Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2009

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1501 - 1530 of 7616

Full-Text Articles in Physical Sciences and Mathematics

Analysis And Modeling Of Ducted And Evanescent Gravity Waves Observed In The Hawaiian Airglow, D. B. Simkhada, J. B. Snively, M. J. Taylor, S. J. Franke Aug 2009

Analysis And Modeling Of Ducted And Evanescent Gravity Waves Observed In The Hawaiian Airglow, D. B. Simkhada, J. B. Snively, M. J. Taylor, S. J. Franke

Publications

Short-period gravity waves of especially-small horizontal scale have been observed in the Maui, Hawaii airglow. Typical small-scale gravity wave events have been investigated, and intrinsic wave propagation characteristics have been calculated from simultaneous meteor radar wind measurements. Here we report specific cases where wave structure is significantly determined by the local wind structure, and where wave characteristics are consistent with ducted or evanescent waves throughout the mesopause region. Two of the documented events, exhibiting similar airglow signatures but dramatically different propagation conditions, are selected for simple numerical modeling case studies. First, a Doppler-ducted wave trapped within relatively weak wind flow …


Kiwivault: Encryption Software For Portable Storage Devices, Trevor Bradshaw Florence Aug 2009

Kiwivault: Encryption Software For Portable Storage Devices, Trevor Bradshaw Florence

Theses and Dissertations

While many people use USB flash drives, most do not protect their stored documents. Solutions for protecting flash drives exist but inherently limit functionality found in unprotected drives such as portability, usability, and the ability to share documents between multiple people. In addition, other drawbacks are introduced such as the possibility of losing access to protected documents if a password is lost. Assuming protecting portable documents is important, in order for people to be willing to protect their documents they should be required to make as few sacrifices in functionality as possible. We introduce KiwiVault, a USB flash drive encryption …


Using Bpm As An Interoperability Platform, Dennis Taylor, Hisham Assal, Jens G. Pohl Aug 2009

Using Bpm As An Interoperability Platform, Dennis Taylor, Hisham Assal, Jens G. Pohl

Collaborative Agent Design (CAD) Research Center

Data mediation is an essential component in the Modeling and Simulation field (M&S). Managing multiple data sources and exchanging data among multiple systems requires sophisticated tools and a powerful process management system. Business Process Management (BPM) provides a framework for modeling and managing business activities, both manual and automated, in a consistent manner. Managing automated processes offers an opportunity to integrate external applications into the platform. By integrating automated data transformation tools into the business processes using graphical programming, we provide an approach to achieve operational interoperability among diverse applications without the need for any application to be aware of …


Two Exoplanets Discovered At Keck Observatory, Jeff A. Valenti, Debra A. Fischer, Geoffrey W. Marcy, John Asher Johnson, Gregory W. Henry, Jason T. Wright, Andrew W. Howard, Matthew J. Giguere, Howard Isaacson Aug 2009

Two Exoplanets Discovered At Keck Observatory, Jeff A. Valenti, Debra A. Fischer, Geoffrey W. Marcy, John Asher Johnson, Gregory W. Henry, Jason T. Wright, Andrew W. Howard, Matthew J. Giguere, Howard Isaacson

Information Systems and Engineering Management Research Publications

We present two exoplanets detected at Keck Observatory. HD 179079 is a G5 subgiant that hosts a hot Neptune planet with M sin i = 27.5 M⊕ in a 14.48 days, low-eccentricity orbit. The stellar reflex velocity induced by this planet has a semiamplitude of K = 6.6 m s−1. HD 73534 is a G5 subgiant with a Jupiter-like planet of M sin i = 1.1 MJup and K = 16 m s−1 in a nearly circular 4.85 yr orbit. Both stars are chromospherically inactive and metal-rich. We discuss a known, classical bias in measuring eccentricities for orbits with velocity …


Measurement Of Bottom Versus Charm As A Function Of Transverse Momentum With Electron-Hadron Correlations In P Þ P Collisions At Square Root Of S = 200 Gev, Andrew Marshall Adare, Sergey V. Afanasiev, Christine A. Aidala, N. N. Ajitanand, Yasuyuki Akiba, Gyöngyi Baksay, László A. Baksay, Marcus Hohlmann, S. Rembeczki, Klaus Dehmelt Aug 2009

Measurement Of Bottom Versus Charm As A Function Of Transverse Momentum With Electron-Hadron Correlations In P Þ P Collisions At Square Root Of S = 200 Gev, Andrew Marshall Adare, Sergey V. Afanasiev, Christine A. Aidala, N. N. Ajitanand, Yasuyuki Akiba, Gyöngyi Baksay, László A. Baksay, Marcus Hohlmann, S. Rembeczki, Klaus Dehmelt

Aerospace, Physics, and Space Science Faculty Publications

The momentum distribution of electrons from semileptonic decays of charm and bottom quarks for midrapidity jyj < 0:35 in p þ p collisions at ffiffi s p ¼ 200 GeV is measured by the PHENIX experiment at the Relativistic Heavy Ion Collider over the transverse momentum range 2 < pT < 7 GeV=c. The ratio of the yield of electrons from bottom to that from charm is presented. The ratio is determined using partial D=D ! e KX (K unidentified) reconstruction. It is found that the yield of electrons from bottom becomes significant above 4 GeV=c in pT. A fixed-order-plus-next-to-leading-log perturbative quantum chromodynamics calculation agrees with the data within the theoretical and experimental uncertainties. The extracted total bottom production cross section at this energy is bb ¼ 3:2þ1:2 1:1ðstatÞ þ1:4 1:3ðsystÞb.


Existence Of Pseudo Almost Automorphic Solutions For The Heat Equation With Sp-Pseudo Almost Automorphic Coefficients, Toka Diagana, Ravi P. Agarwal Aug 2009

Existence Of Pseudo Almost Automorphic Solutions For The Heat Equation With Sp-Pseudo Almost Automorphic Coefficients, Toka Diagana, Ravi P. Agarwal

Mathematics and System Engineering Faculty Publications

We obtain the existence of pseudo almost automorphic solutions to the N-dimensional heat equation with Sp-pseudo almost automorphic coefficients.


Cardiac And Renal Function Are Progressively Impaired With Aging In Zucker Diabetic Fatty Type Ii Diabetic Rats, John W. Baynes, David B. Murray Aug 2009

Cardiac And Renal Function Are Progressively Impaired With Aging In Zucker Diabetic Fatty Type Ii Diabetic Rats, John W. Baynes, David B. Murray

Faculty Publications

This study investigated the temporal relationship between cardiomyopathy and renal pathology in the type II diabetic Zucker diabetic fatty (ZDF) rat. We hypothesized that changes in renal function will precede the development of cardiac dysfunction in the ZDF rat. Animals (10 weeks old) were divided into four experimental groups: Lean Control (fa/?) LC(n = 7), untreated ZDF rats (n = 7) sacrificed at 16 weeks of age, and LC (n = 7) untreated ZDF rats (n = 9) sacrificed at 36 weeks of age. LV structural/functional parameters were assessed via Millar conductance catheter. Renal function was evaluated via markers of …


Root Production And Methane Dynamics: Impact Of Wetland Functional Group Diversity And Composition, Rachel Schultz, Virginie Bouchard, Serita D. Frey Aug 2009

Root Production And Methane Dynamics: Impact Of Wetland Functional Group Diversity And Composition, Rachel Schultz, Virginie Bouchard, Serita D. Frey

Faculty Publications

Background/Question/Methods: The loss of biodiversity worldwide has prompted a close investigation of the link between diversity and ecosystem functions. Most experimental studies have looked at the relationship between grassland plant diversity and aboveground productivity. Less is known about other ecosystems or how diversity affects belowground processes. Our objective was to investigate the link between plant community (diversity and composition) and key belowground processes such as root biomass production and CH4 dynamics in wetland ecosystems. We hypothesized that 1) root biomass would increase with functional group diversity due to complementarity and 2) the sediment pool of CH4 would decrease with diversity …


Loaxahatchee Impoundment Landscape Assessment (Lila): Tree Island Experiments And Management; May 1, 2005 To September 4, 2009: Final Report, Leonard J. Scinto, René Price, Michael Ross Aug 2009

Loaxahatchee Impoundment Landscape Assessment (Lila): Tree Island Experiments And Management; May 1, 2005 To September 4, 2009: Final Report, Leonard J. Scinto, René Price, Michael Ross

SERC Research Reports

Hydrologic modifications have negatively impacted the Florida Everglades in numerous significant ways. The compartmentalization of the once continuously flowing system into the Water Conservation Areas (WCAs) caused disruption of the slow natural flow of water south from Lake Okeechobee through the Everglades to Florida Bay. The ponding of water in the WCAs, the linking of water flow to controlled water levels, and the management of water levels for anthropogenic vs. ecological well-being has caused a reduction in the spatial heterogeneity of the Everglades leading to greater uniformity in topography and vegetation. These effects are noticeable as the degradation in structure …


Single Molecule Force Spectroscopy On G-Quadruplex Dna, Susanna Lynch, Heather Baker, Sarah G. Byker, Dejian Zhou Aug 2009

Single Molecule Force Spectroscopy On G-Quadruplex Dna, Susanna Lynch, Heather Baker, Sarah G. Byker, Dejian Zhou

University Faculty Publications and Creative Works

A study was conducted to demonstrate the first atomic force microscopy (AFM) based investigation of single-molecule (SM) force spectroscopy (FS). A bimolecular G-quadruplex formed between the AFM probe and a gold surface was used as the model system to conduct the investigations. A gold-coated Si 3N4 probe and a flat gold surface were functionalized with a self-assembled monolayer (SAM) of the 3G or 4G DNA. A loading rate dependence investigation was conducted to estimate kinetic and thermodynamic parameters of the 3G and 4G quadruplexes. Rupture forces were measured at loading rates ranging from 1027-43 500 pNs-1. It was observed that …


Single Molecule Force Spectroscopy On G-Quadruplex Dna, Susanna Lynch, Heather Baker, Sarah G. Byker, Dejian Zhou Aug 2009

Single Molecule Force Spectroscopy On G-Quadruplex Dna, Susanna Lynch, Heather Baker, Sarah G. Byker, Dejian Zhou

University Faculty Publications and Creative Works

A study was conducted to demonstrate the first atomic force microscopy (AFM) based investigation of single-molecule (SM) force spectroscopy (FS). A bimolecular G-quadruplex formed between the AFM probe and a gold surface was used as the model system to conduct the investigations. A gold-coated Si 3N4 probe and a flat gold surface were functionalized with a self-assembled monolayer (SAM) of the 3G or 4G DNA. A loading rate dependence investigation was conducted to estimate kinetic and thermodynamic parameters of the 3G and 4G quadruplexes. Rupture forces were measured at loading rates ranging from 1027-43 500 pNs-1. It was observed that …


Wireless Networks: Spert: A Stateless Protocol For Energy-Sensitive Real-Time Routing For Wireless Sensor Network, Sohail Jabbar, Abid Ali Minhas, Raja Adeel Akhtar Aug 2009

Wireless Networks: Spert: A Stateless Protocol For Energy-Sensitive Real-Time Routing For Wireless Sensor Network, Sohail Jabbar, Abid Ali Minhas, Raja Adeel Akhtar

International Conference on Information and Communication Technologies

Putting constraints on performance of a system in the temporal domain, some times turns right into wrong and update into outdate. These are the scenarios where apposite value of time inveterate in the reality. But such timing precision not only requires tightly scheduled performance constraints but also requires optimal design and operation of all system components. Any malfunctioning at any relevant aspect may causes a serious disaster and even loss of human lives. Managing and interacting with such real-time system becomes much intricate when the resources are limited as in wireless sensor nodes. A wireless sensor node is typically comprises …


Software Engineering: Security Characterization For Evaluation Of Software Architectures Using Atam, Asad Raza, Haider Abbas, Louise Yngstrom, Ahmed Hemani Aug 2009

Software Engineering: Security Characterization For Evaluation Of Software Architectures Using Atam, Asad Raza, Haider Abbas, Louise Yngstrom, Ahmed Hemani

International Conference on Information and Communication Technologies

Significant technological advancement in the current electronic era has influenced the work processes of private and government business entities. E-Government is one such area where almost every country is emphasizing and automating their work processes. Software architecture is the integral constituent of any software system with not only cumbersome modeling and development but require heedful evaluation. Considering this aspect we have highlighted in this paper, security evaluation of an ongoing e-society project ESAM using Architectural Tradeoff Analysis Method (ATAM). ESAM is a Web based system intended to provide e-services to the Swedish community residents. ATAM is primarily used for architectural …


Wireless Networks: Certificateless Id-Based Authentication Using Threshold Signature For P2p Manets, Aasia Samreen, Seema Ansari Aug 2009

Wireless Networks: Certificateless Id-Based Authentication Using Threshold Signature For P2p Manets, Aasia Samreen, Seema Ansari

International Conference on Information and Communication Technologies

As far as the security of MANET (mobile and ad hoc network) is concerned, it depends upon the secure authentication especially for P2P MANETs. Identity based encryption was introduced to construct Public Key without requiring a certificate. Therefore, certificateless authentication combined with threshold digital signature and efficient key generation using identities such as IP address, are the challenging issues in front of researchers. In this paper we have addressed the problem of identity based secure authentication employing well-known RSA algorithm and secret sharing to generate threshold signature on a message.


Software Engineering: An Open Source Service Oriented Mobile Business Intelligence Tool (Mbit), Bushra Sajjad, A. Mir, A. Khawar, F. Bashir, A. Tariq Aug 2009

Software Engineering: An Open Source Service Oriented Mobile Business Intelligence Tool (Mbit), Bushra Sajjad, A. Mir, A. Khawar, F. Bashir, A. Tariq

International Conference on Information and Communication Technologies

Corporate executives require relevant and intelligent business information in real-time to take strategic decisions. They require the freedom to access this information anywhere and anytime. There is a need to extend this functionality beyond the office and on the fingertips of the decision makers. Mobile Business Intelligence Tool (MBIT) aims to provide these features in a flexible and cost-efficient manner. This paper describes the detailed architecture of MBIT to overcome the limitations of existing mobile business intelligence tools. Further, a detailed implementation framework is presented to realize the design. This research highlights the benefits of using service oriented architecture to …


Software Engineering: A Pattern For The Effective Use Of Object Oriented Databases, Muhammad Ubaid, Nauman Atique, Saira Begum Aug 2009

Software Engineering: A Pattern For The Effective Use Of Object Oriented Databases, Muhammad Ubaid, Nauman Atique, Saira Begum

International Conference on Information and Communication Technologies

In object oriented scenario, inheritance is a process to make new classes by using classes that have already been defined. Inheritance helps to reuse existing code, by adding together of properties will enhance all new child objects without interfering with their existing ties. In object-oriented programming, an object is instance of class that consists of data and the methods, allows binding for them and operate on that data, stored in the memory of a running application. This paper presents a methodology of class hierarchy with the normalization in object oriented databases. CHNF (class hierarchy normal form) is good concept for …


Application Of Ict Ii: Analytic Network Process Applied To R&D Project Selection, Murad Habib, Raza Khan, Javaid L. Piracha Aug 2009

Application Of Ict Ii: Analytic Network Process Applied To R&D Project Selection, Murad Habib, Raza Khan, Javaid L. Piracha

International Conference on Information and Communication Technologies

Research and development (R&D) project selection is a complex decision-making process. Risks and uncertainties are also associated with the investments and returns of R&D projects. This research paper illustrates an application of ANP (analytic network process). The analytic network process (ANP) is presented as a potentially valuable method to support the selection of projects in a research and development (R&D) environment. The AHP (analytic hierarchy process) is employed to break down large unstructured decision problems into manageable and measurable components. The ANP, as the general form of AHP, is powerful to deal with complex decisions where interdependence exists in a …


Wireless Networks: Automated Frequency Distribution, Management & Assignment (Afdma) In Ieee 802.16, Khurram Shehzad, A. Ali, F. Rasool, R. M. Hashmi, A. Zubair, R. L. Ali Aug 2009

Wireless Networks: Automated Frequency Distribution, Management & Assignment (Afdma) In Ieee 802.16, Khurram Shehzad, A. Ali, F. Rasool, R. M. Hashmi, A. Zubair, R. L. Ali

International Conference on Information and Communication Technologies

Frequency is amongst the most exclusive and most costly resources in wireless communication networks, especially, while considering the demands of broadband wireless access (BWA). In BWA, the management of frequency distribution and its effective utilization is of utmost importance. This research explores possible ways to ensure the most effective allocation of bandwidth resources and their best possible utilization on need basis. The model for static frequency allocation has been optimized and the dynamic frequency management has been calculated while dividing the users in different user classes on the basis of their needs and requirements. The effect of ping-pong handovers has …


Wireless Networks: Improved Secure Network Authentication Protocol (Isnap) For Ieee 802.16, Raheel M. Hashmi, Arooj M. Siddiqui, M. Jabeen, K. Shehzad, A. Zubair, K. S. Alimgeer Aug 2009

Wireless Networks: Improved Secure Network Authentication Protocol (Isnap) For Ieee 802.16, Raheel M. Hashmi, Arooj M. Siddiqui, M. Jabeen, K. Shehzad, A. Zubair, K. S. Alimgeer

International Conference on Information and Communication Technologies

Security is amongst one of the major issues in broadband wireless access (BWA) networks. After the launch of the IEEE 802.16 standard (WiMAX), a number of security issues were reported in several articles. Ever since the beginning, work has been in progress for the neutralization of these identified threats. In this paper, the analysis of the authentication protocols implemented in WiMAX has been presented along with the description of the threats posed to them. The paper also describes security sub-layer and limitations of the existing architecture. An approach has also been presented for the prevention of these threats like the …


Application Of Ict Ii: Considerations On The Validity Constraints For The Bistatic Sar Processing, Qurat Ul-Ann, Otmar Loffeld, Holger Nies, Robert Wang Aug 2009

Application Of Ict Ii: Considerations On The Validity Constraints For The Bistatic Sar Processing, Qurat Ul-Ann, Otmar Loffeld, Holger Nies, Robert Wang

International Conference on Information and Communication Technologies

This paper gives some considerations on the validity constraints for spaceborne/airborne configurations, based on Loffeld's bistatic formula (LBF) for unequal azimuth contribution of transmitter and receiver phase terms.


Software Engineering: Application Of 80/20 Rule In Software Engineering Waterfall Model, Muzaffar Iqbal, Muhammad Rizwan Aug 2009

Software Engineering: Application Of 80/20 Rule In Software Engineering Waterfall Model, Muzaffar Iqbal, Muhammad Rizwan

International Conference on Information and Communication Technologies

Software process is the most important part of software project management, and software process models are important means of implementing the software process in any software organization. When there is need to improve the software process, then the need to improve the work-task part (software process models) of the software process must arise. As, there is need of increasing the commitment of software project managers through out the software development life cycle (SDLC), so we need to give them the list of activities in Waterfall Model, which should be made efficient by the software development team, to get the 80% …


Application Of Ict Iii: Use Of Information And Mobile Computing Technologies In Healthcare Facilities Of Saudi Arabia, Abdul Ahad Siddiqi, Munir Ahmed, Yasser M. Alginahi, Abdulrahman Alharby Aug 2009

Application Of Ict Iii: Use Of Information And Mobile Computing Technologies In Healthcare Facilities Of Saudi Arabia, Abdul Ahad Siddiqi, Munir Ahmed, Yasser M. Alginahi, Abdulrahman Alharby

International Conference on Information and Communication Technologies

Information technology forms an important part of the healthcare solution. Accurate and up-to-date information is essential to continuous quality improvement in any organization, and particularly so in an area as complex as healthcare. Therefore, diverse information systems must be integrated across the healthcare enterprise. The knowledge base in the medical field is large, complex, and growing rapidly. It includes scientific knowledge, as well as familiarity with the day-to-day business of providing healthcare. It is crucial to identify the processes in the healthcare sector that would most benefit from the support of information technology. This study is focused on the analysis …


Networks - Ii: Development Of Symmetric Cryptosystem Using Matrices With Less Overhead On Communication Channel, Jalal F. Al-Muhtadi, Abdul Basit, Maqsood Mahmud Aug 2009

Networks - Ii: Development Of Symmetric Cryptosystem Using Matrices With Less Overhead On Communication Channel, Jalal F. Al-Muhtadi, Abdul Basit, Maqsood Mahmud

International Conference on Information and Communication Technologies

Many systems have been developed by mathematicians using symmetric and Asymmetric Cryptography e.g. Ceaser Cipher, Stream Ciphers, RSA, DES, IDEA, RC-4, ElGamal signatures, LFSR, Ext. Euclidean Algorithm, Lamport Signatures, Merkle Hellman Knapsack. Etc [1]. Some of them are very strong to be broken by cryptanalysts. Some are very easy and even can be broken by the measuring the frequency of alphabets in a specific cipher text. All these system carries some overhead of key with which a plain text is encrypted, for the communication channel. I thought of an idea in which product component which will be 5*1 matrix will …


Networks - Ii: A New Rough Set Based Approach For Optimized Detection Of Available Resources In Grid Computing, Asgarali Bouyer, Mohd Noor Md Sap, Abdul Hanan Abdullah Aug 2009

Networks - Ii: A New Rough Set Based Approach For Optimized Detection Of Available Resources In Grid Computing, Asgarali Bouyer, Mohd Noor Md Sap, Abdul Hanan Abdullah

International Conference on Information and Communication Technologies

Since the grid is a dynamic environment, the prediction and detection of available resources in near future is important for resource scheduling. Economic-based grid management has been viewed as a feasible approach to carry out fair, efficient and reliable scheduling. One key issue in economic-based grid strategy is to inform about available resources. In this paper, we present a novel predictable method to specify available resource in economic-based grid. This method use a rough set analysis by scheduler to divide resources in groups and then grant a priority to each group based on cost price and efficiency of nodes. The …


Artificial Intelligence – Ii: Anomaly Detection In Data Streams Using Fuzzy Logic, Muhammad Umair Khan Aug 2009

Artificial Intelligence – Ii: Anomaly Detection In Data Streams Using Fuzzy Logic, Muhammad Umair Khan

International Conference on Information and Communication Technologies

Unsupervised data mining techniques require human intervention for understanding and analysis of the clustering results. This becomes an issue in dynamic users/applications and there is a need for real-time decision making and interpretation. In this paper we will present an approach to automate the annotation of results obtained from data stream clustering to facilitate interpreting that whether the given cluster is an anomaly or not. We use fuzzy logic to label the data. The results will be obtained on the basis of density function & the number of elements in a certain cluster.


Networks - Ii: Overhead Analysis Of Security Implementation Using Ipsec, Muhammad Awais Azam, Zaka -Ul- Mustafa, Usman Tahir, S. M. Ahsan, Muhammad Adnan Naseem, Imran Rashid, Muhammad Adeel Aug 2009

Networks - Ii: Overhead Analysis Of Security Implementation Using Ipsec, Muhammad Awais Azam, Zaka -Ul- Mustafa, Usman Tahir, S. M. Ahsan, Muhammad Adnan Naseem, Imran Rashid, Muhammad Adeel

International Conference on Information and Communication Technologies

Authentication, access control, encryption and auditing make up the essential elements of network security. Researchers have dedicated a large amount of efforts to implement security features that fully incorporate the use of all these elements. Currently, data networks mainly provide authentication and confidentiality services. Confidentiality alone is not able to protect the system, thus, suitable security measures must be taken. However, this security is itself an overhead which must be accounted for. A trade-off must exist between performance and security. This trade-off must be carefully managed so as not to deteriorate the systems being secured. This calls for the true …


Networks - Ii: Formal Modeling Of Trust In Semantic Grid Registry, Saba Mahmood, Saman Iftikhar, Hafiz Farooq Ahmad, Farah Mahmood Aug 2009

Networks - Ii: Formal Modeling Of Trust In Semantic Grid Registry, Saba Mahmood, Saman Iftikhar, Hafiz Farooq Ahmad, Farah Mahmood

International Conference on Information and Communication Technologies

In this paper we have analyzed and developed a formal specification of a trust model in semantic grid registry. This paper formalizes the basic requirements of a trust model in case of semantic grid registry. We have described the flow of operations of our system through links and processes in the system architecture. The system is formally modeled in pi-calculus. Finally we transformed the specification to pi- ADL and generated code using Archware tool. We have already developed a semantic grid registry.


Decision Making, Philadelphia University Aug 2009

Decision Making, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Data Mining: Assessment Of Features Quality Of Class Discrimination Using Arif Index And Its Application To Physiological Datasets, Dr. Muhammad Arif, A. Fida Aug 2009

Data Mining: Assessment Of Features Quality Of Class Discrimination Using Arif Index And Its Application To Physiological Datasets, Dr. Muhammad Arif, A. Fida

International Conference on Information and Communication Technologies

Quality of features determines the maximum achievable accuracy by any arbitrary classifier in pattern classification problem. In this paper, we have proposed an index that can assess the quality of features in discrimination of patterns in different classes. This index is in-sensitive to the complexity of boundary separating different classes if there is no overlap among features of different classes. Proposed index is model free and requires no clustering algorithm to discover the clustering structure present in the feature space. It is only based on the information of local neighborhood of feature vectors in the feature space. This index can …


Application Of Ict - I: Using Point-To-Point 1550nm Laser For Outdoor Mobility, Roshan A. Shaikh, Abdul Basit Aug 2009

Application Of Ict - I: Using Point-To-Point 1550nm Laser For Outdoor Mobility, Roshan A. Shaikh, Abdul Basit

International Conference on Information and Communication Technologies

Significant implementation challenges exist in wireless backbone connectivity. Typical optical wireless communication topologies are evaluated. A fresh approach using 1550nm Wavelength laser to design protocol and topology for point-to-point outdoor connectivity is carried out. Matlab simulation results support the 1550nm laser as a good choice for outdoor connectivity for optical wireless communication. New design and topology for an optical wireless communication system is suggested with special consideration of security and recommendation for the optimal use of such a technology is suggested.