Loading...

Proceedings of

2nd International Conference on Advances in Computing, Communication and Information Technology CCIT 2014

Date
17-Nov-2014
Location
Birmingham , United Kingdom
Authors
90
ISBN
978-1-63248-051-4

39 Articles Published

1. UNDERSTANDING THE IMPACT OF A FACILITATOR’S BEHAVIOUR ON A GDSS MEETING OUTCOMES: THE FORMULATION OF THE TAGDSSM MODEL

Authors: AMER AL SHISHANY , JACKSON ADAMS

Abstract: This paper aims to shed some light on the importance of the facilitator in a GDSS (Group Decision Support System) supported meeting and the role he/she plays in managing these systems and consequently the impact of his/her managing behaviour on the outcomes of a GDSS meeting. Based on a field study interviewing people from real GDSS environment, SIDE’s (Social Identity model of Deindividuation Effects) strategic component assumption and relevant GDSS supported meeting’s literature this paper proposes a new model named ‘Task-Conflict and Anonymity-Enabled GDSS Meeting (TAGDSSM). This proposed model aims to enhance the understanding and interpreting of facilitators’ and users’ behaviour in anonymity-enabled GDSS meeting environment. The TAGDSSM model manifests two major constructs impacting user’s behaviour in the decision making process: GDSS system’s anonymity and facilitator’s behaviour within GDSS meetings. In-depth semi-structured interviews were conducted with experienced GDSS meet

Keywords: Group Decision Support Systems; TAGDSSM Model; Task-conflict; Technical Anonymity; Strategic Component of the SIDE Theory.

Pages: 1 - 5 | DOI: 10.15224/978-1-63248-051-4-16

2. RESTORATION OF 2D INFORMATION BY MHR METHOD

Authors: DARIUSZ JACEK JAKOBCZAK

Abstract: Applied science and mechanics need mathematical methods for 2D processes modeling using the set of data points. A novel method of Hurwitz-Radon Matrices (MHR) is used in 2D curve modeling. Proposed method is based on the family of Hurwitz-Radon matrices which possess columns composed of orthogonal vectors. Two-dimensional process is modeled via different functions: sine, cosine, tangent, logarithm, exponent, arc sin, arc cos, arc tan and power function.

Keywords: process modeling, Hurwitz-Radon matrices, coefficient of MHR method, mathematical modeling

Pages: 6 - 9 | DOI: 10.15224/978-1-63248-051-4-17

3. INFORMATION AND COMMUNICATION TECHNOLOGY AS AN AID TO LEARNING

Authors: OYEWOLE M. O

Abstract: Information and Communication Technology (ICT) have taken a central position in all sphere of human endeavor. ICT which is refer to any electronic means of capturing, processing, storing and disseminating information now serves as the backbone of societal development in all ramification. This Paper deliberate on using ICT as an aid to learning . It uses a method in Computer science by developing a window based application software that convert text to voice such that information from textbook or material in softcopy can be harnessed without sitting down to read.

Keywords: Information, Communication, Technology, Software development , learning

Pages: 10 - 12 | DOI: 10.15224/978-1-63248-051-4-18

4. SENSITIVITY ANALYSIS OF QUADRATURE AMPLITUDE MODULATION OVER AMR-WB VOICE CODEC

Authors: ION BOGDAN , LUMINITA SCRIPCARIU , MIHAIL POPA , SEBASTIAN CIORNEI

Abstract: The voice calls over cellular networks are encrypted only over small sections of the full path, usually only between the Mobile Equipment and the Base Station/eNodeB. In this paper we propose a solution for highly secure end-to-end voice calls over the already existing voice call. As opposite to data channels, the normal audio channel provides low lag, low jitter and increased security due to the peer-to-peer nature of the connections. The challenge to be resolved is to find the methods for transmitting data over current and upcoming vocoders. This paper presents the first and extensive sensitivity analysis of the QAM modulation parameters over the AMR-WB vocoder. The data transfer speeds and bit error rates achieved over AMR-WB vocoder, are 1600bps with SER 2.2∙10-5, 2000bps with SER 1.5∙10-4, 3200bps with SER 2.4∙10-3 or 4000bps with SER 8∙10-3. The work also presents the modifications of SER and bitrate against parameters ranging from carrier frequency, number of points in the QAM c

Keywords: AMR-WB; AMR-NB; HD Voice data; modem over voice codec; QAM modulation; end-to-end security; data privacy; ubiquitous data communication

Pages: 13 - 18 | DOI: 10.15224/978-1-63248-051-4-19

5. INFORMATION AND COMMUNICATION TECHNOLOGY AS AN AID TO LEARNING

Authors: OYEWOLE M. O

Abstract: Information and Communication Technology (ICT) have taken a central position in all sphere of human endeavor. ICT which is refer to any electronic means of capturing, processing, storing and disseminating information now serves as the backbone of societal development in all ramification. This Paper deliberate on using ICT as an aid to learning . It uses a method in Computer science by developing a window based application software that convert text to voice such that information from textbook or material in softcopy can be harnessed without sitting down to read.

Keywords: Information and Communication Technology, Software development and learning.

Pages: 10 - 12 | DOI: 10.15224/978-1-63248-051-4-18

6. A MIGRATION DECISION FOR USERS AND SERVICES TOWARDS AND WITHIN THE IMS

Authors: SVEN PARAND

Abstract: Making the decision to migrate a user or service from a legacy network to a next generation network (NGN) requires thorough analysis. Despite the will and a clear necessity of telecom operators and service providers (SP) worldwide, many are still struggling with the migration process even after nearly five years and this can be attributed largely to the mentioned analysis aspect. New service delivery platforms (SDP) have necessitated the need to modernize or in some cases rebuild completely new operations support systems/business support systems (OSS/BSS). Mistakes have also been made in choosing an appropriate strategy for migration due to miscalculation in several key areas prior to migrating. Based on a task of moving users and services from legacy networks to IP multimedia subsystem (IMS) as well as inside the IMS, the current paper addresses the issue of making a solid migration decision, based on facts and proper analysis, concentrating mainly on the technical side of it. A high

Keywords: analysis, IMS, migration process, migration phases, NGN.

Pages: 30 - 35 | DOI: 10.15224/978-1-63248-051-4-22

7. WIMAX QUALITY OF SERVICE DEPLOYMENT IN DISASTER MANAGEMENT

Authors: GARIK MARKARIAN , JUWITA MOHD SULTAN , PHILLIP BENACHOUR

Abstract: There are five different Quality of Service (QoS) classes defined by the IEEE 802.16e-2005: UGS, ertPS, rtPS, nrtPS and BE. It is well known that BE provides the lowest level of quality compared all other classes. In this paper, we investigate the performance of rtPS and BE QoS classes in an emergency and natural disaster scenario. We use the OPNET modeler for simulation purposes in order to evaluate rtPS and BE performance with particular focus on video conferencing/streaming and web browsing applications. It is possible that during a disaster BE is the only available service. Simulation results revealed that in certain situations, a user with BE QoS could provide higher throughput compared to the rtPS case. Consequently, we also evaluate the video conferencing/streaming application for the BE QoS case. Simulation results show that for a defined maximum number of users in the network and a certain combination of users that are allocated a QoS and a selected application e.g., web brows

Keywords: QoS,BE, rtPS, throughput.

Pages: 36 - 40 | DOI: 10.15224/978-1-63248-051-4-23

8. DVRA-SN: NEIGHBOUR BASED DISTANCE VECTOR ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS

Authors: MRINAL KANTI DEBBARMA , SANTANU K. SEN , SUDIPTA ROY

Abstract: MANET has emerged as one of the most focused and trust research area in the field of wireless networks and wireless mesh networks. A major thrust of the protocol designers towards the development and deployment of distance vector routing based protocols, irrespectively in wired, wireless or even in ad hoc and sensor networks is primarily because of the conceptual and implementation simplicity and elegance coupled with the minimum information requirement by each node. A good amount of research has been done in the past towards the improvement of routing algorithms in MANET, but the area has not become stable till date. This paper proposes a neighbour based routing protocol that supports a mobile node as special neighbours in the network for making packet forwarding decisions and creates route only when desired by the source node as in case of reactive routing protocol.

Keywords: MANET, Distance Vector Routing, DVRA-SN, Special Neighbours, Neighbouring Table Algorithm.component

Pages: 41 - 44 | DOI: 10.15224/978-1-63248-051-4-24

9. DIFFERENT TECHNIQUES OF AUTOMATIC FACIAL EXPRESSION RECOGNITION: A SURVEY

Authors: ANURAG DE , ASHIM SAHA , M .C. PAL , NIRMALYA KAR

Abstract: Emotion recognition through facial expression detection is one of the important fields of study for human-computer interaction. To detect a facial Expression one system need to come across different variability’s of human faces such as color, posture, expression, orientation, etc. To detect the expression of a human face first it is required to detect the different facial features such as the movements of eye, nose, lips, etc. and then classify them comparing with trained data using a suitable classifier for expression recognition. This paper provides a survey report of implementation of different techniques for expression recognition along with their advantages and drawbacks which will help in further development and improvement of the system.

Keywords: Facial Expression, Image Processing, Human behavior.

Pages: 45 - 49 | DOI: 10.15224/978-1-63248-051-4-25

10. ENHANCED COST ESTIMATION MODEL FOR REPLICA SELECTION

Authors: GIAN CHAND SODHY , KAMA HAZIRA ABDUL KADIR

Abstract: A data grid allows large amount of data to be stored and shared among users at geographically different locations. However, when required, data has to be copied to the location where it is needed. This means a lot of network bandwidth will be used for the data transfer. One strategy employed in data grids is to make multiple copies of the data, called replicas, and place them in strategic locations so that the data is not too far from where it might be needed. When data is required, a user now has to choose among the different replicas. Hence, the need for best replica selection to reduce time, effort and resources needed to bring that data to where it is required. Best replica selection tries to estimate the cost involved in copying the data from the alternative replica sites. Most replica cost estimation models use only a few parameters to make the calculations, hence limiting their usage for specific purposes. In this work, we include multiple parameters, taking into account the cha

Keywords: replica selection, cost estimation model, data replication, data grids

Pages: 50 - 54 | DOI: 10.15224/978-1-63248-051-4-26

11. PERFORMANCE ANALYSIS OF HYBRID OPTICAL AMPLIFIERS IN 120 X 10 GBPS WDM OPTICAL NETWORK WITH CHANNEL SPACING OF 50 GHZ

Authors: HARDEEP SINGH , SUKHWINDER SINGH

Abstract: We investigated the performance of RAMAN--EDFA, RAMAN-SOA, EDFA-SOA hybrid Amplifiers in 120 channel WDM systems with each channel having data rate 10 Gbps at reduced channel spacing of 50 GHz. The performance has been compared on the basis of different fiber length at dispersion equal to 2 ps/nm/km in terms of Q- factor, BER and Eye opening. The results showed that RAMAN – EDFA provides the highest Q-factor, lowest BER and maximum eye opening up to distance of 100 km as compared to RAMAN-SOA and EDFA-SOA hybrid amplifiers. RAMAN – EDFA is the best alternative to RAMAN-SOA and EDFA-SOA in high capacity WDM system with reduced channel spacing.

Keywords: Optical Amplifier, EDFA, SOA, RAMAN, WDM

Pages: 55 - 58 | DOI: 10.15224/978-1-63248-051-4-27

12. AROUND: AN INTERACTIVE AND CONTEXT-AWARE MOBILE EXHIBITION GUIDANCE SYSTEM

Authors: CHENG LING TAI , CHIN-YANG LIN , YI-BIN LIN , YI-JEN YEH

Abstract: With the increasing demand for exhibition/museum guidance services, more and more information technologies and devices have been applied in building intelligent exhibition guidance systems to enrich the understanding and enjoyment of exhibition. In view of this, this study aims to propose and develop such a mobile exhibition guidance system. The proposed system, named AROUND, is designed with the focus on exploiting the context-awareness of mobile devices to achieve high-quality interaction for exhibition visitors and organizers. To this end, we propose a trigger-and-response interaction methodology. The trigger refers to the data obtained from mobile sensors/interfaces, such as camera, NFC reader, recorder and GPS sensor; the response (to visitors) relies on a validation process performed by the AROUND back-end. Under this context, an organizer can easily orchestrate interactive and creative activities for visitors to encourage exhibition participation. On the other hand, we design a

Keywords: Exhibition guidance, interaction technology, sensor integration, context-awareness, mobile computing

Pages: 59 - 63 | DOI: 10.15224/978-1-63248-051-4-28

13. A NEW ADAPTIVE THROUGHPUT POLICING AND SHAPING ALGORITHM ON CAMPUS IP-BASED NETWORK

Authors: MAHAMOD ISMAIL , MAT IKRAM YUSOF , MURIZAH KASSIM

Abstract: This paper presents the development of a new scheme called Adaptive Throughput Policing and Shaping (ATPS) algorithm to control internet inbound throughput and burst flow in a Campus IP-based network. Real live throughput collected from a Campus Network with Committed Access Rate (CAR) of 16 Mbps bandwidth speed are simulated and analyzed. New mathematical model with identified parameters on ATPS is derived. Adaptive throughput policies with burst shaping are simulated using Token Bucket theory control mechanism with 16 Mbps threshold policy. Three main adaptive policy conditions called P1, P2 and P3 which is controlled on 110%, 100% and 50% threshold rate are defined as filtered condition. Burst throughputs are shaped into next free bucket capacity for the next flow time. The throughputs are continuously shaped if the next bucket is full until free buckets are available. This new ATPS algorithm is numerically evaluated and analyzed on traffic performance which controlled the bandwidth

Keywords: Throughput, Internet Traffic, Quality of Service (QoS), Policing, Shaping, Bandwidth, Burst, IP-based Network

Pages: 64 - 68 | DOI: 10.15224/978-1-63248-051-4-29

14. COLLECTION OF WEB MULTIMEDIA TEACHING RESOURCES USING ONTOLOGY

Authors: MOHAMED ALHAWITI , YASSER ABDELHAMID

Abstract: The World Wide Web has a huge amount of e-learning resources in the various branches of science, and it is available in the form of textbooks, presentations, video tutorials, pictures and audio lectures. No doubt that these resources would help students understand academic courses easily, especially those courses that need training and practical activities, like the computer science courses. It also helps the instructor to clarify his ideas in an interesting and innovative way. Searching for the available and suitable resources in the World Wide Web is perhaps one of the most difficult and time consuming tasks, as it requires the exact specification of keywords that characterize each topic in the course syllabus. Collecting such material manually from scratch for each course in a specific domain of knowledge is considered expensive and time consuming effort. Ontology is the explicit formal specifications of the terms and relations among them in a specific domain. It defines a common vo

Keywords: Automatic Retrieval of Educational Multimedia Resources, Information Retrieval, Knowledge Sharing and Reuse, Ontology-Based Annotation.

Pages: 69 - 74 | DOI: 10.15224/978-1-63248-051-4-30

15. PROBABILISTIC SYNTHESIS OF KDP SATISFYING MUTUALLY COMPLEMENTARY CORRECTNESS CONDITIONS

Authors: ALEXANDER B. FROLOV , ALEXANDER V. ZATEY

Abstract: On the basis of probabilistic estimates and computer experiments with application of probabilistic algorithms of synthesis of key distribution patterns in a computer network, it is shown that a combination of two well-known correctness conditions KDP, Key Distribution Pattern and HARPS, Hashed Random Preloaded Subset Key Distribution may increase the information rate of the combined scheme HAKDP, Hashed Key DistributionPattern compared with data rate of schemes based on separate conditions.

Keywords: computer network, system key, key distribution patterns, probabilistic synthesis, probabilistic algorithm, probabilistic estimate, key distribution scheme, cryptographic hash function, correctness condition, information rate

Pages: 75 - 79 | DOI: 10.15224/978-1-63248-051-4-31

16. A NEW ERP MODEL THAT WOULD MEET THE REQUIREMENTS OF SMALL BUSINESSES IN MACEDONIA

Authors: FLORIJE ISMAILI , HAZBI ZIBERI , XHEMAL ZENUNI

Abstract: the growth of business is fast and the impact on the economy is becoming bigger. As a key component of business strategies in order to increase productivity, to raise performance expectations and to maintain competitiveness, companies operating in industries are focused on developing more sophisticated computerized tracking systems. The main objective of this paper will be to analyze the existing Enterprise Resource Planning System in Republic of Macedonia and investigating the possibilities of integrating them into more advanced computing infrastructure. Another important issue is that the research will be focused on proposing and implementing a new service based Enterprise Resource Planning System model.

Keywords: ERP Solutions, Cloud Computing, Service Oriented Architecture

Pages: 80 - 83 | DOI: 10.15224/978-1-63248-051-4-32

17. INFORMATION TECHNOLOGY IN THE AREA OF INSOLVENCY PROCEEDINGS AN EXAMPLE FROM THE ENVIRONMENT OF THE CZECH REPUBLIC

Authors: LUBOS SMRCKA

Abstract: This work describes endeavours to implement modern information technologies into the system of insolvency proceedings in the Czech Republic. It concerns the problem of cooperation of scientific workplaces with state institutions in the field of refining legislation and improvement of collection of statistical data. It also outlines the possibilities of usage of mathematical methods, especially regression analyses, for planar analysis of large sets data with the aim, among others, of defining such cases of insolvency proceedings whose results or course could indicate contravention of laws, or indicate the rise of situations which would be apposite to examine from the sides of auditing bodies.

Keywords: information system, insolvency proceedings, insolvency court, regression analyses, statistics,

Pages: 84 - 88 | DOI: 10.15224/978-1-63248-051-4-33

18. AN AGENT-ORIENTED WEBSITE SUCURITY SYSTEM

Authors: YANLONG ZHANG

Abstract: This paper demonstrates a multi-agent solution to website security management. The results of preliminary use of the software tool are inspiring. The model described provides a generic architecture. With addition of mobile agents and neural network knowledge base model, the model can be extended and performs more effectively and efficiently in website security and forensic analysis.

Keywords: network security, forensic analysis, intrusion detection, intrusion prevention, agent-oriented system, multiagent system

Pages: 102 - 104 | DOI: 10.15224/978-1-63248-051-4-36

19. EXPLOITING ENTERPRISE ORGANOGRAMS TO FACILITATE GOAL/REQUIREMENTS ELICITATION

Authors: CYRILLE DONGMO , JOHN ANDREW VAN DER POLL

Abstract: Amongst other advantages, Goal-Oriented Requirements Engineering (GORE) methods facilitate the process of requirements elicitation and analysis, yet little is known about, e.g. the underlying paradigm relating goals to the structure and processes of the organisation. In this paper we postulate that since goals are inherently part of any organisation, and an information system aims to achieve specific organisational objectives, these ought to address a subset of goals that embody the main objectives of the organization or those that may be derived from them. The systemic paradigm has contributed much to enterprise architecting and modeling, both being vital inputs to goals and requirements elicitation. An enterprise architecture is, however, not readily available since its construction may be a costly exercise. In contrast, an enterprise organogram, which depicts a holistic view of the enterprise, may be easier to build. This paper proposes guidelines to exploit organograms to facilitat

Keywords: Enterprise model, Organogram, Goal elicitation, Requirements Engineering, Directed graph.

Pages: 115 - 124 | DOI: 10.15224/978-1-63248-051-4-38

20. TUNNEL PROPAGATION MODELING FOR COMMUNICATION TECHNOLOGY USING PRINCIPLES OF RADAR THEORY APPROACH FOR CALCULATION OF RECEIVED POWER IN ANY INTERNAL POINT OF A TUNNEL

Authors: ANDREA PIRODDI

Abstract: Wireless communication is in its nature volatile due to rapidly varying propagation conditions between the transmitters and receivers. The propagation conditions inside the tunnels are different from what is experienced in areas outside the tunnels. This paper presents a new method to calculate received power in a defined point inside the tunnel.

Keywords: communication, volatile, propagation, receivers

Pages: 125 - 126 | DOI: 10.15224/978-1-63248-051-4-39

21. A DIFFERENT SHAPE A DIFFERENT SHAPE GRAMMAR APPROACH FOR AUTOMATIC DESIGN GENERATIONAPPROACH FOR AUTOMATIC DESIGN GENERATION

Authors: FILIPE SANTOS , JOAQUIM ESMERADO

Abstract: This paper proposes a different approach for shape grammars where designs are exclusively generated through computations of symbols. This option has the advantage of supporting declarative knowledge and thus facilitates shape reasoning capabilities. Our approach also detached procedural knowledge from shape knowledge using procedural notions that capture sequences, alternatives and tests that should be applied during design process. This decision provides good modular specifications. Moreover, we follow a non-deterministic procedural perspective in the characterization of design processes. Its implementation supports exploratory automatic design generation. Differences between this approach and the conventional approach are discussed and a case study is explored.

Keywords: shape grammars, automatic design generation.

Pages: 127 - 134 | DOI: 10.15224/978-1-63248-051-4-40

22. PERFORMANCE ANALYSIS OF MOBILE RADIO FOR AUTOMATIC CONTROL IN SMART GRIDS

Authors: KLAUS VOLBERT , MARKUS KUCERA , PATRICK ROBATZEK , PETER SCHLEGL , THOMAS WAAS

Abstract: In the context of a “Smart Grid” research project, together with industrial partners, the OTH-Regensburg realized an intelligent medium-voltage grid in the local area. Goal was to improve the current voltage regulation and to counter the problems with inconsistent energy feed-in of decentralized renewable energy producers. In this paper we discuss the possibilities of using 3rd generation (3G) cellular networks (UMTS) as basic technology to communicate the voltage-levels within a medium-voltage grid. We build an experimental hardware setup to generate data-traffic as specified for the smart grid. By analyzing the performance of 3G cellular networks in terms of transmission latency and rate of failure, we tried to evaluate the usability of this technology for such critical data exchange. Though mobile communication in its structure is not specified for the use of transmitting such infrastructure critical data, the results show a promising high reliability with low transmission latency.

Keywords: mobile radio, cellular data transmission, 3G, 4G, Smart Grid, communication (key words)

Pages: 135 - 141 | DOI: 10.15224/978-1-63248-051-4-89

23. CAPACITY EXPANSION METHODS FOR LIVE GSM NETWORK- AN OVERVIEW

Authors: ARJUN SRIDHAR , K. R. SUDINDRA , V. SRIDHAR

Abstract: he increase of subscriber base and attractive marketing strategies has resulted in high traffic channel congestion and demands proportional capacity expansions. Techniques such as carrier addition, cell splitting, aggressive frequency reuse pattern, micro cells for hot spots, realizing dual band networks and halfrate are available to support increase in traffic of live GSM network. A comparative study of suitability of these methods for different traffic requirement is discussed.

Keywords: congestion, frequency planning, Traffic

Pages: 142 - 146 | DOI: 10.15224/978-1-63248-051-4-90

24. FRIENDS RECOMMEND IN MICRO-BLOG SOCIAL NETWORKS

Authors: RUIFANG LIU , RUISHENG SHI , SHAN FENG

Abstract: The users of social network sites are always constructing a large network, recommending friends to registered users is a crucial task for these sites. Traditional content- based or collaborative filtering recommend technologies are limited for the task, because the users and items are the same dataset, which have rich attributes and complex social graph. In the paper, we proposed a local random walk and random forests combined method to do friends recommendation for large social networks. The experimental results show that the method has high precision and high recall at the same time.

Keywords: Local Random Walk, Random Forests, Social Network Site, Friends Recommendation

Pages: 147 - 150 | DOI: 10.15224/978-1-63248-051-4-91

25. TRUTHFUL COMBINATORIAL DOUBLE AUCTION FOR COMBINATORIAL EXCHANGES

Authors: RAM TEJA NANDULA , SAJAL MUKHOPADHYAY , VARUN KUMAR

Abstract: First-come-first-serve (FCFS) scheme is used for selling the goods in market that is a multi-million dollar industry for any popular event. But in a competitive environment is this FCFS efficient? In earlier literature it has been shown that the auction based alternative solutions using the framework of mechanism design, a sub field of game theory [18] can provide better results against FCFS in terms of profit making and efficiency in allocation. However the solution proposed in the earlier literature can address the selling environment where an agent can give demand for a single good that is they have single/Multi unit demand. However there might be a situation where a seller wishes to sell in the combination of goods and buyer wishes to buy in some combinations. It is highly difficult to solve a combinatorial double auction where sellers and buyers bids simultaneously. In this paper we proposed two algorithms of which one is truthful produces a solution which is very near to optimal

Keywords: Double Auction, Combinatorial Exchanges, Mechanism Design

Pages: 151 - 155 | DOI: 10.15224/978-1-63248-051-4-92

26. TM3+/ER3+ CODOPED GERMANIUM GLASSES FOR PHOTONIC APPLICATIONS

Authors: BAO-JIE CHEN , EDWIN YUE-BUN PUN

Abstract: Tm3+/Er3+ codoped sodium magnesium aluminum germanium (NMAG) glasses were prepared and characterized. Broadband near-infrared (NIR) emission in the wavelength range from 1.4 μm to 1.6 μm was observed. The absorption and fluorescence spectra of these glasses were measured and studied. Optical glass waveguides were fabricated using thermal K+–Na+ ion-exchange process, indicating that NMAG glasses are promising materials for broadband waveguide amplifiers, light sources, and tunable lasers.

Keywords: Broadband emission, Rare earth ions, Ion exchange, optical amplifier

Pages: 156 - 158 | DOI: 10.15224/978-1-63248-051-4-93

27. STUDYING THE OPTIMAL HEIGHT OF THE EFSM EQUIVALENT FOR TESTING TELECOMMUNICATION PROTOCOLS

Authors: MARIA FOROSTYANOVA , NATALIA KUSHIK , NINA YEVTUSHENKO , SVETLANA PROKOPENKO

Abstract: The paper presents experimental results on the optimal height of the EFSM equivalent for deriving high quality tests for telecommunication protocols. The EFSM model is a widely used finite state model, and its l-equivalent is an FSM which behavior is equivalent to the initial EFSM for each input sequence of the length l or less. The l-equivalent is known to be more suitable for test derivation than the initial EFSM and thus, it is often used as the specification EFSM for this purpose. In this paper, test derivation the l-equivalent has been derived for the following protocols: POP 3, SMTP, TIME, DCCP, TCP. EFSM models have been extracted from the corresponding RFC specifications, and mutation testing techniques have been utilized in order to estimate the fault coverage of the test suites which correspond to a transition tour of a corresponding l-equivalent. Experimental results clearly show that even when the height l of the l-equivalent is low, and moreover, equals two, many functiona

Keywords: EFSM, l-equivalent, testing, telecommunication protocols.

Pages: 159 - 163 | DOI: 10.15224/978-1-63248-051-4-94

28. A PROCESS OF VALUE ASSESSMENT FOR BUILDING COMPONENTS OF HANOK RESIDENCE

Authors: JONGIL PARK , KYOUNG-HEE KIM , SEULKI KIM , SEUNG-HOON HAN

Abstract: This study focuses on a process of Value Engineering (VE) for Hanok, Korean traditional residence, and its major building components. The purpose of this study is to support designer or builders with objective clues for decision-making by VE, especially when a preliminary design needs changes and feedbacks for the next steps toward design development and/or construction processes. For this research, Hanok elements were reviewed first in overall, and six major components have been selected for performing VE analyses: wall, roof structure, Giwa that is Korean traditional roof tiles, openings, Ondol that is Korean traditional floor-heating system and fence system. The wall system among those was used for a target to be examined in this paper, because this element affects the value of Hanok mostly in aspects of function and cost. For this research, popular applications using Information and Communication Technologies (ICT) such as Green Building Studio (GBS) have been utilized for simulati

Keywords: Korean Traditional Residence; Value Engineering; Management; Simulation; Sustainability

Pages: 164 - 168 | DOI: 10.15224/978-1-63248-051-4-95

29. SHAPE GRAMMAR MODEL GENERATING SECURE VISUAL PASSWORDS THE MOVE TOWARDS COMPLETELY GRAMMAR BASED IMAGES

Authors: IAN SANDERS , MOKGADI RASEKGALA , SIGRID EWERT , THOMAS FOGWILL

Abstract: Computer security is largely supported by passwords forming the principal part of the authentication process. Visual passwords have been proposed as a more secure alternative to alphanumeric passwords but have not as of yet been readily adapted due to the problems associated with current implementations of visual passwords. One of the main issues in the implementation of visual password schemes is the type of password images used. To address the issue of designing and using secure password images, we present a model of a shape grammar supported visual password scheme generating password images that adhere to a specific syntax or set of rules. We present a design of a grammar model which is well adaptable for implementations of visual password scheme images and images with a rule based structure.

Keywords: grammars, shape grammars, visual password authentication, theoretical computer science

Pages: 208 - 214 | DOI: 10.15224/978-1-63248-051-4-139

30. MENU-BASED SERVICE ACCESS AND DELIVERY PATTERN TOWARDS ACHIEVING EQUITABLE ACCESS TO DIGITAL SERVICES

Authors: ISHMAEL MAKITLA

Abstract: The proliferation of mobile phones in developing countries such as South Africa has been revolutionary. This might have sufficed to address the issues of digital divide but not the digital difference. The latter means that not all these mobile phones have equal technological capabilities and this in turn has impact on the nature of the functionality that the mobile phone affords to its user. The basic capability of a mobile phone is the ability to process and display textual information. This capability is used in basic service such as Short Message Service (SMS) as well as Unstructured Supplementary Service Data (USSD). There is a need for a service access and delivery pattern that can facilitate the delivery of services using common-lowest denominator in terms of technological capabilities of mobile phones. This paper describes the conceptualization and reference implementation of a menu-based service access and delivery pattern. The reference implementation has demonstrated that thr

Keywords: mobile phone, menu, USSD, service delivery,pattern

Pages: 197 - 201 | DOI: 10.15224/978-1-63248-051-4-137

31. MODELLING OF CYBER PHYSICAL SYSTEMS USING AADL AND EVENT-B

Authors: MANORANJAN SATPATHY

Abstract: Given the architecture of a Cyber Physical System (CPS) in AADL (Architecture Analysis and Design Language), we aim to use a model based development approach for system construction. We use the Event-B formalism for modelling and analysis. The model decomposition mechanism in Event-B helps us in establishing a one to one correspondence between the AADL components and the Event-B sub-models. Using the example of an Adaptive Cruise Controller, we show how interesting architectural properties could be verified within the Event-B modelling framework.

Keywords: Model based development, Cyber physical systems, Architectural Properties

Pages: 192 - 196 | DOI: 10.15224/978-1-63248-051-4-133

32. A 4X4 MIMO-OFDM LOW COMPLEXITY RECEIVER USING NOVEL DETECTION ALGORITHMS FOR FUTURE GENERATION WIRELESS APPLICATIONS

Authors: ARPIT JAIN

Abstract: The Multiple Input Multiple Output Orthogonal Frequency Division Multiplexing Technology (MIMO-OFDM) may become an inevitable contender for being deployed in almost all types of future generation wireless communication systems for attaining high spectral efficiency at extremely high throughput. The technical constraint in realization of such systems is high computational complexity of the detector when designed for higher order MIMO with 64-QAM and 256 QAM. This paper presents design and development of a novel detection algorithm based on Adaptive Sphere decoding technique to realize a low complexity 4x4 MIMO-OFDM receiver. The new algorithms are tested with LTE standards on MATLAB platforms, have shown significant reduction in computational complexities in terms of number of nodes traversed, Flops, Complex Multiplications, etc, and still performing at par with optimal detectors. The proposed detection algorithms may serve as one of the strong contenders to be deployed in future genera

Keywords: MIMO, OFDM, receiver, detection,

Pages: 187 - 191 | DOI: 10.15224/978-1-63248-051-4-128

33. CATALOGUING AND CLASSIFICATION: DYNAMIC AREAS FOR PROFESSIONAL (LIBRARIANS) NETWORKING IN DEVELOPING FRAMEWORK FOR A NATIONAL UNION CATALOGUE IN NIGERIA

Authors: AKANMIDU , OLUMIDE JOHNSON , EGBE , NSANTA GEORGE , UPEV , MICHAEL TERVER

Abstract: The word around us is full of physical variables that are constantly changing. If we can measure these variables and represent them as a digital quantity, then we can equally record, restore, retrieve, re-organize, manipulate and use them in some other ways in quantities imaginably through information dissemination and services. To tackle the battle imposed upon by the “Omnipotent” National Union Catalogue in Nigeria, the professional librarians have to equip themselves with the mentality of keeping abreast of current developments in the library networking technologies with determination and develop their own “Home-made Schemes” that would form a framework for a National Union Catalogue if not for Africa as a whole but for Nigeria as a Nation. This paper illustrates the importance of cataloguing and classification in organizing our libraries and attempts how the professional librarians can brainstorm together to develop a framework of a comprehensive list of a National Union Catalogue

Keywords: national union catalogue, networking, momemade scheme, Nigeria.

Pages: 174 - 180 | DOI: 10.15224/978-1-63248-051-4-126

34. USING PHASE DEMODULATOR FOR ENCODING IRIS FEATURES

Authors: ABDULLAH S ALOTAIBI , M.A. HEBAISHY

Abstract: Today’s digital world requires us to access and protect computer information and interact securely with computer systems. Traditional methods for personal authentication such as physical key, ID card, secret password, PIN, …., etc. These methods suffer from various problems. Biometric measurements which mean biological features such as fingerprints, voice, face, hand geometry,…,etc. have a convenient and reliable solution to these problems. Recently, iris authentication has received increasing attention due to its high reliability for high security applications. The phasor demodulator is simply a four quadrant plane that maps the resulting feature matrix, from applying the normalized image to Gabor filter, to binary code. This mapping depends on the sign of both the real and imaginary part of the feature matrix. In this paper we show how to get Iris code with different Sizes using phase demodulator.

Keywords: biometrics, normalized image, iris features, Gabor filter, phase demodulator, iris code.

Pages: 45 - 48 | DOI: 10.15224/978-1-63248-010-1-09

35. TOWARDS REQUIREMENTS REUSE: IDENTIFYING SIMILAR REQUIREMENTS WITH LATENT SEMANTIC ANALYSIS AND CLUSTERING ALGORITHMS

Authors: NOOR HASRINA BAKAR , ZARINAH M. KASIRUN

Abstract: Software requirements that exist in natural language can easily be understood by various stakeholders. However, when it comes to extracting common requirements from the natural language requirement documents for reuse, manual extraction process can be arduous, expensive, and very error-prone on the results. In this paper, we describe a process of identifying similar requirement documents for reuse in Software Product Lines. Online product reviews were extracted and used as the input mainly due to the scarcity of publicly available requirement documents. Latent Semantic Analysis technique from Information Retrieval was used to identify similar requirement documents and filter out the unrelated ones after the text has been pre-processed. Similar documents were then clustered together by using K-means and Hierarchical Agglomerative Clustering algorithm. As a result, the output from the clustering process will be used to recommend group of related requirement documents to be used in requir

Keywords: Software Engineering, Requirements Similarities, Requirements Reuse, Software Product Lines, Latent Semantic Analysis, Text Clustering

Pages: 19 - 24 | DOI: 10.15224/978-1-63248-051-4-20

36. A REVERSIBLE AND IMPERCEPTIBLE ACOUSTIC WATERMARKING USING PARTIALLY-APPLIED HUFFMAN LOSSLESS COMPRESSION

Authors: XUPING HUANG

Abstract: In this paper, a reversible and robust acoustic watermarking based on lossless compression is proposed. Stereo speech data is represented by 16 bit for each sampling point and then divided into frames. Then Huffman lossless compression algorithm is applied to insignificant 4 bits in each sampling point partiality to reserve hiding capacity. An average of 0.7035 and the best 0.686 compression ratio depending on different frame lengths are achieved, which promises about 1.188 bits for payload hiding in each sampling point. Since Huffman algorithm is applied partially to each sampling point, stego data is comprehensive after embedding and complexity towards attack is promising. Result of Perceptual Evaluation of Speech Quality based on ITU-T recommendation P.862 and signal-noise ratio (SNR) show the proposed method achieved imperceptibility.

Keywords: acoustic watermarking, lossless compression, reversibility, imperceptibility

Pages: 25 - 29 | DOI: 10.15224/978-1-63248-051-4-21

37. A MIGRATION DECISION FOR USERS AND SERVICES TOWARDS AND WITHIN THE IMS

Authors: SVEN PARAND

Abstract: Making the decision to migrate a user or service from a legacy network to a next generation network (NGN) requires thorough analysis. Despite the will and a clear necessity of telecom operators and service providers (SP) worldwide, many are still struggling with the migration process even after nearly five years and this can be attributed largely to the mentioned analysis aspect. New service delivery platforms (SDP) have necessitated the need to modernize or in some cases rebuild completely new operations support systems/business support systems (OSS/BSS). Mistakes have also been made in choosing an appropriate strategy for migration due to miscalculation in several key areas prior to migrating. Based on a task of moving users and services from legacy networks to IP multimedia subsystem (IMS) as well as inside the IMS, the current paper addresses the issue of making a solid migration decision, based on facts and proper analysis, concentrating mainly on the technical side of it. A high

Keywords: analysis, IMS, migration process, migration phases, NGN.

Pages: 30 - 35 | DOI: 10.15224/978-1-63248-051-4-22

38. CAPACITY EXPANSION METHODS FOR LIVE GSM NETWORK- AN OVERVIEW

Authors: K. R. SUDINDRA

Abstract: he increase of subscriber base and attractive marketing strategies has resulted in high traffic channel congestion and demands proportional capacity expansions. Techniques such as carrier addition, cell splitting, aggressive frequency reuse pattern, micro cells for hot spots, realizing dual band networks and halfrate are available to support increase in traffic of live GSM network. A comparative study of suitability of these methods for different traffic requirement is discussed.

Keywords: congestion, frequency planning, Traffic

Pages: 142 - 146 | DOI: 10.15224/978-1-63248-051-4-90

39. FRIENDS RECOMMEND IN MICRO-BLOG SOCIAL NETWORKS

Authors: SHAN FENG

Abstract: The users of social network sites are always constructing a large network, recommending friends to registered users is a crucial task for these sites. Traditional content- based or collaborative filtering recommend technologies are limited for the task, because the users and items are the same dataset, which have rich attributes and complex social graph. In the paper, we proposed a local random walk and random forests combined method to do friends recommendation for large social networks. The experimental results show that the method has high precision and high recall at the same time.

Keywords: Local Random Walk, Random Forests, Social Network Site, Friends Recommendation

Pages: 147 - 150 | DOI: 10.15224/978-1-63248-051-4-91

Popular Proceedings

ESSHBS 2017 - 2017

7th International Conference On Advances In Economics, Social Science and Human Behaviour Study

ICETM 2023 - 2023

9th International E-Conference on Engineering, Technology and Management

ASET 2017 - 2017

7th International Conference on Advances in Applied Science and Environmental Technology

ACSM 2017 - 2017

7th International Conference on Advances in Civil, Structural and Mechanical Engineering

CSM 2017 - 2017

5th International Conference on Advances in Civil, Structural and Mechanical Engineering

SEM 2017 - 2017

5th International Conference on Advances in Social, Economics and Management

ICETM 2022 - 2022

8th International E- conference on Engineering, Technology and Management

SEM 2019 - 2019

9th International Conference on Advances in Social Science, Economics and Management Study