{"title":"Further Cryptanalysis of 'A User Friendly Remote User Authentication Scheme with Smart Cards'","authors":"M.K. Khan","doi":"10.1109/ICIET.2007.4381318","DOIUrl":"https://doi.org/10.1109/ICIET.2007.4381318","url":null,"abstract":"Recently, Wu and Chieu proposed 'a user friendly remote user authentication scheme with smart cards'. We point out that their scheme is vulnerable and susceptible to the attacks and can easily be cryptanalyzed. Their scheme provides only unilateral authentication (only client authentication) and there is no mutual authentication between user and remote system, so their scheme suscepts from the server spoofing attack. Their scheme also suffers from the impersonation attack and an adversary can easily impersonate a valid user. Furthermore, we describe that an adversary can login into the system by copying the data of stolen or lost smart card of a legitimate user. Moreover, we discuss that Wu and Chieu's scheme has poor reparability, which makes it infeasible to implement.","PeriodicalId":167980,"journal":{"name":"2007 International Conference on Information and Emerging Technologies","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124852249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Trust based Security Framework for Pure AODV Network","authors":"I. Raza, S.A. Hussain","doi":"10.1109/ICIET.2007.4381316","DOIUrl":"https://doi.org/10.1109/ICIET.2007.4381316","url":null,"abstract":"This paper presents a trust based security framework to identify malicious nodes in ad hoc on-demand distance vector (AODV) protocol. In this framework each node calculates trust level of its neighboring nodes for route selection. Trust calculation process involves opinions of other nodes about the node whose trust level is to be determined. If a neighboring node has a trust level lower than a predefined threshold value, it is identified as malicious and it is not considered for route selection. The proposed security framework does not use any key distribution process and no changes are made in control packets of AODV. Simulation results show that the proposed framework improves performance of AODV by identifying and removing malicious nodes. Performance of the framework has been evaluated for three different types of malicious attacks (impersonation attack, colluding nodes attack and black hole attack).","PeriodicalId":167980,"journal":{"name":"2007 International Conference on Information and Emerging Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117227963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid Feature Selection Approach for Natural Language Call Routing Systems","authors":"S. Ullah, F. Karray","doi":"10.1109/ICIET.2007.4381322","DOIUrl":"https://doi.org/10.1109/ICIET.2007.4381322","url":null,"abstract":"Call routing based on natural language identification is an important issue for call centres operating in a multilingual scenario. This is due to the fact that it is not possible for a human agent to become fluent in all languages. In this paper, we propose a call routing system based on prosodic and phonetic features to improve the performance of automatic call routing systems. The main focus of this paper is to propose a feature set that efficiently improves the performance of the system without incorporating several sets of features. Our proposed approach for combining the prosodic and phonetic features achieves an accuracy rate of 98.36% for a binary language identification call routing system.","PeriodicalId":167980,"journal":{"name":"2007 International Conference on Information and Emerging Technologies","volume":"2 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126033936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Technology (IT) Industry trends and adaptation of Capability Maturity Model Integration (CMMI) practices in Pakistan","authors":"T. Noor, J. Ahmad, I. Zafar","doi":"10.1109/ICIET.2007.4381327","DOIUrl":"https://doi.org/10.1109/ICIET.2007.4381327","url":null,"abstract":"Pakistan's software industry is quite young as compare to the developed world and particularly in comparison with India. This report presents different statistics about Pakistan's software industry; especially current number of Software-Capability Maturity Model (SW-CMM) / Capability Maturity Model Integration (CMMI) appraisals and efforts made by different institutions like Pakistan Software Export Board (PSEB), Ministry of IT and Pakistan Software Houses Association (PASHA). This study shows that even after introducing attractive incentives and packages by PSEB and Ministry of IT, Pakistan's IT industry is still moving slowly towards adopting the CMMI framework. The reason for this is being highlighted in this paper after a comprehensive study on the topic and software industry's data analysis. On the basis of this analysis few recommendations are also made.","PeriodicalId":167980,"journal":{"name":"2007 International Conference on Information and Emerging Technologies","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126441492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Synergy in USAR Robotics","authors":"H. Sadeghi, H. Bastani","doi":"10.1109/ICIET.2007.4381336","DOIUrl":"https://doi.org/10.1109/ICIET.2007.4381336","url":null,"abstract":"This paper presents an approach for design and implementation of cooperative rescue robots. The objective is to implement robots making search and rescue (SAR) action safe and easy. The approach is based on two robots, the latter fast and agile to take a general view of disaster area, the former well-equipped to explore surrounding details. However the robots are quite different in appearance and capabilities, but they accomplish the SAR task with a close synergy. Abilities of remotely detecting victims, using non-touch sensors, interactive user friendly control interface and following a planned trajectory to guide towards the victims are main facts of the prosperous SAR. Different parts of the synergetic system, robots; sensors, hardware, control interface, mapping and localization are introduced throughout the paper.","PeriodicalId":167980,"journal":{"name":"2007 International Conference on Information and Emerging Technologies","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132411950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optical Fiber Connector Surface Defect Detection Using Wavelets","authors":"A. Rehman, W. Bin Mozaffar","doi":"10.1109/ICIET.2007.4381337","DOIUrl":"https://doi.org/10.1109/ICIET.2007.4381337","url":null,"abstract":"In this paper, a wavelet-based surface defect detection of optical fiber ferrules is proposed. Surface defects on optical fiber connectors can be damaging to passing signals when coupled with other connectors. Our quality control enhancement work is a visual control stage, using magnified images, whereby morphological operations segment the image and wavelet transforms then detect defects on optical fiber connector surfaces to improve the overall acceptability of the manufactured components.","PeriodicalId":167980,"journal":{"name":"2007 International Conference on Information and Emerging Technologies","volume":"1999 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128099997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Speaker Accent Classification System Using a Fuzzy Gaussian Classifier","authors":"S. Ullah, F. Karray","doi":"10.1109/ICIET.2007.4381302","DOIUrl":"https://doi.org/10.1109/ICIET.2007.4381302","url":null,"abstract":"A speaker's accent is the most important factor affecting the performance of automatic speech recognition (ASR) systems. This is due to the fact that accents vary widely, even within the same country or community. The reason may be attributed to the fuzziness between the boundaries of phoneme classes, a result of differences in a speaker's vocal tract and accent. In this paper, a new method of accent classification is proposed that is based on fuzzy Gaussian mixture models (FGMMs). The proposed method first uses a fuzzy clustering to fuzzily partition the data. In this way, fuzzy memberships to the cluster centres are determined by minimizing the distance between the cluster centres and feature vectors. Afterwards, a GMM classifier is trained by using the fuzzy Gaussian parameters to classify the speaker's accent. The experimental results show that the proposed method outperforms the Gaussian Mixture models, Vector Quantization modeling method, Hidden Markov Model, and Radial Basis Neural Networks.","PeriodicalId":167980,"journal":{"name":"2007 International Conference on Information and Emerging Technologies","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128931924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Evaluation of IEEE 802.15.4 Based IPMAC Network","authors":"T. Haider, M. Yusuf","doi":"10.1109/ICIET.2007.4381310","DOIUrl":"https://doi.org/10.1109/ICIET.2007.4381310","url":null,"abstract":"Wireless adoption in industries is gaining momentum. With the recent development on the standardization front by virtue of IEEE 802.15.4 (Zigbee), the critical task of industrial process monitoring and control can be undertaken wirelessly. This switching over to wireless is, however, in the investigative stages with a few early adoptions in the industry. This work studies the performance of an IEEE 802.15.4 based IPMAC network using star topology in a simulated environment. Results so obtained have been analyzed. General recommendations have been made regarding issues pertaining to time criticality and packet loss.","PeriodicalId":167980,"journal":{"name":"2007 International Conference on Information and Emerging Technologies","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115109190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CFiTT - corrupt free file transfer technique","authors":"A. Sultana, M.F. Bashir, M. Qadir","doi":"10.1109/ICIET.2007.4381319","DOIUrl":"https://doi.org/10.1109/ICIET.2007.4381319","url":null,"abstract":"Communication is one of the basic necessities of human beings. File transfer is one of the basic forms of communication. Reliability is the key issue raised due to complex nature of network and growth of computer science. In this paper we have devised a technique for file transfer which identifies whether some portion of the file is received corrupt or not, and if yes then exactly what portion is corrupt. This technique provides reliability by eliminating the corruption from a file, hence requiring less bandwidth of the network by reducing the amount of data to be re-sent in case of corruption. The reliability is ensured with the help of file signature generation method which we have devised in this paper. The beauty of this technique that it generates hashes which are not easy to break, hence ensuring security of the file. We have used TCP as the underlying protocol, whereas TCP is already considered to be reliable, but the fact is that it does not ensure the reliable transfer over the network due to the fact that it uses CRC which is still vulnerable to network conditions and malicious attacks. Our technique operates at the application layer and tries to finish the cope up with the reliability over the file transfer. We have also developed a prototype to test the integrity of our technique. Empirical results ensure the reliability of our technique. The emphasis of this paper is to provide users with the corrupt free file transfer over the network, so that their time and valuable resources might be saved.","PeriodicalId":167980,"journal":{"name":"2007 International Conference on Information and Emerging Technologies","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128300392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}