{"title":"Towards a cloud-based framework for context management","authors":"E. Badidi, Ikbal Taleb","doi":"10.1109/INNOVATIONS.2011.5893849","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893849","url":null,"abstract":"With the advances in sensing technology and the proliferation of mobile devices and applications, provisioning of context information has been a particularly common research topic. Many research works have proposed, designed, and implemented frameworks and middleware infrastructures for context management. High-level context information is typically acquired from context services that aggregate raw context information sensed by sensors and mobile devices. Given the massive amount of context data processed and stored by context services and the widespread penetration of cloud computing technology in the industry, context providers now can leverage their services by deploying them on the cloud. In this paper, we describe a novel framework for context management that relies on cloud-based context services. One of the benefits of the approach is that context providers can scale up and down depending on current demand for context information.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127959862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hierarchical categorization tree based on a combined unsupervised-supervised classification","authors":"M. Mejdoub, C. Ben Amar","doi":"10.1109/INNOVATIONS.2011.5893800","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893800","url":null,"abstract":"K-nearest neighbor (KNN) classification is an instance-based learning algorithm that has shown to be very effective when classifying images described by local features. In this paper, we present a combined unsupervised and supervised classification tree based on local descriptors and the KNN algorithm. The proposed tree outperforms the classification accuracy of the exact KNN algorithm.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128262572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Khosravi R. Hossein, M. H. Yaghmaee Moghaddam, Amirhossein Baradaran Shahroudi, H. Yazdi
{"title":"FCM-fuzzy rule base: A new rule extraction mechanism","authors":"Khosravi R. Hossein, M. H. Yaghmaee Moghaddam, Amirhossein Baradaran Shahroudi, H. Yazdi","doi":"10.1109/INNOVATIONS.2011.5893829","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893829","url":null,"abstract":"Regardless of creation method, Fuzzy rules are of great importance in the implementation and optimization systems. Although using human knowledge in creating Fuzzy rules, has the advantage of readability and is near the experimental expertise, but it cannot be implemented in all systems. Since Output of a system is based on its correct function over the time, output data is reliable with higher percentage. In this paper, Fuzzy rules are extracted from a decision tree, constructed from the output of the system. In fact, traversing the decision tree leads to producing fuzzy rules. Decision tree which presented, is innovative, in comparison with previous implementations, and could also be regarded as new solution in classification. First advantage of the new decision tree to C4.5 (which is the most widely used as a common decision-making structure), is its capability of deciding on more than one feature simultaneously which is not provided in C4.5. Not producing a definite answer and result improvement in iterative processes are also other benefits of the new presented method.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134300011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A multilayer control framework for distribution systems with high DG penetration","authors":"H. Farag, E. El-Saadany, L. El Chaar","doi":"10.1109/INNOVATIONS.2011.5893877","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893877","url":null,"abstract":"In this paper, a multilayer distributed multi-agent framework under the smart grid umbrella is proposed as a control structure to tackle technical challenges for distribution systems with high penetration of distributed generation. The proposed multi-agent control structure has been divided into three main layers. In the first layer, the functions of the local agents is defined according to the concept of intelligent agents and the characteristic of the individual DG and utility devices such as load tap changer, shunt capacitors and protection devices. Based on the concepts of microgrids, cells and virtual power plants, regional coordination agents are defined and chosen as a second layer. To achieve global objective(s), the distribution management system DMS is selected as the highest layer supervisor agent.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128165632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Non-uniform signal constellation for iteratively decoded bit interleaved coded modulation (BICM-ID) with convolution and LDPC codes","authors":"Tarek Arafa, W. Sauer-Greff, R. Urbansky","doi":"10.1109/INNOVATIONS.2011.5893825","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893825","url":null,"abstract":"Bit interleaved coded modulation with iterative demapping and decoding (BICM-ID) is an effective technique to achieve high spectral efficiency with performance close to capacity limits. However, the use of non-uniform signal constellation following a Gaussian distribution instead of conventional equiprobable signaling provides a further improvement, i.e. shaping gain. In this paper, we investigate the effect of nonuniform constellation on the performance of BICM-ID systems with different forward error correction (FEC) coding schemes such as convolution code and low-density parity-check (LDPC) code as outer code. Simulation results show that the non-uniform constellations can offer a shaping gain up to 0.21 dB.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128942627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Novel pseudorandom phase generation in transform domain communication systems","authors":"Haixin Sun, G. Bi, Yongliang Guan, Yaowu Shi","doi":"10.1109/INNOVATIONS.2011.5893814","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893814","url":null,"abstract":"Transform domain communication system (TDCS) and wavelet domain communication system (WDCS) have been reported to have interference avoiding capability under adverse environmental conditions. These systems achieve low probability of intercept (LPI) and orthogonality simultaneously by using the pseudorandom (PR) sequences for generating the phase vector of the basic function. Conventionally, the PR phase vectors in TDCS and WDCS were generated by a maximal length binary PR sequence (m-sequence), which allows only a relatively small number of users in the systems. This paper reports a method to increase the user capacity of TDCS and WDCS by applying Gold sequence to generate the PR phase vector of the basic function. The increased user capacity of the systems based on Gold sequence is tabulated. Simulation results also demonstrate that by using Gold sequences for the PR phase generation, both TDCS and WDCS can provide a comparable interference avoiding capability with a larger user capacity, compared to those of the systems based on m-sequences in multiple access environments.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132011191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nazar Radhi, Kahtan Aziz, Sofian Hamad, H. Al-Raweshidy
{"title":"Estimate primary user localization using cognitive radio networks","authors":"Nazar Radhi, Kahtan Aziz, Sofian Hamad, H. Al-Raweshidy","doi":"10.1109/INNOVATIONS.2011.5893854","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893854","url":null,"abstract":"The location awareness of the primary user is one of the essential features of cognitive radios. The Location information of the primary user in cognitive radio can be used to assist the communication among secondary users outside the transmission coverage area of primary users or to track the primary users. A cognitive radio network based localization scheme is considered in this paper uses received signal strength (RSS) method to estimate the position and effective isotropic radiated powers of the transmitter source emitting this signal. In our investigation the simulation result for RSS-based localization show the impacts of number of sampling, nodes, sigma variable in the shadowing channel model on mean square error for position estimation and average power estimation error were illustrated.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131211441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A context aware approach to semantic query expansion","authors":"N. Ahmadian, M. Nematbakhsh, H. Vahdat-Nejad","doi":"10.1109/INNOVATIONS.2011.5893868","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893868","url":null,"abstract":"Keyword based search scheme imposes the problem of representing a lot of web pages in the search engines. Query expansion with relevant words increases the performance of search engines, but finding and using the relevant words is an open problem. In this research we describe a new model for query expansion which employs user context and semantic concepts to discover new words for obtaining accurate results. Experimental results show an enhancement on information retrieval performance comparing to the traditional approaches.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120969784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WHOP: Wormhole attack detection protocol using hound packet","authors":"Saurabh Gupta, Subrat Kar, S. Dharmaraja","doi":"10.1109/INNOVATIONS.2011.5893822","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893822","url":null,"abstract":"The lack of centralised infrastructure in ad hoc network makes it vulnerable to various attacks. MANET routing disrupts if participating node do not perform its intended function and start performing malicious activity. A specific attack called Wormmhole attack enables an attacker to record packets at one location in the network, tunnels them to another location, and retransmits them into the network. In this paper, we present a protocol for detecting wormhole attacks without use of any special harware such as directional antenna and precise synchronised clock and the protocol is also independent of physical medium of wireless network. After the route discovery, source node initiates wormhole detection process in the established path which counts hop difference between the neighbours of the one hop away nodes in the route. The destination node detects the wormhole if the hop difference between neighbours of the nodes exceeds the acceptable level. Our simulation results shows that the WHOP is quite excellent in detecting wormhole of large tunnel lengths","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123145472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}