By Topic

Frontiers of Information Technology (FIT), 2011

Date 19-21 Dec. 2011

Filter Results

Displaying Results 1 - 25 of 69
  • [Front cover]

    Publication Year: 2011 , Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (1126 KB)  
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2011 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (18 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2011 , Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (48 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (124 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011 , Page(s): v - x
    Save to Project icon | Request Permissions | PDF file iconPDF (154 KB)  
    Freely Available from IEEE
  • Preface

    Publication Year: 2011 , Page(s): xi - xii
    Save to Project icon | Request Permissions | PDF file iconPDF (86 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Organizers

    Publication Year: 2011 , Page(s): xiii - xiv
    Save to Project icon | Request Permissions | PDF file iconPDF (88 KB)  
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2011 , Page(s): xv - xxi
    Save to Project icon | Request Permissions | PDF file iconPDF (109 KB)  
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2011 , Page(s): xxii
    Save to Project icon | Request Permissions | PDF file iconPDF (89 KB)  
    Freely Available from IEEE
  • Evaluating Contact-Ignorant and History-Based Routing Protocols of Disrupted Mobile Networks

    Publication Year: 2011 , Page(s): 1 - 8
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (386 KB) |  | HTML iconHTML  

    Disrupted and disconnected networks cannot utilize traditional routing protocols due to long delays and frequent disconnections. It is from the start of this decade that proposition of routing protocols, capable of communicating data in disrupted networks, have been started. These routing protocols either suffer from high data delivery latency or lays undue burden upon the already stressed environment. The paper explains some of the prominent disruption tolerant routing protocols via algorithms and compares their performances with respect to average load laid upon a network in terms of number of bundle copies generated, number of contacts utilized during message delivery, average delivery rate and data delivery latency. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fully Distributed Cooperative Spectrum Sensing for Cognitive Radio Ad Hoc Networks

    Publication Year: 2011 , Page(s): 9 - 13
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (312 KB) |  | HTML iconHTML  

    Cognitive radios are indispensable to shift from conventional spectrum assignment to dynamic spectrum access. These are intelligent radios having the capability of sensing the radio environment and reconfiguring the operating parameters dynamically. Recently cognitive radios are considered for ad hoc environment. Cognitive radio ad hoc network have several unique features other than inherited features of ad hoc network like distributed multi-hop architecture, variant network topology and opportunistic spectrum availability. It is required for cognitive radio to find unutilized portion of the spectrum more accurately for successful deployment of cognitive radio ad hoc networks. In cooperative spectrum sensing, multiple cognitive radio users cooperate to detect the presence or absence of primary user to improve the detection performance. Ad hoc networks are dynamic in nature and have no central entity for data fusion. Therefore cognitive radio ad hoc networks need fully distributed cooperative spectrum sensing. In this paper, a gradient based fully distributed cooperative spectrum sensing is proposed for cognitive radio ad hoc networks. The proposed scheme is analyzed from the perspective of reliable sensing and energy consumption. Simulation results show the effectiveness of the proposed scheme. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Delay-Scheduler Coupled Game Theoretic Resource Allocation Scheme for LTE Networks

    Publication Year: 2011 , Page(s): 14 - 19
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (445 KB) |  | HTML iconHTML  

    LTE standard defines classes with granular requirements in order to provide QoS with fast connectivity and high data rates. The basic Release-8 of LTE and the subsequent modifications do not specify any scheduling algorithm making the task of improving user satisfaction more difficult. In our work, we proposed a two-level scheduler with game theoretic application that distributes resources among classes with fairness and then implements a delay based scheduler to satisfy the strict levels of delay budget requirements of LTE classes. A coalition is formed between different class flows by use of bargaining cooperative game that allows for distribution of physical resource blocks in a fair manner via Shapely function. The delay based scheduler checks and compares users packet delay in a service class to make scheduling decisions in the downlink utilizing recent user reported channel conditions. Simulation results carried out with key performance matrices like packet loss ratio, throughput, fairness index and system delay prove the effectiveness of the proposed approach as compared to Exponential Rule, Proportional Fair and M-LWDF algorithms and its usefulness for supporting both real time and non-real time traffic is verified. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Robust Approaches to the Semidefinite Relaxation Detector

    Publication Year: 2011 , Page(s): 20 - 24
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (235 KB) |  | HTML iconHTML  

    The semi definite relaxation detector is one of several approaches to quasi-maximum likelihood detection that have been proposed in the literature. This detector can provide near maximum likelihood performance at polynomial time complexity thereby sparking the interest of the research community. In this work, we investigate how the semi definite relaxation detector can be made robust to model/channel uncertainties. Several models of uncertainty are studied and some plausible techniques of making the semi definite relaxation detector robust to these uncertainties are described. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assessment and Support for Software Capstone Projects at the Undergraduate Level: A Survey and Rubrics

    Publication Year: 2011 , Page(s): 25 - 32
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (236 KB) |  | HTML iconHTML  

    Software engineering and computer science students conduct a capstone project during the final year of their degree programs. These projects are essential in validating that students have gained required knowledge and they can synthesize and use that knowledge to solve real world problems. However, the external requirements on educational programs often do not provide detailed guidelines for how to conduct or support these capstone projects, which may lead to variations among universities. This paper presents the results from a survey conducted at 19 different Pakistani universities of the current management practices and assessment criteria used for the capstone project courses at Undergraduate level. Based upon the results of this survey and similar work on Master Thesis capstone projects in Sweden, we present assessment rubrics for software-related undergraduate capstone projects. We also present recommendations for the continuous improvement of capstone projects. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SBVR2UML: A Challenging Transformation

    Publication Year: 2011 , Page(s): 33 - 38
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (265 KB) |  | HTML iconHTML  

    UML is a de-facto standard used for generating the software models. UML support visualization of the software artifacts. To generate a UML diagram, a software engineer has to collect software requirements in a natural language (such as English) or a semi-formal language (such as SBVR), manually analyze the requirements and then manually generate the class diagrams in an available CASE tool. However, by automatically transforming SBVR Software requirements to UML can seriously share burden of a system analyst and can improve the quality and robustness of software modeling phase. The paper demonstrates the challenging aspect of model transformation from SBVR to UML. The presented approach takes input the software requirements specified in SBVR syntax, parses the input specification, extracts the UML ingredients such as classes, methods, attributes, associations, etc and finally generate the visual representation of the extracted information. The presented approach is fully automated. The presented approach is explained via an example. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Systematic Review on Software Measurement Programs

    Publication Year: 2011 , Page(s): 39 - 44
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (243 KB) |  | HTML iconHTML  

    Most of the measurement programs fail to achieve targeted goals. This paper presents outcomes of systematic review on software measurement programs. The aim of the study is to analyse goal based measurement models/frameworks applications/tools and success factors. 1579 research studies were reviewed in the beginning and on basis of predefined criteria 28 studies were chosen for analysis. The selection of research studies was done on the basis of structured procedure of systematic review. Outcome of this study consists of observations and suggestions on the basis of analysis of selected studies. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Factors Influencing Adoption of Information Technology Based Banking Services: A Case Study of Pakistan

    Publication Year: 2011 , Page(s): 45 - 50
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (238 KB) |  | HTML iconHTML  

    The purpose of this study is to examine factors that positively influence users to adopt latest banking services which are based on information technology (IT). The study focus on three main banking services, internet banking (IB), phone banking (PB) and ATM because latest statistics show that Pakistani population has rapidly accepted these three services, compared to other IT services provided by banks. The basic constructs of Technology Acceptance Model (TAM) along with other constructs are employed to study the cause of rapid acceptance of these banking technologies. A survey is conducted in twin cities of Islamabad and Rawalpindi by distributing a questionnaire to customers of four different banks. The study shows that the intention to use the service is mainly due to trust in the service provided by banks. Results of this empirical study also reveal that factors affecting customers' intention to use the technology are not same for the three banking technologies. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Application of Markov Jump Process Model for Activity-Based Indoor Mobility Prediction in Wireless Networks

    Publication Year: 2011 , Page(s): 51 - 56
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (312 KB) |  | HTML iconHTML  

    One of the most important objectives of a wireless network is to facilitate a prediction of users mobility regardless of their point of attachment to the network. In indoor environments the effective users motion prediction system and wireless localization technology play an important role in all aspects of peoples daily lives. In this paper we propose an activity-based continuous-time Markov model to define and predict the human movement patterns. This model is a simple extension of an Activity based Mobility Prediction algorithm using Markov modeling (AMPuMM) technique. Both models are experimentally evaluated in realistic small university campus scenario. The obtained results show us the high efficiency of the jump methodology in the prediction of the students activities in the indoor campus environment. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network Performance Optimization: A Case Study of Enterprise Network Simulated in OPNET

    Publication Year: 2011 , Page(s): 57 - 62
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (254 KB) |  | HTML iconHTML  

    Designing an efficient network to achieve desirable performance is a challenging task and it becomes more demanding if the network to be optimized for performance is already deployed and operational. In this paper, a case study of a campus network which is operational has been considered to enhance the network performance. Campus network of COMSATS Institute of Information Technology Islamabad, Pakistan has been analyzed which provides local and internet connectivity to approximately 1200 nodes, the problems in the existing network has been identified with the aim to enhance network performance without incorporating additional hardware cost. OPNET Modeler 14.5 simulator has been used to first implement the entire network infrastructure and then a new design for CIIT network has been proposed which provides better performance. The simulation results of both the existing and proposed networks have been compared, it could be observed that the proposed design significantly performs better especially in terms of aggregated throughput of Wireless Local Area Network. The proposed network design also outperforms the existing approach in different parameters such as Ethernet delay and WLAN load by approximately 26% and 19% respectively. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolution of Orthogonal Frequency Division Multiplexing Modulation to Discrete Wavelet Multitone

    Publication Year: 2011 , Page(s): 63 - 68
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (274 KB) |  | HTML iconHTML  

    Orthogonal frequency division multiplexing (OFDM) was proposed in literature as a measure to counter inter-symbol interference (ISI). OFDM has been standardized in various IEEE standards, such as wireless LANS, digital audio broadcasting etc. However, OFDM has a few disadvantages, concerned with the addition of redundant data in cyclic-prefix that it carries. Moreover, its high side-lobes result in significant signal interference. Therefore, a variant of OFDM, namely Discrete Wavelet Multi-tone (DWMT) in wire line and Wavelet OFDM (WOFDM) in wireless channel was proposed in recent history. We have outlined the motivation behind this evolution from OFDM to WOFDM, and have given an overview of its performance analysis as discussed in literature. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Pervasive Nature of Variability in SOC

    Publication Year: 2011 , Page(s): 69 - 74
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (441 KB) |  | HTML iconHTML  

    Service-oriented computing has gained attention from researchers and industry due to various benefits. Enterprises are supported by SOC-based solutions. Enterprise requirements change with the customer needs, market conditions, and variability is often needed in SOC. Research usually focuses at variability on the business process level and ignores variability at other layers. In this paper, we show what kind of variability can occur and how it spans across all layers of SOC. We present some example scenarios to discuss different kinds of variability and their reasons in SOC environments. Finally, we classify variability to show that variability is not an isolated problem in a single layer. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detect HTTP Specification Attacks Using Ontology

    Publication Year: 2011 , Page(s): 75 - 78
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (381 KB) |  | HTML iconHTML  

    Web applications after their revolutionary advent and popularity are target of variety of attacks. Magnitude and complexity of attacks is continuously growing with every minute development in World Wide Web. There are plenty of web attack detection techniques but they cannot fully comprehend the required degree of security for complex web applications. The reasons include static nature of attack detection mechanism, lack of expressiveness in attack detection rules, and absence of reasoning capability to detect unanticipated ways an attack can be launched. To cater these issues, a formal approach is required that has more expressiveness and equipped with reasoning. These traits are fully adhered to by the Semantic techniques. This paper introduces an approach for utilizing Semantic techniques in web application security. This has never been introduced previously to the best of our knowledge. Here the HTTP Protocol ontology is presented to mitigate the communication protocol attacks. In this paper we are focusing on communication protocol attacks including abnormal HTTP messages, HTTP request smuggling and HTTP response splitting. While dealing with these attacks, the proposed technique outperforms the existing solutions with higher detection rate and low false positives as indicated by evaluation results. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Polymorphic Circuit Design for Speedy Handwritten Character Recognition Using Cartesian Genetic Programming

    Publication Year: 2011 , Page(s): 79 - 84
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (386 KB) |  | HTML iconHTML  

    In this paper we have used CGP (Cartesian Genetic Programming) to obtain an optimum polymorphic circuit for speedy recognition of hand written characters. Images are converted to binary form and arranged in one-dimension array. This data is fed, in parallel, to the system. Experiments have demonstrated that promising results can be obtained using a much simpler circuit having 1-bit multiplexers. All the experiments are conducted without any pre-processing and image is being fed in parallel to the system, thus reducing complexity of the circuit and time for recognition enormously. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Palm Print Recognition Using Oriented Hausdorff Distance Transform

    Publication Year: 2011 , Page(s): 85 - 88
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (345 KB) |  | HTML iconHTML  

    Out of various biometrics being used for personal recognition, palm-print matching has gained vast acceptance due to its reliability and practicability. This paper proposes a robust palm-print recognition algorithm for human identification. The algorithm is based on Robust Oriented Hausdorff Similarity (ROHS) measure. The use of ROHS in matching is comparatively more tolerant to noise and occlusion as compared to the traditional Hausdorff distance based matching. A region of interest (128×128) is extracted from the original image and ROHS based matching is performed. The experimental results demonstrate the practicability of this algorithm. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Image Retrieval Based on Quantized Histogram Texture Features in DCT Domain

    Publication Year: 2011 , Page(s): 89 - 94
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (774 KB) |  | HTML iconHTML  

    Huge number of images is available on the internet. Efficient and effective retrieval system is needed to retrieve these images by the contents or features of the images like color, texture and shape. This system is called content based image retrieval (CBIR). Conventionally features are extracted from images in pixel domain. But at present almost all images are represented in compressed form using DCT (Discrete Cosine Transformation) blocks transformation. Some critical information is removed in compression and only perceptual information is left which has significant attraction for information retrieval in compressed domain. In this paper we study the problem that how to retrieve perceptual information in compressed domain JPEG such that to improve image retrieval. Our approach is based on quantized histogram statistical texture features in DCT blocks. We show that to get best image retrieval performance by extracting the statistical texture features of quantized histogram in DCT blocks using JPEG compressed format images. Experiments on the Corel animal database using the proposed approach, give results which show that the statistical texture features of histogram are robust in retrieval of images. This shows that texture features in local compression is a significant step for effective image retrieval. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.