By Topic

Information and Communication Technologies, 2009. ICICT '09. International Conference on

Date 15-16 Aug. 2009

Filter Results

Displaying Results 1 - 25 of 54
  • [Front and back covers]

    Publication Year: 2009 , Page(s): c1 - c4
    Request Permissions | PDF file iconPDF (338 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009 , Page(s): 1
    Request Permissions | PDF file iconPDF (74 KB)  
    Freely Available from IEEE
  • Contents

    Publication Year: 2009 , Page(s): 1 - 3
    Request Permissions | PDF file iconPDF (423 KB)  
    Freely Available from IEEE
  • Contributors

    Publication Year: 2009 , Page(s): 15 - 16
    Request Permissions | PDF file iconPDF (408 KB)  
    Freely Available from IEEE
  • Committees

    Publication Year: 2009 , Page(s): 17 - 18
    Request Permissions | PDF file iconPDF (353 KB)  
    Freely Available from IEEE
  • Director's Message

    Publication Year: 2009 , Page(s): 19 - 22
    Request Permissions | PDF file iconPDF (161 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Associate Dean's Message

    Publication Year: 2009 , Page(s): 23 - 25
    Request Permissions | PDF file iconPDF (308 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Cooperative friendship networks through SLAC with Newscast

    Publication Year: 2009 , Page(s): 31 - 34
    Request Permissions | Click to expandAbstract | PDF file iconPDF (693 KB) |  | HTML iconHTML  

    The effective cooperation and coordination of nodes is necessary for performance improvement in the P2P network. In this paper, we focus on the problem of maintaining considerable amount of cooperation and friendship in P2P networks of selfish peers. For this purpose we will analyze the performance of SLAC. It is a simple algorithm that maintains excessive levels of cooperation and friendship in a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Collaborative 3D digital content creation exploiting a Grid network

    Publication Year: 2009 , Page(s): 35 - 39
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1232 KB) |  | HTML iconHTML  

    The increase in ease of the production of computer simulated graphics has opened new opportunities in the 3D industry. There are unlimited applications for the delivery of 3D Graphics especially concerning 3D multimedia presentation of digital content. Apart from aesthetic and entertaining reasons, experts apply computer simulations to visualize environments and to identify early errors or costs i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comparative analysis of DCCP variants (CCID2, CCID3), TCP and UDP for MPEG4 video applications

    Publication Year: 2009 , Page(s): 40 - 45
    Cited by:  Papers (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (778 KB) |  | HTML iconHTML  

    New emerging technologies like Multimedia applications require timely delivery of information as compared to reliability. The most widely used protocols over transport layer are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Both of these have some drawbacks while using in real time applications. TCP increases delay in transfer of data but achieving reliable transfer of data... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Investigating access to heterogeneous storage systems using linked data in UNICORE Grid middleware

    Publication Year: 2009 , Page(s): 46 - 51
    Request Permissions | Click to expandAbstract | PDF file iconPDF (513 KB) |  | HTML iconHTML  

    The Grid provides access to execution and storage resources - through middleware - by normalizing the access to resources. UNICORE calls this quality dasiaseamlessnesspsila. One result of this is that a request for some action at one resource can, with relative ease, be re-targeted to another, making possible the coordinated usage of multiple resources. In this paper we describe a seamless interfa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An instantiation of Way Point Routing for Mobile ad hoc Networks

    Publication Year: 2009 , Page(s): 52 - 56
    Request Permissions | Click to expandAbstract | PDF file iconPDF (622 KB) |  | HTML iconHTML  

    Mobile ad hoc networks are increasingly finding their existence in the marketplace heading to a new paradigm of pervasive computing. However there are many areas open to research in the field. Due to node mobility resulting in an ever-changing network topology, conventional routing methods cannot be applied in MANETS. Therefore, this is one of the core areas of research. Researchers are challenged... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Networks-on-Chip: Challenges, trends and mechanisms for enhancements

    Publication Year: 2009 , Page(s): 57 - 62
    Cited by:  Papers (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (2013 KB) |  | HTML iconHTML  

    The rate of increase of silicon capacity in integrated circuits (IC) will enable system integration of several billion transistors to reside on a single chip in the near future. Future system-on-chip (SoC) systems must therefore integrate up to several hundreds of cores within a single chip, and SoC designs will employ on-chip communication networks (NoCs) as a result. This paper discusses the pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal modeling of trust in Semantic Grid Registry

    Publication Year: 2009 , Page(s): 65 - 69
    Request Permissions | Click to expandAbstract | PDF file iconPDF (584 KB) |  | HTML iconHTML  

    In this paper we have analyzed and developed a formal specification of a trust model in semantic grid registry. This paper formalizes the basic requirements of a trust model in case of semantic grid registry. We have described the flow of operations of our system through links and processes in the system architecture. The system is formally modeled in pi-calculus. Finally we transformed the specif... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Overhead analysis of security implementation using IPSec

    Publication Year: 2009 , Page(s): 70 - 76
    Request Permissions | Click to expandAbstract | PDF file iconPDF (533 KB) |  | HTML iconHTML  

    Authentication, access control, encryption and auditing make up the essential elements of network security. Researchers have dedicated a large amount of efforts to implement security features that fully incorporate the use of all these elements. Currently, data networks mainly provide authentication and confidentiality services. Confidentiality alone is not able to protect the system, thus, suitab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new rough set based approach for optimized detection of available resources in Grid computing

    Publication Year: 2009 , Page(s): 77 - 82
    Request Permissions | Click to expandAbstract | PDF file iconPDF (799 KB) |  | HTML iconHTML  

    Since the grid is a dynamic environment, the prediction and detection of available resources in near future is important for resource scheduling. Economic-based grid management has been viewed as a feasible approach to carry out fair, efficient and reliable scheduling. One key issue in economic-based grid strategy is to inform about available resources. In this paper, we present a novel predictabl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assessment of node density in Cartesian Ad hoc Routing Protocols (CARP)

    Publication Year: 2009 , Page(s): 83 - 87
    Request Permissions | Click to expandAbstract | PDF file iconPDF (596 KB) |  | HTML iconHTML  

    With the rapid development in the geographical positioning system (GPS) technology, the geographical routing category of the MANET protocols has recently been a hot research area. The Cartesian Ad hoc Routing Protocols (CARP) are a set of three adaptive and connectionless protocols that address the problem of routing and power consumption in MANET. These protocols are used to limit the number of f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal Fractional Frequency Reuse (FFR) and resource allocation in multiuser OFDMA system

    Publication Year: 2009 , Page(s): 88 - 92
    Cited by:  Papers (12)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (502 KB)  

    In this paper we determine the optimal fractional frequency reuse (FFR) and resource allocation in OFDMA system. Since the users at the cell edge are more exposed to inter-cell interference therefore each cell is partitioned into two regions; inner region and outer region. We determine the optimal FFR factor for the outer region, bandwidth assigned to each region and subcarrier and power allocatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of symmetric cryptosystem using matrices with less overhead on communication channel

    Publication Year: 2009 , Page(s): 93 - 97
    Request Permissions | Click to expandAbstract | PDF file iconPDF (546 KB) |  | HTML iconHTML  

    Many systems have been developed by mathematicians using symmetric and Asymmetric Cryptography e.g. Ceaser Cipher, Stream Ciphers, RSA, DES, IDEA, RC-4, ElGamal signatures, LFSR, Ext. Euclidean Algorithm, Lamport Signatures, Merkle Hellman Knapsack. Etc [1]. Some of them are very strong to be broken by cryptanalysts. Some are very easy and even can be broken by the measuring the frequency of alpha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved Secure Network Authentication Protocol (ISNAP) for IEEE 802.16

    Publication Year: 2009 , Page(s): 101 - 105
    Cited by:  Papers (4)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (655 KB) |  | HTML iconHTML  

    Security is amongst one of the major issues in broadband wireless access (BWA) networks. After the launch of the IEEE 802.16 standard (WiMAX), a number of security issues were reported in several articles. Ever since the beginning, work has been in progress for the neutralization of these identified threats. In this paper, the analysis of the authentication protocols implemented in WiMAX has been ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated Frequency Distribution, Management & Assignment (AFDMA) in IEEE 802.16

    Publication Year: 2009 , Page(s): 106 - 111
    Request Permissions | Click to expandAbstract | PDF file iconPDF (939 KB) |  | HTML iconHTML  

    Frequency is amongst the most exclusive and most costly resources in wireless communication networks, especially, while considering the demands of broadband wireless access (BWA). In BWA, the management of frequency distribution and its effective utilization is of utmost importance. This research explores possible ways to ensure the most effective allocation of bandwidth resources and their best p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Certificateless ID-based authentication using threshold signature for P2P MANETs

    Publication Year: 2009 , Page(s): 112 - 116
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (650 KB) |  | HTML iconHTML  

    As far as the security of MANET (mobile and ad hoc network) is concerned, it depends upon the secure authentication especially for P2P MANETs. Identity based encryption was introduced to construct Public Key without requiring a certificate. Therefore, certificateless authentication combined with threshold digital signature and efficient key generation using identities such as IP address, are the c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SPERT: A stateless protocol for energy-sensitive real-time routing for wireless sensor network

    Publication Year: 2009 , Page(s): 117 - 124
    Request Permissions | Click to expandAbstract | PDF file iconPDF (693 KB) |  | HTML iconHTML  

    Putting constraints on performance of a system in the temporal domain, some times turns right into wrong and update into outdate. These are the scenarios where apposite value of time inveterate in the reality. But such timing precision not only requires tightly scheduled performance constraints but also requires optimal design and operation of all system components. Any malfunctioning at any relev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Subjective decision making using type-2 fuzzy logic advisor

    Publication Year: 2009 , Page(s): 127 - 133
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (697 KB) |  | HTML iconHTML  

    In this paper, we present and compare two-stage type-2 fuzzy logic advisor (FLA) for subjective decision making in the domain of students' performance evaluation. We test our proposed model for evaluating students' performance in our computer science and engineering department at HBCC/KFUPM in two domains namely cooperating training and capstone/senior project assessment where we find these FLAs v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new hybrid agent-based modeling & simulation decision support system for breast cancer data analysis

    Publication Year: 2009 , Page(s): 134 - 139
    Cited by:  Papers (4)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (808 KB) |  | HTML iconHTML  

    In this paper, we present a novel technique of building hybrid decision support systems which integrates traditional decision support systems with agent based models for use in breast cancer analysis for better prediction and recommendation. Our system is based on using queries from data (converted to a standardized electronic template) to provide for simulation variables in an agent-based model. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.