{"title":"Accurate measurement of pressure in Natural Gas Vehicles: A digital/electronic design and fabrication","authors":"M. I. Baig, T. Elahi","doi":"10.1109/INMIC.2008.4777794","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777794","url":null,"abstract":"Along with many other issues to be considered when converting a vehicle to CNG (Compressed Natural Gas), one of the primary concerns is the measurement of gas that is remaining in the cylinder. A conventional gas actuation system, which is fitted on the gas pipeline going to the pressure regulator, sends a signal to the unit installed inside of the vehicle that indicates the pressure, normally through four LEDs. A well-tested design is presented in this paper, which gives an accurate and precise measurement of gas pressure in NGVs (Natural Gas Vehicles) using a non-contact sensor mechanism. The final product has an accuracy of 2.0% having a gauge reading of 6000 psi, tested and verified at 4500 psi.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124565225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new methodology for self localization in wireless sensor networks","authors":"Allon Rai, S. Ale, S. Rizvi, A. Riasat","doi":"10.1007/978-90-481-3662-9_45","DOIUrl":"https://doi.org/10.1007/978-90-481-3662-9_45","url":null,"abstract":"","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125040708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Imran Asad Gul, Nils Sommer, Matthias Rohr, Andre van Hoom, Wilhelm Hasselbring
{"title":"Evaluation of control flow traces in software applications for intrusion detection","authors":"Imran Asad Gul, Nils Sommer, Matthias Rohr, Andre van Hoom, Wilhelm Hasselbring","doi":"10.1109/INMIC.2008.4777765","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777765","url":null,"abstract":"Software security has become an important requirement, particularly for systems that are publicly accessible through the Internet. Such systems can be equipped with intrusion detection systems to uncover security breaches. In this paper, we present a novel application-level intrusion detection approach. A normal behavior profile is created from application-internal control flow in terms of operation execution traces. Anomalous control flows indicative for intrusion attempts are detected by continuously monitoring and analyzing the software system. A case study demonstrates the intrusion detection approach's applicability in the context of a multi-user Java Web application.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121819908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a better control of change impact propagation","authors":"A. Ahmad, H. Basson, L. Deruelle, M. Bouneffa","doi":"10.1109/INMIC.2008.4777770","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777770","url":null,"abstract":"The software evolution requires an exhaustive understanding of all the artifacts or components composing the software. In fact, any intended change may generate an impact propagated to the various software components through the different kind of relationships relating them. This situation is generally called the ripple effect and may cause several types of damages or side effects. In this paper, we focus on the potential flow of change impact propagation as provoked by the carried out change. For that purpose, we propose a structural model of software evolution (SMSE). This model is intended to represent and manage the different software artifacts and their relationships. The instantiated SMSE is used to built a knowledge base system providing, among other facilities, an assistance to the designer (or engineer) of software evolution for an a priori assessment of the change impact. The major aim of the system is to help a systematic analysis of the change impact and the identification of its propagation.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114258184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Baig, M.M. Ikram, K. Shamim, A. Akbar, A. Hassan
{"title":"Implementation of SCADA system for unsought tablets detection through morphological image processing","authors":"H. Baig, M.M. Ikram, K. Shamim, A. Akbar, A. Hassan","doi":"10.1109/INMIC.2008.4777789","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777789","url":null,"abstract":"Pharmaceutical industries which are intended for the packaging of different tablets in a strip of blister need to make sure that the tablets are free from defects before letting them go into the packing box. The purpose of this paper is to introduce an efficient, reliable and cost effective supervisory control and data acquisition (SCADA) system for detection and removing of unwanted tablet(s) strips. The system detects defective tablets by capturing image of a batch of tablets and performs morphological analysis over it. If a defective tablet is found, the system is smart enough to trace in which strip the defective tablet would be present after cutting of batch and hence instructing the remote terminal unit (RTU) to remove that strip. The status of the whole process at the completion of every order is sent to master terminal unit (MTU) which generates and saves the log file on MS-EXCEL, and is also able to send the log file to main server via electronic mail.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130310108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of low cost electronic prepaid energy meter","authors":"S.K. Ali Zaidi, H. Masroor, S. Ashraf, A. Hassan","doi":"10.1109/INMIC.2008.4777799","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777799","url":null,"abstract":"Electronic energy meter has got numerous advantages over the conventional electromechanical meter and due to this; many countries of the world have switched to electronic metering system. But unfortunately Pakistan is still deprived of such meters. The paper is based on the final year project of the design & implementation of prepaid electronic energy meter which we are designing in order to eliminate the problems being faced by the Pakistani people. By the introduction of prepaid system in Pakistan the problem of overcharging and over billing and the trouble being faced by the customers in paying the bills will be removed all together. Since our meter is electronic in nature, it has got no moving parts and hence the problem of stability & accuracy due to temperature changes are solved. Our meter is also tamper resistant which eradicates the chances of the theft of electricity.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134101676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Trackback-Rank algorithm for the blog search","authors":"Jung-Hoon Kim, T. Yoon, Kunsu Kim, Jee-Hyong Lee","doi":"10.1109/INMIC.2008.4777781","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777781","url":null,"abstract":"Blog is a personal publishing tool which encourages users to contributions in the Web. As the number of blog entries and contributors (bloggers) grows at a very fast pace, they are increasingly filling the Web space. Thus effective search in the blogspace become more important. For effective search, the page ranking algorithm is one of the most critical techniques. Blogs have the structural features, which do not exist in the traditional Web, such as trackback links, tags, comments. For this reason, the page ranking algorithms for the traditional Web may not work effectively in the blogspace. In this paper, we propose a new ldquotrackback-rankrdquo algorithm which considers the features of blogs for more effective blog search. We evaluate bloggers' authority, trackback connectivity, and users' reactivity in order to rank blog entries. These factors are created and modified by the interaction among blog users. The blog users read and evaluate contents of blog entries and then interaction other users. Thereby, these factors implicitly reflect the contents quality of the entries, and the trackback-rank algorithm could improve the relevance of the search result to the queries. Our experiments on a collection of 62,906 blog entries shows that the trackback-rank algorithm can more effectively find relevant information compared to the traditional ranking algorithm.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123959492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fighting terrorism using DEW","authors":"F. Saeed, R. Zulfiqar, A. Aziz, N. Zaman","doi":"10.1109/INMIC.2008.4777787","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777787","url":null,"abstract":"Directed Energy Weapons (DEW) are in research phase and their use in combat is being discovered with the passage of time. In this paper we will discuss some of the threats that are emerging in this present era and along with that we will give our ideas of dealing with this nuisance of terrorism by using directed energy weapons.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129711470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Shape invariant recognition of segmented human face images using eigenfaces","authors":"Z. Riaz, M. Beetz, B. Radig","doi":"10.1109/INMIC.2008.4777807","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777807","url":null,"abstract":"This paper describes an efficient approach for face recognition as a two step process: (1) segmenting the face region from an image by using an appearance based model, (2) using eigenfaces for person identification for segmented face region. The efficiency lies not only in generation of appearance models which uses the explicit approach for shape and texture but also the combined use of the aforementioned techniques. The result is an algorithm that is robust against facial expressions variances. Moreover it reduces the amount of texture up to 12% of the image texture instead of considering whole face image. Experiments have been performed on Cohn Kanade facial database using ten subjects for training and seven for testing purposes. This achieved a successful face recognition rate up to 92.85% with and without facial expressions. Face recognition using principal component analysis (PCA) is fast and efficient to use, while the extracted appearance model can be further used for facial recognition and tracking under lighting and pose variations. This combination is simple to model and apply in real time.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129713637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of multiple routing protocols using multiple mobility models for mobile ad hoc networks","authors":"Nadir Shah, D. Qian, K. Iqbal","doi":"10.1109/INMIC.2008.4777743","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777743","url":null,"abstract":"Mobile ad hoc networks (MANETs) are networks where the nodes are mobile, communicating via wireless link, operating without fixed infrastructure and each node act as a router (forwarding the in transit packets) as well as an end host. The movement of nodes is different in different scenario depending upon applications. Several routing protocols have been proposed by researchers for mobile ad hoc networks. They perform different in different scenarios. The mobility model is one of the main aspects for testing the performance of MANETs routing protocols. We evaluate the performance of multiple routing protocols (DSDV, DSR, OLSR and AODV) using most common mobility models ( random walk, random direction, random way point) for mobile ad hoc networks. We draw the conclusions at the end from the results which will provide the idea of using routing protocol in implementation according to the mobility characteristics of underline scenario. Also we elaborate the weakness and advantages of these routing protocols.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"8 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130481421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}