{"title":"Implementing immune-based algorithm for bandwidth spectrum allocation in wireless communication","authors":"S. I. Suliman, G. Kendall, I. Musirin","doi":"10.1109/DICTAP.2016.7544007","DOIUrl":"https://doi.org/10.1109/DICTAP.2016.7544007","url":null,"abstract":"Having an effective technique for bandwidth allocation is very important in wireless communications. Artificial Immune Systems, a relatively new meta-heuristic for solving optimization-related problems, is investigated in this study to design a cellular channel allocation framework. In this study, mobile hosts are allowed to continue interacting with the cells that they are currently in, even when the number of channel is insufficient. When the number of mobile hosts increases, it is almost impossible to foresee future channel demands in a wireless network. Often cellular networks are faced with insufficient channels in cells, whilst other cells have more channels available than they need. Our model works by allocating the unused channels from the cells with less demand to the overloaded cells. The model demonstrates that it manages to re-use the available free-conflict channels efficiently. Comparisons with other existing method (i.e. genetic algorithm) were conducted to evaluate the performance of our model.","PeriodicalId":219801,"journal":{"name":"2016 Sixth International Conference on Digital Information and Communication Technology and its Applications (DICTAP)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125147870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet of things network management system architecture for smart healthcare","authors":"F. Sallabi, K. Shuaib","doi":"10.1109/DICTAP.2016.7544021","DOIUrl":"https://doi.org/10.1109/DICTAP.2016.7544021","url":null,"abstract":"The fast and wide advancement of the Internet of Things (IoT) boosted by the remarkable development of sensor networks, RFID, software platforms and the Internet as a global container of IoT, have opened the appetite of several vertical industries to include IoT in their strategic vision for the coming years. Academic institutions have also established projects to vigorously investigate the potential of IoT and develop new protocols in all layers to suit IoT applications and/or adapt the current IP protocols to suit it. Some organizations have already implemented IoT and others have plans to implement it according to Gartner Inc. study. Healthcare industry is no exception, have already adopted IoT, and are planning to use it extensively in the following years for the benefits of patients, elderly people and caregivers. In this research paper, we develop a system architecture to manage IoT for the smart healthcare. For IoT in healthcare to succeed, it should be reliable, effective, well performing, secure and profitable for caregivers. This will guarantee continued operation and service delivery for patients and elderly to avoid any health risks.","PeriodicalId":219801,"journal":{"name":"2016 Sixth International Conference on Digital Information and Communication Technology and its Applications (DICTAP)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130008753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hardware CODEC based JPEG2000 video encoder design for combat system video networks","authors":"S. Turan, Ekram Hussien Mohammed, S. Ertürk","doi":"10.1109/DICTAP.2016.7544019","DOIUrl":"https://doi.org/10.1109/DICTAP.2016.7544019","url":null,"abstract":"This paper presents an approach for designing of JPEG2000 video encoder board based on firmware programmable SRAM-style hardware CODEC. Typical, mostly used, electro optical sensor output signal and its basic characteristics are given and then signal-data size relationships are explained. Later, some fundamental information about JPEG2000 standard is summarized. System design blocks and implementation details are examined. Finally; analysis of real time behavior of such a system on combat system video network (CSVN) evaluated.","PeriodicalId":219801,"journal":{"name":"2016 Sixth International Conference on Digital Information and Communication Technology and its Applications (DICTAP)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117276335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A discrete particle swarm optimisation algorithm for geographical map contour reconstruction","authors":"B. Fergani, M. Kholladi","doi":"10.1109/DICTAP.2016.7544016","DOIUrl":"https://doi.org/10.1109/DICTAP.2016.7544016","url":null,"abstract":"Nowadays, map images are widely used for many applications. To be well exploited, theses maps generally need a contour extraction operation. However, gaps may result from this phase, which would give rise to the need for reconstructing the missing parts. Map-contour gaps can be caused from low-maps quality or from the contour extraction process. This problem cannot be dealt with simple traditional contour extractors when these gaps are relatively large. This paper proposes a discrete PSO for damaged contour matching in geographical maps. The proposed approach has been validated by applying it on a set of genuine maps.","PeriodicalId":219801,"journal":{"name":"2016 Sixth International Conference on Digital Information and Communication Technology and its Applications (DICTAP)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116753724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Afdallyna Fathiyah Harun, S. Benford, C. O'Malley, N. Noor
{"title":"Glyphing it! Children using markers in school","authors":"Afdallyna Fathiyah Harun, S. Benford, C. O'Malley, N. Noor","doi":"10.1109/DICTAP.2016.7543998","DOIUrl":"https://doi.org/10.1109/DICTAP.2016.7543998","url":null,"abstract":"This paper describes a study that investigated the use of d-touch markers in designing learning content for knowledge sharing activities. It looked into design aspects children takes into account in ensuring that the learning content would be understood by their peers. It is believed that emerging design syntax, placement and accompanying visual cues within the markers helped in perceiving the learning content. This paper demonstrates children's view on the use of d-touch markers where they designed and used them within a Malaysian elementary school learning environment.","PeriodicalId":219801,"journal":{"name":"2016 Sixth International Conference on Digital Information and Communication Technology and its Applications (DICTAP)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131196540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ontology-based detection of cyber-attacks to SCADA-systems in critical infrastructures","authors":"Daniel Krauss, C. Thomalla","doi":"10.1109/DICTAP.2016.7544003","DOIUrl":"https://doi.org/10.1109/DICTAP.2016.7544003","url":null,"abstract":"The integration of networks within an organization made many critical infrastructures (CI) and their underlying communication networks that were rather isolated in the past, accessible from outside via internet. CI heavily rely on the security of their supervisory control and data acquisition (SCADA) systems. As attackers are using ever more sophisticated technologies the threats are always increasing. Therefore it is important to detect attacks quickly and react efficiently to them, thus increasing reliability, security and resilience of the system. To specify a model of security events, attacks and vulnerabilities, we propose an ontology. The system logs provide the events, which the intrusion detection systems (IDS) may recognize as suspicious and could be part of an attack. With the help of data bases for known vulnerabilities together with the system model ongoing attacks may be identified. The ontology-framework together with a respective reasoning component forms the common ground for compliance monitoring and correlation of security events and serves as a basis for the specification and implementation of security data normalization. Then security policies (or goals) can be refined into implementable configurations on critical infrastructure network devices.","PeriodicalId":219801,"journal":{"name":"2016 Sixth International Conference on Digital Information and Communication Technology and its Applications (DICTAP)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131998058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluate the effect of teledentistry and information technology on dentistry: Case study Iran","authors":"Nazanin Mazlooman, Behrouz Sahebkar","doi":"10.1109/DICTAP.2016.7544018","DOIUrl":"https://doi.org/10.1109/DICTAP.2016.7544018","url":null,"abstract":"Teledentistry is a combination of dentistry science, Information Technology and Telecommunication services. This science involves the exchange of clinical information and image for distance places by using internet to achieve consulting and treatment plan. Teledentistry enables us to improve our access to oral health delivery services and also it will help to reduce the costs. Teledentistry could be resolved the disparities between urban and rural areas in oral health. In this article, we decided to evaluate the impact of information technology on dentistry in our country Iran. Teledentistry will also review in terms of its innovative ideas and its future in providing dental care. As most of time accepting new technology is difficult for people, we decide to simulate the trend of teledentistry acceptance versus traditional method. For this we use MATLAB software to simulate the Dental Network with Poisson degree distribution and getting numerical and analytical result. This simulation guide us to use some politicians to content dentist to use teledentistry.","PeriodicalId":219801,"journal":{"name":"2016 Sixth International Conference on Digital Information and Communication Technology and its Applications (DICTAP)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121888250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of a real-time ERP-OFDM SDR receiver on the USRP2 platform","authors":"K. Küçük","doi":"10.1109/DICTAP.2016.7543995","DOIUrl":"https://doi.org/10.1109/DICTAP.2016.7543995","url":null,"abstract":"In this paper, the real time ERP-OFDM wireless local area network (WLAN) receiver prototype and its performance analysis based on IEEE 802.11g physical layer requirements are presented. We design and implement a software defined radio (SDR) receiver for all ERP-OFDM WLAN functionalities. The receiver prototype setup based on the universal software radio peripheral 2 called USRP2 with National Instruments (NI) LabVIEW software. It consists of a dipole antenna, the USRP2, and a computer setup USRP2 driver. In this prototype implementation, we deal with signal synchronization, phase estimation, channel estimation, and demodulation over the real wireless channel conditions. To validate the real-time prototype receiver, the spectrum of 2.4 MHz band is measured by IEEE 802.11g supported Wi-Fi card. Moreover, the prototype receiver and Wi-Fi card performances are in very closed agreement with a frame error rate of 1%. Hence, this prototype has been designed successfully to implement all PHY functions of ERP-OFDM.","PeriodicalId":219801,"journal":{"name":"2016 Sixth International Conference on Digital Information and Communication Technology and its Applications (DICTAP)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129314252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Syed Yasser Arafat, Muhammad Inzimam Saghir, M. Ishtiaq, Umer Bashir
{"title":"Comparison of techniques for leaf classification","authors":"Syed Yasser Arafat, Muhammad Inzimam Saghir, M. Ishtiaq, Umer Bashir","doi":"10.1109/DICTAP.2016.7544015","DOIUrl":"https://doi.org/10.1109/DICTAP.2016.7544015","url":null,"abstract":"A number of automated techniques for classification of plants based on their leaves have been developed over the past few years. While each of those techniques have been individually implemented and evaluated, but there have been few studies which have made a direct comparison between the various techniques. In this paper we compared the three well-known techniques. We compared their ability to differentiate among plant species. Techniques which are evaluated are, Histogram of Oriented Gradient (HOG),Colour Scale Invariant Feature Transform (C-SIFT) and Maximally Stable Extremal Region (MSER).These techniques are evaluated against two kinds of leaf datasets, one is our personal built dataset and the other is famous Flavia dataset. The experimental results shows that HOG has an accuracy of 98% on our dataset and 97% for Flavia dataset. Moreover for C-Sift the accuracy for both datasets is 98% and for MSER the accuracy is 96% and 90% for our and Flavia dataset respectively.","PeriodicalId":219801,"journal":{"name":"2016 Sixth International Conference on Digital Information and Communication Technology and its Applications (DICTAP)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125005614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy-efficient link adaptation for distributed space time block code in wireless relay networks","authors":"Ibrahim Aydin, Ümit Aygölü","doi":"10.1109/DICTAP.2016.7543991","DOIUrl":"https://doi.org/10.1109/DICTAP.2016.7543991","url":null,"abstract":"Data transmission techniques in wireless relay networks can be improved in terms of energy-efficiency (EE), throughput and complexity. In this paper we propose an energy-efficient distributed space-time block code (DSTBC) technique where the instantaneous channel state information (CSI) is available at all receivers (source and relays) and just the average CSI is valid at the transmitter side. A two-hop protocol is considered where the source sends data to a number of relays which perform decode-and-forward (DF) relaying strategy and a subset of these relays synchronously send data to destination via DSTBC technique. It is assumed that every node in the network has its own power constraint. The effect of optimum rate adaptation for source-to-relay and relay-to-destination links, separately, on EE and throughput is investigated where optimum rate adaptation is considered in addition to transmit power optimization. It is shown that the rate adaptation is very decisive on EE and throughput performances of the network and when it is compared with direct transmission and the case where just transmission power optimization is performed without rate adaptation, the proposed technique significantly outperforms.","PeriodicalId":219801,"journal":{"name":"2016 Sixth International Conference on Digital Information and Communication Technology and its Applications (DICTAP)","volume":"502 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125097226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}