Pub Date : 2008-04-07DOI: 10.1109/ICTTA.2008.4530117
A. Al-Ali, F. Aloul, Nada R. Aji, Amin A. Al-Zarouni, Nassar H. Fakhro
This paper describes the design of an RFID kids tracking system. It is designed to track a moving child in a wide area, such as a park or mall, using RFID technology. The proposed system has hardware and software components. The hardware architecture consists of an RFID active tag, RFID tag reader, Web server and database server. The Web server and database server are located in the master station. The tag readers are distributed around the open area, e.g. park. The tags are programmed with kid's profiles and are worn by the kids. Communication between the tag reader and the Web server is done via wireless LANs. The software architecture consists of a communication driver that handles all communication functions done at the master station, an application programming interface (API) that handles and analyzes the data, a friendly GUI and a database that saves all readings and client information.
{"title":"Mobile RFID Tracking System","authors":"A. Al-Ali, F. Aloul, Nada R. Aji, Amin A. Al-Zarouni, Nassar H. Fakhro","doi":"10.1109/ICTTA.2008.4530117","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530117","url":null,"abstract":"This paper describes the design of an RFID kids tracking system. It is designed to track a moving child in a wide area, such as a park or mall, using RFID technology. The proposed system has hardware and software components. The hardware architecture consists of an RFID active tag, RFID tag reader, Web server and database server. The Web server and database server are located in the master station. The tag readers are distributed around the open area, e.g. park. The tags are programmed with kid's profiles and are worn by the kids. Communication between the tag reader and the Web server is done via wireless LANs. The software architecture consists of a communication driver that handles all communication functions done at the master station, an application programming interface (API) that handles and analyzes the data, a friendly GUI and a database that saves all readings and client information.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133084463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-07DOI: 10.1109/ICTTA.2008.4530292
H. Abdallah, B. Daniel
With the rapid evolution of wireless network, demands in term of security is increasingly indispensable. That necessitates the advanced method introduction of cryptography and authentication, management and distribution of keys between the different entities on the system, while respecting constraints imposed by wireless systems, such that the capacity of the radio interface and resources of the terminal that represent the bottleneck of strangling of this type of systems. The terminal such GSM is low on requests of signalling SS7. In these papers discuss and we propose a technique of integration and security of intelligent network with mobile network by exploiting the signalling protocol of IETF, SIP.
{"title":"Mobile Intelligent Network security with SIP Authentication Procedure","authors":"H. Abdallah, B. Daniel","doi":"10.1109/ICTTA.2008.4530292","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530292","url":null,"abstract":"With the rapid evolution of wireless network, demands in term of security is increasingly indispensable. That necessitates the advanced method introduction of cryptography and authentication, management and distribution of keys between the different entities on the system, while respecting constraints imposed by wireless systems, such that the capacity of the radio interface and resources of the terminal that represent the bottleneck of strangling of this type of systems. The terminal such GSM is low on requests of signalling SS7. In these papers discuss and we propose a technique of integration and security of intelligent network with mobile network by exploiting the signalling protocol of IETF, SIP.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133081876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-07DOI: 10.1109/ICTTA.2008.4530095
I. Fatani, F. Coudoux, P. Corlay, Y. Cocheril, G. Moniak, M. Berbineau
In this paper, we investigate the joint use of multiple description coding (MDC) and multiple-input multiple-output (MIMO) technology in the specific context of wireless embedded real time video surveillance for transportation applications. The combination of both techniques is expected to provide reliability of transmitted data and graceful degradation of reconstructed video signal. The transmission chain proposed in this work is based on the WiMAX IEEE 802.16d standard. It consists in a 2times4 MIMO system associated with an OFDM physical layer. Different MDC algorithms have been developed with respect to the actual H.264/AVC compression standard. Preliminary results are presented and discussed in order to illustrate the interest of the proposed solution in terms of error robustness and decoded video quality.
{"title":"Robust video monitoring system for transport applications based on joint use of multiple description coding and multiple antennas","authors":"I. Fatani, F. Coudoux, P. Corlay, Y. Cocheril, G. Moniak, M. Berbineau","doi":"10.1109/ICTTA.2008.4530095","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530095","url":null,"abstract":"In this paper, we investigate the joint use of multiple description coding (MDC) and multiple-input multiple-output (MIMO) technology in the specific context of wireless embedded real time video surveillance for transportation applications. The combination of both techniques is expected to provide reliability of transmitted data and graceful degradation of reconstructed video signal. The transmission chain proposed in this work is based on the WiMAX IEEE 802.16d standard. It consists in a 2times4 MIMO system associated with an OFDM physical layer. Different MDC algorithms have been developed with respect to the actual H.264/AVC compression standard. Preliminary results are presented and discussed in order to illustrate the interest of the proposed solution in terms of error robustness and decoded video quality.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"341 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132181684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-07DOI: 10.1109/ICTTA.2008.4530167
Kamal Beydoun, V. Felea, Hervé Guyennet
Navigation aids for the pedestrians are considered new research challenges. The visually impaired are particularly concerned, because of their need to detect and avoid obstacles, as well as to orient themselves in unknown environments. In this paper, we discuss some existing projects in this domain and we propose a novel aid system formed of wireless sensors, meant to help navigation of the visually impaired, which addresses both orientation and obstacle negotiation. The proposed system is GPS-free and does not need external assistance in navigation.
{"title":"Wireless sensor network system helping navigation of the visually impaired","authors":"Kamal Beydoun, V. Felea, Hervé Guyennet","doi":"10.1109/ICTTA.2008.4530167","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530167","url":null,"abstract":"Navigation aids for the pedestrians are considered new research challenges. The visually impaired are particularly concerned, because of their need to detect and avoid obstacles, as well as to orient themselves in unknown environments. In this paper, we discuss some existing projects in this domain and we propose a novel aid system formed of wireless sensors, meant to help navigation of the visually impaired, which addresses both orientation and obstacle negotiation. The proposed system is GPS-free and does not need external assistance in navigation.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132762970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-07DOI: 10.1109/ICTTA.2008.4530288
Sabrina Gerbracht
In this paper different approaches on achieving privacy protection in RDF graphs are discussed. Mainly this means encryption of elements and subgraphs of an RDF graph. Existing solutions have the disadvantage, that along 'with the encryption many new statements have to be generated, 'what results in a rapidly growing graph. By combining different approaches, these disadvantages can be eliminated. The result 'will be an elegant possibility to encrypt parts of an RDF graph, 'without increasing the 'whole RDF graph unnecessarily.
{"title":"Possibilities to Encrypt an RDF-Graph","authors":"Sabrina Gerbracht","doi":"10.1109/ICTTA.2008.4530288","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530288","url":null,"abstract":"In this paper different approaches on achieving privacy protection in RDF graphs are discussed. Mainly this means encryption of elements and subgraphs of an RDF graph. Existing solutions have the disadvantage, that along 'with the encryption many new statements have to be generated, 'what results in a rapidly growing graph. By combining different approaches, these disadvantages can be eliminated. The result 'will be an elegant possibility to encrypt parts of an RDF graph, 'without increasing the 'whole RDF graph unnecessarily.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123161655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-07DOI: 10.1109/ICTTA.2008.4530236
H. Montazeri, M. R. Meybodi
In this paper, a new subchannel allocation schemes for cellular OFDMA networks employing an adaptive frequency reuse factor (FRF) strategy is considered. The allocation algorithm is semi-distributed solution comprising two phases. In the first phase, the Radio Network Controller (RNC) adaptively determines the FRF of each subchannel in a centralized manner. In the second phase, each base station autonomously allocates subchannels to the users using a simple algorithm (i.e. MaxC/I). To solve the first phase, we introduce a hybrid associative reinforcement learning (ARL) model combining self organizing map (SOM) and Learning Automata (LA) to deal with large size and continuous nature of the problem space. The simulation results illustrate that the proposed model achieves a better throughput gain in comparison with other allocation algorithms. It is noteworthy that the proposed algorithm has a low computational cost and achieving this throughput gain is only due to proper assignment of FRF to subchannels.
{"title":"An application of Learning Automata Based ARL to Subchannel Allocation in Cellular OFDMA System","authors":"H. Montazeri, M. R. Meybodi","doi":"10.1109/ICTTA.2008.4530236","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530236","url":null,"abstract":"In this paper, a new subchannel allocation schemes for cellular OFDMA networks employing an adaptive frequency reuse factor (FRF) strategy is considered. The allocation algorithm is semi-distributed solution comprising two phases. In the first phase, the Radio Network Controller (RNC) adaptively determines the FRF of each subchannel in a centralized manner. In the second phase, each base station autonomously allocates subchannels to the users using a simple algorithm (i.e. MaxC/I). To solve the first phase, we introduce a hybrid associative reinforcement learning (ARL) model combining self organizing map (SOM) and Learning Automata (LA) to deal with large size and continuous nature of the problem space. The simulation results illustrate that the proposed model achieves a better throughput gain in comparison with other allocation algorithms. It is noteworthy that the proposed algorithm has a low computational cost and achieving this throughput gain is only due to proper assignment of FRF to subchannels.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"518 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133825472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-07DOI: 10.1109/ICTTA.2008.4530335
Kais Samkari, Ammar Joukhadar
View tier is one of the three basic layers of any web based application designed using the common MVC pattern. From the end user point of view, the whole application is seen from this layer. During the project development process, View seems to be the most time and effort consuming part (almost 80% of the whole process), and that is true because of its fundamental role which covers everything related to the conversation workflow with the end user. Today, there are a lot of available web presentation technologies and frameworks that all aim at facilitating the construction of View tier, such as: Apache Tapestry, Apache Struts, JSF, Microsoft ASP.NET, Ajax and others. The goal of this paper is to determine criteria which enable the comparison of these technologies and frameworks, and applying it on Apache Struts, JSF, Ajax and eliXir presentation tier.
{"title":"Comparison Matrix for Web HCI","authors":"Kais Samkari, Ammar Joukhadar","doi":"10.1109/ICTTA.2008.4530335","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530335","url":null,"abstract":"View tier is one of the three basic layers of any web based application designed using the common MVC pattern. From the end user point of view, the whole application is seen from this layer. During the project development process, View seems to be the most time and effort consuming part (almost 80% of the whole process), and that is true because of its fundamental role which covers everything related to the conversation workflow with the end user. Today, there are a lot of available web presentation technologies and frameworks that all aim at facilitating the construction of View tier, such as: Apache Tapestry, Apache Struts, JSF, Microsoft ASP.NET, Ajax and others. The goal of this paper is to determine criteria which enable the comparison of these technologies and frameworks, and applying it on Apache Struts, JSF, Ajax and eliXir presentation tier.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115330260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-07DOI: 10.1109/ICTTA.2008.4530000
Sakji Sarra, B. Amel
In this work, we aim at optimizing the feature extraction step in the context of multichannel image indexing in the compressed domain, especially the wavelet based domain. To extract the salient signatures, the distribution of the multicomponent wavelet coefficients is modelized according to two different approaches. The first one is a univariate approach: the spectral channels are considered as independent and the signatures are separately computed from each component. The second approach is a multivariate one. It aims at finding an appropriate joint multivariate model whose parameters are the image signatures. The objective of this work is to compare the retrieval performances of the two following multivariate models: the Multivariate Generalized Gaussian Distribution (MGGD) model and a copula-based model. To this respect, an appropriate goodness-of-fit test is used in order to compare the adjustment of the the two models with the empirical histogram of the multivariate wavelet coefficients. Secondly, we compare the performances of retrieval in terms of precision, recall and complexity given by the multivariate approach based on the two models. Comparison between the univariate and the multivariate approach is also performed on natural multichannel images.
{"title":"Indexing of multichannel images in the wavelet transform domain","authors":"Sakji Sarra, B. Amel","doi":"10.1109/ICTTA.2008.4530000","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530000","url":null,"abstract":"In this work, we aim at optimizing the feature extraction step in the context of multichannel image indexing in the compressed domain, especially the wavelet based domain. To extract the salient signatures, the distribution of the multicomponent wavelet coefficients is modelized according to two different approaches. The first one is a univariate approach: the spectral channels are considered as independent and the signatures are separately computed from each component. The second approach is a multivariate one. It aims at finding an appropriate joint multivariate model whose parameters are the image signatures. The objective of this work is to compare the retrieval performances of the two following multivariate models: the Multivariate Generalized Gaussian Distribution (MGGD) model and a copula-based model. To this respect, an appropriate goodness-of-fit test is used in order to compare the adjustment of the the two models with the empirical histogram of the multivariate wavelet coefficients. Secondly, we compare the performances of retrieval in terms of precision, recall and complexity given by the multivariate approach based on the two models. Comparison between the univariate and the multivariate approach is also performed on natural multichannel images.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114898201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-07DOI: 10.1109/ICTTA.2008.4529914
F. Ahmad, Nur Haryani Zakaria, W. Osman
The paper proposes an approach to transform an information based portal into a knowledge-based hub. The study is made on the Agribazaar, which is an information-based portal provided by the Department of Agriculture, Ministry of Agriculture and Agri-based Industry, Malaysia. Basically, the portal has been developed to offer an internet-based commerce infrastructure for buyers and sellers of agriculture products. Agribazaar has been found to be successful in bridging the rural connectivity between users locally and globally. The applications has been accepted and utilized by a substantial number of users in Malaysia and other countries as well. However, the percentage of usage of the portal could be increased if it is made more competitive. One way to obtain a greater percentage of market shares is to reconstruct the portal into a new paradigm which is known as a "knowledge-based" hub. The transformation approach proposed involves five stages namely data repository, metadata, knowledge-based services, application, and security. The approach proposed aims to illustrate the use of existing information to reconstruct and transform the information-based portal into a knowledge-based hub. It is also intended to serve as a model for transforming a information based portal to a knowledge-based hub.
{"title":"Transforming Information-Based Agricultural Portal to Knowledge-Based Agricultural Hub","authors":"F. Ahmad, Nur Haryani Zakaria, W. Osman","doi":"10.1109/ICTTA.2008.4529914","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4529914","url":null,"abstract":"The paper proposes an approach to transform an information based portal into a knowledge-based hub. The study is made on the Agribazaar, which is an information-based portal provided by the Department of Agriculture, Ministry of Agriculture and Agri-based Industry, Malaysia. Basically, the portal has been developed to offer an internet-based commerce infrastructure for buyers and sellers of agriculture products. Agribazaar has been found to be successful in bridging the rural connectivity between users locally and globally. The applications has been accepted and utilized by a substantial number of users in Malaysia and other countries as well. However, the percentage of usage of the portal could be increased if it is made more competitive. One way to obtain a greater percentage of market shares is to reconstruct the portal into a new paradigm which is known as a \"knowledge-based\" hub. The transformation approach proposed involves five stages namely data repository, metadata, knowledge-based services, application, and security. The approach proposed aims to illustrate the use of existing information to reconstruct and transform the information-based portal into a knowledge-based hub. It is also intended to serve as a model for transforming a information based portal to a knowledge-based hub.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117330202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-07DOI: 10.1109/ICTTA.2008.4530044
H. Tavakoli, M. Ahmadian, Z. Zarei, M. Zourabadi
This paper presents Doppler effect formulation with two trajectories; first we use the solution in low speedy density function which is general for this case, second we use the solution in high speedy density function for the first time with the use of the relativity speed in modern physics.
{"title":"Doppler Effect in High Speed","authors":"H. Tavakoli, M. Ahmadian, Z. Zarei, M. Zourabadi","doi":"10.1109/ICTTA.2008.4530044","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530044","url":null,"abstract":"This paper presents Doppler effect formulation with two trajectories; first we use the solution in low speedy density function which is general for this case, second we use the solution in high speedy density function for the first time with the use of the relativity speed in modern physics.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"1083 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116034714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}