Pub Date : 2013-12-01DOI: 10.1109/ICICT.2013.6732777
Ahmed Qaddus, Ahsan Ishfaq, Ali Mustafa
Digital Terrestrial Trunked Radio System (TETRA) standard was developed by ETSI to fulfill the rapid changing growth and demands of high bandwidth applications of voice and data required by both PMR and PAMR users. TETRA networks as based on the cellular architecture approach which offers low capital and maintenance cost solution for the deployment of traditional PMR telephony and digital data transmission. TETRA networks are designed on the principle of point to multipoint wireless architecture, which allow it to offer voice and data services at same time to emergency response teams. TETRA network coverage area is affected by the presence of black spots no signal coverage areas where communication between the TETRA mobile user and TETRA base station is not possible. In this paper a technique based on Heterogeneous Cognitive approach with simulations is proposed to eliminate the problem of black spots in TETRA networks.
{"title":"A novel solution based on cognitive heterogeneous networks for removing black spots in TETRA coverage area","authors":"Ahmed Qaddus, Ahsan Ishfaq, Ali Mustafa","doi":"10.1109/ICICT.2013.6732777","DOIUrl":"https://doi.org/10.1109/ICICT.2013.6732777","url":null,"abstract":"Digital Terrestrial Trunked Radio System (TETRA) standard was developed by ETSI to fulfill the rapid changing growth and demands of high bandwidth applications of voice and data required by both PMR and PAMR users. TETRA networks as based on the cellular architecture approach which offers low capital and maintenance cost solution for the deployment of traditional PMR telephony and digital data transmission. TETRA networks are designed on the principle of point to multipoint wireless architecture, which allow it to offer voice and data services at same time to emergency response teams. TETRA network coverage area is affected by the presence of black spots no signal coverage areas where communication between the TETRA mobile user and TETRA base station is not possible. In this paper a technique based on Heterogeneous Cognitive approach with simulations is proposed to eliminate the problem of black spots in TETRA networks.","PeriodicalId":212608,"journal":{"name":"2013 5th International Conference on Information and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125914637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICICT.2013.6732786
S. Jamil, Falak Zehra, Rabab Naqvi, S. Bhamani
Social networking has changed human life style in the recent era. The impact of use of social networking has not only resulted in globalization but has influenced many other vital factors of human performance This study aimed at exploring impact of Facebook usage intensity on academic grades of the private university students. It was hypothesized that there will be a significant impact of Facebook usage on university student grades and that there will be a significant gender difference on the variable of Facebook intensity scores. Quantitative method was chosen for the study with a survey strategy. The data was collected from a total number of 275 participants from 13 different private universities of Pakistan. Hypotheses were tested using linear regression analysis and independent sample t-test. The data analysis revealed that Facebook usage doesn't predict university student grades and likewise there is no gender difference found on the variable of Facebook intensity. The study was concluded elaborating the discussion and providing recommendations for the future study.
{"title":"Impact of facebook intensity on academic grades of private university students","authors":"S. Jamil, Falak Zehra, Rabab Naqvi, S. Bhamani","doi":"10.1109/ICICT.2013.6732786","DOIUrl":"https://doi.org/10.1109/ICICT.2013.6732786","url":null,"abstract":"Social networking has changed human life style in the recent era. The impact of use of social networking has not only resulted in globalization but has influenced many other vital factors of human performance This study aimed at exploring impact of Facebook usage intensity on academic grades of the private university students. It was hypothesized that there will be a significant impact of Facebook usage on university student grades and that there will be a significant gender difference on the variable of Facebook intensity scores. Quantitative method was chosen for the study with a survey strategy. The data was collected from a total number of 275 participants from 13 different private universities of Pakistan. Hypotheses were tested using linear regression analysis and independent sample t-test. The data analysis revealed that Facebook usage doesn't predict university student grades and likewise there is no gender difference found on the variable of Facebook intensity. The study was concluded elaborating the discussion and providing recommendations for the future study.","PeriodicalId":212608,"journal":{"name":"2013 5th International Conference on Information and Communication Technologies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133163135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICICT.2013.6732787
Mahwish Anwar
Cloud Computing (CC) uses virtualization to provide computing resources on demand via Internet. Small and large organizations benefit from CC because of reduced operating costs and increase in business agility. The migrating Virtual Machine (VM) is vulnerable from attacks such as fake migration initiations, service interruptions, manipulation of data or other network attacks. Hence, during live migration any security lax in VM firewall policy can put the VM at risk. A malicious VM can further pose threat to other VMs in its host and consequently for VMs in LAN. Hardware firewalls only protect VM before and after migration. Plus, they are blind to virtual traffic. Hence, virtual firewalls (VFs) are used to secure VMs. Mostly; they are deployed at Virtual Machine Monitor-level (VMM) under Cloud provider's control. Source VMM-Ievel VF provides security to VM before the migration incurs and the destination VMM-level VF starts securing VM after migration is completed. It thus, becomes possible for attacker to use the intermediate migrating window to launch attacks on VM. This research contributes towards providing understanding of having open source virtual firewall at VM-Ievel for migrating VMs to reduce attack window of VM during the migration. The final contribution is the validation and uptime evaluation of the implemented Packet Filter firewall for VM at VM-level during migration in City Network data center. Such an approach would enable hardened security for overall VM migration.
{"title":"Virtual firewalling for migrating virtual machines in cloud computing","authors":"Mahwish Anwar","doi":"10.1109/ICICT.2013.6732787","DOIUrl":"https://doi.org/10.1109/ICICT.2013.6732787","url":null,"abstract":"Cloud Computing (CC) uses virtualization to provide computing resources on demand via Internet. Small and large organizations benefit from CC because of reduced operating costs and increase in business agility. The migrating Virtual Machine (VM) is vulnerable from attacks such as fake migration initiations, service interruptions, manipulation of data or other network attacks. Hence, during live migration any security lax in VM firewall policy can put the VM at risk. A malicious VM can further pose threat to other VMs in its host and consequently for VMs in LAN. Hardware firewalls only protect VM before and after migration. Plus, they are blind to virtual traffic. Hence, virtual firewalls (VFs) are used to secure VMs. Mostly; they are deployed at Virtual Machine Monitor-level (VMM) under Cloud provider's control. Source VMM-Ievel VF provides security to VM before the migration incurs and the destination VMM-level VF starts securing VM after migration is completed. It thus, becomes possible for attacker to use the intermediate migrating window to launch attacks on VM. This research contributes towards providing understanding of having open source virtual firewall at VM-Ievel for migrating VMs to reduce attack window of VM during the migration. The final contribution is the validation and uptime evaluation of the implemented Packet Filter firewall for VM at VM-level during migration in City Network data center. Such an approach would enable hardened security for overall VM migration.","PeriodicalId":212608,"journal":{"name":"2013 5th International Conference on Information and Communication Technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125298840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICICT.2013.6732788
U. Farooq, J. Gu
The paper presents the design and comparison of type-1 and interval type-2 fuzzy logic controllers for ball and beam system. Both the controllers utilize the beam angle as a scheduling variable for the stabilization and tracking of the ball position. The performance of the controllers is analyzed by simulating them in MATLAB environment for various initial conditions and in the presence of disturbance signals. It is shown that interval type-2 fuzzy gain scheduling controller has a better response and disturbance rejection capability as compared to type-1 fuzzy and conventional pole placement controller.
{"title":"Design and comparison of type-1 and interval type-2 fuzzy gain scheduling controllers for ball and beam system","authors":"U. Farooq, J. Gu","doi":"10.1109/ICICT.2013.6732788","DOIUrl":"https://doi.org/10.1109/ICICT.2013.6732788","url":null,"abstract":"The paper presents the design and comparison of type-1 and interval type-2 fuzzy logic controllers for ball and beam system. Both the controllers utilize the beam angle as a scheduling variable for the stabilization and tracking of the ball position. The performance of the controllers is analyzed by simulating them in MATLAB environment for various initial conditions and in the presence of disturbance signals. It is shown that interval type-2 fuzzy gain scheduling controller has a better response and disturbance rejection capability as compared to type-1 fuzzy and conventional pole placement controller.","PeriodicalId":212608,"journal":{"name":"2013 5th International Conference on Information and Communication Technologies","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125594920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICICT.2013.6732774
J. Shamsi, Aarij Siddiqui, Rabbia Hassan, Rida Sattar, S. Siddiqui
VDrive works on the baseline model of Storage-as-a-Service (SaaS), with an infrastructure built on volunteer computing. The project gives a model for storing user data as decentralized packets on nodes on the network. The model proposes a solution with redundant data to provide an efficient model, with maximum availability.
{"title":"VDrive a cost-effective storage solution, using volunteer computing with emphasis on security/privacy, availability, and latency","authors":"J. Shamsi, Aarij Siddiqui, Rabbia Hassan, Rida Sattar, S. Siddiqui","doi":"10.1109/ICICT.2013.6732774","DOIUrl":"https://doi.org/10.1109/ICICT.2013.6732774","url":null,"abstract":"VDrive works on the baseline model of Storage-as-a-Service (SaaS), with an infrastructure built on volunteer computing. The project gives a model for storing user data as decentralized packets on nodes on the network. The model proposes a solution with redundant data to provide an efficient model, with maximum availability.","PeriodicalId":212608,"journal":{"name":"2013 5th International Conference on Information and Communication Technologies","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128778798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICICT.2013.6732779
A. Siddiqui, Muhammad Raza-us-Samad, F. Siddiqui, Z.A. Shaikh
During past years, significant progress has been taken placed to address health care in areas of HIV / AIDS, Malaria, Dengue, Swine Flu, Cancer, Hepatitis etc. However, all working systems which were in market do not perform overall statistics about disease situation. They are neither universal nor sufficiently as broad as they should be to aware public about disease. Progress and development in health care system at national level could not meet to the requirements of population. Sometimes, progress has stopped, and other times they are in progress. The health systems can deliver impressive services equitably, efficiently and effectively in critical situations to achieve the required goals. Today, there are many health systems working in international market and they target different multi-national group of people, they incorporate attention and take initiative to providing a strengthen support to different countries. Community Health Information System is a web based application, which can improve the productivity of health care through delivering an integrated evidence-based and effective health information in real-time. System can provide useful and efficient data containing wide-range of health KPIs and health determinants - to general public, patients, health professionals and policy makers. Community Health Information System, focused on gathering data and information from all over Pakistan. This system is mainly designed for the current health situation regarding 3rd world countries, e.g.: Pakistan.
{"title":"Community health information system focusing Pakistan","authors":"A. Siddiqui, Muhammad Raza-us-Samad, F. Siddiqui, Z.A. Shaikh","doi":"10.1109/ICICT.2013.6732779","DOIUrl":"https://doi.org/10.1109/ICICT.2013.6732779","url":null,"abstract":"During past years, significant progress has been taken placed to address health care in areas of HIV / AIDS, Malaria, Dengue, Swine Flu, Cancer, Hepatitis etc. However, all working systems which were in market do not perform overall statistics about disease situation. They are neither universal nor sufficiently as broad as they should be to aware public about disease. Progress and development in health care system at national level could not meet to the requirements of population. Sometimes, progress has stopped, and other times they are in progress. The health systems can deliver impressive services equitably, efficiently and effectively in critical situations to achieve the required goals. Today, there are many health systems working in international market and they target different multi-national group of people, they incorporate attention and take initiative to providing a strengthen support to different countries. Community Health Information System is a web based application, which can improve the productivity of health care through delivering an integrated evidence-based and effective health information in real-time. System can provide useful and efficient data containing wide-range of health KPIs and health determinants - to general public, patients, health professionals and policy makers. Community Health Information System, focused on gathering data and information from all over Pakistan. This system is mainly designed for the current health situation regarding 3rd world countries, e.g.: Pakistan.","PeriodicalId":212608,"journal":{"name":"2013 5th International Conference on Information and Communication Technologies","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127232557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICICT.2013.6732790
E. Ahmed, Suleman Khan, Ibrar Yaqoob, A. Gani, F. Salim
Mobile Cloud Computing enables execution of compute-intensive mobile applications by leveraging the services of the cloud. In spite of enabling compute-intensive mobile application execution on resources constrained Smart Mobile Devices, the execution in MCC is not able to carry out without disruption; which degrades the end user experience, hence, deteriorates the usability of emerging applications. The state-of-the-art solutions focus only on the mobile application execution in MCC but do not incorporate all diverse features of the heterogeneous environment to make the execution seamless for the end user. Seamless refers to uninterrupted application execution in MCC with minimal user involvement and interaction to deliver enhanced performance, compared to the local application execution. In this paper, we propose Multi-Objective Optimization model for seamless execution of distributed applications in mobile cloud computing that optimizes the execution time subject to execution cost and energy consumption. The problem is formulated as nonlinear integer programming.
{"title":"Multi-objective optimization model for seamless application execution in mobile cloud computing","authors":"E. Ahmed, Suleman Khan, Ibrar Yaqoob, A. Gani, F. Salim","doi":"10.1109/ICICT.2013.6732790","DOIUrl":"https://doi.org/10.1109/ICICT.2013.6732790","url":null,"abstract":"Mobile Cloud Computing enables execution of compute-intensive mobile applications by leveraging the services of the cloud. In spite of enabling compute-intensive mobile application execution on resources constrained Smart Mobile Devices, the execution in MCC is not able to carry out without disruption; which degrades the end user experience, hence, deteriorates the usability of emerging applications. The state-of-the-art solutions focus only on the mobile application execution in MCC but do not incorporate all diverse features of the heterogeneous environment to make the execution seamless for the end user. Seamless refers to uninterrupted application execution in MCC with minimal user involvement and interaction to deliver enhanced performance, compared to the local application execution. In this paper, we propose Multi-Objective Optimization model for seamless execution of distributed applications in mobile cloud computing that optimizes the execution time subject to execution cost and energy consumption. The problem is formulated as nonlinear integer programming.","PeriodicalId":212608,"journal":{"name":"2013 5th International Conference on Information and Communication Technologies","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131231935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}