(0 Item)

Information Theory and Applications (ITA 2011)

Academic Conferences - Information Theory and Applications (ITA 2011)
Academic Conferences

By : Global Science & Technology Forum

Date : 2011

Location : Singapore / Singapore

PDF 34p
Description :

This conference provides presented recent advances, research and new techniques in information theory and its applications.

Keywords :

Capacity computation, Causal side information, Discrete multiple access channel, Lossy Compresssion, Kolmogorov Complexity, audit process model, Multiple access relay channel, Orthogonal components, Superposition block markov encoding, genetic algorithm, information theory research, information theory proceedings, information theory conferences.

Keywords inside documents :

channel ,model ,compression ,audit ,capacity ,process ,lossy ,image ,relay ,distance ,features ,access ,multiple ,security ,compressor ,receiver ,educational ,algorithm ,figure ,institutions

ITA 2011 aims to provide an international forum for researchers to present and discuss recent advances and new techniques in information theory and its applications. Original, previously unpublished papers and research contributions are invited. Late-breaking results and early stage research are heartily encouraged.

 

Proceedings from the Information Theory and Applications (ITA 2011) conference.

Abstracts from papers available from The Information Theory and Applications (ITA 2011) conference.

 

1. Computation of the Capacity for Discrete Memoryless Channels and Sum Capacity of Multiple Access Channels with Causal Side Information at Receiver

Mohammad Osmani Bojd, Department of Electrical Engineering, Ferdowsi University of Mashhad, Mashhad, Iran

Assadallah Sahebalam, Department of Electrical Engineering, Ferdowsi University of Mashhad, Mashhad, Iran

Ghosheh Abed Hodtani, Department of Electrical Engineering, Ferdowsi University of Mashhad, Mashhad, Iran


Capacity analysis and computation for communication channels with side information at the receiver is an important area of research. Cover-Chiang have proved the increment of capacity with non-causal information at the receiver. We investigate this capacity increment for the channel with causal side information and proposed an efficient algorithm for computing the capacity of discrete memory less channels and the sum capacity of multiple access channels with causal side information at the receiver.

 

2. Similarity Measure using Lossy Compression and its Application to Image Retrieval

Kosuke Bannai, GSIS, Tohoku University

Kazuyuki Narisawa, GSIS, Tohoku University

Ayumi Shinohara, GSIS, Tohoku University

 

We investigate the usefulness of lossy compression-based distance for a similarity measure. If two objects are similar, the joint compressed size of them is much smaller than the sum of the two individual compressed objects. It is well known that the normalized compression distance (NCD) can be used for the similarity measure with lossless compressors [8]. It is based on the Kolmogorov complexity. In this paper, we propose a normalized lossy compression distance (NLCD) for lossy compressors. Moreover, we show the performance of NLCD for image data with the fractal image compression as lossy compressor.

 

3. Formulation of an Information Security Audit Process Model Applicable to Educational Institutions

Maureen Olive M. Billones, Computer Science Department, Ateneo de Zamboanga University, ADZU, Zamboanga City, Philippines

Sherwin E. Ona, College of Computer Studies, De La Salle – Manila, DLSU, Manila, Philippines

 

Educational institutions have not been exempted from occurrences of security breaches in its information systems (IS). Data from Educational Security Incidents (ESI) showed that educational institutions post the second highest in the number of security breaches from 2006 to 2008. And these incidents did not stop on coming. Therefore, it is essential that educational institutions pay much attention in securing its ISs by implementing controls through IS audit. However, guidelines on IS auditing were most applicable only to industries especially financial institutions. There’s a lot difference between the setup in industries and educational institutions that makes it hard to implement security programs. And so this study, presents an information security audit process model that is applicable to educational institutions considering the vulnerabilities in its norms and characteristics.

 

4. UWB Channel Model for Extremely Short Distance Communications Using in 3-D Integration

Nhan Nguyen, Faculty of Physics and Engineering Physics, University of Science, Vietnam National University, HochiMinh City, Vietnam

Nghia Duong, Faculty of Electrical and Electronics Engineering, University of Technology, Vietnam National University,HochiMinh City, Vietnam

Anh Dinh, Department of Electrical and, Computer Engineering, College of Engineering, University of Saskatchewan, Saskatoon, Canada

 

Accurately modeling the channel is extremely important for the design of communication systems. Knowledge of the key features of the channel provides the designers with the ability to predict performance of the system for specific modulation, channel coding, and signal processing. In this paper, we will present the analysis of the physical properties of an UWB channel model and propose  model for extremely short distance wireless communications (with a comparison to the IEEE 802.15.3a channel model). The UWB channel model is the result of signal reflection, diffraction, multipath, and attenuation due to distance and carrier frequency. The channel model is suitable for use in the design of UWB communications for in-chip 3-D integration.

 

5. Multiple Access Relay Channel with Orthogonal Components

Assadallah Sahebalam, Department of Electrical Engineering, Ferdowsi University of Mashhad, Mashhad, Iran

Mohammad Osmani Bojd, Department of Electrical Engineering, Ferdowsi University of Mashhad, Mashhad, Iran

Ghosheh Abed Hodtani, Department of Electrical Engineering, Ferdowsi University of Mashhad, Mashhad, Iran

 

In this paper, we derive an achievable rate region and an outer bound for sum capacity rate for multiple access relay channel with orthogonal components. Superposition block Markov encoding and multiple access encoding and decoding strategies are used to prove the results.

 

6. MALURLs: Malicious URLs Classification System

Monther Aldwairi, Department of Network Engineering and Security, Jordan University of Science and Technology, Irbid, Jordan

Rami Alsalman, Department of Network Engineering and Security, Jordan University of Science and Technology, Irbid, Jordan

 

Surfing the World Wide Web is becoming a dangerous everyday task with the WWW becoming rich in all sorts of attacks. Websites are a major source of many scams, phishing attacks, identity theft, SPAM commerce and malwares. We propose a system to detect malicious websites based on URL and host features and call it MALURLs. The system uses Naïve Bayes classifier as a probabilistic model to detect if the target website is a malicious or benign. It introduces new features and employs self learning using Genetic Algorithm to improve the classification precision. A small dataset is collected and expanded through GA mutations to learn the system over short time and achieve an average precision of 89%.


7. Data Compression and Source Coding

R. Hema, Department of Information Technology, Dronacharya College of Engineering, Khentawas, Gurgaon, Haryana 123506. India

 

This paper surveys a variety of data compression methods. The aim of data compression is to reduce redundancy in stored or communicated data, thus increasing effective data density. Data compression has important application in the areas of file storage and distributed systems.Concepts of lossless and lossy data compression methods are discussed briefly. A framework for evaluation and comparison of methods is constructed and applied to the algorithms presented. Comparisons of both lossless and lossy methods are reported. Finally one case study is also discussed.

Computation of the Capacity for Discrete Memoryless Channels and Sum Capacity of Multiple Access

Company Description : Capacity analysis and computation for communication channels with side information at the receiver is an important area of research. Cover-Chiang have proved the increment of capacity with non-causal information at the receiver. We investigate this capacity increment for the channel with causal side information and proposed an efficient algorithm for computing the capacity of discrete memory less channels and the sum capacity of multiple access channels with causal side information at the receiver.

Product Type : Academic Conferences

Author : Various

PDF 5p

Languages : English

Similarity Measure using Lossy Compression and its Application to Image Retrieval

Company Description : We investigate the usefulness of lossy compression-based distance for a similarity measure. If two objects are similar, the joint compressed size of them is much smaller than the sum of the two individual compressed objects. It is well known that the normalized compression distance (NCD) can be used for the similarity measure with lossless compressors [8]. It is based on the Kolmogorov complexity. In this paper, we propose a normalized lossy compression distance (NLCD) for lossy compressors. Moreover, we show the performance of NLCD for image data with the fractal image compression as lossy compressor.

Product Type : Academic Conferences

Author : Various

PDF 6p

Languages : English

Formulation of an Information Security Audit Process Model Applicable to Educational Institution

Company Description : Educational institutions have not been exempted from occurrences of security breaches in its information systems (IS). Data from Educational Security Incidents (ESI) showed that educational institutions post the second highest in the number of security breaches from 2006 to 2008. And these incidents did not stop on coming. Therefore, it is essential that educational institutions pay much attention in securing its ISs by implementing controls through IS audit. However, guidelines on IS auditing were most applicable only to industries especially financial institutions. There’s a lot difference between the setup in industries and educational institutions that makes it hard to implement security programs. And so this study, presents an information security audit process model that is applicable to educational institutions considering the vulnerabilities in its norms and characteristics.

Product Type : Academic Conferences

Author : Various

PDF 6p

Languages : English

UWB Channel Model for Extremely Short Distance Communications Using in 3-D Integration

Company Description : Accurately modeling the channel is extremely important for the design of communication systems. Knowledge of the key features of the channel provides the designers with the ability to predict performance of the system for specific modulation, channel coding, and signal processing. In this paper, we will present the analysis of the physical properties of an UWB channel model and propose model for extremely short distance wireless communications (with a comparison to the IEEE 802.15.3a channel model). The UWB channel model is the result of signal reflection, diffraction, multipath, and attenuation due to distance and carrier frequency. The channel model is suitable for use in the design of UWB communications for in-chip 3-D integration.

Product Type : Academic Conferences

Author : Various

PDF 4p

Languages : English

Multiple Access Relay Channel with Orthogonal Components

Company Description : In this paper, we derive an achievable rate region and an outer bound for sum capacity rate for multiple access relay channel with orthogonal components. Superposition block Markov encoding and multiple access encoding and decoding strategies are used to prove the results.

Product Type : Academic Conferences

Author : Various

PDF 4p

Languages : English

MALURLs: Malicious URLs Classification System

Company Description : Surfing the World Wide Web is becoming a dangerous everyday task with the WWW becoming rich in all sorts of attacks. Websites are a major source of many scams, phishing attacks, identity theft, SPAM commerce and malwares. We propose a system to detect malicious websites based on URL and host features and call it MALURLs. The system uses Naïve Bayes classifier as a probabilistic model to detect if the target website is a malicious or benign. It introduces new features and employs self learning using Genetic Algorithm to improve the classification precision. A small dataset is collected and expanded through GA mutations to learn the system over short time and achieve an average precision of 89%.

Product Type : Academic Conferences

Author : Various

PDF 3p

Languages : English

Data Compression and Source Coding

Company Description : This paper surveys a variety of data compression methods. The aim of data compression is to reduce redundancy in stored or communicated data, thus increasing effective data density. Data compression has important application in the areas of file storage and distributed systems.Concepts of lossless and lossy data compression methods are discussed briefly. A framework for evaluation and comparison of methods is constructed and applied to the algorithms presented. Comparisons of both lossless and lossy methods are reported. Finally one case study is also discussed.

Product Type : Academic Conferences

Author : Various

PDF 6p

Languages : English

Organizer : Global Science & Technology Forum

GSTF provides a global intellectual platform for top notch academics and industry professionals to actively interact and share their groundbreaking research achievements. GSTF is dedicated to promoting research and development and offers an inter-disciplinary intellectual platform for leading scientists, researchers, academics and industry professionals across Asia Pacific to actively consult, network and collaborate with their counterparts across the globe.