Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Databases and Information Systems
International Conference on Information and Communication Technologies
- Keyword
-
- Information technology (4)
- Computer networks (3)
- Databases (3)
- Information security (3)
- Software engineering (3)
-
- Application software (2)
- Capability maturity model (2)
- Computer security (2)
- Data mining (2)
- Data security (2)
- Government (2)
- Information retrieval (2)
- Mathematics (2)
- Operating systems (2)
- Programming (2)
- Project management (2)
- Resource management (2)
- Robustness (2)
- Statistics (2)
- Technology management (2)
- Admission control (1)
- Algorithm design and analysis (1)
- Appraisal (1)
- Availability (1)
- Bandwidth allocation and reservation scheme (1)
- Biology computing (1)
- Centralized control (1)
- Certification (1)
- Communication channels (1)
- Communication system security (1)
Articles 1 - 26 of 26
Full-Text Articles in Physical Sciences and Mathematics
Enhancement Of Software Engineering By Shifting From Software Product To Software Service, Muhammad Saeed, Muhammad Jaffar-Ur- Rehman
Enhancement Of Software Engineering By Shifting From Software Product To Software Service, Muhammad Saeed, Muhammad Jaffar-Ur- Rehman
International Conference on Information and Communication Technologies
Software development has always been a supply side affair, in which domain experts were the main requirement providers. Software engineers have been creating new technologies, frameworks and methodologies but this has made the software engineering job more complex. Recently all this has been looked at from demand-side prospective. So a new concept of Service Based Software Engineering is shaping up which look at the software as a service rather then a product. This paper is going to analysis the fundamental requirements of such a paradigm shift, by first gathering the concept and then translating this to a workable solution. Different …
An Investigation Into The Skills Gap In The Software Industry Of Pakistan, Zareen Sharf, Dr. Wasim A. Khan
An Investigation Into The Skills Gap In The Software Industry Of Pakistan, Zareen Sharf, Dr. Wasim A. Khan
International Conference on Information and Communication Technologies
Software Industry workers require an adequate skill set to gain maximum output from the effective use of technology. The purpose of this study is to explore the nature of actual and desired software developer, jobs skill set. Survey methodology will be used to obtain reports of actual skill level and those desired to define common dimensions of the software developer skill set. Anticipated results will add to the existing body of IT job skills knowledge and may provide practice with job development and career planning guidance. We also intend to propose a skill standard for the software industry of Pakistan …
Implementation And Analysis Of Cmmi's Configuration Management Process Area; Applicable To "Defined" Level - 3, Ahmad Luqman
Implementation And Analysis Of Cmmi's Configuration Management Process Area; Applicable To "Defined" Level - 3, Ahmad Luqman
International Conference on Information and Communication Technologies
Enterprise Resource Planner (ERP) is a strategically important tool as integrated business application for long-term success in an increasingly competitive global market. This system requires the integration of data and business processes across the whole enterprise. In order to develop a good quality product there is a need of applying proper model. It becomes more costly in terms of training, appraisals, and improvement activities while applying multiple models that are not integrated within and across an organization. Where as Capability Maturity Model Integration is a set of integrated models that successfully addresses multiple disciplines and has integrated training support. Objective …
Opems: Online Peer-To-Peer Expertise Matching System, Sharifullah Khan, S.M. Nabeel
Opems: Online Peer-To-Peer Expertise Matching System, Sharifullah Khan, S.M. Nabeel
International Conference on Information and Communication Technologies
Internet is a vital source to disseminate and share information to the masses. This has made information available in abundance on the Web. However, finding relevant information is difficult if not impossible. This difficulty is bilateral between information providers and seekers in terms of information presentation and accessibility respectively. This paper proposed an online Peer-to-Peer Expertise Matching system. The approach provides a highly scalable and self-organizing system and helps individuals in presenting and accessing the information in a consistent format on the Web. This makes the sharing of information among the autonomous organizations successful.
Enhanced Risk Analysis-Relative Impact Factorization, Basit Shahzad, Tanveer Afzal, Rizwana Irfan
Enhanced Risk Analysis-Relative Impact Factorization, Basit Shahzad, Tanveer Afzal, Rizwana Irfan
International Conference on Information and Communication Technologies
Software engineering is an area of development which always has the risk factor present and software engineering can hardly be done on some straight line. So, the manager has to handle the dynamically changing circumstances in order to complete the job. The target of development team is to develop the software according to the requirements within specified time. Wide variety of risks I are present that may grab the development effort. A good manager must ensure that all measures have been taken against the risks that may possibly come. This paper focuses on determining the relative impact of risk factors …
Fuzzy Logic Control Of Coupled Liquid Tank System, Muhammad Abid
Fuzzy Logic Control Of Coupled Liquid Tank System, Muhammad Abid
International Conference on Information and Communication Technologies
This paper presents a fuzzy control of coupled liquid tank system. The Coupled Liquid Tank system is developed at PIEAS. It has three liquid tanks coupled together. The liquid level in tank 2 is maintained using fuzzy logic. The results are compared with the PID control, mostly used in industries.
A Comparative Study And Analysis Of Pvm And Mpi For Parallel And Distributed Systems, Dr. Syed Jamal Hussain, Ghufran Ahmed
A Comparative Study And Analysis Of Pvm And Mpi For Parallel And Distributed Systems, Dr. Syed Jamal Hussain, Ghufran Ahmed
International Conference on Information and Communication Technologies
Networks of Workstations (NOWs) based on various operating systems are globally accepted as the standard for computing environments in the IT industry. To harness the tremendous potential for computing capability represented by these NOWs, various new tools are being developed. Parallel Virtual Machine (PVM) and Message Passing Interface (MPI) have existed on UNIX workstations for some time, and are maturing in their capability for handling Distributed Parallel Processing (DPP). This research is aimed to explore each of these two vehicles for DPP, considering capability, ease of use, and availability, and compares their distinguishing features; and also explores programmer interface and …
Mapping Ogc Prince 2 To Sei Cmmi 1.1, Ahmad Luqman, Fida Hussain, Dr. S. Tauseef -Ur- Rehman
Mapping Ogc Prince 2 To Sei Cmmi 1.1, Ahmad Luqman, Fida Hussain, Dr. S. Tauseef -Ur- Rehman
International Conference on Information and Communication Technologies
The Capability Maturity Model Integration (CMMI) version 1.1, developed by the Software Engineering Institute (SEI), USA and the PRoject IN Controlled Environment (PRINCE) version 2 developed by Central Computing and Telecommunications Agency (CCTA) now Office of Government Commerce (OGC) as UK Government standard for IT Project Management, share a common concern with Project and Quality management by improved process management. Both are driven by similar concerns and intuitively correlated. Organizations concerned with PRINCE 2 certification often question its overlap with the CMMI. We have looked into OGC PRINCE 2 process/components and map it to the different goals/practices in the SEI …
Poster Session A: Classification Of Compressed Human Face Images By Using Principle Components, Zahid Riaz, Arif Gilgiti, Zulfiqar Ali
Poster Session A: Classification Of Compressed Human Face Images By Using Principle Components, Zahid Riaz, Arif Gilgiti, Zulfiqar Ali
International Conference on Information and Communication Technologies
This paper describes the novel approach of classifying the humans on the basis of their compressed face images. The compression of the face images is performed using Discrete Wavelet Transform (DWT). While the classification encompass the use of Principal Components Analysis (PCA). Classification technique utilizes PCA in some different way. Only first principal component is used as feature vector out of 92 components (since image size is 112×92), causing a better results of 87.39%. The Euclidean distance is used as distance metric. In the end our results are compared to our previous research of classifying the uncompressed images.
Poster Session A: Analyzing & Enhancing Energy Efficient Communication Protocol For Wireless Micro-Sensor Networks, Irfan Majeed Butt, Shoab Ahmed Khan
Poster Session A: Analyzing & Enhancing Energy Efficient Communication Protocol For Wireless Micro-Sensor Networks, Irfan Majeed Butt, Shoab Ahmed Khan
International Conference on Information and Communication Technologies
The paper presents an analysis of energy efficient routing protocols with direct communication protocol. A comparison of these protocols is made analyzing energy consumption at each node and explaining system lifetime after certain rounds. The paper also proposes a novel energy conscious cluster head selection algorithm for making system more reliable and efficient. Simulation shows that our proposed algorithm enhances the system reliability and accuracy.
Poster Session A: A Multi-Priority Application Framework For Mobile Ad Hoc Networks, M. Ibrahim Channa, Ahsan Chaudhry, Kashif Sharif, Irum Memon
Poster Session A: A Multi-Priority Application Framework For Mobile Ad Hoc Networks, M. Ibrahim Channa, Ahsan Chaudhry, Kashif Sharif, Irum Memon
International Conference on Information and Communication Technologies
The fast spread of small wireless computers has enabled the design and deployment of wireless Ad Hoc networks. Typical applications proposed for such networks include both Real Time and Non-Real Time applications. We propose an architecture that provides a complete framework for Real Time applications and Best Effort traffic. The proposed architecture comprises of an Ad Hoc Routing Protocol for route setup and route repair, a Bandwidth Allocation and Reservation Scheme for Real Time traffic, and a MAC layer protocol that provides traffic differentiation. The Admission Control module is used to admit or reject a new Real Time flow request …
Poster Session A: Face Recognition Using Sub-Holistic Pca, Muhammad Murtaza Khan, Dr. Muhammad Younus Javed, Muhammad Almas Anjum
Poster Session A: Face Recognition Using Sub-Holistic Pca, Muhammad Murtaza Khan, Dr. Muhammad Younus Javed, Muhammad Almas Anjum
International Conference on Information and Communication Technologies
This paper proposes a face recognition scheme that enhances the correct face recognition rate as compared to conventional Principal Component Analysis (PCA). The proposed scheme, Sub-Holistic PCA (SH-PCA), was tested using ORL database and out performed PCA for all test scenarios. SH-PCA requires more computational power and memory as compared to PCA however it yields an improvement of 6% correct recognition on the complete ORL database of 400 images. The correct recognition rate for the complete ORL database is 90% for the SH-PCA technique.
Keynote: The Use Of Meta-Heuristic Algorithms For Data Mining, Dr. Beatrize De La Iglesia, A. Reynolds
Keynote: The Use Of Meta-Heuristic Algorithms For Data Mining, Dr. Beatrize De La Iglesia, A. Reynolds
International Conference on Information and Communication Technologies
In this paper we explore the application of powerful optimisers known as metaheuristic algorithms to problems within the data mining domain. We introduce some well-known data mining problems, and show how they can be formulated as optimisation problems. We then review the use of metaheuristics in this context. In particular, we focus on the task of partial classification and show how multi-objective metaheuristics have produced results that are comparable to the best known techniques but more scalable to large databases. We conclude by reinforcing the importance of research on the areas of metaheuristics for optimisation and data mining. The combination …
Keynote: Emerging Era Of Cooperative Empowerment: Grid, Peer-To-Peer, And Community Computing, Dr. Javed I. Khan
Keynote: Emerging Era Of Cooperative Empowerment: Grid, Peer-To-Peer, And Community Computing, Dr. Javed I. Khan
International Conference on Information and Communication Technologies
In this paper we discuss an emerging trend in high performance computing-the social or community computing. The emergence of screensaver computing, grid computing, peer-to-peer systems, and their demonstrated ability to garner computing power as potent as the supercomputers seems to be auspicious. In this paper we discuss the new phenomenon of community computing-including their potential applications in solving a new set of grand challenge problems. We also discuss the previously uncharted technological challenges architects of these new paradigms are addressing.
Secured Network Model For Management Information System Based On Ip Security (Ipsec) Encryption Using Multilayered Approach Of Network Security, Dr. Amir Hassan Pathan, Muniza Irshad
Secured Network Model For Management Information System Based On Ip Security (Ipsec) Encryption Using Multilayered Approach Of Network Security, Dr. Amir Hassan Pathan, Muniza Irshad
International Conference on Information and Communication Technologies
Secured flow of information through the network and play important role in the management information systems. In this paper I describe Secured Network Model For Corporate & Business Organization In Based On Network Level IP Security (IPSec) Encryption & Its Physical Layout Using Multilayered Approach. I have four important considerations for adoption of secured network model as secured network model for management information system.
A Performance Comparison Of Data Encryption Algorithms, Aamer Nadeem, Dr. M. Younus Javed
A Performance Comparison Of Data Encryption Algorithms, Aamer Nadeem, Dr. M. Younus Javed
International Conference on Information and Communication Technologies
The principal goal guiding the design of any encryption algorithm must be security against unauthorized attacks. However, for all practical applications, performance and the cost of implementation are also important concerns. A data encryption algorithm would not be of much use if it is secure enough but slow in performance because it is a common practice to embed encryption algorithms in other applications such as e-commerce, banking, and online transaction processing applications. Embedding of encryption algorithms in other applications also precludes a hardware implementation, and is thus a major cause of degraded overall performance of the system. In this paper, …
Identification Of Ip Information Of Pakistan & Vulnerability Assessment, Nizar Diamond Ali
Identification Of Ip Information Of Pakistan & Vulnerability Assessment, Nizar Diamond Ali
International Conference on Information and Communication Technologies
Detailed IP information of Pakistan was not available prior to this study - at least not to the general public. It was not known how to harvest this information, from where and using which tools. This study came as answer to this challenge and shows how the IP information can be collected, what sources of information to use, methodologies to adopt and tools to utilize for this purpose. The next step was find out areas where network security lapses are present - i.e., to see which servers and which services are vulnerable to known attacks and vulnerabilities. In this way, …
A Survey On Intrusion Detection Approaches, A Murali M. Rao
A Survey On Intrusion Detection Approaches, A Murali M. Rao
International Conference on Information and Communication Technologies
Intrusion detection plays one of the key roles in computer security techniques and is one of the prime areas of research. Usages of computer network services are tremendously increasing day by day and at the same time intruders are also playing a major role to deny network services, compromising the crucial services for Email, FTP and Web. Realizing the importance of the problem due to intrusions, many researchers have taken up research in this area and have proposed several solutions. It has come to a stage to take a stock of the research results and project a comprehensive view so …
G-Value Decoding Of Greedy Codes, Khalil Ahmad
G-Value Decoding Of Greedy Codes, Khalil Ahmad
International Conference on Information and Communication Technologies
Error-correcting codes are widely used to increase the reliability of transmission of information over various forms of communication channels. Codes with a given minimum distance d can be constructed by a greedy algorithm [2]. In this paper, I proposed a new algorithm for the allocation of g-values to the binary vectors. Hamming (7, 4, 3) code can be generated by the application of greedy algorithm on the binary vectors of length 7 arranged in B-ordering. This code is used to demonstrate a new decoding technique for linear codes in addition to the schemes already known for decoding such as Syndrome …
Optimization Of Semantic Caching For Xml Database, Sharifullah Khan, Awais Hamid
Optimization Of Semantic Caching For Xml Database, Sharifullah Khan, Awais Hamid
International Conference on Information and Communication Technologies
The availability of information on the Internet has increased exponentially the Internet users in the last few years. This made the web servers overloaded. Semantic caches store the semantics and results of the previously asked queries close to the users, in order to answer new queries. The caching reduces the burden of the web servers and optimizes their performance. This paper presents the SMOCE Cache, a framework for semantic caching of XML database. Specialized techniques such as indexing and broadening of semantic regions are proposed for the optimization of semantic caching. The evaluation of prototype proved the significance of proposed …
A Dynamic Weight Assignment Approach For Ir Systems, M. Shoaib, Prof Dr. Abad Ali Shah, A. Vashishta
A Dynamic Weight Assignment Approach For Ir Systems, M. Shoaib, Prof Dr. Abad Ali Shah, A. Vashishta
International Conference on Information and Communication Technologies
Weights are assigned to the extracted keywords for partial matching and computing ranking in an IR system. Weight assignment technique is suggested by the IR model that is used for an IR system. Currently suggested weight assignment techniques are static which means that once weight is assigned a keyword it remains unchanged during life-span of an IR system. In this paper, we suggest a dynamic weight assignment technique. This technique can be used by any IR model that supports partial matching.
Study Of Data Provenance And Annotation Model For Information Reliability Suggested For Pathological Laboratory Environment In Pakistan, Naila Aamir, Aslam Pervez
Study Of Data Provenance And Annotation Model For Information Reliability Suggested For Pathological Laboratory Environment In Pakistan, Naila Aamir, Aslam Pervez
International Conference on Information and Communication Technologies
Trust and reliability of information is a very critical issue of today's information age. Keeping provenance of data not only ensures us about its origination but it also keeps track of all the changes that happen to the data through out its life cycle. In this paper we have discussed the importance of data provenance, difference between Where & Why Provenance and different models for keeping such information. The objective of this study is to select a provenance model which can be implemented in scientific environment of our country. For this purpose we have taken the annotation model and have …
Ergonomics: Implications On Computer End-Users, Maheen Ghauri, Dr. Arshad Siddiqi
Ergonomics: Implications On Computer End-Users, Maheen Ghauri, Dr. Arshad Siddiqi
International Conference on Information and Communication Technologies
Ergonomics is the application of scientific information related to humans to the design of objects, systems and environment for human use. The objective is to apply human characteristics to the design of computer-based work environments to reduce problems of people at work. Lack of ergonomics has serious repercussions on end-users, including physical and mental illnesses. Using ergonomics to design computer-intensive environments would maximize efficiency, productivity and job satisfaction of employees. Unfortunately, in the Government Sector in Pakistan, there is no application of ergonomics in computer-based environments, and this leads to inefficiencies, errors, and safety and health issues. The purpose of …
Visualization Of Retrieved Positive Data Using Blending Function, Muhammad Shoaib, Habib -Ur- Rehman, Dr. Abad Ali Shah
Visualization Of Retrieved Positive Data Using Blending Function, Muhammad Shoaib, Habib -Ur- Rehman, Dr. Abad Ali Shah
International Conference on Information and Communication Technologies
Data visualization is an important technique used in data mining. We present the retrieved data into visual format to discover features and trends inherent to the data. Some features of the data to be retrieved are already known to us. Visualization should preserve these known features inherent to the data. Positivity is one such known feature that is inherent to most of the scientific and business data sets. For example, mass, volume and percentage concentration are meaningful only when they are positive values. However certain visualization techniques do not guarantee to preserve this feature while constructing visualization of retrieved data …
Keynote: Role Of Values & Culture In Information Technology, Prof. Dr. Anis Ahmad
Keynote: Role Of Values & Culture In Information Technology, Prof. Dr. Anis Ahmad
International Conference on Information and Communication Technologies
It is no longer unusual to see, in a remote town in northern area in Pakistan, a practically non-literate wagon driver calling from his Nokia cell phone his uncle in Dubai or in Karachi. He enjoys sharing with him about his success in business and the settlement of family disputes. While he is driving on dangerous curvy roads and having this conversation, in the back seat of the wagon a comparatively young person is playing games on his cell phone. All this was unimaginable a quarter of a century ago.
Keynote: Hexagonal Structure For Intelligent Vision, Xiangjian He, Wenjing Jia
Keynote: Hexagonal Structure For Intelligent Vision, Xiangjian He, Wenjing Jia
International Conference on Information and Communication Technologies
Using hexagonal grids to represent digital images have been studied for more than 40 years. Increased processing capabilities of graphic devices and recent improvements in CCD technology have made hexagonal sampling attractive for practical applications and brought new interests on this topic. The hexagonal structure is considered to be preferable to the rectangular structure due to its higher sampling efficiency, consistent connectivity and higher angular resolution and is even proved to be superior to square structure in many applications. Since there is no mature hardware for hexagonal-based image capture and display, square to hexagonal image conversion has to be done …