence Tool (MBIT) aims to provide these features in a flexible and cost-efficient manner. This paper describes the detailed architecture of MBIT to overcome the limitations of existing mobile business intelligence tools. Further, a detailed implementation framework is presented to realize the design. This research highlights the benefits of using service oriented architecture to …


Software Engineering: A Pattern For The Effective Use Of Object Oriented Databases, Muhammad Ubaid, Nauman Atique, Saira Begum Aug 2009

Software Engineering: A Pattern For The Effective Use Of Object Oriented Databases, Muhammad Ubaid, Nauman Atique, Saira Begum

International Conference on Information and Communication Technologies

In object oriented scenario, inheritance is a process to make new classes by using classes that have already been defined. Inheritance helps to reuse existing code, by adding together of properties will enhance all new child objects without interfering with their existing ties. In object-oriented programming, an object is instance of class that consists of data and the methods, allows binding for them and operate on that data, stored in the memory of a running application. This paper presents a methodology of class hierarchy with the normalization in object oriented databases. CHNF (class hierarchy normal form) is good concept for …


Application Of Ict Ii: Analytic Network Process Applied To R&D Project Selection, Murad Habib, Raza Khan, Javaid L. Piracha Aug 2009

Application Of Ict Ii: Analytic Network Process Applied To R&D Project Selection, Murad Habib, Raza Khan, Javaid L. Piracha

International Conference on Information and Communication Technologies

Research and development (R&D) project selection is a complex decision-making process. Risks and uncertainties are also associated with the investments and returns of R&D projects. This research paper illustrates an application of ANP (analytic network process). The analytic network process (ANP) is presented as a potentially valuable method to support the selection of projects in a research and development (R&D) environment. The AHP (analytic hierarchy process) is employed to break down large unstructured decision problems into manageable and measurable components. The ANP, as the general form of AHP, is powerful to deal with complex decisions where interdependence exists in a …


Wireless Networks: Automated Frequency Distribution, Management & Assignment (Afdma) In Ieee 802.16, Khurram Shehzad, A. Ali, F. Rasool, R. M. Hashmi, A. Zubair, R. L. Ali Aug 2009

Wireless Networks: Automated Frequency Distribution, Management & Assignment (Afdma) In Ieee 802.16, Khurram Shehzad, A. Ali, F. Rasool, R. M. Hashmi, A. Zubair, R. L. Ali

International Conference on Information and Communication Technologies

Frequency is amongst the most exclusive and most costly resources in wireless communication networks, especially, while considering the demands of broadband wireless access (BWA). In BWA, the management of frequency distribution and its effective utilization is of utmost importance. This research explores possible ways to ensure the most effective allocation of bandwidth resources and their best possible utilization on need basis. The model for static frequency allocation has been optimized and the dynamic frequency management has been calculated while dividing the users in different user classes on the basis of their needs and requirements. The effect of ping-pong handovers has …


Wireless Networks: Improved Secure Network Authentication Protocol (Isnap) For Ieee 802.16, Raheel M. Hashmi, Arooj M. Siddiqui, M. Jabeen, K. Shehzad, A. Zubair, K. S. Alimgeer Aug 2009

Wireless Networks: Improved Secure Network Authentication Protocol (Isnap) For Ieee 802.16, Raheel M. Hashmi, Arooj M. Siddiqui, M. Jabeen, K. Shehzad, A. Zubair, K. S. Alimgeer

International Conference on Information and Communication Technologies

Security is amongst one of the major issues in broadband wireless access (BWA) networks. After the launch of the IEEE 802.16 standard (WiMAX), a number of security issues were reported in several articles. Ever since the beginning, work has been in progress for the neutralization of these identified threats. In this paper, the analysis of the authentication protocols implemented in WiMAX has been presented along with the description of the threats posed to them. The paper also describes security sub-layer and limitations of the existing architecture. An approach has also been presented for the prevention of these threats like the …


Application Of Ict Ii: Considerations On The Validity Constraints For The Bistatic Sar Processing, Qurat Ul-Ann, Otmar Loffeld, Holger Nies, Robert Wang Aug 2009

Application Of Ict Ii: Considerations On The Validity Constraints For The Bistatic Sar Processing, Qurat Ul-Ann, Otmar Loffeld, Holger Nies, Robert Wang

International Conference on Information and Communication Technologies

This paper gives some considerations on the validity constraints for spaceborne/airborne configurations, based on Loffeld's bistatic formula (LBF) for unequal azimuth contribution of transmitter and receiver phase terms.


Software Engineering: Application Of 80/20 Rule In Software Engineering Waterfall Model, Muzaffar Iqbal, Muhammad Rizwan Aug 2009

Software Engineering: Application Of 80/20 Rule In Software Engineering Waterfall Model, Muzaffar Iqbal, Muhammad Rizwan

International Conference on Information and Communication Technologies

Software process is the most important part of software project management, and software process models are important means of implementing the software process in any software organization. When there is need to improve the software process, then the need to improve the work-task part (software process models) of the software process must arise. As, there is need of increasing the commitment of software project managers through out the software development life cycle (SDLC), so we need to give them the list of activities in Waterfall Model, which should be made efficient by the software development team, to get the 80% …


Application Of Ict Iii: Use Of Information And Mobile Computing Technologies In Healthcare Facilities Of Saudi Arabia, Abdul Ahad Siddiqi, Munir Ahmed, Yasser M. Alginahi, Abdulrahman Alharby Aug 2009

Application Of Ict Iii: Use Of Information And Mobile Computing Technologies In Healthcare Facilities Of Saudi Arabia, Abdul Ahad Siddiqi, Munir Ahmed, Yasser M. Alginahi, Abdulrahman Alharby

International Conference on Information and Communication Technologies

Information technology forms an important part of the healthcare solution. Accurate and up-to-date information is essential to continuous quality improvement in any organization, and particularly so in an area as complex as healthcare. Therefore, diverse information systems must be integrated across the healthcare enterprise. The knowledge base in the medical field is large, complex, and growing rapidly. It includes scientific knowledge, as well as familiarity with the day-to-day business of providing healthcare. It is crucial to identify the processes in the healthcare sector that would most benefit from the support of information technology. This study is focused on the analysis …


Networks - Ii: Development Of Symmetric Cryptosystem Using Matrices With Less Overhead On Communication Channel, Jalal F. Al-Muhtadi, Abdul Basit, Maqsood Mahmud Aug 2009

Networks - Ii: Development Of Symmetric Cryptosystem Using Matrices With Less Overhead On Communication Channel, Jalal F. Al-Muhtadi, Abdul Basit, Maqsood Mahmud

International Conference on Information and Communication Technologies

Many systems have been developed by mathematicians using symmetric and Asymmetric Cryptography e.g. Ceaser Cipher, Stream Ciphers, RSA, DES, IDEA, RC-4, ElGamal signatures, LFSR, Ext. Euclidean Algorithm, Lamport Signatures, Merkle Hellman Knapsack. Etc [1]. Some of them are very strong to be broken by cryptanalysts. Some are very easy and even can be broken by the measuring the frequency of alphabets in a specific cipher text. All these system carries some overhead of key with which a plain text is encrypted, for the communication channel. I thought of an idea in which product component which will be 5*1 matrix will …


Networks - Ii: A New Rough Set Based Approach For Optimized Detection Of Available Resources In Grid Computing, Asgarali Bouyer, Mohd Noor Md Sap, Abdul Hanan Abdullah Aug 2009

Networks - Ii: A New Rough Set Based Approach For Optimized Detection Of Available Resources In Grid Computing, Asgarali Bouyer, Mohd Noor Md Sap, Abdul Hanan Abdullah

International Conference on Information and Communication Technologies

Since the grid is a dynamic environment, the prediction and detection of available resources in near future is important for resource scheduling. Economic-based grid management has been viewed as a feasible approach to carry out fair, efficient and reliable scheduling. One key issue in economic-based grid strategy is to inform about available resources. In this paper, we present a novel predictable method to specify available resource in economic-based grid. This method use a rough set analysis by scheduler to divide resources in groups and then grant a priority to each group based on cost price and efficiency of nodes. The …


Networks - Ii: Overhead Analysis Of Security Implementation Using Ipsec, Muhammad Awais Azam, Zaka -Ul- Mustafa, Usman Tahir, S. M. Ahsan, Muhammad Adnan Naseem, Imran Rashid, Muhammad Adeel Aug 2009

Networks - Ii: Overhead Analysis Of Security Implementation Using Ipsec, Muhammad Awais Azam, Zaka -Ul- Mustafa, Usman Tahir, S. M. Ahsan, Muhammad Adnan Naseem, Imran Rashid, Muhammad Adeel

International Conference on Information and Communication Technologies

Authentication, access control, encryption and auditing make up the essential elements of network security. Researchers have dedicated a large amount of efforts to implement security features that fully incorporate the use of all these elements. Currently, data networks mainly provide authentication and confidentiality services. Confidentiality alone is not able to protect the system, thus, suitable security measures must be taken. However, this security is itself an overhead which must be accounted for. A trade-off must exist between performance and security. This trade-off must be carefully managed so as not to deteriorate the systems being secured. This calls for the true …


Networks - Ii: Formal Modeling Of Trust In Semantic Grid Registry, Saba Mahmood, Saman Iftikhar, Hafiz Farooq Ahmad, Farah Mahmood Aug 2009

Networks - Ii: Formal Modeling Of Trust In Semantic Grid Registry, Saba Mahmood, Saman Iftikhar, Hafiz Farooq Ahmad, Farah Mahmood

International Conference on Information and Communication Technologies

In this paper we have analyzed and developed a formal specification of a trust model in semantic grid registry. This paper formalizes the basic requirements of a trust model in case of semantic grid registry. We have described the flow of operations of our system through links and processes in the system architecture. The system is formally modeled in pi-calculus. Finally we transformed the specification to pi- ADL and generated code using Archware tool. We have already developed a semantic grid registry.


Data Mining: Assessment Of Features Quality Of Class Discrimination Using Arif Index And Its Application To Physiological Datasets, Dr. Muhammad Arif, A. Fida Aug 2009

Data Mining: Assessment Of Features Quality Of Class Discrimination Using Arif Index And Its Application To Physiological Datasets, Dr. Muhammad Arif, A. Fida

International Conference on Information and Communication Technologies

Quality of features determines the maximum achievable accuracy by any arbitrary classifier in pattern classification problem. In this paper, we have proposed an index that can assess the quality of features in discrimination of patterns in different classes. This index is in-sensitive to the complexity of boundary separating different classes if there is no overlap among features of different classes. Proposed index is model free and requires no clustering algorithm to discover the clustering structure present in the feature space. It is only based on the information of local neighborhood of feature vectors in the feature space. This index can …


Application Of Ict - I: Using Point-To-Point 1550nm Laser For Outdoor Mobility, Roshan A. Shaikh, Abdul Basit Aug 2009

Application Of Ict - I: Using Point-To-Point 1550nm Laser For Outdoor Mobility, Roshan A. Shaikh, Abdul Basit

International Conference on Information and Communication Technologies

Significant implementation challenges exist in wireless backbone connectivity. Typical optical wireless communication topologies are evaluated. A fresh approach using 1550nm Wavelength laser to design protocol and topology for point-to-point outdoor connectivity is carried out. Matlab simulation results support the 1550nm laser as a good choice for outdoor connectivity for optical wireless communication. New design and topology for an optical wireless communication system is suggested with special consideration of security and recommendation for the optimal use of such a technology is suggested.


Data Mining: Analyzing Impact Of Outliers' Detection And Removal From The Test Sample In Blind Source Extraction Using Multivariate Calibration Techniques, S. R. Naqvi, F. Rehman, S. S. Naqvi, A. Amin, I. Qayyum, S. Khan, W. A. Khan Aug 2009

Data Mining: Analyzing Impact Of Outliers' Detection And Removal From The Test Sample In Blind Source Extraction Using Multivariate Calibration Techniques, S. R. Naqvi, F. Rehman, S. S. Naqvi, A. Amin, I. Qayyum, S. Khan, W. A. Khan

International Conference on Information and Communication Technologies

Blind source extraction (BSE) may be an essential but a challenging task where multiple sources are convolved and/or time delayed. In this article we discuss the performance of multivariate calibration techniques that comprise of classical least square (CLS), inverse linear regression (ILS), principal component regression (PCR) and partial least square regression (PLS) in achieving this task in robust speech recognition systems with varying signal-to-noise ratios (SNR). We specifically analyze two methods for identifying and removing outliers from the sample, namely; outlier sample removal (OSR) and descriptor selection (DS) for classical least square and factor Based regression respectively, which results in …


Networks - I: Networks-On-Chip: Challenges, Trends And Mechanisms For Enhancements, Omer Tayan Aug 2009

Networks - I: Networks-On-Chip: Challenges, Trends And Mechanisms For Enhancements, Omer Tayan

International Conference on Information and Communication Technologies

The rate of increase of silicon capacity in integrated circuits (IC) will enable system integration of several billion transistors to reside on a single chip in the near future. Future system-on-chip (SoC) systems must therefore integrate up to several hundreds of cores within a single chip, and SoC designs will employ on-chip communication networks (NoCs) as a result. This paper discusses the problems with many current SoC systems, surveys the challenges and trends facing future SoC designs and proposes a mechanism for enhancing NoC strategies of the future by enhancing memory management and utilization techniques within an NoC.


Networks - I: Investigating Access To Heterogeneous Storage Systems Using Linked Data In Unicore Grid Middleware, Roger Menday, M. Shahbaz Memon, A. Shiraz Memon, Achim Streit Aug 2009

Networks - I: Investigating Access To Heterogeneous Storage Systems Using Linked Data In Unicore Grid Middleware, Roger Menday, M. Shahbaz Memon, A. Shiraz Memon, Achim Streit

International Conference on Information and Communication Technologies

The Grid provides access to execution and storage resources - through middleware - by normalizing the access to resources. UNICORE calls this quality dasiaseamlessnesspsila. One result of this is that a request for some action at one resource can, with relative ease, be re-targeted to another, making possible the coordinated usage of multiple resources. In this paper we describe a seamless interface to heterogeneous storage systems, using the (Semantic) Web as middleware for the Grid. Data is accumulated by experiments and simulations running on execution systems, instruments and sensors, and by importing data from other locations. Storage systems are regular …


Networks - I: A Comparative Analysis Of Dccp Variants (Ccid2, Ccid3), Tcp And Udp For Mpeg4 Video Applications, Muhammad Ajmal Azad, Rashid Mahmood, Tahir Mehmood Aug 2009

Networks - I: A Comparative Analysis Of Dccp Variants (Ccid2, Ccid3), Tcp And Udp For Mpeg4 Video Applications, Muhammad Ajmal Azad, Rashid Mahmood, Tahir Mehmood

International Conference on Information and Communication Technologies

New emerging technologies like Multimedia applications require timely delivery of information as compared to reliability. The most widely used protocols over transport layer are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Both of these have some drawbacks while using in real time applications. TCP increases delay in transfer of data but achieving reliable transfer of data while UDP does not provide any acknowledgment, hence it overcomes the problem of delay but lacking congestion control mechanism. To provide congestion control over transport layer using UDP, Datagram Congestion Control Protocol (DCCP) has been designed to provide timely delivery of data …


Artificial Intelligence – I: A Two-Step Approach For Improving Efficiency Of Feedforward Multilayer Perceptrons Network, Shoukat Ullah, Zakia Hussain Aug 2009

Artificial Intelligence – I: A Two-Step Approach For Improving Efficiency Of Feedforward Multilayer Perceptrons Network, Shoukat Ullah, Zakia Hussain

International Conference on Information and Communication Technologies

An artificial neural network has got greater importance in the field of data mining. Although it may have complex structure, long training time, and uneasily understandable representation of results, neural network has high accuracy and is preferable in data mining. This research paper is aimed to improve efficiency and to provide accurate results on the basis of same behaviour data. To achieve these objectives, an algorithm is proposed that uses two data mining techniques, that is, attribute selection method and cluster analysis. The algorithm works by applying attribute selection method to eliminate irrelevant attributes, so that input dimensionality is reduced …


Networks - I: Collaborative 3d Digital Content Creation Exploiting A Grid Network, M. Gkion, M. Z. Patoli, A. Al-Barakati, W. Zhang, P. Newbury, M. White Aug 2009

Networks - I: Collaborative 3d Digital Content Creation Exploiting A Grid Network, M. Gkion, M. Z. Patoli, A. Al-Barakati, W. Zhang, P. Newbury, M. White

International Conference on Information and Communication Technologies

The increase in ease of the production of computer simulated graphics has opened new opportunities in the 3D industry. There are unlimited applications for the delivery of 3D Graphics especially concerning 3D multimedia presentation of digital content. Apart from aesthetic and entertaining reasons, experts apply computer simulations to visualize environments and to identify early errors or costs in order to limit the need of making real prototypes. Thus, 3D Graphics also minimize the time required for developing the final product. Existing 3D applications give partial support to users to engage in collaborative contribution for the production of a 3D model. …


Networks - I: Cooperative Friendship Networks Through Slac With Newscast, M. Usman Akram, Anam Tariq Aug 2009

Networks - I: Cooperative Friendship Networks Through Slac With Newscast, M. Usman Akram, Anam Tariq

International Conference on Information and Communication Technologies

The effective cooperation and coordination of nodes is necessary for performance improvement in the P2P network. In this paper, we focus on the problem of maintaining considerable amount of cooperation and friendship in P2P networks of selfish peers. For this purpose we will analyze the performance of SLAC. It is a simple algorithm that maintains excessive levels of cooperation and friendship in a network while performing tasks. A simulation model ldquoPrisoners' Dilemmardquo is presented that puts this algorithm to work in a Peersim environment. For providing random sampling, an existing protocol called ldquoNEWSCASTrdquo has been used. The extensive computer simulations …


Artificial Intelligence – I: Subjective Decision Making Using Type-2 Fuzzy Logic Advisor, Owais Malik Aug 2009

Artificial Intelligence – I: Subjective Decision Making Using Type-2 Fuzzy Logic Advisor, Owais Malik

International Conference on Information and Communication Technologies

In this paper, we present and compare two-stage type-2 fuzzy logic advisor (FLA) for subjective decision making in the domain of students' performance evaluation. We test our proposed model for evaluating students' performance in our computer science and engineering department at HBCC/KFUPM in two domains namely cooperating training and capstone/senior project assessment where we find these FLAs very useful and promising. In our proposed model, the assessment criteria for different components of cooperative training and senior project are transformed into linguistic labels and evaluation information is extracted into the form of IF-THEN rules from the experts. These rules are modeled …