Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Conference

Discipline
Institution
Keyword
Publication Year
Publication
File Type

Articles 15811 - 15840 of 16621

Full-Text Articles in Physical Sciences and Mathematics

Keynote: Emerging Era Of Cooperative Empowerment: Grid, Peer-To-Peer, And Community Computing, Dr. Javed I. Khan Aug 2005

Keynote: Emerging Era Of Cooperative Empowerment: Grid, Peer-To-Peer, And Community Computing, Dr. Javed I. Khan

International Conference on Information and Communication Technologies

In this paper we discuss an emerging trend in high performance computing-the social or community computing. The emergence of screensaver computing, grid computing, peer-to-peer systems, and their demonstrated ability to garner computing power as potent as the supercomputers seems to be auspicious. In this paper we discuss the new phenomenon of community computing-including their potential applications in solving a new set of grand challenge problems. We also discuss the previously uncharted technological challenges architects of these new paradigms are addressing.


Keynote: The Segmentation Problem In Arabic Character Recognition: The State Of The Art, Ahmed M. Zeki Aug 2005

Keynote: The Segmentation Problem In Arabic Character Recognition: The State Of The Art, Ahmed M. Zeki

International Conference on Information and Communication Technologies

Arabic characters are used in several languages other than Arabic, despite to this fact; Arabic Character Recognition (ACR) has not received enough interests by researchers. Little researchprogress has been achieved comparing to the one done on the Latin or Chinese and the solutions available in the market are still far from being perfect. However, recent years have shown a considerable increase in the number of research papers. The cursive nature of Arabic writing makes the process of recognition a very challenging one. Several methods to segment the Arabic words into characters have been proposed in the past two decades. This …


Tcp Attack Analysis On Packets Captured Using Symantec Decoy Server, Ali Bakhtiar Nizamani, Bahari Belaton Aug 2005

Tcp Attack Analysis On Packets Captured Using Symantec Decoy Server, Ali Bakhtiar Nizamani, Bahari Belaton

International Conference on Information and Communication Technologies

This paper discusses results obtained from Symantec Decoy Server (previously known as Mantrap) with an introduction to honeypots. Lance Spitzner of the Honeynet Project introduced the concept of honeypots. A honeypot is in essence a decoy server, which has no real or strategic value and is only setup to attract crackers towards it. The idea is to trap the crackers and learn cracking techniques from them. Rapid increase in unauthorized intrusions over the Internet provides a great motivation to explore honeypots at a greater depth. We will provide analysis on TCP based denial of service attack carried out on Symantec …


A New Approach For Anti-Aliasing Raster Data In Air Borne Imagery, Fahim Arif, Muhammad Akbar Aug 2005

A New Approach For Anti-Aliasing Raster Data In Air Borne Imagery, Fahim Arif, Muhammad Akbar

International Conference on Information and Communication Technologies

Air borne sensed data is in the form of raster data. Aliasing is always present in a sampled image causing artifact error. To reduce possible aliasing effects, it is a good idea to blur an image slightly before applying a resampling method on it. This paper presents a technique for anti-aliasing remotely sensed images. The technique uses Gaussian low pass filter (GLPF) for generation of slight blur. Then resampling of raster data is performed with the help of bilinear interpolation. Algorithm is developed in MATLAB using some inbuilt functions.


A Visual Tool For Trellis Construction And Decoder Debugging Rac Array Codes, Lami Kaya, Muhammad -Al- Qudah Aug 2005

A Visual Tool For Trellis Construction And Decoder Debugging Rac Array Codes, Lami Kaya, Muhammad -Al- Qudah

International Conference on Information and Communication Technologies

We have developed a visual tool for can be added to a specific RAC array positions and their effect can be easily determined by the help of the visual tool. The program environment has been set in a adaptive manner in order to change different parameters of the RAC codes and see their effect directly. decoding of row and column (RAC) array codes. The visual tool provides interface to view all paths corresponding selected input information bits. Errors constructing trellis diagram and tracing Viterbi.


Secured Network Model For Management Information System Based On Ip Security (Ipsec) Encryption Using Multilayered Approach Of Network Security, Dr. Amir Hassan Pathan, Muniza Irshad Aug 2005

Secured Network Model For Management Information System Based On Ip Security (Ipsec) Encryption Using Multilayered Approach Of Network Security, Dr. Amir Hassan Pathan, Muniza Irshad

International Conference on Information and Communication Technologies

Secured flow of information through the network and play important role in the management information systems. In this paper I describe Secured Network Model For Corporate & Business Organization In Based On Network Level IP Security (IPSec) Encryption & Its Physical Layout Using Multilayered Approach. I have four important considerations for adoption of secured network model as secured network model for management information system.


A Performance Comparison Of Data Encryption Algorithms, Aamer Nadeem, Dr. M. Younus Javed Aug 2005

A Performance Comparison Of Data Encryption Algorithms, Aamer Nadeem, Dr. M. Younus Javed

International Conference on Information and Communication Technologies

The principal goal guiding the design of any encryption algorithm must be security against unauthorized attacks. However, for all practical applications, performance and the cost of implementation are also important concerns. A data encryption algorithm would not be of much use if it is secure enough but slow in performance because it is a common practice to embed encryption algorithms in other applications such as e-commerce, banking, and online transaction processing applications. Embedding of encryption algorithms in other applications also precludes a hardware implementation, and is thus a major cause of degraded overall performance of the system. In this paper, …


Identification Of Ip Information Of Pakistan & Vulnerability Assessment, Nizar Diamond Ali Aug 2005

Identification Of Ip Information Of Pakistan & Vulnerability Assessment, Nizar Diamond Ali

International Conference on Information and Communication Technologies

Detailed IP information of Pakistan was not available prior to this study - at least not to the general public. It was not known how to harvest this information, from where and using which tools. This study came as answer to this challenge and shows how the IP information can be collected, what sources of information to use, methodologies to adopt and tools to utilize for this purpose. The next step was find out areas where network security lapses are present - i.e., to see which servers and which services are vulnerable to known attacks and vulnerabilities. In this way, …


Real Time Object Tracking Using Bma, Zeeshan Hameed Khan, Muhammad Aurangzeb Aug 2005

Real Time Object Tracking Using Bma, Zeeshan Hameed Khan, Muhammad Aurangzeb

International Conference on Information and Communication Technologies

This paper describes real time object tracking using block matching algorithm (BMA). Emphasis is made on the development of techniques for tracking a user-selected object through digital image sequences in multimedia systems. The ability to track objects in sequences is useful in situations where the motion of objects is important. It is also useful when a moving object is difficult to see and needs to be highlighted. A tracking tool is also of benefit to the developers of a multimedia system to automatically 'mark up' a moving object so a user of the system can select it and manipulate it.


Exploring The Possibility Of Implementing Telecommuting At University Utara Malaysia (Uum), Dr. Wan Rozaini Sheik Osman, Haitham Rashdan Aug 2005

Exploring The Possibility Of Implementing Telecommuting At University Utara Malaysia (Uum), Dr. Wan Rozaini Sheik Osman, Haitham Rashdan

International Conference on Information and Communication Technologies

Global technology has quickly progressed to provide more accessible business modes of communication. The image of the traditional workplace as a particular place to go to work is being replaced with employees working wherever they can be most efficient and productive, whether at home, on a plane, on the road, or a telework center. The availability of affordable technology has been one of the major contributors to the "any time, any place" telecommuting trend. The purpose of this study is to investigate the possibility of the implementation of teleworking at University Utara Malaysia (UUM), the suitable job selection criteria, the …


A Survey On Intrusion Detection Approaches, A Murali M. Rao Aug 2005

A Survey On Intrusion Detection Approaches, A Murali M. Rao

International Conference on Information and Communication Technologies

Intrusion detection plays one of the key roles in computer security techniques and is one of the prime areas of research. Usages of computer network services are tremendously increasing day by day and at the same time intruders are also playing a major role to deny network services, compromising the crucial services for Email, FTP and Web. Realizing the importance of the problem due to intrusions, many researchers have taken up research in this area and have proposed several solutions. It has come to a stage to take a stock of the research results and project a comprehensive view so …


G-Value Decoding Of Greedy Codes, Khalil Ahmad Aug 2005

G-Value Decoding Of Greedy Codes, Khalil Ahmad

International Conference on Information and Communication Technologies

Error-correcting codes are widely used to increase the reliability of transmission of information over various forms of communication channels. Codes with a given minimum distance d can be constructed by a greedy algorithm [2]. In this paper, I proposed a new algorithm for the allocation of g-values to the binary vectors. Hamming (7, 4, 3) code can be generated by the application of greedy algorithm on the binary vectors of length 7 arranged in B-ordering. This code is used to demonstrate a new decoding technique for linear codes in addition to the schemes already known for decoding such as Syndrome …


Optimization Of Semantic Caching For Xml Database, Sharifullah Khan, Awais Hamid Aug 2005

Optimization Of Semantic Caching For Xml Database, Sharifullah Khan, Awais Hamid

International Conference on Information and Communication Technologies

The availability of information on the Internet has increased exponentially the Internet users in the last few years. This made the web servers overloaded. Semantic caches store the semantics and results of the previously asked queries close to the users, in order to answer new queries. The caching reduces the burden of the web servers and optimizes their performance. This paper presents the SMOCE Cache, a framework for semantic caching of XML database. Specialized techniques such as indexing and broadening of semantic regions are proposed for the optimization of semantic caching. The evaluation of prototype proved the significance of proposed …


Knowledge Management In Public Sector Universities Of Pakistan, Eram Abbasi, Arshad Siddiqui Aug 2005

Knowledge Management In Public Sector Universities Of Pakistan, Eram Abbasi, Arshad Siddiqui

International Conference on Information and Communication Technologies

In the modern era of globalization of business, 'Information & Knowledge' is considered as the most vital resource for organizational stability. Businesses significantly depend on efficient management of 'Information' and transforming it into 'Knowledge'. Even though Information and Knowledge have been recognized as the vital resource, still the concepts of 'Information Systems' and 'Knowledge Management' are yet misunderstood. The paper firstly reviews the foundations of Information Systems to establish the basis for the conceptual understanding of 'Knowledge Management'. With these theoretical bases, then a generalized model for 'Knowledge Management' has been proposed. The discussion continues with concepts as to how …


A Dynamic Weight Assignment Approach For Ir Systems, M. Shoaib, Prof Dr. Abad Ali Shah, A. Vashishta Aug 2005

A Dynamic Weight Assignment Approach For Ir Systems, M. Shoaib, Prof Dr. Abad Ali Shah, A. Vashishta

International Conference on Information and Communication Technologies

Weights are assigned to the extracted keywords for partial matching and computing ranking in an IR system. Weight assignment technique is suggested by the IR model that is used for an IR system. Currently suggested weight assignment techniques are static which means that once weight is assigned a keyword it remains unchanged during life-span of an IR system. In this paper, we suggest a dynamic weight assignment technique. This technique can be used by any IR model that supports partial matching.


Using Agents For Unification Of Information Extraction And Data Mining, Sharjeel Imtiaz, Azmat Hussain, Dr. Sikandar Hiyat Aug 2005

Using Agents For Unification Of Information Extraction And Data Mining, Sharjeel Imtiaz, Azmat Hussain, Dr. Sikandar Hiyat

International Conference on Information and Communication Technologies

Early work for unification of information extraction and data mining is motivational and problem stated work. This paper proposes a solution framework for unification using intelligent agents. A Relation manager agent extracted feature with cross feedback approach and also provide a Unified Undirected graphical handle. An RPM agent an approach to minimize loop back proposes pooling and model utilization with common parameter for both text and entity level abstractions.


Design Phase Analysis Of Software Reliability Using Aspect-Oriented Programming, Farhan Rafique, Khalid Mahmood, Tauseef-U- Rehman, Khalid Rashid Aug 2005

Design Phase Analysis Of Software Reliability Using Aspect-Oriented Programming, Farhan Rafique, Khalid Mahmood, Tauseef-U- Rehman, Khalid Rashid

International Conference on Information and Communication Technologies

Software system may have various nonfunctional requirements such as reliability, security, performance and schedulability. If we can predict how well the system will meet such requirements at an early phase of software development, we can significantly save the total development cost and time. Among non-functional requirements, reliability is commonly required as the essential property of the system being developed. Therefore, many analysis methods have been proposed but methods that can be practically performed in the design phase are rare. In this paper we show how design-level aspects can be used to separate reliability concerns from essential functional concerns during software …


Study Of Data Provenance And Annotation Model For Information Reliability Suggested For Pathological Laboratory Environment In Pakistan, Naila Aamir, Aslam Pervez Aug 2005

Study Of Data Provenance And Annotation Model For Information Reliability Suggested For Pathological Laboratory Environment In Pakistan, Naila Aamir, Aslam Pervez

International Conference on Information and Communication Technologies

Trust and reliability of information is a very critical issue of today's information age. Keeping provenance of data not only ensures us about its origination but it also keeps track of all the changes that happen to the data through out its life cycle. In this paper we have discussed the importance of data provenance, difference between Where & Why Provenance and different models for keeping such information. The objective of this study is to select a provenance model which can be implemented in scientific environment of our country. For this purpose we have taken the annotation model and have …


Ergonomics: Implications On Computer End-Users, Maheen Ghauri, Dr. Arshad Siddiqi Aug 2005

Ergonomics: Implications On Computer End-Users, Maheen Ghauri, Dr. Arshad Siddiqi

International Conference on Information and Communication Technologies

Ergonomics is the application of scientific information related to humans to the design of objects, systems and environment for human use. The objective is to apply human characteristics to the design of computer-based work environments to reduce problems of people at work. Lack of ergonomics has serious repercussions on end-users, including physical and mental illnesses. Using ergonomics to design computer-intensive environments would maximize efficiency, productivity and job satisfaction of employees. Unfortunately, in the Government Sector in Pakistan, there is no application of ergonomics in computer-based environments, and this leads to inefficiencies, errors, and safety and health issues. The purpose of …


Visualization Of Retrieved Positive Data Using Blending Function, Muhammad Shoaib, Habib -Ur- Rehman, Dr. Abad Ali Shah Aug 2005

Visualization Of Retrieved Positive Data Using Blending Function, Muhammad Shoaib, Habib -Ur- Rehman, Dr. Abad Ali Shah

International Conference on Information and Communication Technologies

Data visualization is an important technique used in data mining. We present the retrieved data into visual format to discover features and trends inherent to the data. Some features of the data to be retrieved are already known to us. Visualization should preserve these known features inherent to the data. Positivity is one such known feature that is inherent to most of the scientific and business data sets. For example, mass, volume and percentage concentration are meaningful only when they are positive values. However certain visualization techniques do not guarantee to preserve this feature while constructing visualization of retrieved data …


Keynote: Role Of Values & Culture In Information Technology, Prof. Dr. Anis Ahmad Aug 2005

Keynote: Role Of Values & Culture In Information Technology, Prof. Dr. Anis Ahmad

International Conference on Information and Communication Technologies

It is no longer unusual to see, in a remote town in northern area in Pakistan, a practically non-literate wagon driver calling from his Nokia cell phone his uncle in Dubai or in Karachi. He enjoys sharing with him about his success in business and the settlement of family disputes. While he is driving on dangerous curvy roads and having this conversation, in the back seat of the wagon a comparatively young person is playing games on his cell phone. All this was unimaginable a quarter of a century ago.


Keynote: Hexagonal Structure For Intelligent Vision, Xiangjian He, Wenjing Jia Aug 2005

Keynote: Hexagonal Structure For Intelligent Vision, Xiangjian He, Wenjing Jia

International Conference on Information and Communication Technologies

Using hexagonal grids to represent digital images have been studied for more than 40 years. Increased processing capabilities of graphic devices and recent improvements in CCD technology have made hexagonal sampling attractive for practical applications and brought new interests on this topic. The hexagonal structure is considered to be preferable to the rectangular structure due to its higher sampling efficiency, consistent connectivity and higher angular resolution and is even proved to be superior to square structure in many applications. Since there is no mature hardware for hexagonal-based image capture and display, square to hexagonal image conversion has to be done …


The Row-Column Confounded 2MX4N Factorial Design And Its Different Fractions, Md Shamsuddin, Mian A S Adnan Apr 2005

The Row-Column Confounded 2MX4N Factorial Design And Its Different Fractions, Md Shamsuddin, Mian A S Adnan

Conference on Applied Statistics in Agriculture

The row-column confounded 2mX4n factorial designs and its different fractions can be constructed and analyzed using pseudo factors in the 4n portion. (Examples are shown)


The Use Of Pseudo Factors In 4N, 8N, 2MX4N, 2NX8N Factorial Designs, Md Shamsuddin, Mian A S Adnan Apr 2005

The Use Of Pseudo Factors In 4N, 8N, 2MX4N, 2NX8N Factorial Designs, Md Shamsuddin, Mian A S Adnan

Conference on Applied Statistics in Agriculture

The confounded factorial designs of the experiments 4n, 2mX4n, 8n, etc, and their different fractions can be constructed and analyzed using a suitable method of pseudo factors known as Rotation-Conversion Method. An example is shown.


The 3N Circular Factorial Designs: More Robust Estimate Of All Factorial Effects, Md Shamsuddin Apr 2005

The 3N Circular Factorial Designs: More Robust Estimate Of All Factorial Effects, Md Shamsuddin

Conference on Applied Statistics in Agriculture

A 3n circular factorial design which facilitates estimates of all factorial effects providing internal partial confounding with blocks within each of its diameters in different directions is constructed for use in analyzing the multi-directional data of different disciplines. The design possesses small error variance by eliminating the heterogeneity in different directions. An example is given.


Spatial Variability In Aggregation Based On Geostatistical Analysis, Shoufan Fang, George Z. Gertner, Guangxing Wang, Alan B. Anderson Apr 2005

Spatial Variability In Aggregation Based On Geostatistical Analysis, Shoufan Fang, George Z. Gertner, Guangxing Wang, Alan B. Anderson

Conference on Applied Statistics in Agriculture

This study derived the equations for computing the spatial variability in the aggregation of original maps of continuous attributes. The derivation of the equations is based on traditional statistical and geostatistical principles. The derived equations can be used to compute the variance, covariance, and spatial (auto-/cross-) covariance of the aggregated pixels and sub-areas in a given study area. Using the derived equations, the total uncertainty within a study area will not change after aggregation. For a case study, it has been shown that aggregation will reduce the values of variance/covariance and spatial covariance of the aggregated individual pixels. It was …


R2 Statistics For Mixed Models, Matthew Kramer Apr 2005

R2 Statistics For Mixed Models, Matthew Kramer

Conference on Applied Statistics in Agriculture

The R2 statistic, when used in a regression or ANOVA context, is appealing because it summarizes how well the model explains the data in an easy-to-understand way. R2 statistics are also useful to gauge the effect of changing a model. Generalizing R2 to mixed models is not obvious when there are correlated errors, as might occur if data are georeferenced or result from a designed experiment with blocking. Such an R2 statistic might refer only to the explanation associated with the independent variables, or might capture the explanatory power of the whole model. In the latter …


A Bayesian And Covariate Approach To Combine Results From Multiple Microarray Studies, John R. Stevens, R. W. Doerge Apr 2005

A Bayesian And Covariate Approach To Combine Results From Multiple Microarray Studies, John R. Stevens, R. W. Doerge

Conference on Applied Statistics in Agriculture

The growing popularity of microarray technology for testing changes in gene expression has resulted in multiple laboratories independently seeking to identify genes related to the same disease in the same organism. Despite the uniform nature of the technology, chance variation and fundamental differences between laboratories can result in considerable disagreement between the lists of significant candidate genes from each laboratory. By adjusting for known differences between laboratories through the use of covariates and employing a Bayesian framework to effectively account for between-laboratory variability, the results of multiple similar studies can be systematically combined via a meta-analysis. Meta-analyses yield additional information …


A Bayesian Random Coefficient Nonlinear Regression Model For A Split-Plot Experiment, Reid D. Landes, Trey Spencer, Ian A. Zelaya Apr 2005

A Bayesian Random Coefficient Nonlinear Regression Model For A Split-Plot Experiment, Reid D. Landes, Trey Spencer, Ian A. Zelaya

Conference on Applied Statistics in Agriculture

In random coefficients regression, we are often interested in the mean of a certain para-meter particular to the experimental unit (EU). When the mean depends on some treatment regimen, we are then interested in comparing the means among the different treatments. When the EUs are repeatedly measured on a variable containing information about the EU parameter, a standard procedure is to estimate each EU parameter and treat the estimates as the response variables. This is especially true when the regression model for an EU is non-linear. Often, for designed experiments with a factorial treatment structure, the estimated EU parameters are …


Evaluating The Effects Of Monensin Overdose In Dairy Cattle, Rebecca R. Hozak, James T. Symanowski, David G. Mcclary, Meliton N. Novilla, John C. Kube, R. Ken Mcguffey, John I. D. Wilkinson, Howard B. Green, Elvin E. Thomas Apr 2005

Evaluating The Effects Of Monensin Overdose In Dairy Cattle, Rebecca R. Hozak, James T. Symanowski, David G. Mcclary, Meliton N. Novilla, John C. Kube, R. Ken Mcguffey, John I. D. Wilkinson, Howard B. Green, Elvin E. Thomas

Conference on Applied Statistics in Agriculture

Monensin is approved as a feed additive by the FDA Center for Veterinary Medicine to increase milk production efficiency in lactating dairy cattle. To assess the effects of a gross error in mixing monensin into cattle feed, a 10-fold overdose was given for three consecutive days to naïve cows as well as cows previously dosed with monensin within the label range. Cows were evaluated during the overdose and for a subsequent 4 week observation period. Physiological variables were analyzed, including dry matter intake, body weight, body condition score, and serum chemistry profile. Production variables were analyzed, including milk yield and …