{"title":"A Survey on Intrusion Detection Approaches","authors":"A. Murali, M. Rao","doi":"10.1109/ICICT.2005.1598592","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598592","url":null,"abstract":"Intrusion detection plays one of the key roles in computer security techniques and is one of the prime areas of research. Usages of computer network services are tremendously increasing day by day and at the same time intruders are also playing a major role to deny network services, compromising the crucial services for Email, FTP and Web. Realizing the importance of the problem due to intrusions, many researchers have taken up research in this area and have proposed several solutions. It has come to a stage to take a stock of the research results and project a comprehensive view so that further research in this area will be motivated objectively to fulfill the gaps exists till now.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130062079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Complex Software Systems—An Assessment of Risks","authors":"I. Naqvi, H. Memon, A. Uqaili","doi":"10.1109/ICICT.2005.1598637","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598637","url":null,"abstract":"This paper analyse the risks involved in developing the complex software systems (CoSS). CoSS are high cost, large and ambitious projects with complicated user interfaces, and stringent performance requirements. We acknowledge previous work of Charette (1996) which concluded that, large-scale project management is a risk management. Complex software development inevitably involves risks due to rapid development in communication technology. The identified risk include: technological complexity, technological novelty, system integration, and long schedule and developers capabilities. It is argued that these risks are the certain characteristics of Complex Software Systems (CoSS). Paper also highlights that software engineering practices are not scaling with large and complex software development. Paper also suggested few risk management practices (i.e. Modular Approach, Integrated solutions, Simplicity etc). The paper concludes with management lessons and further research issues.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114469763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secured Network Model for Management Information System Based On IP Security (IPSec) Encryption Using Multilayered Approach of Network Security","authors":"A. Pathan, M. Irshad","doi":"10.1109/ICICT.2005.1598594","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598594","url":null,"abstract":"Secured flow of information through the network and play important role in the management information systems. In this paper I describe Secured Network Model For Corporate & Business Organization In Based On Network Level IP Security (IPSec) Encryption & Its Physical Layout Using Multilayered Approach. I have four important considerations for adoption of secured network model as secured network model for management information system.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126028124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software Delivery Delay Factors Estimation","authors":"B. Shahzad, N. Saqib","doi":"10.1109/ICICT.2005.1598626","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598626","url":null,"abstract":"This has been observed that most of the software faces a general problem of delayed schedule of delivery. This is because of many factors that are still to be addressed at length. So, because of the lack of knowledge and lower scale of practice of software development principles, problems exist at almost all phases in most of the software. This paper will unleash the critical factors that play a major role in delaying the delivery of software. The solutions for such critical problems have also been suggested in this paper.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124497929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comparative Study and Analysis of PVM and MPI for Parallel and Distributed Systems","authors":"S. Hussain, G. Ahmed","doi":"10.1109/ICICT.2005.1598580","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598580","url":null,"abstract":"Networks of Workstations (NOWs) based on various operating systems are globally accepted as the standard for computing environments in the IT industry. To harness the tremendous potential for computing capability represented by these NOWs, various new tools are being developed. Parallel Virtual Machine (PVM) and Message Passing Interface (MPI) have existed on UNIX workstations for some time, and are maturing in their capability for handling Distributed Parallel Processing (DPP). This research is aimed to explore each of these two vehicles for DPP, considering capability, ease of use, and availability, and compares their distinguishing features; and also explores programmer interface and their utilisation for solving real world parallel processing applications. The research conducted herein concludes that each API has its unique features of strength, hence has potential to remain active into the foreseeable future. This work recommends a potential research issue, that is, to study the feasibility of creating a programming environment that allows access to the virtual machine features of PVM and the message passing features of MPI.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115662181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study of Data Provenance and Annotation Model for Information Reliability Suggested for Pathological Laboratory Environment in Pakistan","authors":"N. Aamir, A. Pervaiz","doi":"10.1109/ICICT.2005.1598582","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598582","url":null,"abstract":"Trust and reliability of information is a very critical issue of today's information age. Keeping provenance of data not only ensures us about its origination but it also keeps track of all the changes that happen to the data through out its life cycle. In this paper we have discussed the importance of data provenance, difference between Where & Why Provenance and different models for keeping such information. The objective of this study is to select a provenance model which can be implemented in scientific environment of our country. For this purpose we have taken the annotation model and have applied it on the pathological laboratories so as to experience the usefulness and practicality of this concept.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131257362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Handoff Study in Mobile Networks Using Mobile IP","authors":"A. Iqbal, K. Khushk","doi":"10.1109/ICICT.2005.1598617","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598617","url":null,"abstract":"Wireless LAN and mobile devices are becoming very popular because of its characteristics like connections without any physical cabling links. To make wireless devices working on built-in communication stack, it is important to consider Internet Protocol layer. For mobile networks IETF has proposed Mobile IP that provides facilities to roam between base stations while mobile devices moves between different cells transparently to application and higher level protocols. This paper provides the brief look on mobile IP architecture and then discusses the future research issues that should be resolved to increase the effectiveness of this protocol.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124638372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Approach for Anti-aliasing Raster Data in Air Borne Imagery","authors":"Fahim Arif, Muhammad Akbar","doi":"10.1117/12.626787","DOIUrl":"https://doi.org/10.1117/12.626787","url":null,"abstract":"Air borne sensed data is in the form of raster data. Aliasing is always present in a sampled image causing artifact error. To reduce possible aliasing effects, it is a good idea to blur an image slightly before applying a resampling method on it. This paper presents a technique for anti-aliasing remotely sensed images. The technique uses Gaussian low pass filter (GLPF) for generation of slight blur. Then resampling of raster data is performed with the help of bilinear interpolation. Algorithm is developed in MATLAB using some inbuilt functions.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121523331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Problems of Learning in Theoretical Computer Science","authors":"M. A. Iqbal","doi":"10.1109/ICICT.2005.1598548","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598548","url":null,"abstract":"In today's \"Information society,\" the future of economic well-being rests on the effectiveness of schools and corporations to empower their people to be more effective learners and knowledge creators Joseph D. Novak Understanding the processes that takes place inside the human mind-while it is thinking and learning-has remained an elusive exercise mostly because of lack of powerful research tools and techniques. Now because of recent advances in various branches of science dealing with mind and brain, it has become possible to better understand the processes of thinking and learning, and the capacity to create new knowledge. For example research from cognitive psychology has considerably increased our understanding of the principles of knowledge organization that govern people's abilities to learn, understand and create new knowledge. It is perhaps the right time to apply these developments in the study of learning to help people to think and read critically, to express themselves clearly and persuasively, and to solve complex problems. In this tutorial we would first be studying and then applying tools and techniques of science of learning to determine which problems are hard to understand in the field of Theoretical Computer Science. We shall also try to find why a problem is hard and why most of the learners fail to solve it in spite of the fact that they have all the prerequisite knowledge as well as the motivation to do it.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122128842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of Decision Support System for Nuclear Emergency","authors":"Uzma Ilyas","doi":"10.1109/ICICT.2005.1598629","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598629","url":null,"abstract":"Decision Support System (DSS) is developed for Karachi Nuclear Power Plant (KANUPP) for off-site emergency management. By only one click to get all information about Karachi Emergency Relief Plan (KERP) document, countermeasures on the basis of priority, economic cost and social behavior of the affected area by Nuclear hazard. Also share work with others across the Network. This computer-based expert system can also provide. System is a distributed application, which consists of a comprehensive database in SQL 7.0 server and a user-friendly environment in Microsoft Visual Basic 6.0.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125518709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}