By Topic

Frontiers of Information Technology (FIT), 2011

Date 19-21 Dec. 2011

Filter Results

Displaying Results 1 - 25 of 69
  • [Front cover]

    Publication Year: 2011, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (1126 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2011, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (18 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2011, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (124 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):v - x
    Request permission for commercial reuse | PDF file iconPDF (154 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2011, Page(s):xi - xii
    Request permission for commercial reuse | PDF file iconPDF (86 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizers

    Publication Year: 2011, Page(s):xiii - xiv
    Request permission for commercial reuse | PDF file iconPDF (88 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2011, Page(s):xv - xxi
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2011, Page(s): xxii
    Request permission for commercial reuse | PDF file iconPDF (89 KB)
    Freely Available from IEEE
  • Evaluating Contact-Ignorant and History-Based Routing Protocols of Disrupted Mobile Networks

    Publication Year: 2011, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (386 KB) | HTML iconHTML

    Disrupted and disconnected networks cannot utilize traditional routing protocols due to long delays and frequent disconnections. It is from the start of this decade that proposition of routing protocols, capable of communicating data in disrupted networks, have been started. These routing protocols either suffer from high data delivery latency or lays undue burden upon the already stressed environ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fully Distributed Cooperative Spectrum Sensing for Cognitive Radio Ad Hoc Networks

    Publication Year: 2011, Page(s):9 - 13
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    Cognitive radios are indispensable to shift from conventional spectrum assignment to dynamic spectrum access. These are intelligent radios having the capability of sensing the radio environment and reconfiguring the operating parameters dynamically. Recently cognitive radios are considered for ad hoc environment. Cognitive radio ad hoc network have several unique features other than inherited feat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Delay-Scheduler Coupled Game Theoretic Resource Allocation Scheme for LTE Networks

    Publication Year: 2011, Page(s):14 - 19
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (445 KB) | HTML iconHTML

    LTE standard defines classes with granular requirements in order to provide QoS with fast connectivity and high data rates. The basic Release-8 of LTE and the subsequent modifications do not specify any scheduling algorithm making the task of improving user satisfaction more difficult. In our work, we proposed a two-level scheduler with game theoretic application that distributes resources among c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Robust Approaches to the Semidefinite Relaxation Detector

    Publication Year: 2011, Page(s):20 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    The semi definite relaxation detector is one of several approaches to quasi-maximum likelihood detection that have been proposed in the literature. This detector can provide near maximum likelihood performance at polynomial time complexity thereby sparking the interest of the research community. In this work, we investigate how the semi definite relaxation detector can be made robust to model/chan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assessment and Support for Software Capstone Projects at the Undergraduate Level: A Survey and Rubrics

    Publication Year: 2011, Page(s):25 - 32
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (236 KB) | HTML iconHTML

    Software engineering and computer science students conduct a capstone project during the final year of their degree programs. These projects are essential in validating that students have gained required knowledge and they can synthesize and use that knowledge to solve real world problems. However, the external requirements on educational programs often do not provide detailed guidelines for how t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SBVR2UML: A Challenging Transformation

    Publication Year: 2011, Page(s):33 - 38
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    UML is a de-facto standard used for generating the software models. UML support visualization of the software artifacts. To generate a UML diagram, a software engineer has to collect software requirements in a natural language (such as English) or a semi-formal language (such as SBVR), manually analyze the requirements and then manually generate the class diagrams in an available CASE tool. Howeve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Systematic Review on Software Measurement Programs

    Publication Year: 2011, Page(s):39 - 44
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (243 KB) | HTML iconHTML

    Most of the measurement programs fail to achieve targeted goals. This paper presents outcomes of systematic review on software measurement programs. The aim of the study is to analyse goal based measurement models/frameworks applications/tools and success factors. 1579 research studies were reviewed in the beginning and on basis of predefined criteria 28 studies were chosen for analysis. The selec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Factors Influencing Adoption of Information Technology Based Banking Services: A Case Study of Pakistan

    Publication Year: 2011, Page(s):45 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (238 KB) | HTML iconHTML

    The purpose of this study is to examine factors that positively influence users to adopt latest banking services which are based on information technology (IT). The study focus on three main banking services, internet banking (IB), phone banking (PB) and ATM because latest statistics show that Pakistani population has rapidly accepted these three services, compared to other IT services provided by... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Application of Markov Jump Process Model for Activity-Based Indoor Mobility Prediction in Wireless Networks

    Publication Year: 2011, Page(s):51 - 56
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    One of the most important objectives of a wireless network is to facilitate a prediction of users mobility regardless of their point of attachment to the network. In indoor environments the effective users motion prediction system and wireless localization technology play an important role in all aspects of peoples daily lives. In this paper we propose an activity-based continuous-time Markov mode... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network Performance Optimization: A Case Study of Enterprise Network Simulated in OPNET

    Publication Year: 2011, Page(s):57 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    Designing an efficient network to achieve desirable performance is a challenging task and it becomes more demanding if the network to be optimized for performance is already deployed and operational. In this paper, a case study of a campus network which is operational has been considered to enhance the network performance. Campus network of COMSATS Institute of Information Technology Islamabad, Pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolution of Orthogonal Frequency Division Multiplexing Modulation to Discrete Wavelet Multitone

    Publication Year: 2011, Page(s):63 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (274 KB) | HTML iconHTML

    Orthogonal frequency division multiplexing (OFDM) was proposed in literature as a measure to counter inter-symbol interference (ISI). OFDM has been standardized in various IEEE standards, such as wireless LANS, digital audio broadcasting etc. However, OFDM has a few disadvantages, concerned with the addition of redundant data in cyclic-prefix that it carries. Moreover, its high side-lobes result i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Pervasive Nature of Variability in SOC

    Publication Year: 2011, Page(s):69 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (441 KB) | HTML iconHTML

    Service-oriented computing has gained attention from researchers and industry due to various benefits. Enterprises are supported by SOC-based solutions. Enterprise requirements change with the customer needs, market conditions, and variability is often needed in SOC. Research usually focuses at variability on the business process level and ignores variability at other layers. In this paper, we sho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detect HTTP Specification Attacks Using Ontology

    Publication Year: 2011, Page(s):75 - 78
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (381 KB) | HTML iconHTML

    Web applications after their revolutionary advent and popularity are target of variety of attacks. Magnitude and complexity of attacks is continuously growing with every minute development in World Wide Web. There are plenty of web attack detection techniques but they cannot fully comprehend the required degree of security for complex web applications. The reasons include static nature of attack d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Polymorphic Circuit Design for Speedy Handwritten Character Recognition Using Cartesian Genetic Programming

    Publication Year: 2011, Page(s):79 - 84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (386 KB) | HTML iconHTML

    In this paper we have used CGP (Cartesian Genetic Programming) to obtain an optimum polymorphic circuit for speedy recognition of hand written characters. Images are converted to binary form and arranged in one-dimension array. This data is fed, in parallel, to the system. Experiments have demonstrated that promising results can be obtained using a much simpler circuit having 1-bit multiplexers. A... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Palm Print Recognition Using Oriented Hausdorff Distance Transform

    Publication Year: 2011, Page(s):85 - 88
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (345 KB) | HTML iconHTML

    Out of various biometrics being used for personal recognition, palm-print matching has gained vast acceptance due to its reliability and practicability. This paper proposes a robust palm-print recognition algorithm for human identification. The algorithm is based on Robust Oriented Hausdorff Similarity (ROHS) measure. The use of ROHS in matching is comparatively more tolerant to noise and occlusio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Image Retrieval Based on Quantized Histogram Texture Features in DCT Domain

    Publication Year: 2011, Page(s):89 - 94
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (774 KB) | HTML iconHTML

    Huge number of images is available on the internet. Efficient and effective retrieval system is needed to retrieve these images by the contents or features of the images like color, texture and shape. This system is called content based image retrieval (CBIR). Conventionally features are extracted from images in pixel domain. But at present almost all images are represented in compressed form usin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.