The Second International Conference on Communications and Information Technology

Displaying 1-40 of 51 results

  • White Papers // Feb 2012

    An Implementation of a MATLAB Compiler for Matrix Processors

    Not only did the compiler writers have to track new language features, they also had to devise translation algorithms that would take maximal advantage of the modern processors capabilities. This paper implements a compiler for Mat-Core processor, where applications written in MATLAB are compiled into sequences of scalar/vector/matrix instructions to...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    A Review of Time Domain Switching Optical Burst Switched Networks

    Optical networks are in continuous demand for their large bandwidth availability. Many optical switching paradigms have been proposed. Among these paradigms, three of them have received more attention from scientists and researchers in this field. These three paradigms are: Optical Circuit Switching(OCS), Optical Packet Switching (OPS) and Optical Burst Switching...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Software Engineering Using Artificial Intelligence Techniques: Current State and Open Problems

    This paper surveys the application of artificial intelligence approaches to the software engineering processes. These approaches can have a major impact on reducing the time to market and improving the quality of software systems in general. Existing survey papers are driven by the AI techniques used, or are focused on...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    CampusCloud: Aggregating Universities Computing Resources in Ad-Hoc Clouds

    Cloud Computing has recently emerged as a new computing paradigm based on the concept of virtualization with the goal of creating a shared and highly scalable computing infrastructure from aggregated physical resources to deliver seamless and on-demand provisioning of software, hardware, and data as services. Universities typically have large amounts...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Database Workload Management - Characterization to Idleness Detection

    Database Management Systems experience workloads that consist of user and system workloads which include structured query language statements, transactions, sessions, jobs etc. These workloads need various resources including CPU cycles, memory, storage etc for their successful execution. The dynamic nature of the database workload leads researchers, vendors and other stack...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Hybrid Exact String Matching Algorithm for Intrusion Detection System

    The Intrusion Detection System (IDS) is an important part of any modern network. Many solutions have been presented based on hardware and software. However, due to the high speed and high bandwidth in the modern network, the traditional IDS based on single CPU is not sufficient to detect a malicious...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Modern Encryption Techniques for Cloud Computing: Randomness and Performance Testing

    Cloud computing has to become the next-generation architecture of IT Enterprise. Clouds are massively complex systems. They can be reduced to simple primitives, that are replicated thousands of times, and common functional units. The complexity of cloud computing create many issues related to security as well as all aspects of...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Temporal Assertion Language for Testing Web Applications

    This research paper presents a temporal logic based assertion language that can help in detecting dynamic errors in web applications. Temporal logic may be advantageous because it deals with the development of situations over time. The operators, syntax, and semantic of the language are introduced. Also in this paper, the...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Model-Based Approach to Policy Artifact in SOA-Based Systems

    Service-Oriented Architecture (SOA) is a new trend for engineering systems bases on two key practices from software engineering: raising abstraction and re-use levels. The development is driven by re-using from a catalog of exiting services which are specified independently from technology in a form of standard interface. Specifying policies such...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    From Packet-Based Towards Hybrid Packet-Based and Flow-Based Monitoring for Efficient Intrusion Detection: An Overview

    Network-based Intrusion Detection Systems (NIDSs) aim at the detection of attacks by an inspection of network traffic. With the increase in network speed and number and types of attacks, existing NIDSs face challenges. This paper presents an overview of how the performance and detection accuracy of the payload-based, flow-based NIDSs...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    RFID Adoption Intention in Hajj Organizations

    Millions of Muslims go to Mecca every year to perform their Hajj (Pilgrimage). Management of Hajj activities is a very complex task for Saudi Arabian authorities and Hajj organizers due to the large number of pilgrims, the specific geographical area for the movement of pilgrims and the short period of...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Web Services Testing Challenges and Approaches

    The web is evolving and expanding continuously and its services are getting more and more complex, public and usable. However, one of the major benefits and challenges in web services is for those services to be offered in a very useful, flexible, effective and secure way. In this paper, the...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Designing an Interactive DSS for Relocating People for Developing Surface Mines in Densely Populated Areas

    Decisions regarding relocation of people due to environmental requirements can be very complex and may have serious socio-economic implications. The authors present the design of a Decision Support System (DSS) to support such decision making processes involving many inputs, human preferences and multiple objectives. Coal is extracted from mines using...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Performance Evaluation of a 16.16 Fixed-Point Multiplier Implemented on the FALCON-A Processor

    This paper describes the implementation of a fixed point multiplier (using the 16.16 format) on the FALCON-A processor. Special assembly language coding techniques have been used to achieve the optimum code size along with minimum truncation error and minimum execution time. It is expected that this information will provide an...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Implementing Real-Time Image Resizing for Live Video Streaming on an Embedded System

    Live video streaming is a popular network application that involves real-time acquisition, transmission and display of a sequence of image frames. However, the large amount of data involved and bandwidth limitations adversely affect the quality of video displayed at the receiving end. A compromise has to be made between video...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Enhancement of Zero Cross Correlation Code for Optical CDMA Network System

    Many codes have been proposed for the Spectral Amplitude Coding (SAC) Optical Code Division Multiple Access (OCDMA) systems that has variable weights of greater than two. The best cross correlation property of these codes can only achieve a minimum cross correlation of one. To satisfy this, the authors had developed...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    A New Family of Two-Dimensional Modified Doubled Weight Code Optical Code Division Multiple Access for Capacity Enhancement

    The performance of a newly developed spectral/spatial Two-Dimensional (2-D) Optical Code Division Multiple Access (OCDMA) Modified Double Weight (MDW) code is presented. Through MUI cancellation properties, the proposed new 2-D MDW code can suppress the Phase Induced Intensity Noise (PIIN) and eliminating Multiple User Interference (MUI). The result analysis indicates...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    A Protocol Stack Architecture for Optical Network-on-Chip

    As the Optical Network-on-Chip (ONoC) becomes a candidate solution for the communication infrastructure of the Systems-on-Chip (SoC), the development of proper hierarchical models and tools for its design and analysis, specific to its heterogeneous nature, becomes a necessity. This paper presents a novel protocol stack architecture for the ONoC. The...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Mobility Management in Next Generation Networks: Analysis of Handover in Host and Network Based Mobility Protocols

    Mobile Internet Protocol (MIP) was introduced in Internet Protocol version 4(IPv4) and became an inbuilt part of the next generation network protocol-Internet Protocol version 6 (IPv6). Mobility protocols can be localized or global depending on the domain of the network. When global mobility protocols are used in managing localized mobility...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Evolutionary-Based Speaker Adaptation to Improve Interaction With RFID Networks in Noisy Environments

    This paper presents an innovative application which consists of providing a speech modality to allow the human operators of a Radio Frequency IDentification (RFID) network to communicate verbally with related devices and information systems. Within this application, the results of two contributions are reported. The first contribution is a new...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    A Promising Digital-Based Radio Network Over IP

    This paper illustrates the major software and hardware issues associated with a promising digital-based radio network station established in the Hashemite University (HU). The project can be considered as new and simple way to limited broadcasts. Modern broadcasting techniques are to be used; Stereo FM and HTTP stream broadcasting. This...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    MANETs Indoor Performance Analysis Under the Influence of Dynamic Propagation Path Loss Conditions

    In this paper, the authors have analyzed the performance of a Mobile Ad-hoc NETwork (MANET) for two routing strategies (i.e., Adhoc On-demand Distance Vector Routing (AODV) and Optimised Link State Routing (OLSR)) under various indoor channel propagation conditions. Two new propagation pathloss models (i.e., ITU & WINNER) were incorporated into...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Cloud Computing and Grid Computing for the Smart and Green Information Systems

    The increased availability of high speed internet and corporate IP connections is enabling the delivery of new network based services which include processing jobs, storage and application based. Most of the services are still being used by procuring hardware at individual and corporate level. Cloud computing potentially offers an overall...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Protocol Design and Implementation of Vehicular Ad-Hoc Networks

    Vehicular Ad-hoc NETworks (VANETs) incorporate vehicle-to-vehicle and vehicle-to-infrastructure communication to provide a host of applications which aim to provide, among other things, a reduction in traffic congestion, accident detection and entertainment. In this paper, the authors describe a small scale experimental model in which they have implemented two major applications...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Analysis of Byzantine Attacks in Adhoc Networks and Their Mitigation

    Ad hoc networking somewhat differs from more traditional approaches, the security aspects that are valid in the networks of the past are not fully applicable in the networks. Ad hoc networks suffer from all weather attacks which may come from any node in the network. In this paper, the authors...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Bees Life Algorithm for Job Scheduling in Cloud Computing

    Cloud computing is known as digital service delivery over the Internet by several applications which are carried out by computer systems in distributed datacenters. It supplies a high performance computing based on protocols which allow shared computation and storage over long distances. In this paper, the authors present a new...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    A Specific Fuzzy Genetic Algorithm for Intrusion Detection

    The Intrusion Detection Systems (IDS) are becoming indispensable for effective protection against attacks that are constantly changing in magnitude and complexity. This paper proposes a Fuzzy Genetic Algorithm (FGA) for intrusion detection. The FGA system is a fuzzy classifier, whose knowledge base is modeled as a fuzzy rule such as...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Data Migration: Connecting Databases in the Cloud

    The introduction of new technologies, architectures and systems or organizational restructuring often requires a company to reorganize its databases either by transferring data from old applications to the new ones, or reorganize data in an existing application according to the new organizational structure. Migration of data, services, and processes to...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Challenges of Using Consensus Protocol in Cloud Computing

    Since, more aspects of work and personal life move online and the Internet becomes a platform for virtual human society, a new paradigm of large-scale distributed computing has emerged which is known as cloud computing. Cloud computing is also the development of parallel computing, distributed computing and grid computing. Storage...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    An Adaptive Approach for Facial Expression Recognition System

    Facial expressions are non-verbal signs that play important role to provide complete meaning in human communication. While humans can easily comprehend the facial expressions, it is not valid for the computers. Therefore, the researchers are still working on developing reliable facial expression recognition systems. In this paper, the analysis of...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Multimodal Biometric Person Recognition System Based on Iris and Palmprint Using Correlation Filter Classifier

    Biometric system has been actively emerging in various industries for the past few years, and it is continuing to roll to provide higher security features for access control system. Many types of uni-modal biometric systems have been developed. However, these systems are only capable to provide low to middle range...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Performance Evaluation of Delay-Sensitive Services Over the Internet Using Multipath Routing

    In recent years, there has been a phenomenal growth in the commercial deployment of delay-sensitive services, such as voice and video services, over the Internet Protocol. Regardless of the advances that have been witnessed in networking technologies, effectively utilizing the network resources to accommodate such services remains a major and...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Pixel-Value Differencing Steganography: Attacks and Improvements

    Hiding confidential data in digital images using the Pixel-Value Differencing (PVD) method provide higher embedding capacity without very noticeable artifacts in the cover image to human eyes. However, the presence of hidden data can be revealed by a number of automatic approaches that can detect variations in statistical properties of...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Vulnerability Assessment for Mission Critical Networks Against Region Failures: A Case Study

    Communications networks nowadays are facing potential threats due to natural disasters such as earthquakes or floods. Moreover, it is also vulnerable to human attacks. Such natural and physical events may result in large scale concurrent region failures. Therefore, the traditional theories of link failure analysis are no longer valid. In...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Performance Evaluation of a Simplified Matrix Processor

    Data parallel applications are growing in importance and demanding increased performance from hardware. Since, the fundamental data structures for a wide variety of data-parallel applications are scalar, vector, and matrix, this paper describes the authors' proposed Simple Matrix Processor (SMP) for executing scalar/vector/matrix instructions and evaluates its performance. SMP extends...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    ASERTN: A Dynamic Testing Tool for Java Based Software Agent

    Testing is an essential activity in software engineering. It is a process of observing the execution of a software system to validate whether it behaves as intended and identifies errors that sometimes can result in large financial losses or bodily harm. Agents have been recognized as a promising technology to...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Application of IDMA Anti-Collision Algorithm in RFID Networks

    This paper presents a novel algorithm with IDMA (Interleave Division Multiple Access) scheme to resolve the anti collision problem for RFID (Radio Frequency IDentification). IDMA which can be regarded as a special case of CDMA (Code Division Multiple Access), allows a very simple chip-by-chip iterative detection strategy which cost (per...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    A Fuzzy Cross-Layer Method to Improve the Quality of Service in Uplink Multimedia Transmissions in WiMAX

    WiMAX is a wireless standard that allows the establishment of a broadband connection with high throughput. IEEE802.16 provides high bandwidth and range, while implementing and operating costs low, and as a serious item to replace wired networks T1 and DSL is considered. On the other hand, the authors witness the...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    2D and 3D Graphical Visualization of Teeth Surface Based on the Fiber Optic Intensity Modulation Technique

    A simple, low cost, 2D and 3D graphical visualization system of teeth surfaces is presented which employs a fiber optic intensity modulation technique. The use of a graphical visualization system for acquiring the tooth surface profile has many applications in the dental and biomedical research area. Analyzes of results are...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    A New Vector Quantization Attack on Self-Recovery Image Authentication

    In this paper, a new Vector Quantization (VQ) attack that is applicable on self-recovery image authentication is proposed. In the proposed counterfeiting attack, the codebook is developed to contain authenticated blocks with their encrypted codes and displacement vector(s). To fabricate a counterfeit image that can pass the verification process as...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    An Implementation of a MATLAB Compiler for Matrix Processors

    Not only did the compiler writers have to track new language features, they also had to devise translation algorithms that would take maximal advantage of the modern processors capabilities. This paper implements a compiler for Mat-Core processor, where applications written in MATLAB are compiled into sequences of scalar/vector/matrix instructions to...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    A Review of Time Domain Switching Optical Burst Switched Networks

    Optical networks are in continuous demand for their large bandwidth availability. Many optical switching paradigms have been proposed. Among these paradigms, three of them have received more attention from scientists and researchers in this field. These three paradigms are: Optical Circuit Switching(OCS), Optical Packet Switching (OPS) and Optical Burst Switching...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Software Engineering Using Artificial Intelligence Techniques: Current State and Open Problems

    This paper surveys the application of artificial intelligence approaches to the software engineering processes. These approaches can have a major impact on reducing the time to market and improving the quality of software systems in general. Existing survey papers are driven by the AI techniques used, or are focused on...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    CampusCloud: Aggregating Universities Computing Resources in Ad-Hoc Clouds

    Cloud Computing has recently emerged as a new computing paradigm based on the concept of virtualization with the goal of creating a shared and highly scalable computing infrastructure from aggregated physical resources to deliver seamless and on-demand provisioning of software, hardware, and data as services. Universities typically have large amounts...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Database Workload Management - Characterization to Idleness Detection

    Database Management Systems experience workloads that consist of user and system workloads which include structured query language statements, transactions, sessions, jobs etc. These workloads need various resources including CPU cycles, memory, storage etc for their successful execution. The dynamic nature of the database workload leads researchers, vendors and other stack...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Hybrid Exact String Matching Algorithm for Intrusion Detection System

    The Intrusion Detection System (IDS) is an important part of any modern network. Many solutions have been presented based on hardware and software. However, due to the high speed and high bandwidth in the modern network, the traditional IDS based on single CPU is not sufficient to detect a malicious...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Modern Encryption Techniques for Cloud Computing: Randomness and Performance Testing

    Cloud computing has to become the next-generation architecture of IT Enterprise. Clouds are massively complex systems. They can be reduced to simple primitives, that are replicated thousands of times, and common functional units. The complexity of cloud computing create many issues related to security as well as all aspects of...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Temporal Assertion Language for Testing Web Applications

    This research paper presents a temporal logic based assertion language that can help in detecting dynamic errors in web applications. Temporal logic may be advantageous because it deals with the development of situations over time. The operators, syntax, and semantic of the language are introduced. Also in this paper, the...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Model-Based Approach to Policy Artifact in SOA-Based Systems

    Service-Oriented Architecture (SOA) is a new trend for engineering systems bases on two key practices from software engineering: raising abstraction and re-use levels. The development is driven by re-using from a catalog of exiting services which are specified independently from technology in a form of standard interface. Specifying policies such...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    From Packet-Based Towards Hybrid Packet-Based and Flow-Based Monitoring for Efficient Intrusion Detection: An Overview

    Network-based Intrusion Detection Systems (NIDSs) aim at the detection of attacks by an inspection of network traffic. With the increase in network speed and number and types of attacks, existing NIDSs face challenges. This paper presents an overview of how the performance and detection accuracy of the payload-based, flow-based NIDSs...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    RFID Adoption Intention in Hajj Organizations

    Millions of Muslims go to Mecca every year to perform their Hajj (Pilgrimage). Management of Hajj activities is a very complex task for Saudi Arabian authorities and Hajj organizers due to the large number of pilgrims, the specific geographical area for the movement of pilgrims and the short period of...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Web Services Testing Challenges and Approaches

    The web is evolving and expanding continuously and its services are getting more and more complex, public and usable. However, one of the major benefits and challenges in web services is for those services to be offered in a very useful, flexible, effective and secure way. In this paper, the...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Designing an Interactive DSS for Relocating People for Developing Surface Mines in Densely Populated Areas

    Decisions regarding relocation of people due to environmental requirements can be very complex and may have serious socio-economic implications. The authors present the design of a Decision Support System (DSS) to support such decision making processes involving many inputs, human preferences and multiple objectives. Coal is extracted from mines using...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Performance Evaluation of a 16.16 Fixed-Point Multiplier Implemented on the FALCON-A Processor

    This paper describes the implementation of a fixed point multiplier (using the 16.16 format) on the FALCON-A processor. Special assembly language coding techniques have been used to achieve the optimum code size along with minimum truncation error and minimum execution time. It is expected that this information will provide an...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Implementing Real-Time Image Resizing for Live Video Streaming on an Embedded System

    Live video streaming is a popular network application that involves real-time acquisition, transmission and display of a sequence of image frames. However, the large amount of data involved and bandwidth limitations adversely affect the quality of video displayed at the receiving end. A compromise has to be made between video...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Enhancement of Zero Cross Correlation Code for Optical CDMA Network System

    Many codes have been proposed for the Spectral Amplitude Coding (SAC) Optical Code Division Multiple Access (OCDMA) systems that has variable weights of greater than two. The best cross correlation property of these codes can only achieve a minimum cross correlation of one. To satisfy this, the authors had developed...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    A New Family of Two-Dimensional Modified Doubled Weight Code Optical Code Division Multiple Access for Capacity Enhancement

    The performance of a newly developed spectral/spatial Two-Dimensional (2-D) Optical Code Division Multiple Access (OCDMA) Modified Double Weight (MDW) code is presented. Through MUI cancellation properties, the proposed new 2-D MDW code can suppress the Phase Induced Intensity Noise (PIIN) and eliminating Multiple User Interference (MUI). The result analysis indicates...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    A Protocol Stack Architecture for Optical Network-on-Chip

    As the Optical Network-on-Chip (ONoC) becomes a candidate solution for the communication infrastructure of the Systems-on-Chip (SoC), the development of proper hierarchical models and tools for its design and analysis, specific to its heterogeneous nature, becomes a necessity. This paper presents a novel protocol stack architecture for the ONoC. The...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Mobility Management in Next Generation Networks: Analysis of Handover in Host and Network Based Mobility Protocols

    Mobile Internet Protocol (MIP) was introduced in Internet Protocol version 4(IPv4) and became an inbuilt part of the next generation network protocol-Internet Protocol version 6 (IPv6). Mobility protocols can be localized or global depending on the domain of the network. When global mobility protocols are used in managing localized mobility...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Evolutionary-Based Speaker Adaptation to Improve Interaction With RFID Networks in Noisy Environments

    This paper presents an innovative application which consists of providing a speech modality to allow the human operators of a Radio Frequency IDentification (RFID) network to communicate verbally with related devices and information systems. Within this application, the results of two contributions are reported. The first contribution is a new...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    A Promising Digital-Based Radio Network Over IP

    This paper illustrates the major software and hardware issues associated with a promising digital-based radio network station established in the Hashemite University (HU). The project can be considered as new and simple way to limited broadcasts. Modern broadcasting techniques are to be used; Stereo FM and HTTP stream broadcasting. This...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    MANETs Indoor Performance Analysis Under the Influence of Dynamic Propagation Path Loss Conditions

    In this paper, the authors have analyzed the performance of a Mobile Ad-hoc NETwork (MANET) for two routing strategies (i.e., Adhoc On-demand Distance Vector Routing (AODV) and Optimised Link State Routing (OLSR)) under various indoor channel propagation conditions. Two new propagation pathloss models (i.e., ITU & WINNER) were incorporated into...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Cloud Computing and Grid Computing for the Smart and Green Information Systems

    The increased availability of high speed internet and corporate IP connections is enabling the delivery of new network based services which include processing jobs, storage and application based. Most of the services are still being used by procuring hardware at individual and corporate level. Cloud computing potentially offers an overall...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Protocol Design and Implementation of Vehicular Ad-Hoc Networks

    Vehicular Ad-hoc NETworks (VANETs) incorporate vehicle-to-vehicle and vehicle-to-infrastructure communication to provide a host of applications which aim to provide, among other things, a reduction in traffic congestion, accident detection and entertainment. In this paper, the authors describe a small scale experimental model in which they have implemented two major applications...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Analysis of Byzantine Attacks in Adhoc Networks and Their Mitigation

    Ad hoc networking somewhat differs from more traditional approaches, the security aspects that are valid in the networks of the past are not fully applicable in the networks. Ad hoc networks suffer from all weather attacks which may come from any node in the network. In this paper, the authors...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Bees Life Algorithm for Job Scheduling in Cloud Computing

    Cloud computing is known as digital service delivery over the Internet by several applications which are carried out by computer systems in distributed datacenters. It supplies a high performance computing based on protocols which allow shared computation and storage over long distances. In this paper, the authors present a new...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    A Specific Fuzzy Genetic Algorithm for Intrusion Detection

    The Intrusion Detection Systems (IDS) are becoming indispensable for effective protection against attacks that are constantly changing in magnitude and complexity. This paper proposes a Fuzzy Genetic Algorithm (FGA) for intrusion detection. The FGA system is a fuzzy classifier, whose knowledge base is modeled as a fuzzy rule such as...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Data Migration: Connecting Databases in the Cloud

    The introduction of new technologies, architectures and systems or organizational restructuring often requires a company to reorganize its databases either by transferring data from old applications to the new ones, or reorganize data in an existing application according to the new organizational structure. Migration of data, services, and processes to...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Challenges of Using Consensus Protocol in Cloud Computing

    Since, more aspects of work and personal life move online and the Internet becomes a platform for virtual human society, a new paradigm of large-scale distributed computing has emerged which is known as cloud computing. Cloud computing is also the development of parallel computing, distributed computing and grid computing. Storage...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    An Adaptive Approach for Facial Expression Recognition System

    Facial expressions are non-verbal signs that play important role to provide complete meaning in human communication. While humans can easily comprehend the facial expressions, it is not valid for the computers. Therefore, the researchers are still working on developing reliable facial expression recognition systems. In this paper, the analysis of...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Multimodal Biometric Person Recognition System Based on Iris and Palmprint Using Correlation Filter Classifier

    Biometric system has been actively emerging in various industries for the past few years, and it is continuing to roll to provide higher security features for access control system. Many types of uni-modal biometric systems have been developed. However, these systems are only capable to provide low to middle range...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Performance Evaluation of Delay-Sensitive Services Over the Internet Using Multipath Routing

    In recent years, there has been a phenomenal growth in the commercial deployment of delay-sensitive services, such as voice and video services, over the Internet Protocol. Regardless of the advances that have been witnessed in networking technologies, effectively utilizing the network resources to accommodate such services remains a major and...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Pixel-Value Differencing Steganography: Attacks and Improvements

    Hiding confidential data in digital images using the Pixel-Value Differencing (PVD) method provide higher embedding capacity without very noticeable artifacts in the cover image to human eyes. However, the presence of hidden data can be revealed by a number of automatic approaches that can detect variations in statistical properties of...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Vulnerability Assessment for Mission Critical Networks Against Region Failures: A Case Study

    Communications networks nowadays are facing potential threats due to natural disasters such as earthquakes or floods. Moreover, it is also vulnerable to human attacks. Such natural and physical events may result in large scale concurrent region failures. Therefore, the traditional theories of link failure analysis are no longer valid. In...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Performance Evaluation of a Simplified Matrix Processor

    Data parallel applications are growing in importance and demanding increased performance from hardware. Since, the fundamental data structures for a wide variety of data-parallel applications are scalar, vector, and matrix, this paper describes the authors' proposed Simple Matrix Processor (SMP) for executing scalar/vector/matrix instructions and evaluates its performance. SMP extends...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    ASERTN: A Dynamic Testing Tool for Java Based Software Agent

    Testing is an essential activity in software engineering. It is a process of observing the execution of a software system to validate whether it behaves as intended and identifies errors that sometimes can result in large financial losses or bodily harm. Agents have been recognized as a promising technology to...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    Application of IDMA Anti-Collision Algorithm in RFID Networks

    This paper presents a novel algorithm with IDMA (Interleave Division Multiple Access) scheme to resolve the anti collision problem for RFID (Radio Frequency IDentification). IDMA which can be regarded as a special case of CDMA (Code Division Multiple Access), allows a very simple chip-by-chip iterative detection strategy which cost (per...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    A Fuzzy Cross-Layer Method to Improve the Quality of Service in Uplink Multimedia Transmissions in WiMAX

    WiMAX is a wireless standard that allows the establishment of a broadband connection with high throughput. IEEE802.16 provides high bandwidth and range, while implementing and operating costs low, and as a serious item to replace wired networks T1 and DSL is considered. On the other hand, the authors witness the...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    2D and 3D Graphical Visualization of Teeth Surface Based on the Fiber Optic Intensity Modulation Technique

    A simple, low cost, 2D and 3D graphical visualization system of teeth surfaces is presented which employs a fiber optic intensity modulation technique. The use of a graphical visualization system for acquiring the tooth surface profile has many applications in the dental and biomedical research area. Analyzes of results are...

    Provided By The Second International Conference on Communications and Information Technology

  • White Papers // Feb 2012

    A New Vector Quantization Attack on Self-Recovery Image Authentication

    In this paper, a new Vector Quantization (VQ) attack that is applicable on self-recovery image authentication is proposed. In the proposed counterfeiting attack, the codebook is developed to contain authenticated blocks with their encrypted codes and displacement vector(s). To fabricate a counterfeit image that can pass the verification process as...

    Provided By The Second International Conference on Communications and Information Technology