The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
ICCNIT 2011 is the first effort by the Department of Computer Science, University of Peshawar, to provide a platform for discussion from different but related fields of computer science. ICCNIT has attracted researchers from diverse communities such as Computer Networks, Wireless Networks, Computer Engineering, Image Processing, Multimedia Contents, Databases, Natural Language Processing, Semantic...
Over the years, information theoretic properties of the class of Rényi Generalized Entropies have been mainly reported in the continuous time domain. This paper makes a contribution towards an investigation of the properties of Renyi Generalized Entropies into the discrete time domain. Consequently, the applicability of Rényi Generalized Entropies, as probability methods of inference, may be extended...
The increased availability of communication resource through simultaneous use of multiple network interfaces of mobile and fixed devices has enabled higher bandwidth for streaming applications. The out-of-sequence arrival on such multipath transport configurations remains the major challenge to be overcome before the available potential is maximized. In this paper, we propose Modified Fast Retransmit...
People capture the memorable events of their lives in a digital form in order to share them in their social network. A memory for Life system can organize them in a meaningful way for future use. The main challenges needed to overcome the sharing of digital memories are: defining a suitable network topology, searching amongst appropriate peers for the correct data, data privacy, and the sharer's control...
There is always demand for high performance single chip microprocessor. In this regard microprocessor's manufacturers have worked hard and have gone through different techniques like increasing its clock speed, cache size, cores and hyper threading. But for past few years the designer have realized that all these techniques are insignificant until microprocessor have fast interconnect, which can provide...
In this paper, we propose an extension to the current architecture of OpenSimulator (OpenSim) [1]; a well known open source framework for the development of virtual worlds. The basic purpose of this extension is to make it scalable by introducing dynamic and fair distribution of load based on physical partitioning of a virtual space. Whenever, a server exceeds its maximum capacity, a new server is...
Online social networks have witnessed massive increase from the point of view of users during last decade. However, it is also becoming center of attraction for spammers. It is a complex problem to trace spammers on a large scale. Since spammers communicate covertly so by analyzing simple graph of social network, they cannot be identified. In order to find the circle of people involved in the malicious...
Immune escape is a critical gateway to malignancy; it is recently discovered that Indoleamine 2, 3 Dioxygenase (IDO) is involved in suppressing T-cell immunity in pathological settings including cancer. The modeling of the biological regulatory networks (BRNs) using kinetic logics of René Thomas, a well-known and powerful approach for modeling formalism, helps in understanding their dynamical behaviors...
The logical formalism of René Thomas is a powerful approach for the discrete (qualitative) modeling and analysis of the Biological Regulatory Networks (BRNs). In this paper, we qualitatively model the NF-kB associated biological regulatory network in the case of HIV-1 infection. High levels of HIV-1 genes expression can be due to the increased levels of intracellular NF-kB and could thus offer a favorable...
With the dawn of this century emerged new and innovative ways for creating software applications on the web. One of them is “web mashup”, which allows users to create new web applications by integrating data and services from other various web applications and data sources. Several technologies like Ajax, RSS, ATOM, REST, and XML etc have emerged which are used in creating mashups. The numerous online...
Data in semantic web is modelled in terms of directed labelled graph. Vertices of that graph represent entities and edges represent relationships between those entities. Semantic web allows the discovery of relations between entities using the ρ-operators. In this paper an algorithm to answer ρ-operators, that is, to find all paths between any two nodes from a graph is proposed. The algorithm is based...
In this paper, we study the performance of multiband Direct Sequence Ultra Wideband (DS-UWB) system in multiuser environment for IEEE 802.15.3a channel. The receiver employs hybrid Parallel Interference Cancellation (PIC) technique with Selective Rake (S Rake) and Partial Rake (P Rake) receivers. The system performance is also evaluated for multistage PIC. The system is simulated for three different...
VANET, a Vehicular Ad hoc Network which is formed among the vehicles or mobile nodes. In a self-organizing manner these mobile nodes communicate with each other. Multi-hop routes usually establish by them for communication. In order to communicate vehicles may be equipped with GPS, Wi-Fi, RFID, wireless transceivers and computerized modules. A Modern Routing Protocol for VANETs (MODNET) is proposed...
The capabilities of Wireless Sensor Network (WSN) are unveiling with each passing day. Extensive use of WSNs is giving rise to different types of threats. To defend against the threats proper security schemes are required. Limited area, power and memory of WSNs implement strict constraints on the selection of cryptographic techniques. Elliptic Curve Cryptography (ECC) is the best candidate due to...
This work aims to present an optimized scheme for entropy encoding part of JPEG image compression by modifying the run length encoding method. In JPEG (Joint Photographic Experts Group) image compression algorithm run length coding performs the actual compression by removing the redundancy from transformed and quantized image data. Using the fact that the preceding processes of run length coding,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.