{"title":"MatLab acceleration for DWT “Daubechies 9/7” for JPEG2000 standard on GPU","authors":"Randa Khemiri, F. Sayadi, Mohamed Atri, R. Tourki","doi":"10.1109/GSCIT.2014.6970112","DOIUrl":"https://doi.org/10.1109/GSCIT.2014.6970112","url":null,"abstract":"Discrete wavelet transform (DWT) has diverse applications in signal and image processing fields. In this paper, we have implemented the lifting “Cohen-Daubechies-Feauveau 9/7” algorithm on a low cost NVIDIA's GPU (Graphics Processing Unit) with MatLab to achieve speedup in computation. The efficiency of our GPU based implementation is measured and compared with CPU based algorithms. Our investigational results with GPU show performance enhancement over a factor of 1.82 compared with CPU for an image of size 4096×4096 pixels.","PeriodicalId":270622,"journal":{"name":"2014 Global Summit on Computer & Information Technology (GSCIT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116915701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new hybrid rerouting scheme in WDM all-optical networks under dynamic traffic","authors":"N. Amdouni, M. Koubàa, T. Aguili","doi":"10.1109/GSCIT.2014.6970121","DOIUrl":"https://doi.org/10.1109/GSCIT.2014.6970121","url":null,"abstract":"In WDM all-optical networks, the wavelength continuity constraint along with the wavelength clash constraint, lead to poorer network performances when dealing with the lightpath provisioning problem. The impact of these constraints is especially severe when traffic demands are unpredictable and characterized by random arrivals and departures. To improve the network utilization efficiency, either wavelength conversion or lightpath rerouting can be used. Since, in the foreseeable future, wavelength conversion is expected to remain an expensive technology, traffic rerouting is an attractive alternative solution to improve the network throughput conditioned by the aforementioned constraints. In this paper we propose to employ hybrid rerouting, to improve the network utilization efficiency considering a dynamic traffic model. Hybrid lightpath rerouting combines passive rerouting and active rerouting. Our proposed algorithm, namely, Sequential Routing with Hybrid Lightpath Rerouting algorithm (SeqRwHLR) establishes the traffic demands sequentially, that is demand by demand at arrival dates. When an incoming traffic demand cannot be set up in the absence of path-free wavelengths between its source and destination nodes, the SeqRwHLR algorithm performs passive rerouting procedure aiming hopefully at freeing a path-free wavelength to service the new traffic demand. Furthermore, our proposed algorithm dynamically reroutes some already established lightpaths from longer paths to vacant shorter ones so as to reduce the network resources consumption. This should hopefully lead to a better performances. The performances of the proposed algorithm are demonstrated to be promising through simulation results.","PeriodicalId":270622,"journal":{"name":"2014 Global Summit on Computer & Information Technology (GSCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122609619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Haider M. Al-Mashhadi, Hala B. Abdul-Wahab, R. Hassan
{"title":"Secure and time efficient hash-based message authentication algorithm for wireless sensor networks","authors":"Haider M. Al-Mashhadi, Hala B. Abdul-Wahab, R. Hassan","doi":"10.1109/GSCIT.2014.6970116","DOIUrl":"https://doi.org/10.1109/GSCIT.2014.6970116","url":null,"abstract":"Wireless sensor networks (WSNs) are used in many applications to gather sensitive information which is then forwarded to an analysis center. Resource limitations have to be taken into account when designing a WSN infrastructure. Authentication in WSNs is critical, as they are often deployed unattended in hostile environments and must transmit information over unsecured mediums. However, the cost of performing cryptographic operations is an extremely limiting factor because sensor devices and related equipment are constrained by storage and computational ability. Hash functions are the most widespread among all Authentication primitives, and are currently used in multiple cryptographic schemes and in security protocols. This paper presents a new Secure Hash Algorithm called (2AMD-160) which uses a famous structure of hash algorithm given by the MIT Laboratory for Computer Science and RSA Data Security, Inc. To demonstrate the effectiveness of 2AMD-160 in terms of security and execution time, we compare our approach with two methods namely, MD5 and SHA1 hash function algorithms. Simulation results demonstrate that the execution time and the security achieved by the proposed method are more effective than the MD5 and SHA1.","PeriodicalId":270622,"journal":{"name":"2014 Global Summit on Computer & Information Technology (GSCIT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129834274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Electrical modeling of split ring resonators operating in the UHF band","authors":"Seif Naoui, L. Latrach, A. Gharsallah","doi":"10.1109/GSCIT.2014.6970101","DOIUrl":"https://doi.org/10.1109/GSCIT.2014.6970101","url":null,"abstract":"The article in hand deals present a new approach focuses on the electric modelling of split ring resonators based on an equivalent circuit. The elements of circuit are determined from geometric parameters forming the three dimensional model of this type of resonators. Firstly an analytic study is proposed about the determination of the components of the circuit in function the physical parameters with a review about comparison between obtained results when the simulation of two different models is presented. Secondly, a demonstrative study on the effect of varying the value of the relative permittivity and determination the error rate at level the resonant frequency in the two models. The objective is to put the conditions and constraints necessary to make our equivalent circuit most responded and most efficient with zero error. The results of simulations are confirmed with using the two commercials software HFSS and ADS.","PeriodicalId":270622,"journal":{"name":"2014 Global Summit on Computer & Information Technology (GSCIT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126081175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cache consistency in adaptive page-server database systems","authors":"I. Jaluta, Naji Bazina","doi":"10.1109/GSCIT.2014.6970098","DOIUrl":"https://doi.org/10.1109/GSCIT.2014.6970098","url":null,"abstract":"We present cache consistency (adaptive concurrency-control and adaptive replica management) protocols for page-server database system in which the database is indexed by B±tree. These protocols avoid the data contention that may occur when concurrency control and replica management are performed at the page level. Page-level X locks are needed only for splitting or merging database (index or data)) pages, while record inserts and deletes on a data (leaf) page need only a short-duration U lock on the affected page (besides the record-level X locks). Thus, a record in a U-locked data page can be updated by one client transaction while other records can simultaneously be fetched by transactions that cache a copy of the page at other clients. Page-level S locks on data pages are not held for commit duration, but are changed to a set of commit-duration record-level S locks at the server if the page needs to be updated at another client and is therefore called back.","PeriodicalId":270622,"journal":{"name":"2014 Global Summit on Computer & Information Technology (GSCIT)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134503075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Novel user interface for text entry on touch screen mobile device for visually impaired users","authors":"S. Misra, Sonali M. Banubakode, C. Dhawale","doi":"10.1109/GSCIT.2014.6970122","DOIUrl":"https://doi.org/10.1109/GSCIT.2014.6970122","url":null,"abstract":"A touch screen mobile device become more popular in society because of its flexibility and discoverability. Unfortunately, due to its high visual demand it creates significant barriers for visually impaired users. But some touch screen devices available in the market with various accessible techniques like using screen reader, haptics and different input mechanisms. But they did not give any remarkable results in convenience handling and text entry speed. In this paper authors analyzes different interaction techniques and their impact on text entry speed. They also proposed new user interface for touch screen device to minimize accessibility barriers for visually impaired users.","PeriodicalId":270622,"journal":{"name":"2014 Global Summit on Computer & Information Technology (GSCIT)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132149556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhance resiliency to pool based key pre-distribution scheme","authors":"Amina Msolli, A. Helali, H. Maaref","doi":"10.1109/GSCIT.2014.6970107","DOIUrl":"https://doi.org/10.1109/GSCIT.2014.6970107","url":null,"abstract":"The security of the information stored or transmitted through a wireless sensor network against attacks is a primary objective. Key management includes many security services such as confidentiality and authentication. Under the constraints of WSN, designing a scheme of key management is a major challenge. In this paper, we improve the resilience of pool based on symmetric key pre-distribution scheme against capture nodes and secure connectivity coverage.","PeriodicalId":270622,"journal":{"name":"2014 Global Summit on Computer & Information Technology (GSCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116200638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GAACO: Metaheuristic driven approach for routing in OppNet","authors":"R. Johari, Dhari Ali Mahmood","doi":"10.1109/GSCIT.2014.6970129","DOIUrl":"https://doi.org/10.1109/GSCIT.2014.6970129","url":null,"abstract":"Routing in delay tolerant network addresses the ability to transport or route bundles from a source to a destination, which is a primary responsibility that all communication networks must have. However, Opportunistic Networks (Opp-Nets) or Delay Tolerant Networks are characterized by the sparse connectivity resulting in a lack of instantaneous end-to-end path between source and destination. In such a challenging environment, popular ad hoc routing protocols such as AODV and DSR fail to establish routes. We introduce a new metaheuristic oriented routing protocol GAACO that utilizes the optimization techniques of Genetic Algorithm and Ant Colony Optimization to find the path between source and destination. GAACO has been simulated in Network Simulator (NS 2) and its performance has been compared with Epidemic routing Protocol on issues such as delay, number of hops traversed, energy consumed and throughput achieved.","PeriodicalId":270622,"journal":{"name":"2014 Global Summit on Computer & Information Technology (GSCIT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122545673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of multiple enrollment for fingerprint recognition","authors":"Fred Kaggwa, J. Ngubiri, Florence Tushabe","doi":"10.1109/GSCIT.2014.6970102","DOIUrl":"https://doi.org/10.1109/GSCIT.2014.6970102","url":null,"abstract":"Fusion of multiple impressions resulting from multiple fingerprint enrollments is one of the ways often used to improve fingerprint recognition performance. In this research, we perform an evaluation of the effectiveness of using multiple enrollment in fingerprint recognition systems. We design a multiple enrollment algorithm and use it together with existing fingerprint recognition techniques to carry out the evaluation. Our experimentation results and evaluations show that multiple enrollment as whole outperforms single enrollment. Multiple enrollment in experiment (1) improved the recognition performance by 83% from EER1 of 0.75% to EER of 0.13% with FVC2000-DB2, and by 79% from EER of 1.14% to EER of 0.28% with the SAS-DB2 fingerprint database. On the other hand, the multiple enrollment in experiment (2) improved the recognition performance by 71% from EER of 6.14% to EER of 1.75% with FVC2000-DB2 and improved recognition performance by 53% from EER of 14.97% to EER of 6.94% with SAS-DB2 fingerprint database.","PeriodicalId":270622,"journal":{"name":"2014 Global Summit on Computer & Information Technology (GSCIT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126446898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Toward a human-machine voice interface based Standard Arabic","authors":"Tebbi Hanane, Hamadouche Maamar, Azzoune Hamid","doi":"10.1109/GSCIT.2014.6970134","DOIUrl":"https://doi.org/10.1109/GSCIT.2014.6970134","url":null,"abstract":"In this work, we present a system of speech synthesis from a text written in Standard Arabic, we explain the methodology used for its design and we demonstrate the principal stages of its conception which can be shown in the following two points; (1) The creation of the sound Database (BD) from the elaboration of a corpus. (2) And the acoustic generation of the text previously acquired. To insure this important step whih is the passage between the world of the writing to that of the speaking, we raise two techniques of Orthographic and Phonetic Transcription (by rules; in which we used 12 rules and by lexicon where we used 6 exceptions words) as well as two methods of speech synthesis (by phonemes and by diphones). The results obtained are shown at the end.","PeriodicalId":270622,"journal":{"name":"2014 Global Summit on Computer & Information Technology (GSCIT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114228696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}