2005 International Conference on Information and Communication Technologies最新文献

筛选
英文 中文
Fingerprint Matching using Ridge Patterns 使用脊纹进行指纹匹配
2005 International Conference on Information and Communication Technologies Pub Date : 2005-08-27 DOI: 10.1109/ICICT.2005.1598565
M. Munir, M. Y. Javed
{"title":"Fingerprint Matching using Ridge Patterns","authors":"M. Munir, M. Y. Javed","doi":"10.1109/ICICT.2005.1598565","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598565","url":null,"abstract":"This paper presents a fingerprint matching scheme that utilizes a ridge patterns to match fingerprint images. The proposed scheme uses a set of 16 Gabor filters where spatial frequencies correspond to the average inter-ridge spacing in fingerprints. It is used to capture the ridge strength at equally spaced orientations. A circular tessellation of filtered image is then used to construct the ridge feature map. This ridge feature map contains both global and local details in a fingerprint as a compact fixed length feature vector. The fingerprint matching is based on the Euclidean distance between two corresponding feature vectors. The genuine accept rate of the Ridge Pattern based matcher is observed to be about 5% to 8% higher than that of minutiae-based matcher at low false accept rates. Fingerprint feature extraction and matching takes nearly 7 seconds on a normal Pentium IV machine.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129188478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Encrypting Data through CHAOS 通过CHAOS加密数据
2005 International Conference on Information and Communication Technologies Pub Date : 2005-08-27 DOI: 10.1109/ICICT.2005.1598634
S. Aejaz, I. M. Ghauri
{"title":"Encrypting Data through CHAOS","authors":"S. Aejaz, I. M. Ghauri","doi":"10.1109/ICICT.2005.1598634","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598634","url":null,"abstract":"Security of information being transmitted or stored is of vital importance. Different encryption schemes have been suggested in this regard. These schemes modify the contents in an apparently random fashion. Chaotic systems are those systems that are governed by a precise set of mathematical equations but exhibit an apparently random behavior. The behavior is also aperiodic and extremely sensitive to initial conditions. This investigation is aimed at describing an encryption mechanism for data using chaotic signals. The complete procedure is presented and demonstrated using examples. The effectiveness of this procedure is also proved.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127765740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Multi-Priority Application Framework For Mobile Ad Hoc Networks 移动自组织网络的多优先级应用框架
2005 International Conference on Information and Communication Technologies Pub Date : 2005-08-27 DOI: 10.1109/ICICT.2005.1598610
M. Channa, A. Chaudhry, K. Sharif, I. Memon
{"title":"A Multi-Priority Application Framework For Mobile Ad Hoc Networks","authors":"M. Channa, A. Chaudhry, K. Sharif, I. Memon","doi":"10.1109/ICICT.2005.1598610","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598610","url":null,"abstract":"The fast spread of small wireless computers has enabled the design and deployment of wireless Ad Hoc networks. Typical applications proposed for such networks include both Real Time and Non-Real Time applications. We propose an architecture that provides a complete framework for Real Time applications and Best Effort traffic. The proposed architecture comprises of an Ad Hoc Routing Protocol for route setup and route repair, a Bandwidth Allocation and Reservation Scheme for Real Time traffic, and a MAC layer protocol that provides traffic differentiation. The Admission Control module is used to admit or reject a new Real Time flow request depending upon bandwidth availability along the route. The Rate Policing Protocol is used to reduce the flow rate of Best Effort traffic in order to make room for new Real Time flows. The bandwidth availability along a route is provided through Hello packets to the network layer, which, in turn, finds a suitable route for Real Time applications. The concept of Local Route Repair is also introduced to repair a route that might have been broken due to node mobility.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127891039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Taxonomy of Cyber Crimes and Legislation in Pakistan 巴基斯坦的网络犯罪分类和立法
2005 International Conference on Information and Communication Technologies Pub Date : 2005-08-27 DOI: 10.1109/ICICT.2005.1598625
Muhammad Adeel, Asif A. Chaudhry, R. Shaikh, Syed Ismail Shah
{"title":"Taxonomy of Cyber Crimes and Legislation in Pakistan","authors":"Muhammad Adeel, Asif A. Chaudhry, R. Shaikh, Syed Ismail Shah","doi":"10.1109/ICICT.2005.1598625","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598625","url":null,"abstract":"We inhabit a rapidly developing world of shifting trends. Information Technology that was considered as a key contributor in progress of any country has evolved into a nightmare in form of Cyber Crimes. Despite proper legislation, most of such offences of less severe nature remain veiled in Pakistan. Deficient law enforcement and absence of an international treaty against Cyber Crimes helps Cyber Criminals skip unscathed. Study will focus on categorization of Cyber Crimes and legislation in Pakistan to cope with these crimes. We report some Cyber Crimes that still lie outside law jurisdictions in Pakistan and take a look at reported crimes in IT history of Pakistan.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"43 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121004712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Design Phase Analysis of Software Reliability Using Aspect-Oriented Programming 基于面向方面编程的软件可靠性设计阶段分析
2005 International Conference on Information and Communication Technologies Pub Date : 2005-08-27 DOI: 10.1109/ICICT.2005.1598598
F. Rafique, K. Mahmood, Tauseef-U-Rehman, K. Rasheed
{"title":"Design Phase Analysis of Software Reliability Using Aspect-Oriented Programming","authors":"F. Rafique, K. Mahmood, Tauseef-U-Rehman, K. Rasheed","doi":"10.1109/ICICT.2005.1598598","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598598","url":null,"abstract":"Software system may have various nonfunctional requirements such as reliability, security, performance and schedulability. If we can predict how well the system will meet such requirements at an early phase of software development, we can significantly save the total development cost and time. Among non-functional requirements, reliability is commonly required as the essential property of the system being developed. Therefore, many analysis methods have been proposed but methods that can be practically performed in the design phase are rare. In this paper we show how design-level aspects can be used to separate reliability concerns from essential functional concerns during software design. The aspect-oriented design technique described in this paper allows one to independently specify fault tolerance and essential functional concerns, and then weave the specifications to produce a design model that reflects both concerns. We illustrate our approach using an example.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122501712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Irrigation Network Regulation through CAD System 基于CAD系统的灌溉管网调节
2005 International Conference on Information and Communication Technologies Pub Date : 2005-08-27 DOI: 10.1109/ICICT.2005.1598578
M. A. Sohag, A. A. Mahessar
{"title":"Irrigation Network Regulation through CAD System","authors":"M. A. Sohag, A. A. Mahessar","doi":"10.1109/ICICT.2005.1598578","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598578","url":null,"abstract":"The irrigation system of Pakistan is the largest integrated network in the world. There are 3 major storage reservoirs, 19 barrages, 12 inter-river link canals, 45 independent irrigation canal commands and over 1,22,268 watercourses. The network of irrigation of the province of Sindh consists of 3 barrages and 14 canal commands. The irrigation water is being used for agricultural, industrial and domestic purposes. Owing to mismanagement and inequitable distribution of water, it is necessary to have a fool-proof system where water is supplied to the end-users judiciously. Therefore water managers and farmers cannot know, how much quantum of water has been in and out flowing from regulators and outlets of main and branch canals, distributaries/ and minors. In current time marvelous developments have been done through microcomputer in the modern technology in all fields especially in the developed and generally in developing countries. The computer model on database has been developed on Potho minor, which off takes from West Branch Jamrao Canal for equitable and reliable distribution of water in the command area of minor. Software of computer was developed to determine inflow, and outflow and losses of water in minor and also water balance. The computer model shows that each watercourse receives either design discharge, less than design or more than design discharge. This is very important for the Area Water Boards (AWBs), water managers, Farmers Organizations (FOs), farmers and other stakeholders to make familiar with distribution of water in the commanded area of the channel.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115988770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimization of Semantic Caching for XML Database XML数据库语义缓存的优化
2005 International Conference on Information and Communication Technologies Pub Date : 2005-08-27 DOI: 10.1109/ICICT.2005.1598584
A. Hamid, S. Khan
{"title":"Optimization of Semantic Caching for XML Database","authors":"A. Hamid, S. Khan","doi":"10.1109/ICICT.2005.1598584","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598584","url":null,"abstract":"The availability of information on the Internet has increased exponentially the Internet users in the last few years. This made the web servers overloaded. Semantic caches store the semantics and results of the previously asked queries close to the users, in order to answer new queries. The caching reduces the burden of the web servers and optimizes their performance. This paper presents the SMOCE Cache, a framework for semantic caching of XML database. Specialized techniques such as indexing and broadening of semantic regions are proposed for the optimization of semantic caching. The evaluation of prototype proved the significance of proposed techniques.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126460625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Role of Software Agents in realizing Semantic Grid 软件代理在实现语义网格中的作用
2005 International Conference on Information and Communication Technologies Pub Date : 2005-08-27 DOI: 10.1109/ICICT.2005.1598579
M. O. Shafiq, S. Khalique, F. Maqbool, A. Ali, H. F. Ahmad, H. Suguri
{"title":"Role of Software Agents in realizing Semantic Grid","authors":"M. O. Shafiq, S. Khalique, F. Maqbool, A. Ali, H. F. Ahmad, H. Suguri","doi":"10.1109/ICICT.2005.1598579","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598579","url":null,"abstract":"Semantic grid activities have taken momentum with the advancements and research in existing grid and related technologies. Software agents have been determined as key resource entities in the semantic grid vision but their role is still ambiguous. Our approach is that semantics are needed in grids for interoperability between software agents at knowledge level. One of the most important goals of semantic grid is to bring seamless automation in grid which can be visualized as autonomous software agents fulfilling a given agenda of goals with least human intervention. In current grid scenario, due to lack of semantics, agents cannot understand services which drastically affects the negotiation, coordination and cooperation capabilities to form virtual organizations. Hence semantics are highly desirable so as to act as a catalyst to enhance the capabilities of software agents in order to bring seamless automation in grid. Our contribution in the paper is to identify the research issues and their solutions to incorporate the capabilities of software agents that can help in achieving semantic grid goals.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126044138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
OPEMS: Online Peer-to-Peer Expertise Matching System OPEMS:在线点对点专家匹配系统
2005 International Conference on Information and Communication Technologies Pub Date : 2005-08-27 DOI: 10.1109/ICICT.2005.1598572
S. Khan, S. M. Nabeel
{"title":"OPEMS: Online Peer-to-Peer Expertise Matching System","authors":"S. Khan, S. M. Nabeel","doi":"10.1109/ICICT.2005.1598572","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598572","url":null,"abstract":"Internet is a vital source to disseminate and share information to the masses. This has made information available in abundance on the Web. However, finding relevant information is difficult if not impossible. This difficulty is bilateral between information providers and seekers in terms of information presentation and accessibility respectively. This paper proposed an online Peer-to-Peer Expertise Matching system. The approach provides a highly scalable and self-organizing system and helps individuals in presenting and accessing the information in a consistent format on the Web. This makes the sharing of information among the autonomous organizations successful.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128155094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A synopsis Letter joining and character mapping algorithm 字母连接和字符映射算法
2005 International Conference on Information and Communication Technologies Pub Date : 2005-08-27 DOI: 10.1109/ICICT.2005.1598624
M. Saleem
{"title":"A synopsis Letter joining and character mapping algorithm","authors":"M. Saleem","doi":"10.1109/ICICT.2005.1598624","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598624","url":null,"abstract":"The theme behind this algorithm is to provide a technique that can be incorporated into a word processing application or a hybrid that allows the end user to write documents in languages which require alphabets to be joined together. This concept will be referred to as Letter Joining hereafter. Languages, the likes of Urdu, Hindi, Punjabi etc, have more than one type of image for a single alphabet. Consider for example the English alphabet 'B'. Its equivalent in the Urdu language is the letter pronounced as 'Bay'. 'Bay' has 4 forms that it can acquire in written Urdu. The first being when it is joined at the beginning of a word. The second being when it is joined in the middle of the word. The third being when it is joined at the end of a word and the last one being a standalone one. To know when to write which form of 'Bay' in a typed document is a complicated task and this is exactly what this algorithm is meant to accomplish. It will decide, based on the previous and next character, on which form of the alphabet it should reproduce.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"875 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133766043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信