Pub Date : 2009-12-15DOI: 10.1109/IIT.2009.5413637
Claude Turner
This article provides a brief review of steganography, steganalysis and wireless sensor networks (WSNs). It also presents a computational framework for steganography in WSN. The technique uses the concept of redundancy and distributed computing to add robustness to the steganographic embedding and extraction algorithms.
{"title":"A steganographic computational paradigm for wireless sensor networks","authors":"Claude Turner","doi":"10.1109/IIT.2009.5413637","DOIUrl":"https://doi.org/10.1109/IIT.2009.5413637","url":null,"abstract":"This article provides a brief review of steganography, steganalysis and wireless sensor networks (WSNs). It also presents a computational framework for steganography in WSN. The technique uses the concept of redundancy and distributed computing to add robustness to the steganographic embedding and extraction algorithms.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130651129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-15DOI: 10.1109/IIT.2009.5413364
S. Shahrestani
This paper deals with the problem of classifying patterns encountered in complex systems. It describes an approach to pattern recognition that results in a complete and reliable classification technique. It is noted that the majority of existing pattern recognition methods initiate their classification acts on identification of similarities between the members of various classes. On contrast, the work reported here, starts with the recognition of distinctive features of encountered patterns. It is proposed that the patterns to be clustered in a particular fashion to facilitate the exploration of their distinctive features. The process does not depend on utilization of heuristic rules. The membership of different classes will then be based on different values for some or all of such features. This paper will also establish that by utilizing the distinctive features complete classification of all patterns, even for complex systems, can be achieved.
{"title":"Identification of distinctive features for classification in complex systems","authors":"S. Shahrestani","doi":"10.1109/IIT.2009.5413364","DOIUrl":"https://doi.org/10.1109/IIT.2009.5413364","url":null,"abstract":"This paper deals with the problem of classifying patterns encountered in complex systems. It describes an approach to pattern recognition that results in a complete and reliable classification technique. It is noted that the majority of existing pattern recognition methods initiate their classification acts on identification of similarities between the members of various classes. On contrast, the work reported here, starts with the recognition of distinctive features of encountered patterns. It is proposed that the patterns to be clustered in a particular fashion to facilitate the exploration of their distinctive features. The process does not depend on utilization of heuristic rules. The membership of different classes will then be based on different values for some or all of such features. This paper will also establish that by utilizing the distinctive features complete classification of all patterns, even for complex systems, can be achieved.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128902519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-15DOI: 10.1109/IIT.2009.5413788
Ahmad Mukhlason, A. Mahmood, N. Arshad, A. Z. Abidin
In knowledge economy age in which knowledge have become the most precious resource, e-Learning is used to not only acquire knowledge but also to maintain competitiveness and advantages for individuals or organizations. However, the early promise of e-Learning has not been fully realized. In most of its implementation, it is not more than a handout being published online. This paper aims to exploit the Semantic Web (SW), Knowledge Management (KM) technology two emerging and promising technology to enhance the existing e-Learning Management System (LMS). An Ontology approach that is the backbone of SW and KM is introduced for developing (semi-) automatic ontological knowledge base construction system (SAOKBCS) and automated question answering system (Aquas) in the proposed e-Learning system. The experiment conducted has shown that the SAOKBCS can extract concept that is the main component of Ontology from text learning object with precision of 86.67%, thus saving the expert time and effort to build Ontology manually. Additionally the experiment on Aquas has shown that more than 80% of users are satisfied with answers provided by the system. The expert locator framework can also improve the performance of Aquas in the future use.
{"title":"SWA-KMDLS: An enhanced e-Learning Management System using Semantic Web and Knowledge Management technology","authors":"Ahmad Mukhlason, A. Mahmood, N. Arshad, A. Z. Abidin","doi":"10.1109/IIT.2009.5413788","DOIUrl":"https://doi.org/10.1109/IIT.2009.5413788","url":null,"abstract":"In knowledge economy age in which knowledge have become the most precious resource, e-Learning is used to not only acquire knowledge but also to maintain competitiveness and advantages for individuals or organizations. However, the early promise of e-Learning has not been fully realized. In most of its implementation, it is not more than a handout being published online. This paper aims to exploit the Semantic Web (SW), Knowledge Management (KM) technology two emerging and promising technology to enhance the existing e-Learning Management System (LMS). An Ontology approach that is the backbone of SW and KM is introduced for developing (semi-) automatic ontological knowledge base construction system (SAOKBCS) and automated question answering system (Aquas) in the proposed e-Learning system. The experiment conducted has shown that the SAOKBCS can extract concept that is the main component of Ontology from text learning object with precision of 86.67%, thus saving the expert time and effort to build Ontology manually. Additionally the experiment on Aquas has shown that more than 80% of users are satisfied with answers provided by the system. The expert locator framework can also improve the performance of Aquas in the future use.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124578173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-15DOI: 10.1109/IIT.2009.5413774
Kosuke Numa, Tatsuo Sugimoto, Masako Miyata, Kiyoko Toriumi, J. Abe, Yuri Tanaka, S. Niida, K. Hori
We propose a system for collecting and connecting people's stories. In order to help encourage participants to engage their “expression mode,” we employed mobile phones for video capture, as opposed to traditional video cameras. As part of our work, we held a workshop in an art festival. In the workshop, facilitators capture participants' stories using mobile phones. Applying a question-and-answer game format, each video has connections to other videos. Our system shows these connections on a large screen such that participants can see an entire network of stories and add their own to it. We show the results of our experiments and conclude that our proposed workshop could successfully collect people's stories and connect them.
{"title":"Using common devices as collaborative tools for collecting and connecting people's stories","authors":"Kosuke Numa, Tatsuo Sugimoto, Masako Miyata, Kiyoko Toriumi, J. Abe, Yuri Tanaka, S. Niida, K. Hori","doi":"10.1109/IIT.2009.5413774","DOIUrl":"https://doi.org/10.1109/IIT.2009.5413774","url":null,"abstract":"We propose a system for collecting and connecting people's stories. In order to help encourage participants to engage their “expression mode,” we employed mobile phones for video capture, as opposed to traditional video cameras. As part of our work, we held a workshop in an art festival. In the workshop, facilitators capture participants' stories using mobile phones. Applying a question-and-answer game format, each video has connections to other videos. Our system shows these connections on a large screen such that participants can see an entire network of stories and add their own to it. We show the results of our experiments and conclude that our proposed workshop could successfully collect people's stories and connect them.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129666392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-15DOI: 10.1109/IIT.2009.5413792
R. Zantout, Mazen Jrab, L. Hamandi, F. Sibai
Fleet management is an important topic in research and development nowadays. Companies, security and emergency forces need to keep track of their trucks and cars and know where a vehicle is at a moment in time, and when, where and for how long a vehicle stopped.
{"title":"Fleet management automation using the global positioning system","authors":"R. Zantout, Mazen Jrab, L. Hamandi, F. Sibai","doi":"10.1109/IIT.2009.5413792","DOIUrl":"https://doi.org/10.1109/IIT.2009.5413792","url":null,"abstract":"Fleet management is an important topic in research and development nowadays. Companies, security and emergency forces need to keep track of their trucks and cars and know where a vehicle is at a moment in time, and when, where and for how long a vehicle stopped.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115318138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-15DOI: 10.1109/IIT.2009.5413369
A. H. Mohammad, M. E. Woodward
Localized Quality of Service (QoS) routing has been recently proposed for supporting the requirements of multimedia applications and satisfying QoS constraints. Localized algorithms avoid the problems associated with the maintenance of global network state by using statistics of flow blocking probabilities. Using local information for routing avoids the overheads of global information with other nodes. However, localized QoS routing algorithms perform routing decision based on information updated from path request to path request. This paper proposes to tackle a combined localized routing and admission control in order to avoid congestion. We introduce a Congestion Avoidance Routing algorithm (CAR) in localized QoS routing which make a decision of routing in each connection request using an admission control to route traffic away from congestion. Simulations of various network topologies are used to illustrate the performance of the CAR. We compare the performance of the CAR algorithm against the Credit Based Routing (CBR) algorithm and the Quality Based Routing (QBR) under various ranges of traffic loads.
{"title":"Localized QoS routing and admission control: Performance evaluation","authors":"A. H. Mohammad, M. E. Woodward","doi":"10.1109/IIT.2009.5413369","DOIUrl":"https://doi.org/10.1109/IIT.2009.5413369","url":null,"abstract":"Localized Quality of Service (QoS) routing has been recently proposed for supporting the requirements of multimedia applications and satisfying QoS constraints. Localized algorithms avoid the problems associated with the maintenance of global network state by using statistics of flow blocking probabilities. Using local information for routing avoids the overheads of global information with other nodes. However, localized QoS routing algorithms perform routing decision based on information updated from path request to path request. This paper proposes to tackle a combined localized routing and admission control in order to avoid congestion. We introduce a Congestion Avoidance Routing algorithm (CAR) in localized QoS routing which make a decision of routing in each connection request using an admission control to route traffic away from congestion. Simulations of various network topologies are used to illustrate the performance of the CAR. We compare the performance of the CAR algorithm against the Credit Based Routing (CBR) algorithm and the Quality Based Routing (QBR) under various ranges of traffic loads.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124363676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-15DOI: 10.1109/IIT.2009.5413763
Piers R. J. Campbell, H. Fathulla, Faheem Ahmed
Classification algorithms have found high levels of application in a range of domains. One of the most important classification algorithms that is currently in wide use Classification And Regression Trees (CART), which yields accurate and consistent results in most multiple domains. A significant failing of CART and other similar algorithms is their inability to handle imprecision. This inability to handle the “grey areas” makes these algorithms less applicable to a range of domains such as Medicine and Finance. A well-regarded method for handling such imprecision is Fuzzy Logic, and in this paper a novel algorithm that combines CART and Fuzzy Logic is presented. Following the description of the implementation the experimental results presented which have been achieved through the use of the proposed FuzzyCART algorithm demonstrate an increased level of classification accuracy for medical data when compared to classical CART.
分类算法在许多领域都有很高的应用。分类回归树(classification And Regression Trees, CART)是目前广泛使用的一种重要的分类算法,它能在大多数多领域产生准确一致的结果。CART和其他类似算法的一个重大缺陷是它们无法处理不精确。由于无法处理“灰色地带”,这些算法不太适用于医学和金融等一系列领域。模糊逻辑是一种很好的处理这种不精确的方法,本文提出了一种结合CART和模糊逻辑的新算法。在描述实现之后,通过使用所提出的FuzzyCART算法实现的实验结果表明,与经典CART相比,医疗数据的分类精度提高了。
{"title":"FuzzyCART: A novel Fuzzy Logic based Classification & Regression Trees Algorithm","authors":"Piers R. J. Campbell, H. Fathulla, Faheem Ahmed","doi":"10.1109/IIT.2009.5413763","DOIUrl":"https://doi.org/10.1109/IIT.2009.5413763","url":null,"abstract":"Classification algorithms have found high levels of application in a range of domains. One of the most important classification algorithms that is currently in wide use Classification And Regression Trees (CART), which yields accurate and consistent results in most multiple domains. A significant failing of CART and other similar algorithms is their inability to handle imprecision. This inability to handle the “grey areas” makes these algorithms less applicable to a range of domains such as Medicine and Finance. A well-regarded method for handling such imprecision is Fuzzy Logic, and in this paper a novel algorithm that combines CART and Fuzzy Logic is presented. Following the description of the implementation the experimental results presented which have been achieved through the use of the proposed FuzzyCART algorithm demonstrate an increased level of classification accuracy for medical data when compared to classical CART.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126276287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-15DOI: 10.1109/IIT.2009.5413370
Zahra Eskandari Gharghe, B. M. Bidgoli
Broder's shingling is one of the state-of-the-art approaches in detecting near-duplicate documents. Prior evaluations of this method have shown that document-pairs which have different main content but have a large amount of similar unimportant details are the main sources of its errors. Different web pages from the same site are a good example of such documents. In such pages, almost always there is a similar boilerplate text which has a chance to be selected as the document's fingerprint and trick the algorithm. It seems that this problem is due to representing each document only by a sample of its shingles. This sample only contains some of the page's shingles and discards any other information. by Including additional information such as frequencies of shingles in this sample, we can improve the performance of the algorithm. This paper proposes a weighting of shingles and adapts shingling to be applied on weighted shingles. Our results have shown an improvement in shingling's performance.
{"title":"Weighted shingling: an adaptation of shingling for weighted shingles","authors":"Zahra Eskandari Gharghe, B. M. Bidgoli","doi":"10.1109/IIT.2009.5413370","DOIUrl":"https://doi.org/10.1109/IIT.2009.5413370","url":null,"abstract":"Broder's shingling is one of the state-of-the-art approaches in detecting near-duplicate documents. Prior evaluations of this method have shown that document-pairs which have different main content but have a large amount of similar unimportant details are the main sources of its errors. Different web pages from the same site are a good example of such documents. In such pages, almost always there is a similar boilerplate text which has a chance to be selected as the document's fingerprint and trick the algorithm. It seems that this problem is due to representing each document only by a sample of its shingles. This sample only contains some of the page's shingles and discards any other information. by Including additional information such as frequencies of shingles in this sample, we can improve the performance of the algorithm. This paper proposes a weighting of shingles and adapts shingling to be applied on weighted shingles. Our results have shown an improvement in shingling's performance.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132002305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-15DOI: 10.1109/IIT.2009.5413635
E. Nourani, M. A. Azgomi
As the use of web services is growing, there is an increasing demand for dependability. In this paper we intend to introduce various offered solutions for dependable web services. The existing solutions are divided into two categories: fault tolerance techniques, such as active and passive replications, and the use of design diversity. The main contribution of this paper is the use of design diversity techniques and WS-BPEL, which would result in proposing a useful and flexible architecture for dependable web services. The proposed architecture has been used as the basis of a design pattern for dependable web services, called D3WS. We have implemented the proposed architecture in a prototype application using N-version programming (NVP). We have also modeled the architecture using stochastic reward nets (SRNs) for further evaluation of dependability measures.
{"title":"A design pattern for dependable web services using design diversity techniques and WS-BPEL","authors":"E. Nourani, M. A. Azgomi","doi":"10.1109/IIT.2009.5413635","DOIUrl":"https://doi.org/10.1109/IIT.2009.5413635","url":null,"abstract":"As the use of web services is growing, there is an increasing demand for dependability. In this paper we intend to introduce various offered solutions for dependable web services. The existing solutions are divided into two categories: fault tolerance techniques, such as active and passive replications, and the use of design diversity. The main contribution of this paper is the use of design diversity techniques and WS-BPEL, which would result in proposing a useful and flexible architecture for dependable web services. The proposed architecture has been used as the basis of a design pattern for dependable web services, called D3WS. We have implemented the proposed architecture in a prototype application using N-version programming (NVP). We have also modeled the architecture using stochastic reward nets (SRNs) for further evaluation of dependability measures.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131332416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-15DOI: 10.1109/IIT.2009.5413355
H. Binsalleeh, N. Mohammed, P. S. Sandhu, Feras Aljumah, B. Fung
Every year millions of Muslims from all around the world gather to perform their pilgrimage in Makkah, Saudi Arabia. Due to the massive number of pilgrims of different languages, cultures and countries, it is highly challenging for the authorities to manage and provide proper services to these pilgrims. In this paper, we propose a pilgrim tracking system with the help of Radio Frequency identification (RFID) that can be deployed to improve the present situation. We also investigate possible security and privacy issues and propose a new secure protocol which meets the requirements for this application. Our proposed authentication protocol provides privacy, security and it is efficient particularly for this application.
{"title":"Using RFID tags to improve pilgrimage management","authors":"H. Binsalleeh, N. Mohammed, P. S. Sandhu, Feras Aljumah, B. Fung","doi":"10.1109/IIT.2009.5413355","DOIUrl":"https://doi.org/10.1109/IIT.2009.5413355","url":null,"abstract":"Every year millions of Muslims from all around the world gather to perform their pilgrimage in Makkah, Saudi Arabia. Due to the massive number of pilgrims of different languages, cultures and countries, it is highly challenging for the authorities to manage and provide proper services to these pilgrims. In this paper, we propose a pilgrim tracking system with the help of Radio Frequency identification (RFID) that can be deployed to improve the present situation. We also investigate possible security and privacy issues and propose a new secure protocol which meets the requirements for this application. Our proposed authentication protocol provides privacy, security and it is efficient particularly for this application.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123327971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}