{"title":"Analyzing & Enhancing energy Efficient Communication Protocol for Wireless Micro-sensor Networks","authors":"I. M. Butt, Sohaib Khan","doi":"10.1109/ICICT.2005.1598611","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598611","url":null,"abstract":"The paper presents an analysis of energy efficient routing protocols with direct communication protocol. A comparison of these protocols is made analyzing energy consumption at each node and explaining system lifetime after certain rounds. The paper also proposes a novel energy conscious cluster head selection algorithm for making system more reliable and efficient. Simulation shows that our proposed algorithm enhances the system reliability and accuracy.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"3 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116675556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Visual Tool for Trellis Construction and Decoder Debugging RAC Array Codes","authors":"L. Kaya, M. Al-Qudah","doi":"10.1109/ICICT.2005.1598561","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598561","url":null,"abstract":"We have developed a visual tool for can be added to a specific RAC array positions and their effect can be easily determined by the help of the visual tool. The program environment has been set in a adaptive manner in order to change different parameters of the RAC codes and see their effect directly. decoding of row and column (RAC) array codes. The visual tool provides interface to view all paths corresponding selected input information bits. Errors constructing trellis diagram and tracing Viterbi.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129718972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Iris Recognition Using Single Feature Vector","authors":"A. Basit, M. Javed, M. A. Anjum","doi":"10.1109/ICICT.2005.1598567","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598567","url":null,"abstract":"In this paper, an efficient method for personal identification based on the pattern of human iris is proposed. The system initially detects boundaries of iris, and then unwraps it into rectangular strip. A single vector is obtained corresponding to maximum eigen value and it is used as distinct feature of the iris. In the next step training is done and recognition decision is carried out by comparing the Euclidean distances with other feature vectors which determine whether two irises are similar or not. The results show that the success rate of the proposed method is 95.91%.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"93 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129982777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy Logic Control of Coupled Liquid Tank System","authors":"M. Abid","doi":"10.1109/ICICT.2005.1598571","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598571","url":null,"abstract":"This paper presents a fuzzy control of coupled liquid tank system. The Coupled Liquid Tank system is developed at PIEAS. It has three liquid tanks coupled together. The liquid level in tank 2 is maintained using fuzzy logic. The results are compared with the PID control, mostly used in industries.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"57 22","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113937688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real Time Object Tracking Using BMA","authors":"Z.H. Khan, M. Aurangzeb","doi":"10.1109/ICICT.2005.1598555","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598555","url":null,"abstract":"This paper describes real time object tracking using block matching algorithm (BMA). Emphasis is made on the development of techniques for tracking a user-selected object through digital image sequences in multimedia systems. The ability to track objects in sequences is useful in situations where the motion of objects is important. It is also useful when a moving object is difficult to see and needs to be highlighted. A tracking tool is also of benefit to the developers of a multimedia system to automatically 'mark up' a moving object so a user of the system can select it and manipulate it.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122594761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Syndromic Management of Sexually Transmitted Diseases Using Dynamic Machine Learning and Path-Finding Algorithms","authors":"Arun Reginald Accp, Aijaz Qadir, Patoli Mbbs, Mba","doi":"10.1109/ICICT.2005.1598630","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598630","url":null,"abstract":"Early detection and investigative procedures pertaining the discovery and treatment of Sexually Transmitted Diseases (STDs) requires sophisticated and expensive instruments, which ironically are unavailable to most in this country. Moreover, test results are hardly obtainable in a reasonable amount of time requiring one to return over and over again for regular checkup intervals, delaying the treatment and extending the period of infectivity developing risks of unwanted, sometimes unimaginable, complications. Syndromic approach to management of STDs is based on the identification of a consistent group of symptoms and syndromes to classify the exact disease or infection be-forehand, so that further investigations are sought for based on this initial criterion. In this paper, we will analyze results based on two different approaches: Human and Artificial Intelligence (AI). Using algorithms specifically applicable to AI, we will examine the benefits and pitfalls of using completely automated computer tasks to generate life-saving information in shortest possible time.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129147302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Audio and Video CODEC Distribution using Mobile Agents","authors":"O. Paracha, Z. I. Malik, S. Ali","doi":"10.1109/ICICT.2005.1598623","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598623","url":null,"abstract":"Codecs are increasing as the number of ways to store music and video for online users is increasing. We need various codecs loaded onto our player environment or our system to actually interpret the media content at hand. The distribution of the codecs for various can be done using mobile agents so that they can look for the appropriate codec and distribute it for the user, if it is not available on the system for a specific type of encoded media content. The aim of this paper is to devise a mechanism for this, using mobile agents. So, a media content player architecture, called MAMP (Mobile Agent Media Player), based on mobile agents is suggested to acquire the appropriate codecs based on the media content being played with the provision of cached information of the codecs available for faster and efficient search on different servers on the World Wide Web.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132752318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protocol Filtering Controlled Call Admission for CDMA2000 1x EV-DO","authors":"M. Adeel, A. Chaudhry, N.M. Shaikh","doi":"10.1109/ICICT.2005.1598620","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598620","url":null,"abstract":"Routing inconsistencies in all IP core can drastically affect the overall throughput of particular network. In cellular data communications, however, this issue proves to be rather more severe due to limited battery power of Mobile Station (MS) and higher average cost per data packet. Existence of persistent routing loop between PDSN/FA and Home Agent (HA) due to accidental or deliberate misconfiguration at HA results in repeated retransmission of packets of same ID across the network, consequently increasing the consumption of valuable bandwidth and average cost per data packet. We propose a Call Admission Policy for CDMA2000 1x EV-DO that blocks admission of new data calls associated to a misconflgured HA at the time of their admission to the network. Hence resulting in improved network throughput, less bandwidth and battery power consumption and improved average cost per data packet.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124531236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Software Engineering Principles to Develop Reusable Business Rules","authors":"S. Ali, B. Soh, T. Torabi","doi":"10.1109/ICICT.2005.1598601","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598601","url":null,"abstract":"Nowadays, businesses need a system that can provide flexibility, reusability and simplicity for their business solutions. However, if business logics or rules are implemented using procedural paradigms, then the business systems will become more complex. In this paper we treat business logics separate from system logics, whereby we analyse a business by describing its rules and developing a set of rule statements. These business rules will be treated as a separate component in the design and implementation of the system. We have found that our proposed method leads to a system, which is more customisable, flexible, efficient, and reusable, in terms of business rules. In the paper, we also present an example of online quotation and order placement system developed for manufacturing company based on our proposed method which has been implemented using XML technologies. This example illustrates how to construct reusable business rules during development of a business solution based on software engineering principles.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128181144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Knowledge Management In Public Sector Universities of Pakistan","authors":"Eram Abbasi, Arshad Siddiqi IBA-Karachi","doi":"10.1109/ICICT.2005.1598590","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598590","url":null,"abstract":"In the modern era of globalization of business, 'Information & Knowledge' is considered as the most vital resource for organizational stability. Businesses significantly depend on efficient management of 'Information' and transforming it into 'Knowledge'. Even though Information and Knowledge have been recognized as the vital resource, still the concepts of 'Information Systems' and 'Knowledge Management' are yet misunderstood. The paper firstly reviews the foundations of Information Systems to establish the basis for the conceptual understanding of 'Knowledge Management'. With these theoretical bases, then a generalized model for 'Knowledge Management' has been proposed. The discussion continues with concepts as to how this model can be used to efficiently manage 'Knowledge' in any public sector university of Pakistan. Finally, the implications of this model are discussed with directions for further research.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126714702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}