Pub Date : 2009-09-25DOI: 10.1109/ICICT.2009.5267196
Muhammad Umair Khan
Unsupervised data mining techniques require human intervention for understanding and analysis of the clustering results. This becomes an issue in dynamic users/applications and there is a need for real-time decision making and interpretation. In this paper we will present an approach to automate the annotation of results obtained from data stream clustering to facilitate interpreting that whether the given cluster is an anomaly or not. We use fuzzy logic to label the data. The results will be obtained on the basis of density function & the number of elements in a certain cluster.
{"title":"Anomaly Detection in data streams using fuzzy logic","authors":"Muhammad Umair Khan","doi":"10.1109/ICICT.2009.5267196","DOIUrl":"https://doi.org/10.1109/ICICT.2009.5267196","url":null,"abstract":"Unsupervised data mining techniques require human intervention for understanding and analysis of the clustering results. This becomes an issue in dynamic users/applications and there is a need for real-time decision making and interpretation. In this paper we will present an approach to automate the annotation of results obtained from data stream clustering to facilitate interpreting that whether the given cluster is an anomaly or not. We use fuzzy logic to label the data. The results will be obtained on the basis of density function & the number of elements in a certain cluster.","PeriodicalId":147005,"journal":{"name":"2009 International Conference on Information and Communication Technologies","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134631470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-25DOI: 10.1109/ICICT.2009.5267183
R. A. Shaikh, A. Basit
Significant implementation challenges exist in wireless backbone connectivity. Typical optical wireless communication topologies are evaluated. A fresh approach using 1550nm Wavelength laser to design protocol and topology for point-to-point outdoor connectivity is carried out. Matlab simulation results support the 1550nm laser as a good choice for outdoor connectivity for optical wireless communication. New design and topology for an optical wireless communication system is suggested with special consideration of security and recommendation for the optimal use of such a technology is suggested.
{"title":"Using point-to-point 1550nm laser for outdoor mobility","authors":"R. A. Shaikh, A. Basit","doi":"10.1109/ICICT.2009.5267183","DOIUrl":"https://doi.org/10.1109/ICICT.2009.5267183","url":null,"abstract":"Significant implementation challenges exist in wireless backbone connectivity. Typical optical wireless communication topologies are evaluated. A fresh approach using 1550nm Wavelength laser to design protocol and topology for point-to-point outdoor connectivity is carried out. Matlab simulation results support the 1550nm laser as a good choice for outdoor connectivity for optical wireless communication. New design and topology for an optical wireless communication system is suggested with special consideration of security and recommendation for the optimal use of such a technology is suggested.","PeriodicalId":147005,"journal":{"name":"2009 International Conference on Information and Communication Technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121940696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-25DOI: 10.1080/00207161003596690
N. Memon, S. Gilani
Medical image is usually comprised of region of interest (ROI) and region of non interest (RONI). ROI is the region that contains the important information from diagnosis point of view so it must be stored without any distortion. We have proposed a digital watermarking technique which avoids the distortion of image in ROI by embedding the watermark information in RONI. The watermark is comprised of patient information, hospital logo and message authentication code, computed using hash function. Earlier BCH encryption of watermark is performed to ensure inaccessibility of embedded data to the adversaries.
{"title":"Watermarking of chest CT scan medical images for content authentication","authors":"N. Memon, S. Gilani","doi":"10.1080/00207161003596690","DOIUrl":"https://doi.org/10.1080/00207161003596690","url":null,"abstract":"Medical image is usually comprised of region of interest (ROI) and region of non interest (RONI). ROI is the region that contains the important information from diagnosis point of view so it must be stored without any distortion. We have proposed a digital watermarking technique which avoids the distortion of image in ROI by embedding the watermark information in RONI. The watermark is comprised of patient information, hospital logo and message authentication code, computed using hash function. Earlier BCH encryption of watermark is performed to ensure inaccessibility of embedded data to the adversaries.","PeriodicalId":147005,"journal":{"name":"2009 International Conference on Information and Communication Technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127937469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-25DOI: 10.1109/ICICT.2009.5267205
R. Hashmi, A. Siddiqui, M. Jabeen, K. Shehzad, A. Zubair, K. Alimgeer
Security is amongst one of the major issues in Broadband Wireless Access (BWA) Networks. After the launch of the IEEE 802.16 standard (WiMAX), a number of security issues were reported in several articles. Ever since the beginning, work has been in progress for the neutralization of these identified threats. In this paper, the analysis of the authentication protocols implemented in WiMAX has been presented along with the description of the threats posed to them. The paper also describes security sub-layer and limitations of the existing architecture. An approach has also been presented for the prevention of these threats like the avoidance of replay; suppress replay and man-in-the-middle attacks. The proposed approach enhances the network security and strengthens it by resynchronization of the Subscriber Station with the Base Station.
{"title":"Improved Secure Network Authentication Protocol (ISNAP) for IEEE 802.16","authors":"R. Hashmi, A. Siddiqui, M. Jabeen, K. Shehzad, A. Zubair, K. Alimgeer","doi":"10.1109/ICICT.2009.5267205","DOIUrl":"https://doi.org/10.1109/ICICT.2009.5267205","url":null,"abstract":"Security is amongst one of the major issues in Broadband Wireless Access (BWA) Networks. After the launch of the IEEE 802.16 standard (WiMAX), a number of security issues were reported in several articles. Ever since the beginning, work has been in progress for the neutralization of these identified threats. In this paper, the analysis of the authentication protocols implemented in WiMAX has been presented along with the description of the threats posed to them. The paper also describes security sub-layer and limitations of the existing architecture. An approach has also been presented for the prevention of these threats like the avoidance of replay; suppress replay and man-in-the-middle attacks. The proposed approach enhances the network security and strengthens it by resynchronization of the Subscriber Station with the Base Station.","PeriodicalId":147005,"journal":{"name":"2009 International Conference on Information and Communication Technologies","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132543960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-25DOI: 10.1109/ICICT.2009.5267190
Syed Rameez Naqvi, F. Rehman, S. S. Naqvi, A. Amin, I. Qayyum, S. Khan, W. A. Khan
Blind Source Extraction (BSE) may be an essential but a challenging task where multiple sources are convolved and/or time delayed. In this article we discuss the performance of Multivariate Calibration Techniques that comprise of Classical Least Square (CLS), Inverse Linear Regression (ILS), Principal Component Regression (PCR) and Partial Least Square Regression (PLS) in achieving this task in robust speech recognition systems with varying Signal-to-Noise Ratios (SNR). We specifically analyze two methods for identifying and removing outliers from the sample, namely; Outlier Sample Removal (OSR) and Descriptor Selection (DS) for Classical Least Square and Factor Based Regression respectively, which results in higher correlation among predicted and the expected results. Our experiments suggest that factor based methods produce much reliable results than Classical Least Square Regression. However, Classical Least Square is much more immune to white noise as compared to Factor Based Regressions. Our results prove that successful detection and removal of outliers from the Sample Under Test (SUT) may result in as low as 37% and 56% improvement in prediction with Classical Least Square and Principal Component Regression respectively.
{"title":"Analyzing impact of outliers' detection and removal from the test sample in Blind Source Extraction using Multivariate Calibration Techniques","authors":"Syed Rameez Naqvi, F. Rehman, S. S. Naqvi, A. Amin, I. Qayyum, S. Khan, W. A. Khan","doi":"10.1109/ICICT.2009.5267190","DOIUrl":"https://doi.org/10.1109/ICICT.2009.5267190","url":null,"abstract":"Blind Source Extraction (BSE) may be an essential but a challenging task where multiple sources are convolved and/or time delayed. In this article we discuss the performance of Multivariate Calibration Techniques that comprise of Classical Least Square (CLS), Inverse Linear Regression (ILS), Principal Component Regression (PCR) and Partial Least Square Regression (PLS) in achieving this task in robust speech recognition systems with varying Signal-to-Noise Ratios (SNR). We specifically analyze two methods for identifying and removing outliers from the sample, namely; Outlier Sample Removal (OSR) and Descriptor Selection (DS) for Classical Least Square and Factor Based Regression respectively, which results in higher correlation among predicted and the expected results. Our experiments suggest that factor based methods produce much reliable results than Classical Least Square Regression. However, Classical Least Square is much more immune to white noise as compared to Factor Based Regressions. Our results prove that successful detection and removal of outliers from the Sample Under Test (SUT) may result in as low as 37% and 56% improvement in prediction with Classical Least Square and Principal Component Regression respectively.","PeriodicalId":147005,"journal":{"name":"2009 International Conference on Information and Communication Technologies","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123717472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-25DOI: 10.1109/ICICT.2009.5267202
Amnah Siddiqa, M. Niazi, Farah Mustafa, Habib Bokhari, Amir Hussain, Noreen Akram, Shabnum Shaheen, Fouzia Ahmed, Sarah Iqbal
In this paper, we present a novel technique of building hybrid decision support systems which integrates traditional decision support systems with agent based models for use in breast cancer analysis for better prediction and recommendation. Our system is based on using queries from data (converted to a standardized electronic template) to provide for simulation variables in an agent-based model. The goal is to develop an ICT tool to assist non-specialist biologist researcher users in performing analysis of large amounts of data by applying simple simulation techniques. To demonstrate the effectiveness of this novel decision support system, an extensive breast cancer data collection exercise was carried out with the support of Hospitals in a previously unexplored region. The collected data was subsequently integrated in an electronic medical record filing system for patients. We also demonstrate the application of agent based modeling and simulation techniques for building simulation models of tumor growth and treatment. Our proposed decision support system also provides a comprehensive query tool which facilitates the use of retrieved data in statistical tools2 for subsequent interpretation and analysis.
{"title":"A new hybrid agent-based modeling & simulation decision support system for breast cancer data analysis","authors":"Amnah Siddiqa, M. Niazi, Farah Mustafa, Habib Bokhari, Amir Hussain, Noreen Akram, Shabnum Shaheen, Fouzia Ahmed, Sarah Iqbal","doi":"10.1109/ICICT.2009.5267202","DOIUrl":"https://doi.org/10.1109/ICICT.2009.5267202","url":null,"abstract":"In this paper, we present a novel technique of building hybrid decision support systems which integrates traditional decision support systems with agent based models for use in breast cancer analysis for better prediction and recommendation. Our system is based on using queries from data (converted to a standardized electronic template) to provide for simulation variables in an agent-based model. The goal is to develop an ICT tool to assist non-specialist biologist researcher users in performing analysis of large amounts of data by applying simple simulation techniques. To demonstrate the effectiveness of this novel decision support system, an extensive breast cancer data collection exercise was carried out with the support of Hospitals in a previously unexplored region. The collected data was subsequently integrated in an electronic medical record filing system for patients. We also demonstrate the application of agent based modeling and simulation techniques for building simulation models of tumor growth and treatment. Our proposed decision support system also provides a comprehensive query tool which facilitates the use of retrieved data in statistical tools2 for subsequent interpretation and analysis.","PeriodicalId":147005,"journal":{"name":"2009 International Conference on Information and Communication Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116961828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-25DOI: 10.1109/ICICT.2009.5267207
N. Hassan, M. Assaad
In this paper we determine the optimal Fractional Frequency Reuse (FFR) and resource allocation in OFDMA system. Since the users at the cell edge are more exposed to inter-cell interference therefore each cell is partitioned into two regions; inner region and outer region. We determine the optimal FFR factor for the outer region, bandwidth assigned to each region and subcarrier and power allocation to all the users in the cell. The problem is formulated as sum-power minimization problem subject to minimum rate constraints in both the regions. This is a mixed linear integer programing problem which is relaxed into a convex optimization problem. We develop an efficient algorithm by using Lagrange dual decomposition theory at reasonable computational cost.
{"title":"Optimal Fractional Frequency Reuse (FFR) and resource allocation in multiuser OFDMA system","authors":"N. Hassan, M. Assaad","doi":"10.1109/ICICT.2009.5267207","DOIUrl":"https://doi.org/10.1109/ICICT.2009.5267207","url":null,"abstract":"In this paper we determine the optimal Fractional Frequency Reuse (FFR) and resource allocation in OFDMA system. Since the users at the cell edge are more exposed to inter-cell interference therefore each cell is partitioned into two regions; inner region and outer region. We determine the optimal FFR factor for the outer region, bandwidth assigned to each region and subcarrier and power allocation to all the users in the cell. The problem is formulated as sum-power minimization problem subject to minimum rate constraints in both the regions. This is a mixed linear integer programing problem which is relaxed into a convex optimization problem. We develop an efficient algorithm by using Lagrange dual decomposition theory at reasonable computational cost.","PeriodicalId":147005,"journal":{"name":"2009 International Conference on Information and Communication Technologies","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124606710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-25DOI: 10.1109/ICICT.2009.5267198
Z. J. Paracha, Akhtar Kalam, Rubbiya Ali
This research presents a new approach to analyze harmonics in electrical power distribution network through statistical estimation technique of Neural Networks. The typical power system in current times is encountered by numerous Power Quality (PQ) problems. This is due to the increased usage of electronic circuitry that involves continuous power switching. The advanced switching and non linear nature of sophisticated electronic equipment deteriorates the quality of supply power thus injecting harmonics into the power distribution network. The power system which is not designed to accept the behavior of the non linear loads thus faces the problems of voltage unbalance, sag, swell, momentary or temporary interruptions and ultimately the total shut down or the black out of the system. The problem of interruption in continuous electric power supply to consumers has affected the safety, reliability and economic efficiency of the power distribution network. In this research Artificial Neural Networks have been used for efficiently predicting the harmonics of a power distribution network. The research highlights the importance of focusing on various power quality parameters specially prevention of harmonics in power distribution networks to achieve sustainable availability of quality supply of electrical power by power utilities for its customers. The outcomes of this research were compared and tested with the field results of a power utility in Victoria, Australia.
{"title":"A novel approach of harmonic analysis in power distribution networks using artificial intelligence","authors":"Z. J. Paracha, Akhtar Kalam, Rubbiya Ali","doi":"10.1109/ICICT.2009.5267198","DOIUrl":"https://doi.org/10.1109/ICICT.2009.5267198","url":null,"abstract":"This research presents a new approach to analyze harmonics in electrical power distribution network through statistical estimation technique of Neural Networks. The typical power system in current times is encountered by numerous Power Quality (PQ) problems. This is due to the increased usage of electronic circuitry that involves continuous power switching. The advanced switching and non linear nature of sophisticated electronic equipment deteriorates the quality of supply power thus injecting harmonics into the power distribution network. The power system which is not designed to accept the behavior of the non linear loads thus faces the problems of voltage unbalance, sag, swell, momentary or temporary interruptions and ultimately the total shut down or the black out of the system. The problem of interruption in continuous electric power supply to consumers has affected the safety, reliability and economic efficiency of the power distribution network. In this research Artificial Neural Networks have been used for efficiently predicting the harmonics of a power distribution network. The research highlights the importance of focusing on various power quality parameters specially prevention of harmonics in power distribution networks to achieve sustainable availability of quality supply of electrical power by power utilities for its customers. The outcomes of this research were compared and tested with the field results of a power utility in Victoria, Australia.","PeriodicalId":147005,"journal":{"name":"2009 International Conference on Information and Communication Technologies","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126571456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-25DOI: 10.1109/ICICT.2009.5267200
M. Shahzad, Nazish Alia, Sadaf Mahmood
Exploring DNA sequences is really important in the context of bioinformatics, as it maintains every function of our body - being the building block. Bioinformaticians have unfolded numerous features of this sequence and it is probable that still there are more features to discover within DNA sequence. To get the desired information from DNA sequence quickly, depends largely on its presentation. It is desirable to investigate the sequence in visual or textual form, as needed. In this paper, we put forward a software tool which can be helpful in exploring DNA features and observing it in different representations (simultaneously or individually) to discover new patterns. The DNA sequence having up to 425,000 base pairs is tested on this tool.
{"title":"DNA Innovate: Visualizing DNA sequences","authors":"M. Shahzad, Nazish Alia, Sadaf Mahmood","doi":"10.1109/ICICT.2009.5267200","DOIUrl":"https://doi.org/10.1109/ICICT.2009.5267200","url":null,"abstract":"Exploring DNA sequences is really important in the context of bioinformatics, as it maintains every function of our body - being the building block. Bioinformaticians have unfolded numerous features of this sequence and it is probable that still there are more features to discover within DNA sequence. To get the desired information from DNA sequence quickly, depends largely on its presentation. It is desirable to investigate the sequence in visual or textual form, as needed. In this paper, we put forward a software tool which can be helpful in exploring DNA features and observing it in different representations (simultaneously or individually) to discover new patterns. The DNA sequence having up to 425,000 base pairs is tested on this tool.","PeriodicalId":147005,"journal":{"name":"2009 International Conference on Information and Communication Technologies","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134520578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-25DOI: 10.1109/ICICT.2009.5267180
A. Beg, S. K. Hasnain
This paper presents a framework that utilizes Boolean Difference theory to find test vectors for stuck-at-fault detection. The framework reads in structural-style Verilog models, and automatically injects single stuck-at-faults (either stuck-at-zero or stuck-at-one) into the models. The simulations are then performed to find minimal sets of test vectors. Using this setup, we conducted experiments on more than 4000 different circuits. The results show that an appreciable savings in test time and effort can be achieved using the method. The same setup can also be used for didactic purposes, specifically for digital design and test courses.
{"title":"A framework for finding minimal test vectors for stuck-at-faults","authors":"A. Beg, S. K. Hasnain","doi":"10.1109/ICICT.2009.5267180","DOIUrl":"https://doi.org/10.1109/ICICT.2009.5267180","url":null,"abstract":"This paper presents a framework that utilizes Boolean Difference theory to find test vectors for stuck-at-fault detection. The framework reads in structural-style Verilog models, and automatically injects single stuck-at-faults (either stuck-at-zero or stuck-at-one) into the models. The simulations are then performed to find minimal sets of test vectors. Using this setup, we conducted experiments on more than 4000 different circuits. The results show that an appreciable savings in test time and effort can be achieved using the method. The same setup can also be used for didactic purposes, specifically for digital design and test courses.","PeriodicalId":147005,"journal":{"name":"2009 International Conference on Information and Communication Technologies","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133437376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}