Pub Date : 2010-03-02DOI: 10.1109/MCIT.2010.5444867
A. Esmailpour, N. Nasser
Quality of Service (QoS) differentiation in WiMAX networks is a critically important part of QoS support that has not been properly addressed in the literature. Radio Resource Management (RRM) techniques such as packet scheduling and admission control have been studied by many research groups, and although they claim to provide QoS differentiation in their schemes, no studies have truly evaluated and measured the QoS differentiations among various service classes. In this study, we propose quantifying QoS differentiation using a new parameter called Fairness, which could measure QoS differentiation among various service classes. By simulation results, we show that Fairness values could provide detailed information about QoS differentiation, where throughput and delay fall short of comparison analysis for QoS support among Real Time (RT) versus Non-RT (NRT) applications.
{"title":"Quantifying Quality of Service differentiation for WiMAX networks","authors":"A. Esmailpour, N. Nasser","doi":"10.1109/MCIT.2010.5444867","DOIUrl":"https://doi.org/10.1109/MCIT.2010.5444867","url":null,"abstract":"Quality of Service (QoS) differentiation in WiMAX networks is a critically important part of QoS support that has not been properly addressed in the literature. Radio Resource Management (RRM) techniques such as packet scheduling and admission control have been studied by many research groups, and although they claim to provide QoS differentiation in their schemes, no studies have truly evaluated and measured the QoS differentiations among various service classes. In this study, we propose quantifying QoS differentiation using a new parameter called Fairness, which could measure QoS differentiation among various service classes. By simulation results, we show that Fairness values could provide detailed information about QoS differentiation, where throughput and delay fall short of comparison analysis for QoS support among Real Time (RT) versus Non-RT (NRT) applications.","PeriodicalId":285648,"journal":{"name":"2010 International Conference on Multimedia Computing and Information Technology (MCIT)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125761247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-03-02DOI: 10.1109/MCIT.2010.5444840
M. Aburrous, M. A. Hossain, K. Dahal, F. Thabtah
This paper presents a novel approach to overcome the difficulty and complexity in detecting and predicting e-banking phishing website. We proposed an intelligent resilient and effective model that is based on using association and classification Data Mining algorithms. These algorithms were used to characterize and identify all the factors and rules in order to classify the phishing website and the relationship that correlate them with each other. We implemented six different classification algorithm and techniques to extract the phishing training data sets criteria to classify their legitimacy. We also compared their performances, accuracy, number of rules generated and speed. The rules generated from the associative classification model showed the relationship between some important characteristics like URL and Domain Identity, and Security and Encryption criteria in the final phishing detection rate. The experimental results demonstrated the feasibility of using Associative Classification techniques in real applications and its better performance as compared to other traditional classifications algorithms.
{"title":"Associative Classification techniques for predicting e-banking phishing websites","authors":"M. Aburrous, M. A. Hossain, K. Dahal, F. Thabtah","doi":"10.1109/MCIT.2010.5444840","DOIUrl":"https://doi.org/10.1109/MCIT.2010.5444840","url":null,"abstract":"This paper presents a novel approach to overcome the difficulty and complexity in detecting and predicting e-banking phishing website. We proposed an intelligent resilient and effective model that is based on using association and classification Data Mining algorithms. These algorithms were used to characterize and identify all the factors and rules in order to classify the phishing website and the relationship that correlate them with each other. We implemented six different classification algorithm and techniques to extract the phishing training data sets criteria to classify their legitimacy. We also compared their performances, accuracy, number of rules generated and speed. The rules generated from the associative classification model showed the relationship between some important characteristics like URL and Domain Identity, and Security and Encryption criteria in the final phishing detection rate. The experimental results demonstrated the feasibility of using Associative Classification techniques in real applications and its better performance as compared to other traditional classifications algorithms.","PeriodicalId":285648,"journal":{"name":"2010 International Conference on Multimedia Computing and Information Technology (MCIT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130969492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-03-02DOI: 10.1109/MCIT.2010.5444851
A. Ajmal, I. Hussain
Vehicle detection and classification of vehicles play an important role in decision making for the purpose of traffic control and management. In this paper we propose a novel and efficient algorithm based on image processing using aerial cameras for vehicle detection and classification especially in highways. The algorithm is mainly based on a sequence of morphological methods being applied on an image taken by an aerial camera of a road segment. The algorithm also uses thresholding and edge detection techniques for vehicle detection. Experiments are carried out over a wide range of vehicles, road segments and camera heights. A success rate of more than 85% and proper vehicle classification is achieved.
{"title":"Vehicle detection using morphological image processing technique","authors":"A. Ajmal, I. Hussain","doi":"10.1109/MCIT.2010.5444851","DOIUrl":"https://doi.org/10.1109/MCIT.2010.5444851","url":null,"abstract":"Vehicle detection and classification of vehicles play an important role in decision making for the purpose of traffic control and management. In this paper we propose a novel and efficient algorithm based on image processing using aerial cameras for vehicle detection and classification especially in highways. The algorithm is mainly based on a sequence of morphological methods being applied on an image taken by an aerial camera of a road segment. The algorithm also uses thresholding and edge detection techniques for vehicle detection. Experiments are carried out over a wide range of vehicles, road segments and camera heights. A success rate of more than 85% and proper vehicle classification is achieved.","PeriodicalId":285648,"journal":{"name":"2010 International Conference on Multimedia Computing and Information Technology (MCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128871316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-03-02DOI: 10.1109/MCIT.2010.5444870
S. Barton, V. Gouet-Brunet, M. Rukoz, C. Charbuillet, G. Peeters
A comparative study of distributions and properties of datasets representing public domain audio and visual content is presented. The criteria adopted in this study incorporate the analysis of the pairwise distance distribution histograms and estimation of intrinsic dimensionality. In order to better understand the results, auxiliary datasets have been also considered and analyzed. The results of this study provide a solid ground for further research using the presented datasets such as their indexability with index structures.
{"title":"Qualitative comparison of audio and visual descriptors distributions","authors":"S. Barton, V. Gouet-Brunet, M. Rukoz, C. Charbuillet, G. Peeters","doi":"10.1109/MCIT.2010.5444870","DOIUrl":"https://doi.org/10.1109/MCIT.2010.5444870","url":null,"abstract":"A comparative study of distributions and properties of datasets representing public domain audio and visual content is presented. The criteria adopted in this study incorporate the analysis of the pairwise distance distribution histograms and estimation of intrinsic dimensionality. In order to better understand the results, auxiliary datasets have been also considered and analyzed. The results of this study provide a solid ground for further research using the presented datasets such as their indexability with index structures.","PeriodicalId":285648,"journal":{"name":"2010 International Conference on Multimedia Computing and Information Technology (MCIT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132862415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-03-02DOI: 10.1109/MCIT.2010.5444849
I. Jafar, Ghazi Al Sukkar
Coloring of grayscale images finds its place in many areas such as medical imaging and coloring of black and white images and videos. However, manual coloring is time consuming and ill-posed problem. In this paper we present a semi-automatic framework for coloring of grayscale images. Given a grayscale image, the new framework operates by prompting the user to specify a source color image of similar content to that of the grayscale image. Then, it employs a large set of grey level features, K-means clustering, and a new color assignment approach to transfer color to the grayscale image. Subjective and objective evaluation revealed the capability of the proposed framework in producing faithful and true color images.
{"title":"A novel coloring framework for grayscale images","authors":"I. Jafar, Ghazi Al Sukkar","doi":"10.1109/MCIT.2010.5444849","DOIUrl":"https://doi.org/10.1109/MCIT.2010.5444849","url":null,"abstract":"Coloring of grayscale images finds its place in many areas such as medical imaging and coloring of black and white images and videos. However, manual coloring is time consuming and ill-posed problem. In this paper we present a semi-automatic framework for coloring of grayscale images. Given a grayscale image, the new framework operates by prompting the user to specify a source color image of similar content to that of the grayscale image. Then, it employs a large set of grey level features, K-means clustering, and a new color assignment approach to transfer color to the grayscale image. Subjective and objective evaluation revealed the capability of the proposed framework in producing faithful and true color images.","PeriodicalId":285648,"journal":{"name":"2010 International Conference on Multimedia Computing and Information Technology (MCIT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133771544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-03-02DOI: 10.1109/MCIT.2010.5444847
A. Elmahalawy, Newal Elfishawy, M. N. El-dien
One of the leading technologies is the Smart Home, where the home itself recognizes certain changes in home environment and provides adequate services to residents. Also, the Smart Home can anticipate the any dangerous state so it can adapt itself for this future case. Our goal is to anticipate states with too large power take-off; it means to eliminate power spikes. Program allows starting of simulation also without anticipation. The results are suitable for comparison with simulations with the block of anticipation. Anticipation based on evolutionary algorithms. So, we can see the quality of anticipation in the best way.
{"title":"Anticipation the consumed electrical power in Smart Home using evolutionary algorithms","authors":"A. Elmahalawy, Newal Elfishawy, M. N. El-dien","doi":"10.1109/MCIT.2010.5444847","DOIUrl":"https://doi.org/10.1109/MCIT.2010.5444847","url":null,"abstract":"One of the leading technologies is the Smart Home, where the home itself recognizes certain changes in home environment and provides adequate services to residents. Also, the Smart Home can anticipate the any dangerous state so it can adapt itself for this future case. Our goal is to anticipate states with too large power take-off; it means to eliminate power spikes. Program allows starting of simulation also without anticipation. The results are suitable for comparison with simulations with the block of anticipation. Anticipation based on evolutionary algorithms. So, we can see the quality of anticipation in the best way.","PeriodicalId":285648,"journal":{"name":"2010 International Conference on Multimedia Computing and Information Technology (MCIT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125068324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-03-02DOI: 10.1109/MCIT.2010.5444853
K. Hamdan, H. El Khatib, K. Shuaib
Software project management has become a crucial field of research due to the increasing role of software in today's world. When a project is insufficiently supported, the quality and speed of the project will suffer. Improving the functions of project management is a main concern in software development organizations. The essence of this paper is to estimate software project cost by Analogy estimation model, incorporating organizational and intercultural factors was developed and evaluated. Analysis was done to show how such added factors can improve the overall accuracy of estimating the cost of a project.
{"title":"Practical software project total cost estimation methods","authors":"K. Hamdan, H. El Khatib, K. Shuaib","doi":"10.1109/MCIT.2010.5444853","DOIUrl":"https://doi.org/10.1109/MCIT.2010.5444853","url":null,"abstract":"Software project management has become a crucial field of research due to the increasing role of software in today's world. When a project is insufficiently supported, the quality and speed of the project will suffer. Improving the functions of project management is a main concern in software development organizations. The essence of this paper is to estimate software project cost by Analogy estimation model, incorporating organizational and intercultural factors was developed and evaluated. Analysis was done to show how such added factors can improve the overall accuracy of estimating the cost of a project.","PeriodicalId":285648,"journal":{"name":"2010 International Conference on Multimedia Computing and Information Technology (MCIT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116740642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-03-02DOI: 10.1109/MCIT.2010.5444864
E. Vejdani, F. Saadatmand, M. Niazi, M. Yaghmaee
Ant Colony Systems (ACS) have been successfully utilized to optimization problems in recent years. However, few works have been done on applying ACS to data mining. This paper proposes an ACS-based algorithm to extract membership functions in fuzzy data mining. The membership functions are first encoded into binary bits and then given to the ACS to search for the optimal set of membership functions. With the proposed algorithm, a global search can be performed and system automation is implemented, because our model does not require the user-specified threshold of minimum support. We experimentally evaluate our approach and reveal that our algorithm significantly improve membership functions and reduce the computation costs.
{"title":"Extracting membership functions by ACS algorithm without specifying actual minimum support","authors":"E. Vejdani, F. Saadatmand, M. Niazi, M. Yaghmaee","doi":"10.1109/MCIT.2010.5444864","DOIUrl":"https://doi.org/10.1109/MCIT.2010.5444864","url":null,"abstract":"Ant Colony Systems (ACS) have been successfully utilized to optimization problems in recent years. However, few works have been done on applying ACS to data mining. This paper proposes an ACS-based algorithm to extract membership functions in fuzzy data mining. The membership functions are first encoded into binary bits and then given to the ACS to search for the optimal set of membership functions. With the proposed algorithm, a global search can be performed and system automation is implemented, because our model does not require the user-specified threshold of minimum support. We experimentally evaluate our approach and reveal that our algorithm significantly improve membership functions and reduce the computation costs.","PeriodicalId":285648,"journal":{"name":"2010 International Conference on Multimedia Computing and Information Technology (MCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114254315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-03-02DOI: 10.1109/MCIT.2010.5444854
H. Pervaiz
This paper proposes a radio resource management framework for integrated network selection mechanism control in multi- network environment as an interaction between the service providers and users in competitive manner to admit high priority users or the services that maximize their rewards. The proposed scheme comprises of three steps namely as user profile, service profile and access network selection. The priorities are assigned to the users depending on their grade and category. The users belonging to same categories have same preferences for the decision factors (or QoS parameters). Different policies are defined according to the network load to prioritize high priority users as compared to the type of service requested. The access network selection mechanism calculates the payoffs based on their relative weights calculated using AHP and a utility function evaluation by each wireless network for each user. The proposed model is preliminary and its contribution is to create an admission policy that can adapt to different coverage areas of a wireless network and depends on the priority of users and their requirements.
{"title":"A Multi-Criteria Decision Making (MCDM) network selection model providing enhanced QoS differentiation to customers","authors":"H. Pervaiz","doi":"10.1109/MCIT.2010.5444854","DOIUrl":"https://doi.org/10.1109/MCIT.2010.5444854","url":null,"abstract":"This paper proposes a radio resource management framework for integrated network selection mechanism control in multi- network environment as an interaction between the service providers and users in competitive manner to admit high priority users or the services that maximize their rewards. The proposed scheme comprises of three steps namely as user profile, service profile and access network selection. The priorities are assigned to the users depending on their grade and category. The users belonging to same categories have same preferences for the decision factors (or QoS parameters). Different policies are defined according to the network load to prioritize high priority users as compared to the type of service requested. The access network selection mechanism calculates the payoffs based on their relative weights calculated using AHP and a utility function evaluation by each wireless network for each user. The proposed model is preliminary and its contribution is to create an admission policy that can adapt to different coverage areas of a wireless network and depends on the priority of users and their requirements.","PeriodicalId":285648,"journal":{"name":"2010 International Conference on Multimedia Computing and Information Technology (MCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130064636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-03-02DOI: 10.1109/MCIT.2010.5444862
Yasseen Al Makady, H. Janicke
Information is becoming more and more critical to our businesses, governance and social life. Social networking and increasingly pervasive communication technologies lead to a variety of technologies to control and facilitate the exchange of information, many of them based on peer-to-peer concepts. Security issues, such as confidentiality and integrity, arising from the rapid increase of the information exchange are often secondary and not sufficiently addressed by the available technologies. In this paper we will use JXTA, a technology that facilitates communication, resource sharing and distribution amongst peers, to build an information management layer that focuses on the efficient and secure exchange of information.
{"title":"Secure management layer for JXTA-based information sharing systems","authors":"Yasseen Al Makady, H. Janicke","doi":"10.1109/MCIT.2010.5444862","DOIUrl":"https://doi.org/10.1109/MCIT.2010.5444862","url":null,"abstract":"Information is becoming more and more critical to our businesses, governance and social life. Social networking and increasingly pervasive communication technologies lead to a variety of technologies to control and facilitate the exchange of information, many of them based on peer-to-peer concepts. Security issues, such as confidentiality and integrity, arising from the rapid increase of the information exchange are often secondary and not sufficiently addressed by the available technologies. In this paper we will use JXTA, a technology that facilitates communication, resource sharing and distribution amongst peers, to build an information management layer that focuses on the efficient and secure exchange of information.","PeriodicalId":285648,"journal":{"name":"2010 International Conference on Multimedia Computing and Information Technology (MCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134508275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}