{"title":"Design and implementation of sustainable educational network using knowledge management in Nepal","authors":"Kumar Pudashine, Vishnu Kumar Rana","doi":"10.1109/AHICI.2011.6113944","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113944","url":null,"abstract":"Educational network interconnects various academic and research institutions. It provides a platform for knowledge sharing between different institutions. It can be implemented via National Regional Educational Network. For the sustainability of any educational network, active stakeholders play a vital role. These stakeholders could be considered as the major contributors of a knowledge base. The main aim of this research paper is to provide a model of various knowledge base through the inclusion of active stakeholders for the sustainability of educational network in Nepal. The implementation of knowledge base is done through the three models. The first model provides implementation in an academic institution. The second approach provides implementation in NREN. The third model referred as hybrid provides implementation of Knowledge base in both academic institutions and NREN. It is expected that this research will enhance the performance of existing NREN. Finally this research will help to minimize the digital divide of Nepal.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128966518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Provisioning secure on-demand routing protocol in mobile ad hoc network","authors":"B. Vaidya, D. Makrakis, H. Mouftah","doi":"10.1109/AHICI.2011.6113952","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113952","url":null,"abstract":"Mobile ad-hoc network (MANET) has been a leading technology for ubiquitous networking since a decade, in which an ad-hoc routing is one of its fundamental components. Due to a number of inevitable challenges in MANETs, especially a problem of secure routing is long-standing, many researchers have extensively studied and developed various techniques to secure on-demand routing protocols in MANETs. However, many open issues remain in secure on-demand routing for MANETs. In this paper, we propose a lightweight and efficient security mechanism for on-demand source routing protocol including DSR in MANETs. The proposed scheme provides key generation by using a self-certified public keying technique as well as ensures secure route discovery by employing Schnorr digital signature and multi-signatures scheme. We provide security analysis of the proposed scheme. It can be seen that the proposed approach is more secure than the existing schemes. We also evaluated the proposed approach using computer simulation and compared its performance to that of SRP. The results show that the proposed mechanism is better than SRP.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129650441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ankush Agarwal, Geethu Babu, L. Rishi, K. Shruthi, Vinu Agarwal
{"title":"RFID management for tracking and inventory","authors":"Ankush Agarwal, Geethu Babu, L. Rishi, K. Shruthi, Vinu Agarwal","doi":"10.1109/AHICI.2011.6113935","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113935","url":null,"abstract":"RFID (Radio Frequency Identification Technology) is a field of computerizing recognition process that is progressively gaining thrust in recent years and is now being seen as a means of enhancing data handling procedures, complimentary in many ways to other data capture technologies such as bar coding. A variety of devices and associated systems have been developed to satisfy a broad series of applications. Regardless of the diversity of applications, the ideologies upon which they are based are quite understated, even though the technology and technicalities associated with their function can be quite innovative.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126963238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A single spatial 2D phase filter for channel demultiplexing in mode diversity multiplexing","authors":"G. Stepniak","doi":"10.1109/AHICI.2011.6113933","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113933","url":null,"abstract":"A single spatial phase filter that discriminates multiple channels at the output of mode division multiplexing system is shown. Excellently low crosstalk performance is reported for 4 × 4 and 8 × 8 systems.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121557067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal and suboptimal relay selection and power allocation in multi-relay cooperative network","authors":"Umesh Phuyal, S. C. Jha, V. Bhargava","doi":"10.1109/AHICI.2011.6113937","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113937","url":null,"abstract":"We study a cooperative communication scenario where multiple amplify-and-forward relays cooperate to transmit data from a source to destination. We discuss an optimal power allocation method to assign transmit powers to the source and relays in order to maximize achievable data rate of the system.We also propose less-complex suboptimal power allocation methods using various relay selection strategies. We provide simulation results to demonstrate performance of the optimal power allocation and suboptimal relay selection and power allocation schemes. We show that these suboptimal schemes perform close to optimal scheme and are more reasonable for practical implementation.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121990166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An advanced segmentation using bit-plane slicing technique in extraction of lungs region","authors":"T. Kiran, G. Kwon","doi":"10.1109/AHICI.2011.6113949","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113949","url":null,"abstract":"This paper presents the new method for the segmentation of pulmonary parenchyma. The proposed method is based on the bit-plane slicing technique. The original image is binarized using the bit-plane technique and among the different images the best binarized image is chosen. After the image is binarized, the labeling is done and the area of each label is calculated from which we obtained the next level of binarized image. Then the boundary tracing algorithm is applied to get the binarized image. The following steps show the automatic extraction of lungs area and experimental results has proved it's significant.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127993898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The ideal search","authors":"Thapa Parmeshwor","doi":"10.1109/AHICI.2011.6113943","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113943","url":null,"abstract":"There are various types of search techniques developed so far for searching the numbers, searching strings and others. Searching in large database containing huge collection of data is done (in most of the cases) using numerical indexes. Though there are many efficient search methods available still they are not ideal. The ideal search is the one that performs search in constant time, i.e. O(1). Till now this case is considered impossible but still we can achieve a performance very close to it using hash table. But this “The Ideal Search” can search any integer number among billions of numbers at constant O(1) time.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126818981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real - time download prediction based on the k - nearest neighbor method","authors":"Akshata Patil, Sanchita Jha","doi":"10.1109/AHICI.2011.6113929","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113929","url":null,"abstract":"The amount of download prediction or forecast is a statement about the way things will happen in the future, often but not always based on experience or knowledge. While there is much overlap between prediction and forecast, a prediction may be a statement that some outcome is expected, while a forecast may cover a range of possible outcomes. Although guaranteed information about the information is in many cases impossible, prediction is necessary to allow plans to be made about possible developments; Howard H. Stevenson writes that prediction in business “… is at least two things: Important and hard”. In this paper a method is proposed to predict the amount of download in real-time using the k - Nearest neighbor algorithm., the k-nearest neighbor algorithm (k-NN) is a method for classifying objects based on closest training examples in the feature space. k-NN is a type of instance-based learning, or lazy learning where the function is only approximated locally and all computation is deferred until classification.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134451410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Solar power of mobile transmitter/receiver tower antennas in remote areas","authors":"Tapas K. Das, Alokekumar Das, Avranil Das","doi":"10.1109/AHICI.2011.6113939","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113939","url":null,"abstract":"The low cost solar power requiring for mobile transmitter/receiver tower antennas in remote areas with low traffic density and other uses in village sites, is developed. The power provides coverage to large areas having the mega cells presenting radii in the range of 100–500 km. The solar cell assembly parameters considering the top glass plate, thickness of the EVA film, back cover material, and the processing control parameters of the laminated equipment considering the temperature and duration of curing of the EVA film, vacuum pressure, are taken to obtain maximum power output in the flat panel Photovoltaic (PV) module. The line-focused solar-cell concentrator was used to reduce the cost of the PV module as concentrating the light is significantly less expensive than the cost of flat-pate module. The decrease of output power was measured by increasing the temperature of the solar cell strings. Air-cooled heat sink was used to cool the cells and the temperature variation was obtained by changing fin area and wind speed. The optimum condition related to the assembly and processing parameters of the solar cell module to obtain maximum power is shown.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133915709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SYN flood attack prevention using main-memory database management system","authors":"S. Bhirud, V. Katkar","doi":"10.1109/AHICI.2011.6113945","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113945","url":null,"abstract":"With increase in densities of semiconductor chips and decrease in cost, it is feasible to store huge amount of data in main memory. Main Memory Database Management System (MMDBMS) uses main memory as primary storage for huge amount of data and provides very high speed access to it. This makes MMDBMS suitable option for implementation of real-time network security systems. This paper presents light-weight mechanism for detection and prevention of SYN flood attack using MMDBMS. Experimental results are provided to support proposed mechanism.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132810344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}