Loading...

Proceedings of

International Conference on Advances in Information Technology AIT 2012

Date
23-Jun-2012
Location
Bangkok , Thailand
Authors
23
ISBN
978-981-07-2683-6

9 Articles Published

1. IMPLEMENTING RNA-FINNT IN IDEAL PASSWORD AUTHENTICATION SCHEME RESULTS IN FORTIFICATION OF TRANSPORT LAYER SECURITY PROTOCOL

Authors: G.GEETHA , KULJEET KAUR

Abstract: Mutual Authentication in the multi server environment of an organization, done at the transport layer, becomes complex when communication is done over the public link. Secure Shell protocol is the de facto standard and is deployed over the public network, for determining identity of client and server through Password-based key exchange schemes like AuthA and DH-EKE etc. This password based key exchange schemes and their multiple modes of operation are secure under the computational Diffie-Hellman intractability assumption but could not withstand security requirements and are vulnerable to attacks. So the paper focuses on additional tier of security for transport layer security protocol by using Fingerprint for mutual authentication in the multi server environment of an organization along with the Password. With the help of two identity parameters password and fingerprint, an ideal password authentication scheme would be generated.

Keywords: Mutual Authentication, Password Authentication, Diffie-Hellman Key Exchange, Secured Shell Protocol, Secured Socket Lock.

Pages: 14 - 18 | DOI: 104

2. MODEL PROJECT-BASED LEARNING USING REAL WORLD PROJECTS IN THE INFORMATION SCIENCES AND TECHNOLOGY CURRICULUM

Authors: LILA RAJABION , SAMIR SHAH

Abstract: This paper reports on real world project based experience and learning with computer information science and technology projects and Penn State University campuses (Mont Alto & York). Working on the real world experiences improve the collaboration with industry and emphasizes on the team projects. This paper also deals with reasons for developing and implementing the real world project approach in IT project management, system analysis and design courses and Capstone project courses. It will also outline the modifications that were gained after the first experiences with this type of approach. Finally, we summarize the student’s perspectives and learning experiences, as well as faculty experiences with collaborating with industry.

Keywords: Higher education, industry-university collaboration, team projects, project management , project based learning

Pages: 19 - 23 | DOI: 105

3. CLINICAL ENTROPY BASED PCA FOR MULTI-LEAD ELECTROCARDIOGRAM SIGNALS

Authors: A. MAHANTA , L. N. SHARMA

Abstract: In this work, an information theoretic approach is proposed for principal component analysis (PCA) of multi-lead electrocardiogram signals. Clinical information is evaluated from the inverse of the diagonal eigenvalue matrix. It is termed as Clinical Entropy (Centropy). Clinical entropy (Centropy) based PCA method shows improved performance compared to the conventional PCA. The proposed method exhibits superior signal quality with higher cross correlation (CC), lower percentage root mean square difference (PRD) and lower root mean square error (RMSE) values.

Keywords: ECG, PRD, PCA, Entropy

Pages: 24 - 28 | DOI: 106

4. EVALUATION OF DE-INTERLACING TECHNIQUES FOR 1080I HDTV

Authors: KHALID BASHIR BAJWA , MUHAMMAD YAQOOB

Abstract: The paper presents the evaluation and grading of different techniques that are in use today for the de-interlacing of High Definition interlaced content. S2 (1080i/25) is one of the standards for High Definition Television (HDTV) that is broadcasted in Europe, USA and other parts of world. Different de-interlacing techniques starting from basic ones like line averaging, field insertion to advanced ones like motion adaptive and motion compensation are reviewed. These techniques are evaluated using objective video quality metrics like Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE) and more advanced one like Structural Similarity (SSIM). Subjective evaluation is carried out using perception based subjective video quality metric (Mean Opinion Score). The comparison of subjective and objective results shows that there is a high correlation among the subjective scores and the objective criterion.

Keywords: 1080i HDTV, De-interlacing, Objective Assessment, Video quality.

Pages: 29 - 34 | DOI: 107

5. DEVELOPMENT OF USER-FRIENDLY GUI FOR INDOOR LOCALIZATION USING RFID PASSIVE TAG

Authors: T.KARTHICK

Abstract: Radio frequency identification (RFID) is an automatic identification technology that enables tracking of people and object. In this paper, passive RFID tag is used for indoor localization. Passive RFID tag has many advantages i.e.,cost-effective, relatively small and its endurance.This paper proposes simulation of indoor localization usingself-created Graphic User Interface (GUI) to apply the RFID-based localization using fingerprint technique.In this paper, Maximum number of intersect tags and Maximum and 2nd Maximum number of intersect tags are deployed as pattern matching algorithm. For this technique,the database of fingerprint is obtained from ID information of the tags. The maximum number of intersect tag will be used as the justification of measured position of the target node.The estimated error location is obtained from the location estimation result compared with fingerprint location in the database. Theaverage error in the estimation result for both techniquesis approximatel

Keywords: Indoor localization, RFID passive tag, Fingerprint technique.

Pages: 35 - 40 | DOI: 108

6. AN IMPROVEMENT OF REQUIREMENT-BASED COMPLIANCE CHECKING ALGORITHM IN SERVICE WORKFLOWS

Authors: ANDREW MARTIN , WATTANA VIRIYASITAVAT

Abstract: This paper presents an improvement of requirement-oriented compliance checking algorithm to support trust-based decision making in service workflow environments. The proposed algorithm is based on our previous progressive works on (1) Service Workflow Specification language (SWSpec) serving as a formal and uniformed representation of requirements, and (2) the algorithm based on Constrained Truth Table (CTT), specifically developed for compliance checking for the Composite class of SWSpec. However, CTT algorithmpractically suffers from high complexitywhich is O(|S||V|2|V|), where |V| is the number of services presented in a workflow, and |S| is the size of a SWSpec formula to be checked. In this paper, we improve algorithm CTT by using Exclusive Disjunctive Normal Form (EDNF) as a new data structure that reduces the time complexity in the average case to O(|S||V|2). Finally, the performance comparison between these two approaches is conducted

Keywords: Service, Workflow, Compliance Checking

Pages: 41 - 45 | DOI: 109

7. PREDICTION OF YAHOO! MUSIC SEQUENCES ON USER’S MUSICAL TASTE

Authors: AKSHAY SHARMA , ALPA RESHAMWALA , DIVYA VINEET , NISHA SHARMA , PARSHWA SHAH , SUNITA MAHAJAN

Abstract: Sequential pattern mining is an important data mining problem with broad applications. In this paper, we have implemented Apriori a candidate generation algorithm and SPAM (Sequential Pattern Mining) algorithm on Yahoo! Music KDD Cup 2011, which is the annual Data Mining and Knowledge Discovery competition organized by ACM Special Interest Group on Knowledge Discovery and Data Mining, the leading professional organization of data miners.Yahoo! Music has amassed billions of user ratings for musical pieces. When properly analyzed, the raw ratings encode information on how the popularity of songs, albums and artists vary over time and above all, which songs users would like to listen to. Such an analysis introduces new scientific challenges. From these discovered patterns, we can know what patterns or music sequences which are frequently heard and in what order they are recommended. Experimental results have shown that SPAM performs well for large datasets like Yahoo! Music datasetis due

Keywords: Data mining, sequence data, time interval, Yahoo! Music, User music tastes.

Pages: 6 - 9 | DOI: 10.15224/978-981-07-2683-6-102

8. BER PERFORMANCE OF OPPORTUNISTIC RELAYING WITH DIRECT LINK USING ANTENNA SELECTION

Authors: AYAZ HUSSAIN , RAZA HAIDER , ZUHAIBUDDIN BHUTTO

Abstract: The opportunistic relaying scheme with the selection of antenna at source is the best alternative to get many of the benefits of MIMO [1]. In such a scheme, the best relay as well as best antennas at source can be selected for communication. Here, we will introduce the opportunistic amplify and forward relaying with direct link using antennas selection at source only. Under assumption of Rayleigh fading channel, in this proposed scheme the exact BER (bit error rate) performance will be analyzed and observed that the increasing antennas is a better option as compared to relays

Keywords: Cooperative Relay, Dual-hop, Antenna Selection, BER

Pages: 10 - 13 | DOI: 10.15224/978-981-07-2683-6-103

9. VIRTUAL IP GENERATION AND ALLOCATION TECHNIQUES IN MOBILE ADHOC NETWORKS

Authors: R.K.SINGH , TANU PREET SINGH , SATINDER KAUR

Abstract: Mobile ad-hoc networks (MANET) are growing in popularity due to the abundance of mobile devices, the speed and convenience of deployment, and the independence of network infrastructure. In such an IP-based network, IP address assignment to mobile devices is one of the most important network configuration parameters. A mobile device cannot participate in unicast communications until it is assigned a free IP address and the corresponding subnet mask. One of the most important resources is the set of IP addresses that are assigned to the network. When a new node wants to join a network, it has to be assigned an IP address as part of its initialization. For assigning an IP address to nodes one should meet the following requirements: There should be no conflict in IP address assignment, i.e., at any given instant of time there should not be two or more nodes with the same IP address. An IP address is assigned only for the duration the node stays in the network. When the node departs the ne

Keywords: unicast communications, assigned, address

Pages: 27 - 31 | DOI: 10.15224/978-981-07-5939-1-30

Popular Proceedings

ICETM 2023

9th International E-Conference on Engineering, Technology and Management

ESSHBS 2017

7th International Conference On Advances In Economics, Social Science and Human Behaviour Study

ASET 2017

7th International Conference on Advances in Applied Science and Environmental Technology

ACSM 2017

7th International Conference on Advances in Civil, Structural and Mechanical Engineering

CSM 2017

5th International Conference on Advances in Civil, Structural and Mechanical Engineering

SEM 2017

5th International Conference on Advances in Social, Economics and Management

ICETM 2022

8th International E- conference on Engineering, Technology and Management

ACSEE 2019

8th International Conference on Advances in Civil, Structural and Environmental Engineering