Pub Date : 2013-12-01DOI: 10.1109/ICICT.2013.6732782
R. Siddiqi
IndusMarker is an automated short-answer marking system based on structure-editing and structure-matching rather than extensive use of linguistic features analysis. Since IndusMarker cannot guarantee 100% human-system agreement rate, the use of IndusMarker has therefore been limited to conducting practice tests. It was expected that such a use of IndusMarker will lead to improvements in student learning and instructor-student interactions. The main aim of this paper is to verify these claims. The results indicate that such a use of IndusMarker leads to improvements in both student learning and instructor-student interactions. In addition, IndusMarker is also shown to give reasonably high human-system agreement rates even after the removal of all linguistic analysis features from the software.
{"title":"Impact of automated short-answer marking on students' learning: IndusMarker, a case study","authors":"R. Siddiqi","doi":"10.1109/ICICT.2013.6732782","DOIUrl":"https://doi.org/10.1109/ICICT.2013.6732782","url":null,"abstract":"IndusMarker is an automated short-answer marking system based on structure-editing and structure-matching rather than extensive use of linguistic features analysis. Since IndusMarker cannot guarantee 100% human-system agreement rate, the use of IndusMarker has therefore been limited to conducting practice tests. It was expected that such a use of IndusMarker will lead to improvements in student learning and instructor-student interactions. The main aim of this paper is to verify these claims. The results indicate that such a use of IndusMarker leads to improvements in both student learning and instructor-student interactions. In addition, IndusMarker is also shown to give reasonably high human-system agreement rates even after the removal of all linguistic analysis features from the software.","PeriodicalId":212608,"journal":{"name":"2013 5th International Conference on Information and Communication Technologies","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124927896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICICT.2013.6732780
Reema Qaiser Khan, W. Khan, Majid Kaleem, Ali Ahmed
Everything in this universe that the naked eye can perceive has color. Color impacts our lives in various ways; red color is perceived as danger or warning, blue color has a calming effect, whereas green color indicates approval. Soothing colors can relax the human body, whereas some colors may irritate the human eye. People with full color vision or with color vision deficiency (color blind), both struggle in selecting colors, for example, while designing a website, contrasting colored clothes, or choosing colors to paint the house. The issue that arises is whether the colors are in harmony; meaning if the colors complement each other and are not unappealing to the eye. In this paper we have proposed a model of a color harmonizer application, which will facilitate the user to harmonize colors according to color harmonies.
{"title":"A proposed model of a color harmonizer application","authors":"Reema Qaiser Khan, W. Khan, Majid Kaleem, Ali Ahmed","doi":"10.1109/ICICT.2013.6732780","DOIUrl":"https://doi.org/10.1109/ICICT.2013.6732780","url":null,"abstract":"Everything in this universe that the naked eye can perceive has color. Color impacts our lives in various ways; red color is perceived as danger or warning, blue color has a calming effect, whereas green color indicates approval. Soothing colors can relax the human body, whereas some colors may irritate the human eye. People with full color vision or with color vision deficiency (color blind), both struggle in selecting colors, for example, while designing a website, contrasting colored clothes, or choosing colors to paint the house. The issue that arises is whether the colors are in harmony; meaning if the colors complement each other and are not unappealing to the eye. In this paper we have proposed a model of a color harmonizer application, which will facilitate the user to harmonize colors according to color harmonies.","PeriodicalId":212608,"journal":{"name":"2013 5th International Conference on Information and Communication Technologies","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114086250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICICT.2013.6732781
Shakeel Durrani, Imran Jattala, J. Farooqi, Naila Shakeel, Mohsin Murad
The wave adoption of wireless over wire-line is a global phenomenon and the Oil & Gas industry is no exception. This paper presents a multi-tiered secure hardened Wireless Remote Terminal Unit (WRTU) for SCADA systems. The WRTU is based on ARM Coter-M4 Processor supported by GSM & Satellite modems, GPS, WiFi and Ethernet. WRTU can be interfaced to an array of standard industrial sensors, and actuators. WRTU has data acquisition, monitoring, and control capabilities. WRTU is an inexpensive device, using Commercial-of-The-Shelf (COTS) modules. WRTU is an easy to deploy (using existing public available infrastructure) device and `single device that does it all'. WRTU connects to the Control and Monitoring Centre (CMC) via GSM or Satellite modem. The CMC monitors and controls all peripherals of the WRTU, maintains a log of alerts, sensors information, set critical limits and provides geo-location of all WRTU s via its GIS portal. The CMC has a database to maintain all operational centric data, for report generation, historical analysis and forecasting. A multi-tiered cybersecurity framework has been designed to protect entire communication infrastructure. Cybersecurity is critically important for national security in todays connected world. Cybersecurity is of critical importance as most national security agencies want the introduction of cybersecurity into all new SCADA systems used in critical infrastructure.
{"title":"Design and development of wireless RTU and cybersecurity framework for SCADA system","authors":"Shakeel Durrani, Imran Jattala, J. Farooqi, Naila Shakeel, Mohsin Murad","doi":"10.1109/ICICT.2013.6732781","DOIUrl":"https://doi.org/10.1109/ICICT.2013.6732781","url":null,"abstract":"The wave adoption of wireless over wire-line is a global phenomenon and the Oil & Gas industry is no exception. This paper presents a multi-tiered secure hardened Wireless Remote Terminal Unit (WRTU) for SCADA systems. The WRTU is based on ARM Coter-M4 Processor supported by GSM & Satellite modems, GPS, WiFi and Ethernet. WRTU can be interfaced to an array of standard industrial sensors, and actuators. WRTU has data acquisition, monitoring, and control capabilities. WRTU is an inexpensive device, using Commercial-of-The-Shelf (COTS) modules. WRTU is an easy to deploy (using existing public available infrastructure) device and `single device that does it all'. WRTU connects to the Control and Monitoring Centre (CMC) via GSM or Satellite modem. The CMC monitors and controls all peripherals of the WRTU, maintains a log of alerts, sensors information, set critical limits and provides geo-location of all WRTU s via its GIS portal. The CMC has a database to maintain all operational centric data, for report generation, historical analysis and forecasting. A multi-tiered cybersecurity framework has been designed to protect entire communication infrastructure. Cybersecurity is critically important for national security in todays connected world. Cybersecurity is of critical importance as most national security agencies want the introduction of cybersecurity into all new SCADA systems used in critical infrastructure.","PeriodicalId":212608,"journal":{"name":"2013 5th International Conference on Information and Communication Technologies","volume":"25 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116518186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICICT.2013.6732775
Zeeshan Javaid, Imran Ijaz
Cloud the industrial blockbuster of the era providing a list of benefits but suffering many problems with the rapid increase of clients, using different policies. With the passage of time many question arises on the security and performance of cloud, many issues originate because weak authentication process of the cloud servers and credentials openly travel in public internet which causes the breech in authentication process. Many new authentication schemes made and vary time to time to overcome the loop holes. This work suggests the model for hiding the authentication credentials travel on public internet.
{"title":"Secure user authentication in cloud computing","authors":"Zeeshan Javaid, Imran Ijaz","doi":"10.1109/ICICT.2013.6732775","DOIUrl":"https://doi.org/10.1109/ICICT.2013.6732775","url":null,"abstract":"Cloud the industrial blockbuster of the era providing a list of benefits but suffering many problems with the rapid increase of clients, using different policies. With the passage of time many question arises on the security and performance of cloud, many issues originate because weak authentication process of the cloud servers and credentials openly travel in public internet which causes the breech in authentication process. Many new authentication schemes made and vary time to time to overcome the loop holes. This work suggests the model for hiding the authentication credentials travel on public internet.","PeriodicalId":212608,"journal":{"name":"2013 5th International Conference on Information and Communication Technologies","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114073250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICICT.2013.6732783
R. Siddiqi
Usage of streaming video over the Internet and mobile networks has become quite common due to its convenience and low cost. In all the uses of streaming video over networks that do not guarantee bandwidths, the major challenge is to maintain acceptable video viewing experience in case of a network congestion. This paper presents a technique that has the potential to solve this challenge, at least to a certain extent. The proposed technique dynamically adjusts the chrominance level of the video images to fit the available bandwidth. Analysis of the results indicates that dynamic chrominance adjustment does improve the viewing quality of the streaming video significantly.
{"title":"Improving the quality of streaming video through dynamic chrominance adjustment","authors":"R. Siddiqi","doi":"10.1109/ICICT.2013.6732783","DOIUrl":"https://doi.org/10.1109/ICICT.2013.6732783","url":null,"abstract":"Usage of streaming video over the Internet and mobile networks has become quite common due to its convenience and low cost. In all the uses of streaming video over networks that do not guarantee bandwidths, the major challenge is to maintain acceptable video viewing experience in case of a network congestion. This paper presents a technique that has the potential to solve this challenge, at least to a certain extent. The proposed technique dynamically adjusts the chrominance level of the video images to fit the available bandwidth. Analysis of the results indicates that dynamic chrominance adjustment does improve the viewing quality of the streaming video significantly.","PeriodicalId":212608,"journal":{"name":"2013 5th International Conference on Information and Communication Technologies","volume":"223 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127177627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICICT.2013.6732789
Eram Abbasi, K. Abbasi
Business Process Modeling (BPM) is a technique used to model business processes and helps in better understanding of these processes. BPM helps in improving organizational efficiency by either helping in making the business processes more efficient or even helps in automation of the business processes. There are many BPM techniques used till date but none of these techniques being used supports the decision making requirements for an organization. To address this problem the paper suggests a model that can help integrate decision making with the prevailing Business Process Models. The paper firstly reviews foundations of Business Process Modeling (BPM) and the Decision Model (DM) to establish the basis for the conceptual understanding of BPM and DM. With these theoretical bases, then a model has been proposed where the Decision Model has been integrated with the Business Process Model to meet the decision making needs for the decision makers. Finally, the implications of this model are discussed with directions for further research.
{"title":"Business process modeling and decision model integration","authors":"Eram Abbasi, K. Abbasi","doi":"10.1109/ICICT.2013.6732789","DOIUrl":"https://doi.org/10.1109/ICICT.2013.6732789","url":null,"abstract":"Business Process Modeling (BPM) is a technique used to model business processes and helps in better understanding of these processes. BPM helps in improving organizational efficiency by either helping in making the business processes more efficient or even helps in automation of the business processes. There are many BPM techniques used till date but none of these techniques being used supports the decision making requirements for an organization. To address this problem the paper suggests a model that can help integrate decision making with the prevailing Business Process Models. The paper firstly reviews foundations of Business Process Modeling (BPM) and the Decision Model (DM) to establish the basis for the conceptual understanding of BPM and DM. With these theoretical bases, then a model has been proposed where the Decision Model has been integrated with the Business Process Model to meet the decision making needs for the decision makers. Finally, the implications of this model are discussed with directions for further research.","PeriodicalId":212608,"journal":{"name":"2013 5th International Conference on Information and Communication Technologies","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127392694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICICT.2013.6732784
Noman Mazher, I. Ashraf, A. Altaf
Phishing is the technique of social engineering in which important information are hijacked. To prevent phishing the easiest way is to blacklist such web sites which are suspicious;, but there are many new phished websites that are not blacklisted. To protect users from those phishing sites many ways are available; one of those is to implement security toolbar in web browser. Nowaday every modern web browser has its own implicit security toolbar. Our research is based on the evaluation of toolbars attached with Internet Explorer, Mozilla Firefox and Google Chrome. In our experiment we appraised toolbars attached with these most popular web browsers. Results evaluation showed that Google Chrome provides best security against phishing websites.
{"title":"Which web browser work best for detecting phishing","authors":"Noman Mazher, I. Ashraf, A. Altaf","doi":"10.1109/ICICT.2013.6732784","DOIUrl":"https://doi.org/10.1109/ICICT.2013.6732784","url":null,"abstract":"Phishing is the technique of social engineering in which important information are hijacked. To prevent phishing the easiest way is to blacklist such web sites which are suspicious;, but there are many new phished websites that are not blacklisted. To protect users from those phishing sites many ways are available; one of those is to implement security toolbar in web browser. Nowaday every modern web browser has its own implicit security toolbar. Our research is based on the evaluation of toolbars attached with Internet Explorer, Mozilla Firefox and Google Chrome. In our experiment we appraised toolbars attached with these most popular web browsers. Results evaluation showed that Google Chrome provides best security against phishing websites.","PeriodicalId":212608,"journal":{"name":"2013 5th International Conference on Information and Communication Technologies","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127760869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICICT.2013.6732776
G. Narejo, Shahyan Pervez Bharucha
In this paper we have provided a cheap method for counting open fingers and virtual drawing in real time using color detection and shape detection algorithms. These algorithms don't require training and database. Our method for finger counting detects the circular markers having a specified color visible on the inner side of the fingers by using color detection and shape recognition operations on the real time captured image and then counts the markers visible. The count can be further used as an input for other medium using communication methods. Different schemes are also defined using the combination of colors and hands used to generate desired output signals. The method devised for virtual drawing detects the circular specific colored marker on a stylus or finger using color detection and shape recognition. The position of the marker is marked and then plotted using the points marked in the previous frames which results in the pattern tracking the marker's movement. The development of both applications is done using Matlab as the developing environment using a normal A4-Tech webcam and run on Dell latitude D630 laptop with Intel® Core™2 Duo processor, Ram 2.00GB.
{"title":"Real time finger counting and virtual drawing using color detection and shape recognition","authors":"G. Narejo, Shahyan Pervez Bharucha","doi":"10.1109/ICICT.2013.6732776","DOIUrl":"https://doi.org/10.1109/ICICT.2013.6732776","url":null,"abstract":"In this paper we have provided a cheap method for counting open fingers and virtual drawing in real time using color detection and shape detection algorithms. These algorithms don't require training and database. Our method for finger counting detects the circular markers having a specified color visible on the inner side of the fingers by using color detection and shape recognition operations on the real time captured image and then counts the markers visible. The count can be further used as an input for other medium using communication methods. Different schemes are also defined using the combination of colors and hands used to generate desired output signals. The method devised for virtual drawing detects the circular specific colored marker on a stylus or finger using color detection and shape recognition. The position of the marker is marked and then plotted using the points marked in the previous frames which results in the pattern tracking the marker's movement. The development of both applications is done using Matlab as the developing environment using a normal A4-Tech webcam and run on Dell latitude D630 laptop with Intel® Core™2 Duo processor, Ram 2.00GB.","PeriodicalId":212608,"journal":{"name":"2013 5th International Conference on Information and Communication Technologies","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124444006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICICT.2013.6732785
U. Afzal, Tariq Mahmood
Drones are autonomous aircrafts employed in conditions where manned flight is perilous. Drone-based attacks are made in Northern Pakistan with the intention of eliminating terrorists (in the context of US-led war of terror). In June 2004, the first drone strike killed one militant and four civilians; since then hundreds of attacks have killed thousands of people including accidental deaths of innocent children and women. To gauge the impact of future drone attacks, we apply time series forecasting on drone attack data to predict the frequency of different types of future attacks. On a reliable drone attack data set, we use IBM SPSS tool to learn four predictive models: 1) number of drone attacks, 2) number of militant casualties, 3) number of civilian casualties, and 4) number of injuries. Over our actual dataset, the prediction accuracy is maximized when we allow SPSS to automatically select the forecasting algorithm, as compared to a manual selection and configuration. We use automated selection to predict our four types of data for the six months, July 2013 till December 2013.
{"title":"Using predictive analytics to forecast drone attacks in Pakistan","authors":"U. Afzal, Tariq Mahmood","doi":"10.1109/ICICT.2013.6732785","DOIUrl":"https://doi.org/10.1109/ICICT.2013.6732785","url":null,"abstract":"Drones are autonomous aircrafts employed in conditions where manned flight is perilous. Drone-based attacks are made in Northern Pakistan with the intention of eliminating terrorists (in the context of US-led war of terror). In June 2004, the first drone strike killed one militant and four civilians; since then hundreds of attacks have killed thousands of people including accidental deaths of innocent children and women. To gauge the impact of future drone attacks, we apply time series forecasting on drone attack data to predict the frequency of different types of future attacks. On a reliable drone attack data set, we use IBM SPSS tool to learn four predictive models: 1) number of drone attacks, 2) number of militant casualties, 3) number of civilian casualties, and 4) number of injuries. Over our actual dataset, the prediction accuracy is maximized when we allow SPSS to automatically select the forecasting algorithm, as compared to a manual selection and configuration. We use automated selection to predict our four types of data for the six months, July 2013 till December 2013.","PeriodicalId":212608,"journal":{"name":"2013 5th International Conference on Information and Communication Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120945411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICICT.2013.6732778
T. Saeed, S. Khan, U. Tariq, Z. Khan
We propose a unique localization algorithm for MANETs: the mobile infrastructure-less networks with support of static underlying wireless sensor network nodes. The algorithm has been designed with two stages for localizing the MANET. The first stage is the naive activation stage which acts as the bootstrap for the prediction stage. The predictive minimal energy consumption algorithm incorporates the information from the measured TOA (Time Of Arrival) to locate the mobile nodes. The experimental results and comparative analysis show that our system provides accurate localization of linearly moving MANET's using low power consumption of the underlying wireless sensor networks.
{"title":"Predictive activation for localization using minimal data-fusion in MANETs","authors":"T. Saeed, S. Khan, U. Tariq, Z. Khan","doi":"10.1109/ICICT.2013.6732778","DOIUrl":"https://doi.org/10.1109/ICICT.2013.6732778","url":null,"abstract":"We propose a unique localization algorithm for MANETs: the mobile infrastructure-less networks with support of static underlying wireless sensor network nodes. The algorithm has been designed with two stages for localizing the MANET. The first stage is the naive activation stage which acts as the bootstrap for the prediction stage. The predictive minimal energy consumption algorithm incorporates the information from the measured TOA (Time Of Arrival) to locate the mobile nodes. The experimental results and comparative analysis show that our system provides accurate localization of linearly moving MANET's using low power consumption of the underlying wireless sensor networks.","PeriodicalId":212608,"journal":{"name":"2013 5th International Conference on Information and Communication Technologies","volume":"129 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130031275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}