{"title":"Architecture supporting network discovery in future heterogeneous networks","authors":"R. Yaqub, I. Ul Haq, K. Yahya","doi":"10.1109/INMIC.2008.4777755","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777755","url":null,"abstract":"The aim of this research paper is to critically analyze one of the integrated WLAN-cellular network architecture which third generation partnership project (3GPP) has also included in its release 6 i.e. generic access network (GAN) formally called unlicensed mobile access (UMA). This article analyzes the limitations of the above mentioned solution and present an architecture for future heterogeneous networks using a novel hybrid approach of network discovery, where the network will broadcast the updated network information using cell broadcast center (CBC) to the mobile station/user equipment (MS) and the MS may also enquire from the network the additional information regarding the available networks, as opposed to centralized technique used in the existing cellular networks. The proposed solution suggests a network information repository (NIR) embedded in the core network, being populated with information of all the available radio access networks (RANs) in a specific location. The information obtained from NIR will help the MS to identify the network elements ahead of time and communicate with these elements in advance. This will help the MS to fetch the general information about the available networks and select the desired network ahead of time and thus seamless connectivity/ handover will be possible for the end user.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115815041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Baig, M.M. Ikram, K. Shamim, A. Akbar, A. Hassan
{"title":"Implementation of SCADA system for unsought tablets detection through morphological image processing","authors":"H. Baig, M.M. Ikram, K. Shamim, A. Akbar, A. Hassan","doi":"10.1109/INMIC.2008.4777789","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777789","url":null,"abstract":"Pharmaceutical industries which are intended for the packaging of different tablets in a strip of blister need to make sure that the tablets are free from defects before letting them go into the packing box. The purpose of this paper is to introduce an efficient, reliable and cost effective supervisory control and data acquisition (SCADA) system for detection and removing of unwanted tablet(s) strips. The system detects defective tablets by capturing image of a batch of tablets and performs morphological analysis over it. If a defective tablet is found, the system is smart enough to trace in which strip the defective tablet would be present after cutting of batch and hence instructing the remote terminal unit (RTU) to remove that strip. The status of the whole process at the completion of every order is sent to master terminal unit (MTU) which generates and saves the log file on MS-EXCEL, and is also able to send the log file to main server via electronic mail.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130310108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Trackback-Rank algorithm for the blog search","authors":"Jung-Hoon Kim, T. Yoon, Kunsu Kim, Jee-Hyong Lee","doi":"10.1109/INMIC.2008.4777781","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777781","url":null,"abstract":"Blog is a personal publishing tool which encourages users to contributions in the Web. As the number of blog entries and contributors (bloggers) grows at a very fast pace, they are increasingly filling the Web space. Thus effective search in the blogspace become more important. For effective search, the page ranking algorithm is one of the most critical techniques. Blogs have the structural features, which do not exist in the traditional Web, such as trackback links, tags, comments. For this reason, the page ranking algorithms for the traditional Web may not work effectively in the blogspace. In this paper, we propose a new ldquotrackback-rankrdquo algorithm which considers the features of blogs for more effective blog search. We evaluate bloggers' authority, trackback connectivity, and users' reactivity in order to rank blog entries. These factors are created and modified by the interaction among blog users. The blog users read and evaluate contents of blog entries and then interaction other users. Thereby, these factors implicitly reflect the contents quality of the entries, and the trackback-rank algorithm could improve the relevance of the search result to the queries. Our experiments on a collection of 62,906 blog entries shows that the trackback-rank algorithm can more effectively find relevant information compared to the traditional ranking algorithm.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123959492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A wavelet based algorithm for Ocular Artifact detection In the EEG signals","authors":"M. Kiamini, S. Alirezaee, B. Perseh, M. Ahmadi","doi":"10.1109/INMIC.2008.4777729","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777729","url":null,"abstract":"Artifacts are noises introduced to an electroencephalogram (EEG) signal by patient's movements. Eye-blinks and movements of the eyeballs produce electrical signals that are collectively known as Ocular Artifacts (OA) and these are 10-100 times stronger than EEG signal which is being recorded. Removing artifacts from EEG signal may aid the work of doctors, because artifacts disturb their attention. This paper present a new method to automatically identify the position of Ocular Artifacts zones in contaminated EEG signal. Then only removing it's to obtain clean EEG based on the stationary wavelet transform (SWT). In this case, correlation coefficient between wavelet coefficients of the Ocular Artifacts zones in contaminated EEG signal and same zones in electrooculogram (EOG) will be used to generate the wavelet coefficients for artifact-free EEG signal.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117090846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new methodology for self localization in wireless sensor networks","authors":"Allon Rai, S. Ale, S. Rizvi, A. Riasat","doi":"10.1007/978-90-481-3662-9_45","DOIUrl":"https://doi.org/10.1007/978-90-481-3662-9_45","url":null,"abstract":"","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125040708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accurate measurement of pressure in Natural Gas Vehicles: A digital/electronic design and fabrication","authors":"M. I. Baig, T. Elahi","doi":"10.1109/INMIC.2008.4777794","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777794","url":null,"abstract":"Along with many other issues to be considered when converting a vehicle to CNG (Compressed Natural Gas), one of the primary concerns is the measurement of gas that is remaining in the cylinder. A conventional gas actuation system, which is fitted on the gas pipeline going to the pressure regulator, sends a signal to the unit installed inside of the vehicle that indicates the pressure, normally through four LEDs. A well-tested design is presented in this paper, which gives an accurate and precise measurement of gas pressure in NGVs (Natural Gas Vehicles) using a non-contact sensor mechanism. The final product has an accuracy of 2.0% having a gauge reading of 6000 psi, tested and verified at 4500 psi.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124565225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of low cost electronic prepaid energy meter","authors":"S.K. Ali Zaidi, H. Masroor, S. Ashraf, A. Hassan","doi":"10.1109/INMIC.2008.4777799","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777799","url":null,"abstract":"Electronic energy meter has got numerous advantages over the conventional electromechanical meter and due to this; many countries of the world have switched to electronic metering system. But unfortunately Pakistan is still deprived of such meters. The paper is based on the final year project of the design & implementation of prepaid electronic energy meter which we are designing in order to eliminate the problems being faced by the Pakistani people. By the introduction of prepaid system in Pakistan the problem of overcharging and over billing and the trouble being faced by the customers in paying the bills will be removed all together. Since our meter is electronic in nature, it has got no moving parts and hence the problem of stability & accuracy due to temperature changes are solved. Our meter is also tamper resistant which eradicates the chances of the theft of electricity.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134101676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Coping with parametric uncertainties in magnetic levitation system","authors":"K. Shafiq, H. Z. Bukhari, S. Ahmed, A. I. Bhatti","doi":"10.1109/INMIC.2008.4777711","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777711","url":null,"abstract":"Controller design for magnetic levitation systems is considered problematic due to the parametric uncertainties in mass, strong disturbance forces between the magnets, and noise effects inflowing from sensor, and input channels. In this paper, an LMI based solution is proposed for the position tracking problem of a magnetic levitation system in the presence of parametric uncertainties. Moreover the effect of disturbance has also been canceled successfully. The problem will be posed in LMI using state-feedback H-infinity approach and an efficient solution to multiple specifications arising during linearization will be targeted. The formation of affine parameterized model of a Magnetic Levitation System to incorporate parametric variations and its subsequent robust controller design with rig implementation is the novel aspect of this work.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"237 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115586024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fighting terrorism using DEW","authors":"F. Saeed, R. Zulfiqar, A. Aziz, N. Zaman","doi":"10.1109/INMIC.2008.4777787","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777787","url":null,"abstract":"Directed Energy Weapons (DEW) are in research phase and their use in combat is being discovered with the passage of time. In this paper we will discuss some of the threats that are emerging in this present era and along with that we will give our ideas of dealing with this nuisance of terrorism by using directed energy weapons.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129711470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Shape invariant recognition of segmented human face images using eigenfaces","authors":"Z. Riaz, M. Beetz, B. Radig","doi":"10.1109/INMIC.2008.4777807","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777807","url":null,"abstract":"This paper describes an efficient approach for face recognition as a two step process: (1) segmenting the face region from an image by using an appearance based model, (2) using eigenfaces for person identification for segmented face region. The efficiency lies not only in generation of appearance models which uses the explicit approach for shape and texture but also the combined use of the aforementioned techniques. The result is an algorithm that is robust against facial expressions variances. Moreover it reduces the amount of texture up to 12% of the image texture instead of considering whole face image. Experiments have been performed on Cohn Kanade facial database using ten subjects for training and seven for testing purposes. This achieved a successful face recognition rate up to 92.85% with and without facial expressions. Face recognition using principal component analysis (PCA) is fast and efficient to use, while the extracted appearance model can be further used for facial recognition and tracking under lighting and pose variations. This combination is simple to model and apply in real time.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129713637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}