{"title":"CyberCOP: the all-in-one ip firewall framework","authors":"F. Ahmed, K. A. Siddiqui, F. Asghar","doi":"10.1109/ISCON.2002.1214587","DOIUrl":"https://doi.org/10.1109/ISCON.2002.1214587","url":null,"abstract":"","PeriodicalId":284251,"journal":{"name":"IEEE Students Conference, ISCON '02. Proceedings.","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115770208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fingerprint \"registration point extraction, database entry of extracted features and matching criteria\"","authors":"S.K.R. Rizvi, S. A. Hussain","doi":"10.1109/ISCON.2002.1215935","DOIUrl":"https://doi.org/10.1109/ISCON.2002.1215935","url":null,"abstract":"The paper presents an algorithm for registration and matching criteria in fingerprint based security systems. Topics discussed include: compression of fingerprint images in the spatial domain; local mean histograms; methods of calculating direction vectors; registration point extraction; normalization of the registration area; extraction of ridge bifurcation by Gabor filter; method of generating fingerprint code; database entry; matching criteria for the database. I also discuss two methods, registration point detection and Poincare index method, and explain why the second method is invalid.","PeriodicalId":284251,"journal":{"name":"IEEE Students Conference, ISCON '02. Proceedings.","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116005546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An interactive speaker testing system based on DFT","authors":"A. A. Siddiqui, M. Zia, M. Amir, S. Haque","doi":"10.1109/ISCON.2002.1215934","DOIUrl":"https://doi.org/10.1109/ISCON.2002.1215934","url":null,"abstract":"The paper discusses the analysis of a signal using fast Fourier transform (FFT). Fourier analysis is a mathematical technique based on decomposing signals into sinusoids. The discrete Fourier transform (DFT) is the technique used with periodic digitized signals. There are several ways to calculate the discrete Fourier transform, such as solving simultaneous linear equations, the correlation method and fast Fourier transform (FFT). While FFT produces the same result as the other approaches for calculating DFT, it is incredibly more efficient, often reducing the computation time by about three hundred times as compared to other DFT techniques. To demonstrate the practical aspects of fast Fourier transform, a speaker testing system is developed and different speakers are tested for buzzing. Buzzing is a common problem in speakers. To detect a speaker for buzzing, an interactive PC based system has been developed, and, using this system, a speaker can be easily analyzed. Also, by using this system, the testing time is greatly reduced and the test data can be saved in the form of a graph of frequency versus % total harmonic distortion (THD). Both the hardware and the software for this system are discussed.","PeriodicalId":284251,"journal":{"name":"IEEE Students Conference, ISCON '02. Proceedings.","volume":"222 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114166542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W.U. Zaman Bajwa, S. A. Ahmed, S. Zulfiqar, A. Abbas, A. Qayyum
{"title":"Mobile IP based mobility management for 3G wireless networks","authors":"W.U. Zaman Bajwa, S. A. Ahmed, S. Zulfiqar, A. Abbas, A. Qayyum","doi":"10.1109/ISCON.2002.1214596","DOIUrl":"https://doi.org/10.1109/ISCON.2002.1214596","url":null,"abstract":"We present an implementation of Mobile IP (named WASMIP) in Linux. WASMIP is based on Linux OS because of the fact that it is an open source OS and provides the programmers with a great deal of flexibility when it comes to system programming. The implementation has a total of three software entities by the names of Mobile Node (MN), Home Agent (HA) and Foreign Agent (FA). These three entities are independent of each other and run as separate processes. All these entities are configurable through an Xwindows based configuration CUI. The implementation fully conforms to RFC 2002 'SHOULD' requirements and supports IPin-IP encapsulation, FA care-of-address, keyed-MDS \"prefix + suffix\" mode of authentication and IEEE 802.1 1 wireless interfaces. Additionally. in this paper we also look at what the future has in store for Mobile IP in the light of 3G wireless networks.","PeriodicalId":284251,"journal":{"name":"IEEE Students Conference, ISCON '02. Proceedings.","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117316874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automated segmentation of skin-tone regions in video sequences","authors":"A. Farrukh, A. Ahmad, M.I. Khan, N. Khan","doi":"10.1109/ISCON.2002.1215951","DOIUrl":"https://doi.org/10.1109/ISCON.2002.1215951","url":null,"abstract":"The paper introduces an automatic video object extraction algorithm based on color segmentation. The algorithm focuses on extracting the skin of a human object in an image. The algorithm includes preprocessing, edge detection, classification of pixels and blocks, block clustering, region growing, edge following and final extraction of the human skin-tone region. Through use of these steps, pixel-wise accuracy is achieved in the segmented object of interest. The algorithm gives very promising result in situations such as video conferencing, seminars and surveillance systems.","PeriodicalId":284251,"journal":{"name":"IEEE Students Conference, ISCON '02. Proceedings.","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128396122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measuring software reuse","authors":"Muhuninitrd Wuseem Arfi, Maryam Siddiqi, Omer Arshad, Aamna Almakky, Rabia Wasti","doi":"10.1109/ISCON.2002.1214595","DOIUrl":"https://doi.org/10.1109/ISCON.2002.1214595","url":null,"abstract":"Predicting future i s always a risky enterprise! GPS is undergoing tremendous growth, with many product innovations being made. Furthermore, technology advances are leading resulting organizational and institutional changes, which wil l have a profound impact on the ”positioning professions”, as well as on the community in general. Location commerce or “L-Commerce” has become the latest buzzword to circulate, among ’ telecommunications industry watchers tracking new trends in the wireless arena. L-Commerce wil l help connect businesses with their most qualified customers, quickly direct individuals to the services they desire, and even increase the efficiency of emergency services. The convergence of multiple technologies including geographic information systems (CIS), Internet, wireless communications, location determination, and portable devices has given rise to exciting new types of information utilities that may be referred to simply as location services. Also called mobile location services, wireless location services, or location-based services, these systems are making a major impact on how we navigate our world and how business i s done. Knowing where a person or object i s at any time presents a powerful new dimension to’ the kinds of information services that can be offered. Location services deliver geographic information between mobile and I or static users via the Internet and/or wireless network. L-Commerce has combined the technologies of mobile computing / wireless communication with Global Positioning System (GPS), to provide a wide range o f location-dependent services to the general public (such as roadside assistance, concierge services, location-sensitive advertising). The Governments are working on the grounds to provide location-based data to the public. US government has already announced that GPS will be freely available to general public by the current decade [ZOOO]. In this paper, L-Commerce i s presented with reference to future trends in mobile computing and GPS technology. By using the media o f GPS, people would be experiencing the world as really a ‘Global Village’.","PeriodicalId":284251,"journal":{"name":"IEEE Students Conference, ISCON '02. Proceedings.","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123517239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Bluetooth telephony model through multi-hop routing","authors":"S. Mansoor","doi":"10.1109/ISCON.2002.1215937","DOIUrl":"https://doi.org/10.1109/ISCON.2002.1215937","url":null,"abstract":"Bluetooth (BT) is a new short-range (10 m) wireless personal area network (WPAN) technology, operating in the globally unlicensed 2.4 GHz ISM band. At present, BT's scope appears limited to direct, single hop communication and cable replacement. However, it seems destined to grow into applications that would require indirect communication (multi-hop) support such as large conferences and even BT telephony. The author feels that the primary hurdle BT needs to defeat is the lack of support for multi-hop routing of data/voice packets in BT networks. While most contemporary research on BT has focused on BT usage scenarios profiled at the launch of the technology, the author feels that the standard has the potential to grow into areas such as Bluetooth telephony, where BT enabled phone sets would be able to allow users to communicate over large distances, with no charge. Thus, the need for efficient packet routing is born. The algorithm presented intends to offer a low cost, backward compatible solution by building on top of existing BT functionality (while leaving it intact), and distributing the burden of determining and maintaining routes (through the BT scatternet) and routing vectors between the various BT entities in the BT scatternet.","PeriodicalId":284251,"journal":{"name":"IEEE Students Conference, ISCON '02. Proceedings.","volume":"65 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132237462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Voice over asynchronous transfer modc(ATM)","authors":"I. Gohar, A. Mirza","doi":"10.1109/ISCON.2002.1214600","DOIUrl":"https://doi.org/10.1109/ISCON.2002.1214600","url":null,"abstract":"activity through modeling. There are varied levels o f abstraction, which can be contained within the use o f simulation. One extreme i s the computer simulation while other is command and control decision-making simulations (like in training and entertainment), which involve people as participants. A further dimension i s web-based simulation using state-of-art technologies. Other diverse fields are social sciences and medicine. This paper encompasses some exciting domains where simulation and modeling i s extensively used to help simplify understanding o f complex real time phenomena.","PeriodicalId":284251,"journal":{"name":"IEEE Students Conference, ISCON '02. Proceedings.","volume":"186 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133946174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantitative analysis of multiprotocol label switching (MPLS) in VPNs","authors":"Muzammil Khan, Syed","doi":"10.1109/ISCON.2002.1215940","DOIUrl":"https://doi.org/10.1109/ISCON.2002.1215940","url":null,"abstract":"The world is moving towards the ubiquitous deployment of the Internet. Virtual private networking technology provides the medium to use the public Internet backbone as an appropriate channel for private data communication. By replacing expensive private network bandwidth with relatively low-cost bandwidth, much of the remote communications burden is transferred over to ISPs. A multilayer technology, multiprotocol label switching (MPLS), offers an alternative tunneling mechanism for implementing IP VPNs. MPLS combines the performance of layer 2 switching with layer 3 routing to provide a scalable and flexible architecture for building VPNs. MPLS represents the next level of standards-based evolution in combining layer 2 (data link layer) switching technologies with layer 3 (network layer) routing technologies. The primary objective of this standardization process is to create a flexible networking fabric that provides increased performance and scalability. This includes traffic-engineering capabilities, which provide, for example, aspects of quality of service (QoS), and facilitate the use of virtual private networks. This paper covers the general idea of MPLS in VPNs; it also covers a quantitative analysis of MPLS in VPNs.","PeriodicalId":284251,"journal":{"name":"IEEE Students Conference, ISCON '02. Proceedings.","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124160377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pre-feasibility study to establish computer integrated manufacturing (CIM) industry in Pakistan","authors":"T. Masood","doi":"10.1109/ISCON.2002.1215943","DOIUrl":"https://doi.org/10.1109/ISCON.2002.1215943","url":null,"abstract":"Modern production concepts require new approaches. Therefore, flexible goals for the problems with alternative possibilities and strategies for specific solutions are important. This paper introduces the rising needs, working principles, research environment, pre-research and development, applied engineering, and international cooperation required for computer-integrated manufacturing (CIM) in Pakistan. A rise and fall comparison of manufacturing systems due to CIM systems of developed countries depicts the very basic need to imitate such systems in Pakistan. An overview of Pakistani industry utilizing CIM systems depicts the present stage of the topic. A prototype CIM system is also presented and particular emphasis is put on the execution supervision of the enterprise's plan of business processes.","PeriodicalId":284251,"journal":{"name":"IEEE Students Conference, ISCON '02. Proceedings.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125878138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}