{"title":"IT integration in power distribution substation, AADC substations' automation and management","authors":"K. W. Darwish","doi":"10.1109/INNOVATIONS.2011.5893797","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893797","url":null,"abstract":"The objective of this paper is to introduce the Information Technology (IT) adapted by Al Ain Distribution Company (AADC) engineers toward establishing the Smart Grid (SG). In the way to establish a SG the quality of supply is improved in continuous steps along with the desire to protect the environment. The paper presents the IT techniques in the control and monitoring of the medium voltage power distribution substations which shall support the integrity of all intelligent applications and services of distribution management.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116159451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An automated assessment and reporting tool for introductory Java programs","authors":"Fatima AlShamsi, Ashraf Elnagar","doi":"10.1109/INNOVATIONS.2011.5893842","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893842","url":null,"abstract":"This paper presents a graph-based grading system for Java introductory programming courses, eGrader. The assessment process undergoes two stages in succession. Namely, dynamically and statically. This analysis leads to producing detailed feedback reports to both students and instructors. The student report provides a detailed feedback on the submitted code with a total mark break down. In addition to showing the model solution, specific comments on syntax and semantic errors (if any) are provided. On the other hand, the automated class report is a comprehensive document that provides detailed analysis on all students' submissions. The success of eGrader is measured by four performance measures which are sensitivity (97.37%), specificity (98.1%), precision (98.04%) and accuracy (97.07%).","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114410423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey of indoor positioning systems and algorithms","authors":"Klaithem Al Nuaimi, Hesham Kamel","doi":"10.1109/INNOVATIONS.2011.5893813","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893813","url":null,"abstract":"Positioning objects has been an important topic since it is needed to locate people, guide them to a certain place, and assist companies and organizations with their assets management. Several systems and algorithms were proposed to solve the positioning problem and to enhance existing systems. In this paper, we survey various indoor positioning systems to explore the related challenges that exist in this area and evaluate some proposed solutions. We provide a categorization and classification of the current indoor positioning systems and identify some possible areas of enhancements","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129589018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Kiranyaz, Stefan Uhlmann, Jenni Raitoharju, T. Ince, M. Gabbouj
{"title":"Incremental evolution of collective network of binary classifier for content-based image classification and retrieval","authors":"S. Kiranyaz, Stefan Uhlmann, Jenni Raitoharju, T. Ince, M. Gabbouj","doi":"10.1109/INNOVATIONS.2011.5893823","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893823","url":null,"abstract":"In this paper, we propose an incremental evolution scheme within collective network of (evolutionary) binary classifiers (CNBC) framework to address the problem of incremental learning and to achieve a high retrieval performance for content-based image retrieval (CBIR). The proposed CNBC framework can still function even though the training (ground truth) data may not be entirely present from the beginning and thus the system can only be evolved incrementally. The CNBC framework basically adopts a “Divide and Conquer” type approach by allocating several networks of binary classifiers (NBCs) to discriminate each class and performs evolutionary search to find the optimal binary classifier (BC) in each NBC. This design further allows such scalability that the CNBC can dynamically adapt its internal topology to new features and classes with minimal effort. Both visual and numerical performance evaluations of the proposed framework over benchmark image databases demonstrate its efficiency and accuracy for scalable CBIR and classification.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125657191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Countermeasures against consistency anomalies in distributed integrated databases with relaxed ACID properties","authors":"L. Frank","doi":"10.1109/INNOVATIONS.2011.5893830","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893830","url":null,"abstract":"In central databases the consistency of data is normally implemented by using the ACID (Atomicity, Consistency, Isolation and Durability) properties of a DBMS (Data Base Management System). This is not possible if distributed and/or mobile databases are involved and the availability of data also has to be optimized. Therefore, we will in this paper use so called relaxed ACID properties across different locations.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114525085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The unequal protection of Network Coding with multi-generation mixing","authors":"Mohammed D. Halloush, H. Radha","doi":"10.1109/INNOVATIONS.2011.5893837","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893837","url":null,"abstract":"In this paper, we study and analyze the unequal protection characteristic of Network Coding (NC) with Multi-generation Mixing (MGM). MGM supports unequal protection by providing different levels of reliable communication for different groups of sender packets. MGM is a generalized framework for practical network coding that enhances its performance by improving the reliability of delivering sender packets [10]. By employing MGM, generations are created from sender packets. At the same time a mixing set consists of a fixed number of generations. In this paper we analyze the capability of MGM to support unequal protection of MGM mixing set generations.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131449503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experimental evaluation of image compression and transmission for TinyOS-based imote2 platform","authors":"M. Mowafi, F. Awad, E. Taqieddin, O. Banimelhem","doi":"10.1109/INNOVATIONS.2011.5893811","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893811","url":null,"abstract":"In this paper, the performance of JPEG image compression and transmission using TinyOS-based Imote2 wireless sensor network platform is experimentally evaluated via a newly developed testbed. This testbed supports multihop sensor networks based on the Imote2 platform equipped with the Imote2 Multimedia Sensor Board. In addition, a standard JPEG library is embedded into the Imote2 platform to provide in-node image compression. The processing and transmission times, power consumption, and peak-signal-to-noise ratio performance metrics measurements are reported. The results show that the processing requirements are less than those of the transmission. According to the results, a tradeoff between the image quality and the energy and delay costs may be obtained.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130047387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent techniques for image segmentation in cell tracking and mobility analysis","authors":"A.A. Aly, S. Deris, N. Zaki","doi":"10.1109/INNOVATIONS.2011.5893846","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893846","url":null,"abstract":"Segmentation and tracking of cells is important step in cell motility studies. Over the past two decades, researchers have developed powerful methods for detecting and tracking the living cells. To improve the overall living cells tracking systems performance, we focused on developing a novel algorithm for image processing. This paper presents novel image segmentation and tracking system technique to incorporate the advantages of both Topological Alignments and snakes. Where the initial segmentation by Topological Alignments is firstly transformed into the input of the snake model and begins its evolvement to the interested object boundary and analyzes the cells mobility. In our experiments, we compared our algorithm with traditional snake. The results demonstrate that the proposed algorithm achieves accurate tracking for detecting and analyzing the mobility of the living cells. Our results indicate better segmentation and more accurate tracking for detecting and analyzing the mobility of the living cells. We have achieved better tracking and detecting for the cells, also dealing with under and over segmentation.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132843170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Revocation in VANETs: A survey","authors":"Hind Obaid Al Falasi, E. Barka","doi":"10.1109/INNOVATIONS.2011.5893820","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893820","url":null,"abstract":"VANET is short for Vehicular Ad hoc NETwork. Vehicular Ad-Hoc Networks (VANETs) are a special class of Mobile Ad-Hoc Networks (MANETs) where nodes self-organize and self-manage information in a distributed fashion. They consist of vehicles and/or roadside units that assist in the management of the network. A public key infrastructure (PKI) was widely adopted by recent research efforts as a solution to security problems. One part of a PKI solution is certificate revocation. Certificate revocation is one way to terminate the membership of a vehicle from the network. Revocation can also be conducted by the other vehicles participating in the network. This paper is a survey of different revocation schemes developed for VANETs. The purpose of the paper is to survey the literature, and provide an overview of the extent of the research done in the area of revocation in VANETs.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116260491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive scheduling in mobile ad hoc networks using reinforcement learning approach","authors":"Malika Bourenane","doi":"10.1109/INNOVATIONS.2011.5893856","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893856","url":null,"abstract":"This paper presents an adaptive scheduling scheme for quality of service (QoS) provisioning in wireless ad hoc networks. Our proposed scheme models the environment as a Markov Decision Process and uses a reinforcement learning technique that considers, in occurrence of collisions, maximizing the throughput and minimizing the average transmission energy in a wireless environment, by taking into account the channel conditions.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125565488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}