{"title":"A Dynamic Weight Assignment Approach for IR Systems","authors":"M. Shoaib, A. Shah, A. Vashishta","doi":"10.1109/ICICT.2005.1598599","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598599","url":null,"abstract":"Weights are assigned to the extracted keywords for partial matching and computing ranking in an IR system. Weight assignment technique is suggested by the IR model that is used for an IR system. Currently suggested weight assignment techniques are static which means that once weight is assigned a keyword it remains unchanged during life-span of an IR system. In this paper, we suggest a dynamic weight assignment technique. This technique can be used by any IR model that supports partial matching.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"122 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129502845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TCP Attack Analysis on Packets Captured Using Symantec Decoy Server","authors":"Ali Raza Nizamani, B. Belaton","doi":"10.1109/ICICT.2005.1598595","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598595","url":null,"abstract":"This paper discusses results obtained from Symantec Decoy Server (previously known as Mantrap) with an introduction to honeypots. Lance Spitzner of the Honeynet Project introduced the concept of honeypots. A honeypot is in essence a decoy server, which has no real or strategic value and is only setup to attract crackers towards it. The idea is to trap the crackers and learn cracking techniques from them. Rapid increase in unauthorized intrusions over the Internet provides a great motivation to explore honeypots at a greater depth. We will provide analysis on TCP based denial of service attack carried out on Symantec Decoy Server based honeypot. These results highlight the importance of honeypot as a tool of learning and preventing future intrusions.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129531763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Use of Neural Networks in Multi-Sensor Fusion for Remote Sensing Applications","authors":"S. Aejaz","doi":"10.1109/ICICT.2005.1598564","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598564","url":null,"abstract":"Remote sensing encounters different types of objects with similar spectral signatures. Multi-sensors form the solution of the problem with spectral different parts of the spectrum and the resulting information is then processed using digital signal processing techniques. Artificial neural networks provide another method for processing this information. The research describes how neural networks may be used to classify objects on the basis of their spectral response to different frequencies.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115285778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"G-value Decoding of Greedy Codes","authors":"K. Ahmad","doi":"10.1109/ICICT.2005.1598559","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598559","url":null,"abstract":"Error-correcting codes are widely used to increase the reliability of transmission of information over various forms of communication channels. Codes with a given minimum distance d can be constructed by a greedy algorithm [2]. In this paper, I proposed a new algorithm for the allocation of g-values to the binary vectors. Hamming (7, 4, 3) code can be generated by the application of greedy algorithm on the binary vectors of length 7 arranged in B-ordering. This code is used to demonstrate a new decoding technique for linear codes in addition to the schemes already known for decoding such as Syndrome Decoding Array (S.D.A).","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121073417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring the Possibility of Implementing Telecommuting at University Utara Malaysia (UUM)","authors":"W. Osman, H. Rashdan","doi":"10.1109/ICICT.2005.1598554","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598554","url":null,"abstract":"Global technology has quickly progressed to provide more accessible business modes of communication. The image of the traditional workplace as a particular place to go to work is being replaced with employees working wherever they can be most efficient and productive, whether at home, on a plane, on the road, or a telework center. The availability of affordable technology has been one of the major contributors to the \"any time, any place\" telecommuting trend. The purpose of this study is to investigate the possibility of the implementation of teleworking at University Utara Malaysia (UUM), the suitable job selection criteria, the suitable technology needed to support this new mode of business, employee perception and willingness to telecommute, and top management support. To investigate the possibility of a lecturer's job as a telecommuter, we have adopted Jack Nilles Job Task Analysis. For the technology factor, data is collected through literature review. Structured interviews are conducted with top management to determine their willingness to implement this program. And, finally, questionnaires are used to identify the UUM lecturers' willingness to telecommute. This study found that, if the technology factor is available, people are willing to telecommute, a lecturer's job is suitable for telecommuting, and Management is agreeable. Therefore, it is concluded that at UUM, people can enjoy telecommuting benefits of telecommuting, if there is an established policy and regulations that allow them to telecommute.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127358371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simplified Static Image Face Detection Algorithm","authors":"S.A.R. Zaidi, Shyma Zaidi, K. Samad, A.A. Iqbal","doi":"10.1109/ICICT.2005.1598618","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598618","url":null,"abstract":"Although there are thousands of algorithms available for face extraction from static images based on histogram intersection technique or feature based face detection but these are still complex and it is not a trivial task to implement these algorithm, as a matter of fact most programmers regard these techniques as time chewing monsters because most of newly available programming languages does not provide any specific support for achieving the task. Hence we require a simplified algorithm, which can easily operate under normal circumstances and can easily be implemented by a programmer having technical knowledge instead of getting in to very coarse-grained mathematical details. The algorithm we discuss in this paper is some how uses histogram technique but it is not the purely dependent on histogram intersection or some other technique. There are some pros and cons of every system and thus this system is also not hundred percent perfect, how ever over the time we can develop a system with capability of detecting multiple faces in a single image and naturally combining couple of more algorithms, we can also achieve 3D face detection. In this paper a prototype is implemented using Microsoft GDI+ within limitations of managed and safe code.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123108681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation And Analysis of CMMI's Configuration Management Process Area; Applicable to \"Defined\" Level - 3","authors":"A. Luqman","doi":"10.1109/ICICT.2005.1598604","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598604","url":null,"abstract":"Enterprise Resource Planner (ERP) is a strategically important tool as integrated business application for long-term success in an increasingly competitive global market. This system requires the integration of data and business processes across the whole enterprise. In order to develop a good quality product there is a need of applying proper model. It becomes more costly in terms of training, appraisals, and improvement activities while applying multiple models that are not integrated within and across an organization. Where as Capability Maturity Model Integration is a set of integrated models that successfully addresses multiple disciplines and has integrated training support. Objective of this paper is the analysis & implementation of CMMI's Configuration Management (CM) process area in support category while adopting its continuous approach [1], by exploring all specific goals and their corresponding specific practices and discussing its implementation over selected ERP case study. Its adoption will drive the CM towards continuous process improvement of enterprise business for more reliable delivery of software products.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129319411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Teaching Visual Programming to High School Students, Experience from Pakistan","authors":"A. Khan, A. Siddiqi","doi":"10.1109/ICICT.2005.1598587","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598587","url":null,"abstract":"This paper presents the lessons learnt from a Visual Basic. Net curriculum from Microsoft. The said curriculum by the global name of \"Code Rules\" was recently localized and called \"Coding Mela\". A pilot was conducted to evaluate its efficacy towards high school students in a number of cities in Pakistan. The objective of this pilot was to introduce students to basic programming concepts in an easy and interesting manner. Modern programming languages are becoming increasingly complex these days, Visual Basic provides an event based programming model which is more intuitive and interactive for visual programming but a little difficult for the novices to programming. However the language as a whole is easy and simple to learn.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132341176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Service-Oriented E-Learning Architecture Using Web Service-Based Intelligent Agents","authors":"N. Hussain, M.K. Khan","doi":"10.1109/ICICT.2005.1598570","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598570","url":null,"abstract":"There is no doubt that e-learning has found its way in our lives. From the very start to the Ph.D. level one can find e-learning courses every where and all the big names are supporting it. One thing that is needed to be understood is that e-learning is basically the integration of various technologies. Now this technology is maturing and we can find different standards for e-learning .New technologies such as agents and web services are promising better results. In this paper we have proposed an e-learning architecture that is dependent on multi-agent systems and web services. These communication technologies will make the architecture more robust, scalable and efficient.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132807172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Address Auto-configuration in Mobile Ad Hoc Networks using OLSR","authors":"M. U. Saleeml, Shoaib Mukhtar","doi":"10.1109/ICICT.2005.1598613","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598613","url":null,"abstract":"Mobile Ad Hoc Networks is dynamic multi-hop network that is formed by a set of mobile wireless nodes that are sharing the same bandwidth. So every node possibly acts as a host as well as a router. In traditional networks, hosts can depend on the central servers like DHCP for IP assignment and management, but it cannot be extended to MANET due to its distributed and dynamic nature. Many solutions have been proposed, amongst them some are try to extend the stateless configuration of IPv6 for MANET; others distribute IP addresses among nodes (using binary distribution). Most of these proposed solutions have lag consideration of network partitioning and merging. Our proposed solution not only caters the need of configuration but also covers the issues of network partitioning and merging by introducing extension to OLSR protocol.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115355444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}