{"title":"Predicting Number of Attackers Using Regression Anlaysis","authors":"Krishan Kumar, R. Joshi, K. Singh","doi":"10.1109/ICICT.2007.375402","DOIUrl":"https://doi.org/10.1109/ICICT.2007.375402","url":null,"abstract":"Anomaly based DDoS detection involves deviation from thresholds set in normal condition. This deviation can be used for estimating number of attackers. We use ns-2 as simulation test bed for launching DDoS attacks using well known DDoS attack tools with varied number of attackers. A new relationship is established between estimated number of attackers and drift from normal value using Regression. Error in relationship is graphically depicted by highlighting number of false positives/negatives. An Internet type topology is used to test our scheme.","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121010468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Extended Algorithm to Enhance the Performance of the Current NAPT","authors":"M. S. Ferdous, F. Chowdhury, J. Acharjee","doi":"10.1109/ICICT.2007.375401","DOIUrl":"https://doi.org/10.1109/ICICT.2007.375401","url":null,"abstract":"In this paper, we present an enhanced version algorithm for Network Address Port Translation (NAPT) flavor of Traditional Network Address Translation (NAT). Current version algorithm of NAPT allows mapping of tuples of the type (Local Source IP addresses, Source TU port number) to tuples of the type (registered NAT router IP address, assigned TU port number). But our proposed enhanced algorithm utilizes not only Local Source IP address and Source Port number but also global Destination IP address (True IP) and Destination port number. This proposed algorithm slightly improves the efficiency of the current NAPT and reduces one of the constraints of the current NAPT.","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127993716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effect of Timing Synchronization Error on the Bit Error Rate Performance of an OFDM System","authors":"M. Harun-Owr-Roshid, S. Majumder","doi":"10.1109/ICICT.2007.375381","DOIUrl":"https://doi.org/10.1109/ICICT.2007.375381","url":null,"abstract":"Performance of an orthogonal frequency division multiplexing (OFDM) transmission system is evaluated analytically taking into considerations the combined influence of receiver noise, Rayleigh fading and the timing error due to imperfect slot synchronization at the receiver. Performance results are presented in terms of bit error rate (BER) at a bit rate of 100 kbps in the presence of inter-channel interference (ICI) and intersymbol interference (ISI) and additive white Gaussian channel noise. The power penalty suffered by the system due to above system imperfections is also determined at a BER of 10-6. The results show that there is a significant degradation in system BER due to timing error. The computed results show that the penalty suffered by the system only due to timing synchronization error is about 2.0 dB corresponding to timing bit errors to the right of m = 10 and is 5.25 dB for m = 14.","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126450902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Secure Quantization-Based Watermarking Scheme Using An Improved Statistical Model in the Wavelet Domain","authors":"S. Rezazadeh, A. Rafiei","doi":"10.1109/ICICT.2007.375385","DOIUrl":"https://doi.org/10.1109/ICICT.2007.375385","url":null,"abstract":"In this paper, we have proposed a secure semi-fragile watermarking technique for content authentication of digital images. A binary image is encrypted in an efficient way and then embedded as the watermark for tamper detection. The watermark is embedded by applying a quantization index modulation process on Euclidean norm of singular values of blocks in the wavelet domain. To avoid visual degradation of watermarked image, we have enhanced a model to take into consideration blocks statistics of the host image. Experimental results are presented for well known images to demonstrate effectiveness of our method.","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132821860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Planar Tree Transformation through Flips","authors":"M. Kamrul Islam, S. Haque","doi":"10.1109/ICICT.2007.375332","DOIUrl":"https://doi.org/10.1109/ICICT.2007.375332","url":null,"abstract":"A flip or edge-replacement is considered as a transformation by which one edge e of a geometric object is removed and an edge f (f ne e) is inserted such that the resulting object belongs to the same class as the original object. Here, we consider planar trees as geometric objects. In this paper, we present a technique for transforming a given planar tree into another one for a set S of n points in general position in the plane. We show that any planar tree can be transformed into another planar tree by at most 2n-k-s-2 (0(n)) flips (k > 0 and s > 0 are defined later) which is an improvement of the result in [3].","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133652458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Three Level Broker Framework for Global Service - Oriented Utility Grid","authors":"K. Narmadha, S. Selvi","doi":"10.1109/ICICT.2007.375372","DOIUrl":"https://doi.org/10.1109/ICICT.2007.375372","url":null,"abstract":"The topology of brokers is very important in a global service-oriented utility grid for serving both the users' and service providers' interests. A three level broker framework is proposed in this paper in which the brokers are not bound to any particular domain. Hence the users and service providers are free to choose the broker they wish. The framework is designed in such a way that the brokers are organized into three levels. A Level 1(L1) broker is assisted by many Level 2(L2) brokers and a L2 broker may be assisted by many Level 3(L3) brokers. Users interact with LI brokers only. L2 brokers are classified according to the type of resources. L3 brokers are classified based on the resources under a L2 broker. A L1 broker contacts L2 brokers, which in turn may contact L3 brokers for selecting the requested resources.","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125204191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bit Error Rate and Crosstalk Performance in Optical Cross Connect without Wavelength Converter","authors":"Ngee Thiam Sim, S. Majumder, M.S. Islam","doi":"10.1109/ICICT.2007.375379","DOIUrl":"https://doi.org/10.1109/ICICT.2007.375379","url":null,"abstract":"Aa analytical approach is presented for modeling crosstalk and to evaluate the bit error rate (BER) performance in a wavelength division-multiplexing (WDM) network for link with optical cross connect (OXC) without wavelength converter. Factors that affect the magnitude of crosstalk in the OXC are investigated and parameters that play important role in determining magnitude of crosstalk and BER are identified. The effects of OXC induced crosstalk on the BER performance is evaluated at a bit rate of 10 Gb/s by optimizing different parameters.","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130778179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Publications and Domain Knowledge to Build Research Profiles: An Application in Automatic Reviewer Assignment","authors":"H. Biswas, M. Hasan","doi":"10.1109/ICICT.2007.375347","DOIUrl":"https://doi.org/10.1109/ICICT.2007.375347","url":null,"abstract":"Peer-review has been a common practice for quality control in scholarly publications for decades. The ubiquity of the Internet and, subsequently, the availability of easy-to-use Web-based systems (both free and commercial) has made the peer-review process fast, cost-effective and convenient. In a typical scenario, authors upload papers online and manually assign topic-areas; reviewers also sign up by letting the system know about their area of expertise. A rudimentary Paper-Reviewer matching is usually performed by the system and validated by the Program-Chair (for conferences) or by the Editor-in-Chief (for journals). As argued in relevant literature, the peer-review process suffers from several flaws including author's or reviewer's bias in choosing topic-areas and expertise, as well as inter-reviewer agreement, etc. In this research, we explore automatic reviewer assignment for papers by solely considering the content of the papers and the true profile of the reviewers. In this research, we experimented with three approaches to calculate paper-reviewer relevance using the Vector Space Model. We used a set of 10 papers, 30 reviewers and the real paper-reviewer assignment information from a real-conference; and justifed the result of automatic paper-reviewer assignment based on the above three approaches. We noticed that the overlap between real-assignment and automatic-assignment is poor (with only 55-66% of the reviewers being in common). Such a result was not surprising to us, since we are aware that reviewers often express their frustrations claiming that some papers assigned them are not in line with their preferences and expertise. The data-set we used was rather small and suffered from data-sparseness problem and therefore we tried to analyze the automatic-assignment rationales through unbiased human judgment to identify the effect of the above-mentioned approaches in automatic reviewer assignment. We concluded that combining domain-knowledge with automatically extracted keywords (i.e., ontology-driven topic inference using automatically-extracted keywords) could potentially identify the most relevant candidate-reviewers for a paper.","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134488207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development and Performance Analysis of An Adaptive and Scalable Image Compression Scheme with Wavelets","authors":"K. H. Talukder, K. Harada","doi":"10.1109/ICICT.2007.375387","DOIUrl":"https://doi.org/10.1109/ICICT.2007.375387","url":null,"abstract":"This paper presents an enhanced 2D wavelet based gray scale still image compression scheme and its performance analysis and evaluation over other system. The 2D image compression and reconstruction methods based on the Haar wavelet are developed with some enhanced features. Some of the principal factors used for the evaluation of the new adaptive system include the compression ratio, the peak signal to noise ratio (PSNR), the number of wavelet decomposition, different thresholding techniques etc. The perception based subjective (mean opinion score (MOS)) and objective (picture quality scale (PQS)) evaluation methods are also applied and their effectiveness is evaluated. The extent to which the quality of the image is degraded by wavelet compression and decompression methods is analysed. The arguments of the usefulness of wavelet transformation for image compression over today's method are presented based on the experimental results obtained.","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134579485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combined CDMA-SDMA Performance Analysis and Code Assignment Algorithm","authors":"N. Odeh, S. Khatun, B. Ali, A. Ismail","doi":"10.1109/ICICT.2007.375378","DOIUrl":"https://doi.org/10.1109/ICICT.2007.375378","url":null,"abstract":"This paper present a novel performance enhancement for combined code division multiple access (CDMA) and space division multiple access (SDMA) scheme using SDMA grouping on top of code and spatial signatures. This paper is divided into two parts. In the first part, the system performance of combined CDMA-SDMA scheme is evaluated under Additive White Gaussian Noise (AWGN) channel for a single sectored cell. A fixed number of available codes L kept in a central pool can be utilized by K users, where, K>L. The same code can be assigned to a group of users according to their angle of arrival (which is known as SDMA group). Here, the analytical model of bit error rate (BER) for any arbitrary number of users has been derived and evaluated. In the second part of this paper, a simple code assignment algorithm is proposed to assign a already used code to a new user by which, the orthogonality between users can be maximized. The results show that the system capacity is noticeably improved with the combined system compared to the pure CDMA system. Further enhancement can be obtained when SDMA grouping is considered with orthogonal code assignment to users those belongs to different SDMA groups. Finally, the code assignment algorithm shows that high number of users can be accommodated by a fixed small number of codes.","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133766233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}