Pub Date : 2012-06-26DOI: 10.1109/ICCITECHNOL.2012.6285824
Yaneli Cruz, I. Boughzala, Saïd Assar
Mobile technology and mobile applications evolution have increased possibilities for mobile learning (ML). However, the lack of perceived learning value and institutional infrastructure are hindering the possibilities for ML attempts. The purpose of our study is the understanding opportunities and obstacles of mobile technologies as perceived by teachers in higher education. A questionnaire was developed based on actual research about technology adoption in higher education and was used to interview 14 teachers. Participants were asked to identify different issues associated with using mobile technology in education. In response, participants provided insights about ML perception, such as opportunities to enhance communication with students, availability for resources and immediate feedback. Finally, they identified technological, institutional, pedagogical and individual obstacles that threaten ML practices.
{"title":"Opportunities and obstacles for mobile learning in a Business School","authors":"Yaneli Cruz, I. Boughzala, Saïd Assar","doi":"10.1109/ICCITECHNOL.2012.6285824","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285824","url":null,"abstract":"Mobile technology and mobile applications evolution have increased possibilities for mobile learning (ML). However, the lack of perceived learning value and institutional infrastructure are hindering the possibilities for ML attempts. The purpose of our study is the understanding opportunities and obstacles of mobile technologies as perceived by teachers in higher education. A questionnaire was developed based on actual research about technology adoption in higher education and was used to interview 14 teachers. Participants were asked to identify different issues associated with using mobile technology in education. In response, participants provided insights about ML perception, such as opportunities to enhance communication with students, availability for resources and immediate feedback. Finally, they identified technological, institutional, pedagogical and individual obstacles that threaten ML practices.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132184314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-26DOI: 10.1109/ICCITECHNOL.2012.6285843
Ikram Bououd, I. Boughzala
The present paper introduces a new category of games which could be ranked among the collaborative games. This “collaboration-oriented game” has the distinction of being based on the solidarity and collaboration rather than individualism and competition. It puts forward team spirit over the individual one and serves to enhance the collaboration skills for players. The collaboration-oriented game aims at enhancing managers' capacity to manage their teams and allows them to learn collaboration skills and best practices. Such a game, as part of the panoply of serious games, allows learning and evolving through entertainment. This paper positions firstly this kind of game in the space of existing games, then, it presents its features and rules. Finally, it proposes some application scenarios in the professional context.
{"title":"The design of a collaboration-oriented serious game","authors":"Ikram Bououd, I. Boughzala","doi":"10.1109/ICCITECHNOL.2012.6285843","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285843","url":null,"abstract":"The present paper introduces a new category of games which could be ranked among the collaborative games. This “collaboration-oriented game” has the distinction of being based on the solidarity and collaboration rather than individualism and competition. It puts forward team spirit over the individual one and serves to enhance the collaboration skills for players. The collaboration-oriented game aims at enhancing managers' capacity to manage their teams and allows them to learn collaboration skills and best practices. Such a game, as part of the panoply of serious games, allows learning and evolving through entertainment. This paper positions firstly this kind of game in the space of existing games, then, it presents its features and rules. Finally, it proposes some application scenarios in the professional context.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130043344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-26DOI: 10.1109/ICCITECHNOL.2012.6285803
F. Hadiji, F. Zarai, L. Kamoun
In the next generation communication systems, different kinds of wireless public access have become increasingly available in various areas, so mobile terminals should provide multi-interfaces technology. The most challenging problem is the seamless intersystem mobility across heterogeneous wireless networks and the guarantee of the best quality of service and security for applications and users with best cost. This paper presents a proposed architecture of the mobile terminal that manages the handoff decision taking into account preferences given by users, applications requirements and networks performances and capabilities using the IEEE 802.11u standard.
{"title":"Architecture of mobile node in heterogeneous networks","authors":"F. Hadiji, F. Zarai, L. Kamoun","doi":"10.1109/ICCITECHNOL.2012.6285803","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285803","url":null,"abstract":"In the next generation communication systems, different kinds of wireless public access have become increasingly available in various areas, so mobile terminals should provide multi-interfaces technology. The most challenging problem is the seamless intersystem mobility across heterogeneous wireless networks and the guarantee of the best quality of service and security for applications and users with best cost. This paper presents a proposed architecture of the mobile terminal that manages the handoff decision taking into account preferences given by users, applications requirements and networks performances and capabilities using the IEEE 802.11u standard.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"186 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133761708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-26DOI: 10.1109/ICCITECHNOL.2012.6285844
S. Kurkovsky, R. Koshy, Vivian Novak, Peter Szul
Equipped with powerful processors, cameras for capturing still images and video, and a range of sensors capable of tracking location, orientation and motion of the user, modern smartphones offer a sophisticated platform for implementing handheld augmented reality (AR) applications. Despite the advances in research and development, implementing AR applications for the smartphone platform remains a challenge due to many open problems related to navigation, contextawareness, visualization, usability and interaction design, as well as content creation and sharing. This paper surveys a number of open challenges and issues, trade-offs and possible solutions in implementing handheld AR applications.
{"title":"Current issues in handheld augmented reality","authors":"S. Kurkovsky, R. Koshy, Vivian Novak, Peter Szul","doi":"10.1109/ICCITECHNOL.2012.6285844","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285844","url":null,"abstract":"Equipped with powerful processors, cameras for capturing still images and video, and a range of sensors capable of tracking location, orientation and motion of the user, modern smartphones offer a sophisticated platform for implementing handheld augmented reality (AR) applications. Despite the advances in research and development, implementing AR applications for the smartphone platform remains a challenge due to many open problems related to navigation, contextawareness, visualization, usability and interaction design, as well as content creation and sharing. This paper surveys a number of open challenges and issues, trade-offs and possible solutions in implementing handheld AR applications.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133990244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-26DOI: 10.1109/ICCITECHNOL.2012.6285792
J. Karam, Samer E. Mansour
There are conditions imposed on the coefficients of filters and therefore on the roots of the binomial polynomials associated with the construction of Daubechies Wavelets. In this paper, a particular class of polynomials is derived from such construction. It bears as coefficients the ratios of those of the binomial polynomials. Limits for the roots of this family of polynomials are derived and the conditions for obtaining optimum radius are identified along with some illustrations.
{"title":"Wavelets polynomials and associated zeros locations","authors":"J. Karam, Samer E. Mansour","doi":"10.1109/ICCITECHNOL.2012.6285792","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285792","url":null,"abstract":"There are conditions imposed on the coefficients of filters and therefore on the roots of the binomial polynomials associated with the construction of Daubechies Wavelets. In this paper, a particular class of polynomials is derived from such construction. It bears as coefficients the ratios of those of the binomial polynomials. Limits for the roots of this family of polynomials are derived and the conditions for obtaining optimum radius are identified along with some illustrations.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133481626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-26DOI: 10.1109/ICCITECHNOL.2012.6285793
Sidi ould Cheikh, A. Guéroui
The IEEE 802.11s Wireless Mesh Networks (WMN) is a new multi-hop technology increasing the coverage of IEEE 802.11 Wireless Network and providing Internet access. The IEEE 802.11s WMN is composed of two levels: Mesh and clients levels. The client may be mobile or static, but all Mesh nodes are static. The principal challenge of the WMN-based IEEE 802.11s, is how to guarantee the Quality of Service (QoS) to multimedia and real time traffic. In this article, we propose a method based on bandwidth reservation to improve the QoS of real time traffic. This method named MBRWMN(Multi-hop Bandwidth Reservation in WMN) defines a new weight parameter based on bandwidth reservation and use it to define a new WAM(Weighted Airtime Metric) metric. The best path between the source and the destination, is provided by this new metric. The proposed solution guarantees hop by hop required bandwidth to real time traffic. The simulation results show the proposed solution performance compared with HWMP protocol.
{"title":"Multi-hop bandwidth reservation in WMN-based IEEE 802.11s (MBRWMN)","authors":"Sidi ould Cheikh, A. Guéroui","doi":"10.1109/ICCITECHNOL.2012.6285793","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285793","url":null,"abstract":"The IEEE 802.11s Wireless Mesh Networks (WMN) is a new multi-hop technology increasing the coverage of IEEE 802.11 Wireless Network and providing Internet access. The IEEE 802.11s WMN is composed of two levels: Mesh and clients levels. The client may be mobile or static, but all Mesh nodes are static. The principal challenge of the WMN-based IEEE 802.11s, is how to guarantee the Quality of Service (QoS) to multimedia and real time traffic. In this article, we propose a method based on bandwidth reservation to improve the QoS of real time traffic. This method named MBRWMN(Multi-hop Bandwidth Reservation in WMN) defines a new weight parameter based on bandwidth reservation and use it to define a new WAM(Weighted Airtime Metric) metric. The best path between the source and the destination, is provided by this new metric. The proposed solution guarantees hop by hop required bandwidth to real time traffic. The simulation results show the proposed solution performance compared with HWMP protocol.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123953573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-26DOI: 10.1109/ICCITECHNOL.2012.6285840
Ahmed M. Almradi, S. Dianat
In this paper, the problem of Non Data Aided (NDA) Signal to Noise Ratio (SNR) estimation of Binary Phase Shift keying (BPSK) modulated signals using the Expectation Maximization (EM) Algorithm is discussed. Multiple Input Single Output (MISO) channels with Space Time Block Codes (STBC) are used. The EM algorithm is a method that finds the Maximum Likelihood (ML) solution iteratively when there are unobserved (hidden or missing) data. Extension of the proposed approach to other types of modulated signals in estimating SNR is straight forward. The performance of the estimator is assessed using the NDA Cramer Rao Lower Bounds (CRLBs). Alamouti coding technique is used in this paper with two transmit antennas and one receive antenna. Our assumption is that the received signal is corrupted by additive white Gaussian noise (AWGN) with unknown variance, and scaled by fixed unknown complex channel gain. Monte Carlo simulations are used to show that the proposed estimator offers a substantial improvement over the conventional Single Input Single Output (SISO) NDA SNR estimator due to the use of the statistical dependences in space and time. Moreover, the proposed NDA SNR estimator works close to the NDA SNR estimator over Single Input Multiple Output (SIMO) channels.
{"title":"NDA SNR estimation over MISO with STBC channels for BPSK modulated signals using the EM algorithm","authors":"Ahmed M. Almradi, S. Dianat","doi":"10.1109/ICCITECHNOL.2012.6285840","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285840","url":null,"abstract":"In this paper, the problem of Non Data Aided (NDA) Signal to Noise Ratio (SNR) estimation of Binary Phase Shift keying (BPSK) modulated signals using the Expectation Maximization (EM) Algorithm is discussed. Multiple Input Single Output (MISO) channels with Space Time Block Codes (STBC) are used. The EM algorithm is a method that finds the Maximum Likelihood (ML) solution iteratively when there are unobserved (hidden or missing) data. Extension of the proposed approach to other types of modulated signals in estimating SNR is straight forward. The performance of the estimator is assessed using the NDA Cramer Rao Lower Bounds (CRLBs). Alamouti coding technique is used in this paper with two transmit antennas and one receive antenna. Our assumption is that the received signal is corrupted by additive white Gaussian noise (AWGN) with unknown variance, and scaled by fixed unknown complex channel gain. Monte Carlo simulations are used to show that the proposed estimator offers a substantial improvement over the conventional Single Input Single Output (SISO) NDA SNR estimator due to the use of the statistical dependences in space and time. Moreover, the proposed NDA SNR estimator works close to the NDA SNR estimator over Single Input Multiple Output (SIMO) channels.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122766980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-26DOI: 10.1109/ICCITECHNOL.2012.6285846
Liang Dou, Qiang Liu, Zongyuang Yang, Jinkui Xie
A recent trend in the study of UML formal semantics is to integrate semantics of various UML diagrams into a single framework. The aim is to get a unified basis for main research topics like validation, verification and syntax checking. In this paper, we propose an approach based on the Situation Calculus (SC) which is a sophisticated action theory and is capable of modeling general systems. UML models are treated as a tailored SC system, containing eternals, fluents and actions that formalize the frequently used concepts in the UML metamodel. Class diagrams and object diagrams are modeled by eternals for consistency checking. State machine diagrams and sequence diagrams are modeled by fluents and actions, with corresponding precondition axioms and successor state axioms in SC. We use Golog, an executable high-level programming language based on the SC, to analyze and test UML diagrams. Based on the methods proposed in this paper, UML diagrams can be formally analyzed and simulated in the Golog interpreter, which can be useful in discovering system deficits at the design level.
{"title":"A Situation Calculus-based semantic framework for UML","authors":"Liang Dou, Qiang Liu, Zongyuang Yang, Jinkui Xie","doi":"10.1109/ICCITECHNOL.2012.6285846","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285846","url":null,"abstract":"A recent trend in the study of UML formal semantics is to integrate semantics of various UML diagrams into a single framework. The aim is to get a unified basis for main research topics like validation, verification and syntax checking. In this paper, we propose an approach based on the Situation Calculus (SC) which is a sophisticated action theory and is capable of modeling general systems. UML models are treated as a tailored SC system, containing eternals, fluents and actions that formalize the frequently used concepts in the UML metamodel. Class diagrams and object diagrams are modeled by eternals for consistency checking. State machine diagrams and sequence diagrams are modeled by fluents and actions, with corresponding precondition axioms and successor state axioms in SC. We use Golog, an executable high-level programming language based on the SC, to analyze and test UML diagrams. Based on the methods proposed in this paper, UML diagrams can be formally analyzed and simulated in the Golog interpreter, which can be useful in discovering system deficits at the design level.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130609200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-26DOI: 10.1109/ICCITECHNOL.2012.6285807
D. Barth, Boubkeur Boudaoud, T. Mautor
In this paper, we introduce and present a new model for resources management and for a guaranteed QoS in the interdomain routing framework. This new model is called the stock model, we study it using game theory. The stock model is based on a reverse cascade approach and is applied in a distributed context. The goal of each transit provider in the network is to be able to provisioning the necessary capacity on each route that it wants to buy. Therefore, we use a repeated game with incomplete information for this study. A linear reward inaction algorithm is used to update strategy of each player (domain or operator). We show how each player chooses its best strategy on each route to satisfy the demands of its customers and to provide a maximum benefit. Finally, we analyze and provide some simulation results obtained by applying the game model on simple topologies where the model stabilizes and converges to Nash equilibriums.
{"title":"Game theory for contracts establishment with guaranteed QoS in the interdomain network","authors":"D. Barth, Boubkeur Boudaoud, T. Mautor","doi":"10.1109/ICCITECHNOL.2012.6285807","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285807","url":null,"abstract":"In this paper, we introduce and present a new model for resources management and for a guaranteed QoS in the interdomain routing framework. This new model is called the stock model, we study it using game theory. The stock model is based on a reverse cascade approach and is applied in a distributed context. The goal of each transit provider in the network is to be able to provisioning the necessary capacity on each route that it wants to buy. Therefore, we use a repeated game with incomplete information for this study. A linear reward inaction algorithm is used to update strategy of each player (domain or operator). We show how each player chooses its best strategy on each route to satisfy the demands of its customers and to provide a maximum benefit. Finally, we analyze and provide some simulation results obtained by applying the game model on simple topologies where the model stabilizes and converges to Nash equilibriums.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126474717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-26DOI: 10.1109/ICCITECHNOL.2012.6285818
A. I. Alhasant, B. Sharif, C. Tsimenidis, J. Neasham
This paper presents an efficient Received Signal Strength RSS-based localization approach utilizing a Tree Search Algorithm (TSA). In comparison to the existing exhaustive search algorithms, e.g. Least Square Estimators (LSE) and Error Controlling localization (Ecolocation), the proposed approach achieves considerable reduction in computational complexity and storage requirements. The effectiveness of the TSA is evaluated through simulation and real experiments. The presented results show that the performance of the new approach closely achieves LSE and performs better than Ecolocation algorithms. Moreover, at a comparable system complexities, TSA outperforms the simplistic Proximity and Centroid localization algorithms.
本文利用树搜索算法(TSA)提出了一种有效的基于接收信号强度rss的定位方法。与现有的穷举搜索算法(如Least Square Estimators (LSE)和Error control localization (Ecolocation))相比,该方法大大降低了计算复杂度和存储需求。通过仿真和实际实验对TSA的有效性进行了评价。实验结果表明,该方法的性能接近LSE,且优于生态定位算法。此外,在相当的系统复杂性下,TSA优于简单的接近和质心定位算法。
{"title":"Low complexity least-square estimator for RSS-based localization in Wireless Sensor Networks","authors":"A. I. Alhasant, B. Sharif, C. Tsimenidis, J. Neasham","doi":"10.1109/ICCITECHNOL.2012.6285818","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285818","url":null,"abstract":"This paper presents an efficient Received Signal Strength RSS-based localization approach utilizing a Tree Search Algorithm (TSA). In comparison to the existing exhaustive search algorithms, e.g. Least Square Estimators (LSE) and Error Controlling localization (Ecolocation), the proposed approach achieves considerable reduction in computational complexity and storage requirements. The effectiveness of the TSA is evaluated through simulation and real experiments. The presented results show that the performance of the new approach closely achieves LSE and performs better than Ecolocation algorithms. Moreover, at a comparable system complexities, TSA outperforms the simplistic Proximity and Centroid localization algorithms.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126528630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}