Pub Date : 2009-09-25DOI: 10.1109/ICICT.2009.5267175
S. Khalid, A. Basharat, A. A. Shahid, Syed Ali Hassan
To address the ever increasing need and challenges associated with improving the state of web-based education, a synergistic view of E-Learning and intelligent and adaptive tutoring is adapted which is the basic essence of the learner centered Adaptive E-learning Framework presented in this paper. This framework aims to provide a complete environment of online learning. The conceptual architecture of the framework presented in this paper is centered around the following core features: (1) Domain Specific Learning Services (2) Student Capability Analysis (3) Adaptive Lecture Authoring Tool and Notification Manager (4) Intelligent Assessment Engine (5) User Friendly E-Learning Portal. Altogether, this framework is truly aimed to be an integrated platform consistent with the emerging needs of E-learning and Distance Education.
{"title":"An adaptive E-learning Framework to supporting new ways of teaching and learning","authors":"S. Khalid, A. Basharat, A. A. Shahid, Syed Ali Hassan","doi":"10.1109/ICICT.2009.5267175","DOIUrl":"https://doi.org/10.1109/ICICT.2009.5267175","url":null,"abstract":"To address the ever increasing need and challenges associated with improving the state of web-based education, a synergistic view of E-Learning and intelligent and adaptive tutoring is adapted which is the basic essence of the learner centered Adaptive E-learning Framework presented in this paper. This framework aims to provide a complete environment of online learning. The conceptual architecture of the framework presented in this paper is centered around the following core features: (1) Domain Specific Learning Services (2) Student Capability Analysis (3) Adaptive Lecture Authoring Tool and Notification Manager (4) Intelligent Assessment Engine (5) User Friendly E-Learning Portal. Altogether, this framework is truly aimed to be an integrated platform consistent with the emerging needs of E-learning and Distance Education.","PeriodicalId":147005,"journal":{"name":"2009 International Conference on Information and Communication Technologies","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121462754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-25DOI: 10.1109/ICICT.2009.5267177
A. A. Siddiqi, Munir Ahmed, Y. Alginahi, Abdulrahman Alharby
Information technology forms an important part of the healthcare solution. Accurate and up-to-date information is essential to continuous quality improvement in any organization, and particularly so in an area as complex as healthcare. Therefore, diverse information systems must be integrated across the healthcare enterprise. The knowledge base in the medical field is large, complex, and growing rapidly. It includes scientific knowledge, as well as familiarity with the day-to-day business of providing healthcare. It is crucial to identify the processes in the healthcare sector that would most benefit from the support of information technology. This study is focused on the analysis and design of Comprehensive Patient Healthcare System (CPHS), which comprises two large subsystems, Computerized Patient Record System (CPRS) and Mobile Computing Clinical System (MCCS). It is anticipated that, this innovated system would not only serve as an application of state-of-the-art information and mobile computing technologies, but it would also provide clinical services at point of care in Saudi Arabia hospitals. Use of such technologies with highly efficient techniques for essential information gathering in a timely and cost effective manner in hospital sites is critical in order to understand how to enhance quality health care services to improve the life of patients and rapid decisions making. The design and development of CPHS would therefore pave the way for opening new venues in which such highly advanced information and mobile computing technologies are employed in the hospitals and other sectors beyond the field of medical care.
{"title":"Use of information and mobile computing technologies in healthcare facilities of Saudi Arabia","authors":"A. A. Siddiqi, Munir Ahmed, Y. Alginahi, Abdulrahman Alharby","doi":"10.1109/ICICT.2009.5267177","DOIUrl":"https://doi.org/10.1109/ICICT.2009.5267177","url":null,"abstract":"Information technology forms an important part of the healthcare solution. Accurate and up-to-date information is essential to continuous quality improvement in any organization, and particularly so in an area as complex as healthcare. Therefore, diverse information systems must be integrated across the healthcare enterprise. The knowledge base in the medical field is large, complex, and growing rapidly. It includes scientific knowledge, as well as familiarity with the day-to-day business of providing healthcare. It is crucial to identify the processes in the healthcare sector that would most benefit from the support of information technology. This study is focused on the analysis and design of Comprehensive Patient Healthcare System (CPHS), which comprises two large subsystems, Computerized Patient Record System (CPRS) and Mobile Computing Clinical System (MCCS). It is anticipated that, this innovated system would not only serve as an application of state-of-the-art information and mobile computing technologies, but it would also provide clinical services at point of care in Saudi Arabia hospitals. Use of such technologies with highly efficient techniques for essential information gathering in a timely and cost effective manner in hospital sites is critical in order to understand how to enhance quality health care services to improve the life of patients and rapid decisions making. The design and development of CPHS would therefore pave the way for opening new venues in which such highly advanced information and mobile computing technologies are employed in the hospitals and other sectors beyond the field of medical care.","PeriodicalId":147005,"journal":{"name":"2009 International Conference on Information and Communication Technologies","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130833071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-25DOI: 10.1109/ICICT.2009.5267188
R. Mehmood, Muhammad Usman Ali, I. A. Taj
In recent studies kernel based object tracking (KBOT) using Bhattacharya coefficient as similarity measure is shown to be robust and efficient object tracking technique. Image histogram provides a compact summarization of the distribution of data in an image. Due to computational efficiency; histogram has been successfully applied in KBOT based tracking algorithms. However without spatial or shape information, similar objects of different color may be indistinguishable based solely on histogram comparisons. The application of meanshift algorithm (the core of KBOT) on 1-D low level features of histogram may converge to false local maxima and cause inaccuracy of target localization. In this paper we presented a robust and efficient tracking approach using structural features along with histogram based Bhattacharya coefficient similarity measure for tracking non rigid objects. It is proposed that integrating the edge based target information as post processing step for updating estimated mean shift centroid in KBOT improves the localization problem. Experimental results show the updated algorithm has achieve more precise tracking results as compared to original kernel based object tracking
{"title":"Applying centroid based adjustment to kernel based object tracking for improving localization","authors":"R. Mehmood, Muhammad Usman Ali, I. A. Taj","doi":"10.1109/ICICT.2009.5267188","DOIUrl":"https://doi.org/10.1109/ICICT.2009.5267188","url":null,"abstract":"In recent studies kernel based object tracking (KBOT) using Bhattacharya coefficient as similarity measure is shown to be robust and efficient object tracking technique. Image histogram provides a compact summarization of the distribution of data in an image. Due to computational efficiency; histogram has been successfully applied in KBOT based tracking algorithms. However without spatial or shape information, similar objects of different color may be indistinguishable based solely on histogram comparisons. The application of meanshift algorithm (the core of KBOT) on 1-D low level features of histogram may converge to false local maxima and cause inaccuracy of target localization. In this paper we presented a robust and efficient tracking approach using structural features along with histogram based Bhattacharya coefficient similarity measure for tracking non rigid objects. It is proposed that integrating the edge based target information as post processing step for updating estimated mean shift centroid in KBOT improves the localization problem. Experimental results show the updated algorithm has achieve more precise tracking results as compared to original kernel based object tracking","PeriodicalId":147005,"journal":{"name":"2009 International Conference on Information and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129585071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-25DOI: 10.1109/ICICT.2009.5267211
S. Mahmood, S. Iftikhar, H. F. Ahmad, F. Mahmood
In this paper we have analyzed and developed a formal specification of a Trust Model in Semantic Grid Registry. This paper formalizes the basic requirements of a trust model in case of semantic grid registry. We have described the flow of operations of our system through links and processes in the system architecture. The system is formally modeled in Pi-Calculus. Finally we transformed the specification to Pi- ADL and generated code using Archware tool. We have already developed a Semantic Grid Registry.
{"title":"Formal modeling of trust in Semantic Grid Registry","authors":"S. Mahmood, S. Iftikhar, H. F. Ahmad, F. Mahmood","doi":"10.1109/ICICT.2009.5267211","DOIUrl":"https://doi.org/10.1109/ICICT.2009.5267211","url":null,"abstract":"In this paper we have analyzed and developed a formal specification of a Trust Model in Semantic Grid Registry. This paper formalizes the basic requirements of a trust model in case of semantic grid registry. We have described the flow of operations of our system through links and processes in the system architecture. The system is formally modeled in Pi-Calculus. Finally we transformed the specification to Pi- ADL and generated code using Archware tool. We have already developed a Semantic Grid Registry.","PeriodicalId":147005,"journal":{"name":"2009 International Conference on Information and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131015517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-25DOI: 10.1109/ICICT.2009.5267209
Asgarali Bouyer, M. N. MD SAP, A. Abdullah
Since the Grid is a dynamic environment, the prediction and detection of available resources in near future is important for resource scheduling. Economic-based grid management has been viewed as a feasible approach to carry out fair, efficient and reliable scheduling. One key issue in Economic-based grid strategy is to inform about available resources. In this paper, we present a novel predictable method to specify available resource in economic-based grid. This method use a rough set analysis by scheduler to divide resources in groups and then grant a priority to each group based on cost price and efficiency of nodes. The result show that our proposed method has an acceptable performance and it try to use cheaper and suitable resources for each job to decrease cost price of computation.
{"title":"A new rough set based approach for optimized detection of available resources in Grid computing","authors":"Asgarali Bouyer, M. N. MD SAP, A. Abdullah","doi":"10.1109/ICICT.2009.5267209","DOIUrl":"https://doi.org/10.1109/ICICT.2009.5267209","url":null,"abstract":"Since the Grid is a dynamic environment, the prediction and detection of available resources in near future is important for resource scheduling. Economic-based grid management has been viewed as a feasible approach to carry out fair, efficient and reliable scheduling. One key issue in Economic-based grid strategy is to inform about available resources. In this paper, we present a novel predictable method to specify available resource in economic-based grid. This method use a rough set analysis by scheduler to divide resources in groups and then grant a priority to each group based on cost price and efficiency of nodes. The result show that our proposed method has an acceptable performance and it try to use cheaper and suitable resources for each job to decrease cost price of computation.","PeriodicalId":147005,"journal":{"name":"2009 International Conference on Information and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125792921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-25DOI: 10.1109/ICICT.2009.5267179
Murad Habib, R. Khan, J. L. Piracha
Research and development (R&D) project selection is a complex decision-making process. Risks and uncertainties are also associated with the investments and returns of R&D projects. This research paper illustrates an application of ANP (analytic network process). The analytic network process (ANP) is presented as a potentially valuable method to support the selection of projects in a research and development (R&D) environment. The AHP (Analytic Hierarchy Process) is employed to break down large unstructured decision problems into manageable and measurable components. The ANP, as the general form of AHP, is powerful to deal with complex decisions where interdependence exists in a decision model. The research paper discusses the use of the ANP, a general form of Saaty's analytic Network process, as a model to evaluate the value of competing R&D projects.
{"title":"Analytic network process applied to R&D project selection","authors":"Murad Habib, R. Khan, J. L. Piracha","doi":"10.1109/ICICT.2009.5267179","DOIUrl":"https://doi.org/10.1109/ICICT.2009.5267179","url":null,"abstract":"Research and development (R&D) project selection is a complex decision-making process. Risks and uncertainties are also associated with the investments and returns of R&D projects. This research paper illustrates an application of ANP (analytic network process). The analytic network process (ANP) is presented as a potentially valuable method to support the selection of projects in a research and development (R&D) environment. The AHP (Analytic Hierarchy Process) is employed to break down large unstructured decision problems into manageable and measurable components. The ANP, as the general form of AHP, is powerful to deal with complex decisions where interdependence exists in a decision model. The research paper discusses the use of the ANP, a general form of Saaty's analytic Network process, as a model to evaluate the value of competing R&D projects.","PeriodicalId":147005,"journal":{"name":"2009 International Conference on Information and Communication Technologies","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115195442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-25DOI: 10.1109/ICICT.2009.5267184
B. Sajjad, A. Mir, A. Khawar, F. Bashir, A. Tariq
Corporate executives require relevant and intelligent business information in real-time to take strategic decisions. They require the freedom to access this information anywhere and anytime. There is a need to extend this functionality beyond the office and on the fingertips of the decision makers. Mobile Business Intelligence Tool (MBIT) aims to provide these features in a flexible and cost-efficient manner. This paper describes the detailed architecture of MBIT to overcome the limitations of existing mobile business intelligence tools. Further, a detailed implementation framework is presented to realize the design. This research highlights the benefits of using service oriented architecture to design flexible and platform independent mobile business applications.
{"title":"An open source service oriented Mobile Business Intelligence Tool (MBIT)","authors":"B. Sajjad, A. Mir, A. Khawar, F. Bashir, A. Tariq","doi":"10.1109/ICICT.2009.5267184","DOIUrl":"https://doi.org/10.1109/ICICT.2009.5267184","url":null,"abstract":"Corporate executives require relevant and intelligent business information in real-time to take strategic decisions. They require the freedom to access this information anywhere and anytime. There is a need to extend this functionality beyond the office and on the fingertips of the decision makers. Mobile Business Intelligence Tool (MBIT) aims to provide these features in a flexible and cost-efficient manner. This paper describes the detailed architecture of MBIT to overcome the limitations of existing mobile business intelligence tools. Further, a detailed implementation framework is presented to realize the design. This research highlights the benefits of using service oriented architecture to design flexible and platform independent mobile business applications.","PeriodicalId":147005,"journal":{"name":"2009 International Conference on Information and Communication Technologies","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125922879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-25DOI: 10.1109/ICICT.2009.5267199
S. Ullah, Z. Hussain
An Artificial Neural Network has got greater importance in the field of data mining. Although it may have complex structure, long training time, and uneasily understandable representation of results, neural network has high accuracy and is preferable in data mining. This research paper is aimed to improve efficiency and to provide accurate results on the basis of same behaviour data. To achieve these objectives, an algorithm is proposed that uses two data mining techniques, that is, attribute selection method and cluster analysis. The algorithm works by applying attribute selection method to eliminate irrelevant attributes, so that input dimensionality is reduced to only those attributes which contribute in the training process. Then after, the whole dataset is partitioned into n clusters which are finally fed into Multilayer Perceptrons network based on backpropagation algorithm to carry out blockwise and parallel training.
{"title":"A two-step approach for improving efficiency of feedforward Multilayer Perceptrons network","authors":"S. Ullah, Z. Hussain","doi":"10.1109/ICICT.2009.5267199","DOIUrl":"https://doi.org/10.1109/ICICT.2009.5267199","url":null,"abstract":"An Artificial Neural Network has got greater importance in the field of data mining. Although it may have complex structure, long training time, and uneasily understandable representation of results, neural network has high accuracy and is preferable in data mining. This research paper is aimed to improve efficiency and to provide accurate results on the basis of same behaviour data. To achieve these objectives, an algorithm is proposed that uses two data mining techniques, that is, attribute selection method and cluster analysis. The algorithm works by applying attribute selection method to eliminate irrelevant attributes, so that input dimensionality is reduced to only those attributes which contribute in the training process. Then after, the whole dataset is partitioned into n clusters which are finally fed into Multilayer Perceptrons network based on backpropagation algorithm to carry out blockwise and parallel training.","PeriodicalId":147005,"journal":{"name":"2009 International Conference on Information and Communication Technologies","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123124704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-25DOI: 10.1109/ICICT.2009.5267206
K. Shehzad, A. Ali, F. Rasool, R. Hashmi, A. Zubair, R. Ali
Frequency is amongst the most exclusive and most costly resources in wireless communication networks, especially, while considering the demands of Broadband Wireless Access (BWA). In BWA, the management of frequency distribution and its effective utilization is of utmost importance. This research explores possible ways to ensure the most effective allocation of bandwidth resources and their best possible utilization on need basis. The model for static frequency allocation has been optimized and the dynamic frequency management has been calculated while dividing the users in different user classes on the basis of their needs and requirements. The effect of ping-pong handovers has been handled by introducing an inter-base station handshake process, allowing effective management of fast moving users. Automated Frequency Distribution, Management and Assignment (AFDMA) provides maximum bandwidth optimization in order to ensure increased network performance and Quality of Service (QoS).
{"title":"Automated Frequency Distribution, Management & Assignment (AFDMA) in IEEE 802.16","authors":"K. Shehzad, A. Ali, F. Rasool, R. Hashmi, A. Zubair, R. Ali","doi":"10.1109/ICICT.2009.5267206","DOIUrl":"https://doi.org/10.1109/ICICT.2009.5267206","url":null,"abstract":"Frequency is amongst the most exclusive and most costly resources in wireless communication networks, especially, while considering the demands of Broadband Wireless Access (BWA). In BWA, the management of frequency distribution and its effective utilization is of utmost importance. This research explores possible ways to ensure the most effective allocation of bandwidth resources and their best possible utilization on need basis. The model for static frequency allocation has been optimized and the dynamic frequency management has been calculated while dividing the users in different user classes on the basis of their needs and requirements. The effect of ping-pong handovers has been handled by introducing an inter-base station handshake process, allowing effective management of fast moving users. Automated Frequency Distribution, Management and Assignment (AFDMA) provides maximum bandwidth optimization in order to ensure increased network performance and Quality of Service (QoS).","PeriodicalId":147005,"journal":{"name":"2009 International Conference on Information and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131036728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-25DOI: 10.1109/ICICT.2009.5267215
M. A. Azad, R. Mahmood, T. Mehmood
New emerging technologies like Multimedia applications require timely delivery of information as compared to reliability. The most widely used protocols over transport layer are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Both of these have some drawbacks while using in real time applications. TCP increases delay in transfer of data but achieving reliable transfer of data while UDP does not provide any acknowledgment, hence it overcomes the problem of delay but lacking congestion control mechanism. To provide congestion control over transport layer using UDP, Datagram Congestion Control Protocol (DCCP) has been designed to provide timely delivery of data and congestion control mechanism as well. In this research text, we have worked out the behavior of video applications over DCCP environment. We have analyzed the performance of MPEG4 video over transport layer using DCCP variants, UDP and TCP under competing and non-competing topology. Delay, throughput, jitter and packet loss are used to assess the performance of these protocols. Our results show that DCCP can be used as a transport layer protocol for video applications, which may result in improved throughput, reduced packet loss as compared to UDP but the delay and jitter of UDP is much lesser than DCCP variants. According to the results DCCP assures better QoS than other transport protocols for video transmission under congestion.
{"title":"A comparative analysis of DCCP variants (CCID2, CCID3), TCP and UDP for MPEG4 video applications","authors":"M. A. Azad, R. Mahmood, T. Mehmood","doi":"10.1109/ICICT.2009.5267215","DOIUrl":"https://doi.org/10.1109/ICICT.2009.5267215","url":null,"abstract":"New emerging technologies like Multimedia applications require timely delivery of information as compared to reliability. The most widely used protocols over transport layer are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Both of these have some drawbacks while using in real time applications. TCP increases delay in transfer of data but achieving reliable transfer of data while UDP does not provide any acknowledgment, hence it overcomes the problem of delay but lacking congestion control mechanism. To provide congestion control over transport layer using UDP, Datagram Congestion Control Protocol (DCCP) has been designed to provide timely delivery of data and congestion control mechanism as well. In this research text, we have worked out the behavior of video applications over DCCP environment. We have analyzed the performance of MPEG4 video over transport layer using DCCP variants, UDP and TCP under competing and non-competing topology. Delay, throughput, jitter and packet loss are used to assess the performance of these protocols. Our results show that DCCP can be used as a transport layer protocol for video applications, which may result in improved throughput, reduced packet loss as compared to UDP but the delay and jitter of UDP is much lesser than DCCP variants. According to the results DCCP assures better QoS than other transport protocols for video transmission under congestion.","PeriodicalId":147005,"journal":{"name":"2009 International Conference on Information and Communication Technologies","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116753673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}