Jehad M. Hamamreh, Haji. M. Furqan, Zain Ali, G. Sidhu
{"title":"Enhancing the Security Performance of OSTBC Using Pre-Equalicodization","authors":"Jehad M. Hamamreh, Haji. M. Furqan, Zain Ali, G. Sidhu","doi":"10.1109/FIT.2017.00059","DOIUrl":"https://doi.org/10.1109/FIT.2017.00059","url":null,"abstract":"In this study, we first quantify the secrecy performance achieved by employing precoded orthogonal space time block coding (POSTBC) in order to use it as a benchmark for comparison purposes with a new proposed security scheme. In POSTBC, space time codewords are precoded before being transmitted with an optimum pre-coding matrix based on the main channel of the legitimate parties. The obtained results demonstrate a considerable secrecy gap region in the resulting bit error rate (BER) performance due to using POSTBC. Afterwards, a new method called pre-equlicodization (precoding along with semi pre-equalization) is proposed to further enhance the secrecy performance. In pre-equlicodization scheme, the transmitted symbols are precoded by a new modified matrix called pre-equalicodizing matrix. This matrix is built by manipulating each row element in the optimal selected precoding matrix by the corresponding amplitude square inverse of the estimated channel gain over each data stream. The comparative simulation results prove that the employment of the proposed method can provide robustness against eavesdropping while assuring confidentiality and reliability between the legitimate communication parties albeit Eve is considered to have full knowledge of the used method, but not the main channel since TDD is adopted.","PeriodicalId":107273,"journal":{"name":"2017 International Conference on Frontiers of Information Technology (FIT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117209045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bluetooth Low Energy based Communication Framework for Intra Vehicle Wireless Sensor Networks","authors":"Naeem Mirza, A. Khan","doi":"10.1109/FIT.2017.00013","DOIUrl":"https://doi.org/10.1109/FIT.2017.00013","url":null,"abstract":"In modern vehicles Controller Area Network (CAN) bus has significant importance to transfer data from sensors to Engine Control Unit (ECU) by employing two wire system. CAN bus is very efficient in terms of throughput and reliability but it requires very careful sensor deployment and wiring. In this paper, we propose low cost and energy efficient communication between sensor nodes and ECU using Bluetooth Low Energy (BLE) within Vehicular Ad Hoc Network by employing Intra Vehicle Wireless Sensor Network. BLE can be readily employed in densely urban environment for inter vehicular (up to 50m range) and intra vehicular (up to 10m range) wireless communication. We have compared BLE and CAN bus for communicating actual engine data between ECUs and sensors, and ECU and Onboard Unit (OBU), in terms of energy efficiency, throughput, latency and coverage area. Proposed BLE based system exhibited very high successful packet delivery ratios for static and driving scenarios with acceptable average RSSI values of at least -10dBm. During extensive tests, BLE CC2540/CC2541 based system also achieved very low current consumption (in microamperes) and longer battery life time (around six months on a standard coin battery).","PeriodicalId":107273,"journal":{"name":"2017 International Conference on Frontiers of Information Technology (FIT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133892951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qadeem Khan, Usman Qamar, Wasi Haider Butt, S. Rehman
{"title":"Implementation and Analysis of Novel Clustering Algorithm Without Initial Value Selection for Software Architectural Styles Data Set","authors":"Qadeem Khan, Usman Qamar, Wasi Haider Butt, S. Rehman","doi":"10.1109/FIT.2017.00019","DOIUrl":"https://doi.org/10.1109/FIT.2017.00019","url":null,"abstract":"Data clustering algorithms such as K-Mean clustering works on initial point selection. According to the literature review, the performance of K-Mean clustering algorithm is not much better because K-Mean performs data clustering based on initial value selection from the data to be clustered. Similarly Fuzzy C-Means and agglomerative clustering also has low performance and are sensitive to noise and outliers. So keeping in view this important deficiency, we are proposing a novel data clustering algorithm that performs the data clustering without initial value selection. The experimental setup is performed and evaluated on our own proposed data set of software architectural styles data set. The proposed algorithm is evaluated for performance and accuracy by considering the bench marks of rapid miner 7.3. and in MATLAB for clustering algorithms.","PeriodicalId":107273,"journal":{"name":"2017 International Conference on Frontiers of Information Technology (FIT)","volume":"233 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132534590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. Memon, Muhammad Uzair Ahmed, S. Hussain, Zahid Abbas Baig, Umer Aziz
{"title":"Real Time Translator for Sign Languages","authors":"Z. Memon, Muhammad Uzair Ahmed, S. Hussain, Zahid Abbas Baig, Umer Aziz","doi":"10.1109/FIT.2017.00033","DOIUrl":"https://doi.org/10.1109/FIT.2017.00033","url":null,"abstract":"Sign language is a medium of conversation for physically disabled people. These people communicate via different actions of hands, where each different action means something. This article focuses on removing the barrier of communication between normal and physically disabled people. The article aims to translate the sign language in real time by mobile camera such that it can act as a medium of conversation between normal and deaf or dumb people.","PeriodicalId":107273,"journal":{"name":"2017 International Conference on Frontiers of Information Technology (FIT)","volume":"77 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132581627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of PID and State-Feedback Controller on the Depth Control of a Robotic Fish","authors":"Subhan Khan, Salman Javed, Noman Naeem, Irfan Ali","doi":"10.1109/FIT.2017.00009","DOIUrl":"https://doi.org/10.1109/FIT.2017.00009","url":null,"abstract":"This paper presents time-domain performance analysis of a proportional integral derivative (PID) and a statefeedback control algorithm on a robotic fish plant. The nonlinear dynamics of the depth of the robotic fish are linearized and approximated as an integrating process with dead-time. The simulated results of robotic fish are then compared with the actual hardware of the robotic fish with various set-points. This paper also presents the design of a graphical user interface in Matlab to test the software and hardware results in a run-time situation. The control algorithms are compared on the basis of transient response and steady-state error. The developed robotic fish have potential of stable swimming under low-cost structure.","PeriodicalId":107273,"journal":{"name":"2017 International Conference on Frontiers of Information Technology (FIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123617254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. Haider, K. Mehmood, S. Khan, M. Rafique, Faheem Ashraf, Chul-Hwan Kim
{"title":"An Optimal Approach to Manage Responsive Residential Appliances in Smart Grid","authors":"Z. Haider, K. Mehmood, S. Khan, M. Rafique, Faheem Ashraf, Chul-Hwan Kim","doi":"10.1109/FIT.2017.00056","DOIUrl":"https://doi.org/10.1109/FIT.2017.00056","url":null,"abstract":"The number of electric vehicles (EVs) are increasing across the world due to critical situation of environmental pollution and rise in energy demand. According to a study [1], there will be an increase of 5.9 million in aggregated sale of EVs by 2020 and 20 million EVs will be on the road. Despite many advantages of the EVs over conventional vehicles, the interconnection of large number of EVs to the power system threatens its reliability and stability. To counter the adverse effects of EVs on distribution network, this study suggests a methodology for management of flexible/responsive residential appliances (FRAM) including EV charging by adopting water-filling (WF) algorithm. The proposed framework guarantees the curtailment of load demand at distribution transformer during overload condition while considering consumers' comfort. During the overload event, the developed strategy allocates demand depriving limit (DDL) to each home served by the distribution transformer. The allocation of DDL is dynamic and depends on the attributes of the associated consumers such as characteristics of responsive loads, convenience factor, load profile etc. The developed strategy is analyzed by performing a case study consists of five homes connected to a distribution transformer.","PeriodicalId":107273,"journal":{"name":"2017 International Conference on Frontiers of Information Technology (FIT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127226573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating Effect of Block Size in Compressed Sensing for Grayscale Images","authors":"Muhammad Abdur Rehman Hashmi, R. H. Raza","doi":"10.1109/FIT.2017.00034","DOIUrl":"https://doi.org/10.1109/FIT.2017.00034","url":null,"abstract":"Compressed sensing is an evolving methodology that enables sampling at sub-Nyquist rates and still provides decent signal reconstruction. During the last decade, the reported works have suggested to improve time efficiency by adopting Block based Compressed Sensing (BCS) and reconstruction performance improvement through new algorithms. A trade-off is required between the time efficiency and reconstruction quality. In this paper we have evaluated the significance of block size in BCS to improve reconstruction performance for grayscale images. A parameter variant of BCS [15] based sampling followed by reconstruction through Smoothed Projected Landweber (SPL) technique [16] involving use of Weiner smoothing filter and iterative hard thresholding is applied in this paper. The BCS variant is used to evaluate the effect of block size on image reconstruction quality by carrying out extensive testing on 9200 images acquired from online resources provided by Caltech101 [6], University of Granada [7] and Florida State University [8]. The experimentation showed some consistent results which can improve reconstruction performance in all BCS frameworks including BCS-SPL [17] and its variants [19], [27]. Firstly, the effect of varying block size (4x4, 8x8, 16x16, 32x32 and 64x64) results in changing the Peak Signal to Noise Ratio (PSNR) of reconstructed images from at least 1 dB to a maximum of 16 dB. This challenges the common notion that bigger block sizes always result in better reconstruction performance. Secondly, the variation in reconstruction quality with changing block size is mostly dependent on the image visual contents. Thirdly, images having similar visual contents, irrespective of the size, e.g., those from the same category of Caltech101 [6] gave majority vote for the same Optimum Block Size (OBS). These focused notes may help improve BCS based image capturing at many of the existing applications. For example, experimental results suggest using block size of 8x8 or 16x16 to capture facial identity using BCS. Fourthly, the average processing time taken for BCS and reconstruction through SPL with Lapped transform of Discrete Cosine Transform as the sparifying basis remained 300 milli-seconds for block size of 4x4 to 5 seconds for block size of 64x64. Since the processing time variation remains less than 5 seconds, selecting the OBS may not affect the time constraint in many applications. Analysis reveals that no particular block size is able to provide optimum reconstruction for all images with varying nature of visual contents. Therefore, the selection of block size should be made specific to the particular type of application images depending upon their visual contents.","PeriodicalId":107273,"journal":{"name":"2017 International Conference on Frontiers of Information Technology (FIT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127739438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Raja Sehrab Bashir, S. Lee, C. C. Yung, Khubaib Amjad Alam, R. Ahmad
{"title":"A Methodology for Impact Evaluation of Refactoring on External Quality Attributes of a Software Design","authors":"Raja Sehrab Bashir, S. Lee, C. C. Yung, Khubaib Amjad Alam, R. Ahmad","doi":"10.1109/FIT.2017.00040","DOIUrl":"https://doi.org/10.1109/FIT.2017.00040","url":null,"abstract":"Refactoring aims at improving software design quality without affecting external behavior. It is commonly believed that refactoring operations always enhance the software quality. However, some recent empirical studies have reported negative or negligible effects of refactoring on certain quality attributes. The actual impact of each refactroing on certain quality attributes may help developers in selecting the most suitable refactoring alternatives. Various work have been proposed in this regard at source code-level. However, fewer studies have assessed the refactoring impact at design-level. In this study, We propose a refactoring impact evaluation method enabling developers to select the suitable refactoring operations based on their impact. Nine small scale case studies have been used to validate the consistency of propose method. The results reveal that move method, extract method, extract class rafactoring operations have improved maintainability, understandability, modifiability, and analyzability in nine case studies. These obeservations are consistent accross multiple case studies, implying that the proposed approach is highly consistent.","PeriodicalId":107273,"journal":{"name":"2017 International Conference on Frontiers of Information Technology (FIT)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128000140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Evaluation of CoDel Queue Mechanism and TFRC Transport Protocol when Using VoIP Flows","authors":"T. Chaudhery","doi":"10.1109/FIT.2017.00008","DOIUrl":"https://doi.org/10.1109/FIT.2017.00008","url":null,"abstract":"There is an increasing demand for delivering real-time interactive voice traffic with Quality of Experience (QoE) requirements over a best-effort IP network. Therefore, the use of either TCP or UDP has become problematic since TCP is not well suited for interactive traffic and UDP is unresponsive to congestion. As a result a number of Congestion Control Mechanism (CCM) have been proposed with emphasis on achieving fair share of network resources among competing flows, but little attention has been paid to the QoE requirements of interactive applications. Furthermore, such traffic is affected by the bufferbloat phenomenon, which causes high latency and jitter. Therefore, intelligent queue management techniques need to be explored for this problem. This paper experimentally evaluates and analyses the performance benefits for VoIP using a Congestion Framework, which includes: (a) the congestion responsive transport protocol TFRC and (b) Active Queue Management (AQM) variant, called Controlled Delay (CoDel) at the network layer. The simulations were carried in network simulator, ns2, to evaluate how CoDel maintains QoE if round trip time (RTT) between source and destination is increased. The findings show that CoDel can maintain QoE for the VoIP flows under RTTs of 160 ms, however over longer RTTs the network queue size is larger compared to RED the delay experienced is greater, which impacts the overall end-to-end delay, hence loss of QoE.","PeriodicalId":107273,"journal":{"name":"2017 International Conference on Frontiers of Information Technology (FIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129695747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Provision of Security in Vehicular Ad Hoc Networks through an Intelligent Secure Routing Scheme","authors":"K. Qureshi, F. Bashir, A. Abdullah","doi":"10.1109/FIT.2017.00043","DOIUrl":"https://doi.org/10.1109/FIT.2017.00043","url":null,"abstract":"Vehicular Ad hoc Networks (VANETs) are providing road management systems by a wide variety of different value-added safety and infotainment applications. The main aim of these networks is to provide data communications among vehicles with or without infrastructure. Due to advancements and wide deployment of wireless technologies in these networks, different types of security attacks and malicious abuses may lead to catastrophic results in the networks. In this paper, we propose an Intelligent Secure Routing Scheme (ISRS) to secure the data communication with or without infrastructure especially for emergency messages propagation. Simulation results indicate the superiority of proposed scheme on data security in the presence of malicious nodes activities in the network.","PeriodicalId":107273,"journal":{"name":"2017 International Conference on Frontiers of Information Technology (FIT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116227927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}