The Second International Conference on Communications and Information Technology

Displaying 1-40 of 51 results

  • White Papers // Feb 2012

    An Implementation of a MATLAB Compiler for Matrix Processors

    Not only did the compiler writers have to track new language features, they also had to devise translation algorithms that would take maximal advantage of the modern processors capabilities. This paper implements a compiler for Mat-Core processor, where applications written in MATLAB are compiled into sequences of scalar/vector/matrix instructions to...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    A Review of Time Domain Switching Optical Burst Switched Networks

    Optical networks are in continuous demand for their large bandwidth availability. Many optical switching paradigms have been proposed. Among these paradigms, three of them have received more attention from scientists and researchers in this field. These three paradigms are: Optical Circuit Switching(OCS), Optical Packet Switching (OPS) and Optical Burst Switching...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Software Engineering Using Artificial Intelligence Techniques: Current State and Open Problems

    This paper surveys the application of artificial intelligence approaches to the software engineering processes. These approaches can have a major impact on reducing the time to market and improving the quality of software systems in general. Existing survey papers are driven by the AI techniques used, or are focused on...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    CampusCloud: Aggregating Universities Computing Resources in Ad-Hoc Clouds

    Cloud Computing has recently emerged as a new computing paradigm based on the concept of virtualization with the goal of creating a shared and highly scalable computing infrastructure from aggregated physical resources to deliver seamless and on-demand provisioning of software, hardware, and data as services. Universities typically have large amounts...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Enhancement of Zero Cross Correlation Code for Optical CDMA Network System

    Many codes have been proposed for the Spectral Amplitude Coding (SAC) Optical Code Division Multiple Access (OCDMA) systems that has variable weights of greater than two. The best cross correlation property of these codes can only achieve a minimum cross correlation of one. To satisfy this, the authors had developed...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    A New Family of Two-Dimensional Modified Doubled Weight Code Optical Code Division Multiple Access for Capacity Enhancement

    The performance of a newly developed spectral/spatial Two-Dimensional (2-D) Optical Code Division Multiple Access (OCDMA) Modified Double Weight (MDW) code is presented. Through MUI cancellation properties, the proposed new 2-D MDW code can suppress the Phase Induced Intensity Noise (PIIN) and eliminating Multiple User Interference (MUI). The result analysis indicates...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    A Protocol Stack Architecture for Optical Network-on-Chip

    As the Optical Network-on-Chip (ONoC) becomes a candidate solution for the communication infrastructure of the Systems-on-Chip (SoC), the development of proper hierarchical models and tools for its design and analysis, specific to its heterogeneous nature, becomes a necessity. This paper presents a novel protocol stack architecture for the ONoC. The...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    MANETs Indoor Performance Analysis Under the Influence of Dynamic Propagation Path Loss Conditions

    In this paper, the authors have analyzed the performance of a Mobile Ad-hoc NETwork (MANET) for two routing strategies (i.e., Adhoc On-demand Distance Vector Routing (AODV) and Optimised Link State Routing (OLSR)) under various indoor channel propagation conditions. Two new propagation pathloss models (i.e., ITU & WINNER) were incorporated into...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Cloud Computing and Grid Computing for the Smart and Green Information Systems

    The increased availability of high speed internet and corporate IP connections is enabling the delivery of new network based services which include processing jobs, storage and application based. Most of the services are still being used by procuring hardware at individual and corporate level. Cloud computing potentially offers an overall...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Protocol Design and Implementation of Vehicular Ad-Hoc Networks

    Vehicular Ad-hoc NETworks (VANETs) incorporate vehicle-to-vehicle and vehicle-to-infrastructure communication to provide a host of applications which aim to provide, among other things, a reduction in traffic congestion, accident detection and entertainment. In this paper, the authors describe a small scale experimental model in which they have implemented two major applications...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Analysis of Byzantine Attacks in Adhoc Networks and Their Mitigation

    Ad hoc networking somewhat differs from more traditional approaches, the security aspects that are valid in the networks of the past are not fully applicable in the networks. Ad hoc networks suffer from all weather attacks which may come from any node in the network. In this paper, the authors...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Bees Life Algorithm for Job Scheduling in Cloud Computing

    Cloud computing is known as digital service delivery over the Internet by several applications which are carried out by computer systems in distributed datacenters. It supplies a high performance computing based on protocols which allow shared computation and storage over long distances. In this paper, the authors present a new...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    A Specific Fuzzy Genetic Algorithm for Intrusion Detection

    The Intrusion Detection Systems (IDS) are becoming indispensable for effective protection against attacks that are constantly changing in magnitude and complexity. This paper proposes a Fuzzy Genetic Algorithm (FGA) for intrusion detection. The FGA system is a fuzzy classifier, whose knowledge base is modeled as a fuzzy rule such as...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Data Migration: Connecting Databases in the Cloud

    The introduction of new technologies, architectures and systems or organizational restructuring often requires a company to reorganize its databases either by transferring data from old applications to the new ones, or reorganize data in an existing application according to the new organizational structure. Migration of data, services, and processes to...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Challenges of Using Consensus Protocol in Cloud Computing

    Since, more aspects of work and personal life move online and the Internet becomes a platform for virtual human society, a new paradigm of large-scale distributed computing has emerged which is known as cloud computing. Cloud computing is also the development of parallel computing, distributed computing and grid computing. Storage...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    An Adaptive Approach for Facial Expression Recognition System

    Facial expressions are non-verbal signs that play important role to provide complete meaning in human communication. While humans can easily comprehend the facial expressions, it is not valid for the computers. Therefore, the researchers are still working on developing reliable facial expression recognition systems. In this paper, the analysis of...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    A Promising Digital-Based Radio Network Over IP

    This paper illustrates the major software and hardware issues associated with a promising digital-based radio network station established in the Hashemite University (HU). The project can be considered as new and simple way to limited broadcasts. Modern broadcasting techniques are to be used; Stereo FM and HTTP stream broadcasting. This...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Multimodal Biometric Person Recognition System Based on Iris and Palmprint Using Correlation Filter Classifier

    Biometric system has been actively emerging in various industries for the past few years, and it is continuing to roll to provide higher security features for access control system. Many types of uni-modal biometric systems have been developed. However, these systems are only capable to provide low to middle range...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Performance Evaluation of Delay-Sensitive Services Over the Internet Using Multipath Routing

    In recent years, there has been a phenomenal growth in the commercial deployment of delay-sensitive services, such as voice and video services, over the Internet Protocol. Regardless of the advances that have been witnessed in networking technologies, effectively utilizing the network resources to accommodate such services remains a major and...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Pixel-Value Differencing Steganography: Attacks and Improvements

    Hiding confidential data in digital images using the Pixel-Value Differencing (PVD) method provide higher embedding capacity without very noticeable artifacts in the cover image to human eyes. However, the presence of hidden data can be revealed by a number of automatic approaches that can detect variations in statistical properties of...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Vulnerability Assessment for Mission Critical Networks Against Region Failures: A Case Study

    Communications networks nowadays are facing potential threats due to natural disasters such as earthquakes or floods. Moreover, it is also vulnerable to human attacks. Such natural and physical events may result in large scale concurrent region failures. Therefore, the traditional theories of link failure analysis are no longer valid. In...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Performance Evaluation of a Simplified Matrix Processor

    Data parallel applications are growing in importance and demanding increased performance from hardware. Since, the fundamental data structures for a wide variety of data-parallel applications are scalar, vector, and matrix, this paper describes the authors' proposed Simple Matrix Processor (SMP) for executing scalar/vector/matrix instructions and evaluates its performance. SMP extends...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    ASERTN: A Dynamic Testing Tool for Java Based Software Agent

    Testing is an essential activity in software engineering. It is a process of observing the execution of a software system to validate whether it behaves as intended and identifies errors that sometimes can result in large financial losses or bodily harm. Agents have been recognized as a promising technology to...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Application of IDMA Anti-Collision Algorithm in RFID Networks

    This paper presents a novel algorithm with IDMA (Interleave Division Multiple Access) scheme to resolve the anti collision problem for RFID (Radio Frequency IDentification). IDMA which can be regarded as a special case of CDMA (Code Division Multiple Access), allows a very simple chip-by-chip iterative detection strategy which cost (per...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    A Fuzzy Cross-Layer Method to Improve the Quality of Service in Uplink Multimedia Transmissions in WiMAX

    WiMAX is a wireless standard that allows the establishment of a broadband connection with high throughput. IEEE802.16 provides high bandwidth and range, while implementing and operating costs low, and as a serious item to replace wired networks T1 and DSL is considered. On the other hand, the authors witness the...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    2D and 3D Graphical Visualization of Teeth Surface Based on the Fiber Optic Intensity Modulation Technique

    A simple, low cost, 2D and 3D graphical visualization system of teeth surfaces is presented which employs a fiber optic intensity modulation technique. The use of a graphical visualization system for acquiring the tooth surface profile has many applications in the dental and biomedical research area. Analyzes of results are...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    A New Vector Quantization Attack on Self-Recovery Image Authentication

    In this paper, a new Vector Quantization (VQ) attack that is applicable on self-recovery image authentication is proposed. In the proposed counterfeiting attack, the codebook is developed to contain authenticated blocks with their encrypted codes and displacement vector(s). To fabricate a counterfeit image that can pass the verification process as...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Robust Visual Hashing for Image Authentication

    In this paper, secure and robust image (visual) hashing based on the Discrete Wavelet Transform (DWT) and Non-negative Matrix Factorization (NMF) is proposed. In the proposed method, the considered image is undergone preprocessing manipulations. Then, the DWT is applied on the preprocessed image to generate image features that are largely...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Secure Object-Based Image Coding Scheme

    A secure perceptually motivated object/region-based image coding scheme with effective selective encryption is proposed. An image is represented by an edge image (extracted using a robust morphological edge detection technique), binary mask (identifying arbitrary shaped image objects), and residual image (representing the error after edge-interpolation). The binary mask is encoded...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    The Impact of Radio Network Planning and Site Configuration on the WCDMA Network Capacity and Coverage Area

    The Third Generation (3G) cellular system offers high data rate services compared with 1G and 2G systems. The planners must utilize all possible resources to improve capacity and coverage area for the cellular network. The aim of this paper to investigate the Third Generation (3G) cellular system offers high data...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    A Novel Quality Model for UML Models

    One of the most expensive and important phase in software system life cycle is the maintenance. At this stage change may cause serious quality problems. Although, many approaches have been already proposed at a source code level to improve quality of final software product, but those are not enough to...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Identification of Highly Jittered Radar Emitters: Issues on Low Cost Embedded Design

    This paper presents efforts toward design of radar identification system for highly jittered radar emitters. The paper first provides a mathematical background of clustering techniques, and then presents a derivation of additional parameters, such as PRI, among mixed pulse sequence and, finally, discusses implementation of digital processing part on a...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Distributed Database Systems MANETS

    The mobile database system in a MANET is a dynamic distributed database system, which is composed of some mobile host. The key issues in MANETs for mobile database are: how to optimize mobile queries, cache and replicate data, manage transactions and routing. In this proposal, the authors wish to take...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Enhanced-MPR-CDS Approach for Self-Organization and Routing in WSNs

    Wireless sensor networks are poised to become a very significant enabling technology in many sectors. Already a few very low power wireless sensor platforms have entered the marketplace. Almost all of these platforms are designed to run on batteries that have a very limited lifetime. Recent advances in wireless sensor...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    MLDF: Discovering Mobile Learning Content Using Mobile Devices

    The emergence and development of mobile devices continue to improve the people living standards. In specific, mobile devices have become one of the most powerful technologies available to the individual for acquiring knowledge in a ubiquitous manner. However, such technology does not come without its challenges. One of these challenges...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Security Options for Personal Computer

    This paper describes new security methods that can be used to protect a Personal Computer (PC) and user's personal files and folders (items). The protection of the user's accounts is achieved by an encrypted passwords and the protection of the items is provided by Lock, Hide and Delete security options....

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Application of Six Sigma Approach in Predicting Functional Defects for System Testing

    The importance of knowing total number of defects to be found at the start of system testing phase has become significant element in software engineering practices towards achieving zero known post release defects of the software released to users. Defect prediction for testing demonstrates the initiative for test process improvement...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Unified Security, Trust and Privacy (STP) Protection for Future RFID System

    Future trend of RFID system is moving towards integration with other devices, and hence making it more pervasive. Though RFID technology brings countless benefits and it also comes with potential security and privacy threats. Integration and interconnection of RFID system with other devices may introduce security vulnerabilities which could be...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Mobility Management in Next Generation Networks: Analysis of Handover in Host and Network Based Mobility Protocols

    Mobile Internet Protocol (MIP) was introduced in Internet Protocol version 4(IPv4) and became an inbuilt part of the next generation network protocol-Internet Protocol version 6 (IPv6). Mobility protocols can be localized or global depending on the domain of the network. When global mobility protocols are used in managing localized mobility...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Evolutionary-Based Speaker Adaptation to Improve Interaction With RFID Networks in Noisy Environments

    This paper presents an innovative application which consists of providing a speech modality to allow the human operators of a Radio Frequency IDentification (RFID) network to communicate verbally with related devices and information systems. Within this application, the results of two contributions are reported. The first contribution is a new...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    An Implementation of a MATLAB Compiler for Matrix Processors

    Not only did the compiler writers have to track new language features, they also had to devise translation algorithms that would take maximal advantage of the modern processors capabilities. This paper implements a compiler for Mat-Core processor, where applications written in MATLAB are compiled into sequences of scalar/vector/matrix instructions to...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    A Review of Time Domain Switching Optical Burst Switched Networks

    Optical networks are in continuous demand for their large bandwidth availability. Many optical switching paradigms have been proposed. Among these paradigms, three of them have received more attention from scientists and researchers in this field. These three paradigms are: Optical Circuit Switching(OCS), Optical Packet Switching (OPS) and Optical Burst Switching...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Software Engineering Using Artificial Intelligence Techniques: Current State and Open Problems

    This paper surveys the application of artificial intelligence approaches to the software engineering processes. These approaches can have a major impact on reducing the time to market and improving the quality of software systems in general. Existing survey papers are driven by the AI techniques used, or are focused on...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    CampusCloud: Aggregating Universities Computing Resources in Ad-Hoc Clouds

    Cloud Computing has recently emerged as a new computing paradigm based on the concept of virtualization with the goal of creating a shared and highly scalable computing infrastructure from aggregated physical resources to deliver seamless and on-demand provisioning of software, hardware, and data as services. Universities typically have large amounts...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Enhancement of Zero Cross Correlation Code for Optical CDMA Network System

    Many codes have been proposed for the Spectral Amplitude Coding (SAC) Optical Code Division Multiple Access (OCDMA) systems that has variable weights of greater than two. The best cross correlation property of these codes can only achieve a minimum cross correlation of one. To satisfy this, the authors had developed...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    A New Family of Two-Dimensional Modified Doubled Weight Code Optical Code Division Multiple Access for Capacity Enhancement

    The performance of a newly developed spectral/spatial Two-Dimensional (2-D) Optical Code Division Multiple Access (OCDMA) Modified Double Weight (MDW) code is presented. Through MUI cancellation properties, the proposed new 2-D MDW code can suppress the Phase Induced Intensity Noise (PIIN) and eliminating Multiple User Interference (MUI). The result analysis indicates...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    A Protocol Stack Architecture for Optical Network-on-Chip

    As the Optical Network-on-Chip (ONoC) becomes a candidate solution for the communication infrastructure of the Systems-on-Chip (SoC), the development of proper hierarchical models and tools for its design and analysis, specific to its heterogeneous nature, becomes a necessity. This paper presents a novel protocol stack architecture for the ONoC. The...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    MANETs Indoor Performance Analysis Under the Influence of Dynamic Propagation Path Loss Conditions

    In this paper, the authors have analyzed the performance of a Mobile Ad-hoc NETwork (MANET) for two routing strategies (i.e., Adhoc On-demand Distance Vector Routing (AODV) and Optimised Link State Routing (OLSR)) under various indoor channel propagation conditions. Two new propagation pathloss models (i.e., ITU & WINNER) were incorporated into...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Cloud Computing and Grid Computing for the Smart and Green Information Systems

    The increased availability of high speed internet and corporate IP connections is enabling the delivery of new network based services which include processing jobs, storage and application based. Most of the services are still being used by procuring hardware at individual and corporate level. Cloud computing potentially offers an overall...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Protocol Design and Implementation of Vehicular Ad-Hoc Networks

    Vehicular Ad-hoc NETworks (VANETs) incorporate vehicle-to-vehicle and vehicle-to-infrastructure communication to provide a host of applications which aim to provide, among other things, a reduction in traffic congestion, accident detection and entertainment. In this paper, the authors describe a small scale experimental model in which they have implemented two major applications...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Analysis of Byzantine Attacks in Adhoc Networks and Their Mitigation

    Ad hoc networking somewhat differs from more traditional approaches, the security aspects that are valid in the networks of the past are not fully applicable in the networks. Ad hoc networks suffer from all weather attacks which may come from any node in the network. In this paper, the authors...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Bees Life Algorithm for Job Scheduling in Cloud Computing

    Cloud computing is known as digital service delivery over the Internet by several applications which are carried out by computer systems in distributed datacenters. It supplies a high performance computing based on protocols which allow shared computation and storage over long distances. In this paper, the authors present a new...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    A Specific Fuzzy Genetic Algorithm for Intrusion Detection

    The Intrusion Detection Systems (IDS) are becoming indispensable for effective protection against attacks that are constantly changing in magnitude and complexity. This paper proposes a Fuzzy Genetic Algorithm (FGA) for intrusion detection. The FGA system is a fuzzy classifier, whose knowledge base is modeled as a fuzzy rule such as...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Data Migration: Connecting Databases in the Cloud

    The introduction of new technologies, architectures and systems or organizational restructuring often requires a company to reorganize its databases either by transferring data from old applications to the new ones, or reorganize data in an existing application according to the new organizational structure. Migration of data, services, and processes to...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Challenges of Using Consensus Protocol in Cloud Computing

    Since, more aspects of work and personal life move online and the Internet becomes a platform for virtual human society, a new paradigm of large-scale distributed computing has emerged which is known as cloud computing. Cloud computing is also the development of parallel computing, distributed computing and grid computing. Storage...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    An Adaptive Approach for Facial Expression Recognition System

    Facial expressions are non-verbal signs that play important role to provide complete meaning in human communication. While humans can easily comprehend the facial expressions, it is not valid for the computers. Therefore, the researchers are still working on developing reliable facial expression recognition systems. In this paper, the analysis of...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    A Promising Digital-Based Radio Network Over IP

    This paper illustrates the major software and hardware issues associated with a promising digital-based radio network station established in the Hashemite University (HU). The project can be considered as new and simple way to limited broadcasts. Modern broadcasting techniques are to be used; Stereo FM and HTTP stream broadcasting. This...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Multimodal Biometric Person Recognition System Based on Iris and Palmprint Using Correlation Filter Classifier

    Biometric system has been actively emerging in various industries for the past few years, and it is continuing to roll to provide higher security features for access control system. Many types of uni-modal biometric systems have been developed. However, these systems are only capable to provide low to middle range...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Performance Evaluation of Delay-Sensitive Services Over the Internet Using Multipath Routing

    In recent years, there has been a phenomenal growth in the commercial deployment of delay-sensitive services, such as voice and video services, over the Internet Protocol. Regardless of the advances that have been witnessed in networking technologies, effectively utilizing the network resources to accommodate such services remains a major and...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Pixel-Value Differencing Steganography: Attacks and Improvements

    Hiding confidential data in digital images using the Pixel-Value Differencing (PVD) method provide higher embedding capacity without very noticeable artifacts in the cover image to human eyes. However, the presence of hidden data can be revealed by a number of automatic approaches that can detect variations in statistical properties of...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Vulnerability Assessment for Mission Critical Networks Against Region Failures: A Case Study

    Communications networks nowadays are facing potential threats due to natural disasters such as earthquakes or floods. Moreover, it is also vulnerable to human attacks. Such natural and physical events may result in large scale concurrent region failures. Therefore, the traditional theories of link failure analysis are no longer valid. In...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Performance Evaluation of a Simplified Matrix Processor

    Data parallel applications are growing in importance and demanding increased performance from hardware. Since, the fundamental data structures for a wide variety of data-parallel applications are scalar, vector, and matrix, this paper describes the authors' proposed Simple Matrix Processor (SMP) for executing scalar/vector/matrix instructions and evaluates its performance. SMP extends...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    ASERTN: A Dynamic Testing Tool for Java Based Software Agent

    Testing is an essential activity in software engineering. It is a process of observing the execution of a software system to validate whether it behaves as intended and identifies errors that sometimes can result in large financial losses or bodily harm. Agents have been recognized as a promising technology to...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Application of IDMA Anti-Collision Algorithm in RFID Networks

    This paper presents a novel algorithm with IDMA (Interleave Division Multiple Access) scheme to resolve the anti collision problem for RFID (Radio Frequency IDentification). IDMA which can be regarded as a special case of CDMA (Code Division Multiple Access), allows a very simple chip-by-chip iterative detection strategy which cost (per...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    A Fuzzy Cross-Layer Method to Improve the Quality of Service in Uplink Multimedia Transmissions in WiMAX

    WiMAX is a wireless standard that allows the establishment of a broadband connection with high throughput. IEEE802.16 provides high bandwidth and range, while implementing and operating costs low, and as a serious item to replace wired networks T1 and DSL is considered. On the other hand, the authors witness the...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    2D and 3D Graphical Visualization of Teeth Surface Based on the Fiber Optic Intensity Modulation Technique

    A simple, low cost, 2D and 3D graphical visualization system of teeth surfaces is presented which employs a fiber optic intensity modulation technique. The use of a graphical visualization system for acquiring the tooth surface profile has many applications in the dental and biomedical research area. Analyzes of results are...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    A New Vector Quantization Attack on Self-Recovery Image Authentication

    In this paper, a new Vector Quantization (VQ) attack that is applicable on self-recovery image authentication is proposed. In the proposed counterfeiting attack, the codebook is developed to contain authenticated blocks with their encrypted codes and displacement vector(s). To fabricate a counterfeit image that can pass the verification process as...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Robust Visual Hashing for Image Authentication

    In this paper, secure and robust image (visual) hashing based on the Discrete Wavelet Transform (DWT) and Non-negative Matrix Factorization (NMF) is proposed. In the proposed method, the considered image is undergone preprocessing manipulations. Then, the DWT is applied on the preprocessed image to generate image features that are largely...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Secure Object-Based Image Coding Scheme

    A secure perceptually motivated object/region-based image coding scheme with effective selective encryption is proposed. An image is represented by an edge image (extracted using a robust morphological edge detection technique), binary mask (identifying arbitrary shaped image objects), and residual image (representing the error after edge-interpolation). The binary mask is encoded...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    The Impact of Radio Network Planning and Site Configuration on the WCDMA Network Capacity and Coverage Area

    The Third Generation (3G) cellular system offers high data rate services compared with 1G and 2G systems. The planners must utilize all possible resources to improve capacity and coverage area for the cellular network. The aim of this paper to investigate the Third Generation (3G) cellular system offers high data...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    A Novel Quality Model for UML Models

    One of the most expensive and important phase in software system life cycle is the maintenance. At this stage change may cause serious quality problems. Although, many approaches have been already proposed at a source code level to improve quality of final software product, but those are not enough to...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Identification of Highly Jittered Radar Emitters: Issues on Low Cost Embedded Design

    This paper presents efforts toward design of radar identification system for highly jittered radar emitters. The paper first provides a mathematical background of clustering techniques, and then presents a derivation of additional parameters, such as PRI, among mixed pulse sequence and, finally, discusses implementation of digital processing part on a...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Distributed Database Systems MANETS

    The mobile database system in a MANET is a dynamic distributed database system, which is composed of some mobile host. The key issues in MANETs for mobile database are: how to optimize mobile queries, cache and replicate data, manage transactions and routing. In this proposal, the authors wish to take...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Enhanced-MPR-CDS Approach for Self-Organization and Routing in WSNs

    Wireless sensor networks are poised to become a very significant enabling technology in many sectors. Already a few very low power wireless sensor platforms have entered the marketplace. Almost all of these platforms are designed to run on batteries that have a very limited lifetime. Recent advances in wireless sensor...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    MLDF: Discovering Mobile Learning Content Using Mobile Devices

    The emergence and development of mobile devices continue to improve the people living standards. In specific, mobile devices have become one of the most powerful technologies available to the individual for acquiring knowledge in a ubiquitous manner. However, such technology does not come without its challenges. One of these challenges...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Security Options for Personal Computer

    This paper describes new security methods that can be used to protect a Personal Computer (PC) and user's personal files and folders (items). The protection of the user's accounts is achieved by an encrypted passwords and the protection of the items is provided by Lock, Hide and Delete security options....

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Application of Six Sigma Approach in Predicting Functional Defects for System Testing

    The importance of knowing total number of defects to be found at the start of system testing phase has become significant element in software engineering practices towards achieving zero known post release defects of the software released to users. Defect prediction for testing demonstrates the initiative for test process improvement...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Unified Security, Trust and Privacy (STP) Protection for Future RFID System

    Future trend of RFID system is moving towards integration with other devices, and hence making it more pervasive. Though RFID technology brings countless benefits and it also comes with potential security and privacy threats. Integration and interconnection of RFID system with other devices may introduce security vulnerabilities which could be...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Mobility Management in Next Generation Networks: Analysis of Handover in Host and Network Based Mobility Protocols

    Mobile Internet Protocol (MIP) was introduced in Internet Protocol version 4(IPv4) and became an inbuilt part of the next generation network protocol-Internet Protocol version 6 (IPv6). Mobility protocols can be localized or global depending on the domain of the network. When global mobility protocols are used in managing localized mobility...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Evolutionary-Based Speaker Adaptation to Improve Interaction With RFID Networks in Noisy Environments

    This paper presents an innovative application which consists of providing a speech modality to allow the human operators of a Radio Frequency IDentification (RFID) network to communicate verbally with related devices and information systems. Within this application, the results of two contributions are reported. The first contribution is a new...

    Provided By The Second International Conference on Communications and Information Technology