{"title":"Sensitivity Level Enhancement in Vehicular DGPS Receivers to Provide Exact Location Tracking on Sub-lane of a Highway","authors":"M. Adeel, Muhammad Muaz, Aamir Latif, S. Mahmud","doi":"10.1109/FIT.2012.59","DOIUrl":"https://doi.org/10.1109/FIT.2012.59","url":null,"abstract":"The GPS data received by a receiver, embedded into a moving vehicle, encounter the distance inaccuracy due to close-in multipath of reflected signals of adjacent moving vehicles. The said inaccuracy cause a failure of sub-lane detection of the vehicle that pass through a specific lane. Increasing the sensitivity level of the received signals, the inaccuracy can be controlled up to a great extent. In this paper we are interested in finding out the best condition to enhance the sensitivity level of received symbols. This is achieved through up-gradation of probability of detection of the received signals. Similarly, the process is refined up to a great extent by selecting the best discriminator function response (DFR) for the purpose of decreasing root mean square error (RMSE). Moreover, the best DFR is selected in order to increase the convergence rate for a certain discriminator which results in increase of sensitivity level of the received GPS symbols. The best optimized solution provides up to 4cm accuracy in selected DGPS receiver.","PeriodicalId":166149,"journal":{"name":"2012 10th International Conference on Frontiers of Information Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129725467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Use of Radiative Transfer Equation (RTE) for Estimating Optical Signal Attenuation through Inhomogeneous Clouds","authors":"M. Zaman, Malik, S. Sheikh, Muhammad","doi":"10.1109/FIT.2012.18","DOIUrl":"https://doi.org/10.1109/FIT.2012.18","url":null,"abstract":"High data rate requirement has necessitated the use of optical wireless links from satellite-to-ground that invariably pass through the inhomogeneous cloud layers. It has thus become necessary to accurately model the scattering channel and estimate attenuation suffered by the information bearing optical signal traversing the multiple scattering inhomogeneous clouds. This paper introduces the utilization of three dimensional radiative transfer equation RTE for prediction of attenuation in the optical signal traversing the cloud layers. The three dimensional radiative transfer equation explicitly handles the spatial complexity and multiple scattering effects of inhomogeneous clouds and provides accurate propagation channel estimation without invoking mathematical assumptions. Cloud droplets mainly composed of liquid water attenuates the beam of light through absorption and scattering in forward direction. Therefore, it is necessary to generate three dimensional cloud fields that exhibit realistic spatial distribution of the cloud structure. This statistically generated cloud field from experimental data is used as an input to three dimensional radiative transfer model to calculate transmitted irradiance at the bottom of cloud to predict attenuation in cumulus cloud scene. This paper employs the numerical solution of three dimensional radiative transfer equation using Monte Carlo simulation that uses stochastic methods to simulate physical processes of scattering and absorption within inhomogeneous cloud layers. The open source I3RC Monte Carlo code has been chosen to perform simulations at commonly employed optical wavelengths of 850 nm and 1550 nm. The 10 μm has been specifically analyzed to gain insight of wavelength dependence in optical propagation through clouds.","PeriodicalId":166149,"journal":{"name":"2012 10th International Conference on Frontiers of Information Technology","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132650786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sliding Mode Control for Coupled-Tank Liquid Level Control System","authors":"H. Abbas, S. Asghar, S. Qamar","doi":"10.1109/FIT.2012.65","DOIUrl":"https://doi.org/10.1109/FIT.2012.65","url":null,"abstract":"This paper presents the mathematical modeling of coupled-tank system and designing of sliding mode control (SMC) for liquid level control in the system. The non-linear single-input single-output (SISO) mathematical model of plant is developed initially. A simulation is carried out using MATLAB/SIMULINK to control the non-linear model of coupled-tank system for a number of different conditions. The commanded inputs such as that of step, random, square, saw tooth and sinusoidal input signals are fed to the system to test the tracking performance of SMC. Some realistic situations are also included in the plant to examine the robustness of controller. The controller showed robustness for disturbance in the plant and produced an appropriate control signals for the sake of controlling the liquid level in the coupled tank system. The tracking performance of SMC is also compared with conventional PID controller in terms of performance index ITAE. The SMC showed excellent tracking results than PID controller for time varying command signals.","PeriodicalId":166149,"journal":{"name":"2012 10th International Conference on Frontiers of Information Technology","volume":"211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133821307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sensor Fault Detection in Coupled Liquid Tanks System","authors":"F. Kousar, M. Abid, Abdul Qayyum Khan","doi":"10.1109/FIT.2012.64","DOIUrl":"https://doi.org/10.1109/FIT.2012.64","url":null,"abstract":"As the field of automation is progressing, safer and reliable systems are highly desirable. Any malfunction in the plant result in reduced efficiency of the plant, reduced quality of the product and sometimes may result into fatalities. Therefore fault detection and process monitoring is becoming an integral part of modern control systems. The coupled liquid tank system is an experimental setup with nonlinear dynamics. The objective of this paper is to develop and implement fault detection techniques for coupled liquid tank system. The proposed scheme makes use of observer based residual generation and norm based residual evaluation. First system was linearized by Jacobian linearization and fault diagnosis system has been designed for the linearized system. Then this algorithm has been implemented on real plant and satisfactory results have been obtained.","PeriodicalId":166149,"journal":{"name":"2012 10th International Conference on Frontiers of Information Technology","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128403972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A General Paradigm for Normalizing Metamorphic Malwares","authors":"Seyed Emad Armoun, S. Hashemi","doi":"10.1109/FIT.2012.69","DOIUrl":"https://doi.org/10.1109/FIT.2012.69","url":null,"abstract":"Nowadays malwares are one of the most important problems of computer society and even people society according to the expansion of computer applications in every dimension of our life. Malware is a malicious code that can harm computer systems and thus makes disorder in their performance. In order to escape from malware detectors, malwares use some obfuscation methods to change their appearance. This problem cannot be solved using traditional malware detection methods since these methods are highly dependent on malware's signatures. So normalization (de-obfuscation) methods have been proposed to confront with these problems. In this paper we propose a general malware normalizer that can store lots of obfuscation methods in the form of automata structures and use them for normalizing metamorphic malwares. Each obfuscation method is modeled using an Augmented DFA, ADFA in short. This paradigm searches the occurrence of obfuscated codes in the source code by traversing these ADFAs. If an obfuscated code is detected in the code, it will be normalized in the next phase and thus the obfuscated malware will be detected easily by traditional malware detectors. The main contribution of this paper is its high generality. It can normalize a wide range of obfuscation methods against current methods that are proposed for confronting with one or a limited set of obfuscation methods. The presented approach is developed and tested on a diverse set of malwares and the results are promising for detecting metamorphic malwares.","PeriodicalId":166149,"journal":{"name":"2012 10th International Conference on Frontiers of Information Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132766545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bilal Ahmed, Ilyas Saleem, H. Zahra, H. Khurshid, S. M. Abbas
{"title":"Tri-window Printed Monopole Antenna with Wideband Characteristics for Portable Communication Devices","authors":"Bilal Ahmed, Ilyas Saleem, H. Zahra, H. Khurshid, S. M. Abbas","doi":"10.1109/FIT.2012.36","DOIUrl":"https://doi.org/10.1109/FIT.2012.36","url":null,"abstract":"A tri-window printed monopole antenna with wideband characteristics is proposed in this paper. Compact size, uniform gain and stable radiation patterns at high frequencies make the proposed design a good candidate for its integration in portable communication devices. FR-4 with dielectric constant 4.4 and height 1.6mm has been used as substrate. Antenna having overall dimensions of 28.7 × 24.8 × 1.6 mm3 exhibits wideband characteristics ranging from 2.27 to 7.35 GHz at VSWR ≤ 2 applicable for WiBro (2.3-2.4 GHz), Bluetooth (2.4-2.484 GHz), Wi-Fi/WLAN/Hiper LAN/IEEE 802.11 2.4GHz (2412-2484 MHz), 3.6GHz (3657.5-3690.0MHz) and 4.9/5.0GHz (4915- 5825MHz, 5.15-5.35 GHz, 5.47-5.725 GHz), LTE band 7 (2.5- 2.69GHz), LTE band 22 (3.41-3.6 GHz) and WiMAX 2.3GHz (2.3-2.5GHz), 2.5GHz (2500-2690 MHz), 3.3GHz, 3.5GHz (3400- 3600MHz) and 5.8GHz (5.6-5.9GHz).","PeriodicalId":166149,"journal":{"name":"2012 10th International Conference on Frontiers of Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129050089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web Accessibility for Disabled: A Case Study of Government Websites in Pakistan","authors":"Muhammad Bakhsh, A. Mehmood","doi":"10.1109/FIT.2012.68","DOIUrl":"https://doi.org/10.1109/FIT.2012.68","url":null,"abstract":"It is the era of information technology and governments around the world opting for electronic government and official websites are now under the use of a diverse population for the purpose of information retrieval. A number of disabled persons are becoming the part of this society but they are ignored when web projects are planned and developed. If this practice of software development is kept continuing then disabled persons would not take the advantage in the electronic government era. This study evaluates the websites of central government in Pakistan including all ministries and divisions using accessibility evaluation tools based on World Wide Web Consortium's (W3C) web accessibility standards. Functional accessibility evaluator and total validator are the tools which are used for the evaluation process. The results shows that most of the web sites are not developed according to the accessibility standards for disabled persons. In the light of these results, recommendations are made to improve the accessibility of these websites for disable persons.","PeriodicalId":166149,"journal":{"name":"2012 10th International Conference on Frontiers of Information Technology","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117234066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identifying Similar Software Datasets through Fuzzy Inference System","authors":"S. Anwar, Z. Rana, M. Awais","doi":"10.1109/FIT.2012.40","DOIUrl":"https://doi.org/10.1109/FIT.2012.40","url":null,"abstract":"Similar software have similar software measurements. Defect data from one software can be used to anticipate defects in a similar software. Although, not many defect datasets are made public in software engineering domain, PROMISE repository is a reasonable collection of software data. This paper presents a two step approach to identify similar software and applies the proposed technique to find similar datasets in PROMISE repository. As step 1, the approach generates associations rules for each dataset to determine dataset's behavior in terms of frequent patterns. As step 2, overlap between the association rules is calculated using Fuzzy Inference Systems (FIS). The FIS generated for the study have been expert-based as well as auto-generated. Similarity between 28 dataset pairs has been found KC2 and PC1 turned out to be most similar datasets with 86% similarity using Mamdani, 92% with Sugeno models. Results from expert-based and auto generated FIS have been comparable.","PeriodicalId":166149,"journal":{"name":"2012 10th International Conference on Frontiers of Information Technology","volume":" 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120832861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Eye Mask for Seeded DWDM Transmission Links","authors":"Syed Aun Abbas, H. Lee, H. Rhy","doi":"10.1109/FIT.2012.60","DOIUrl":"https://doi.org/10.1109/FIT.2012.60","url":null,"abstract":"The factors that influence the choice of suitable eye mask for a seeded DWDM link are presented. It is observed that two factors play a key role in determining the characteristics of the eye mask namely, bandwidth of the transmitter driver circuit and the transmitter RIN in conjunction with the input seed signal power. None of the well known eye masks fit well due to thicker ones level in a seeded DWDM system, so there is a need to define a new mask for this purpose. It is shown thorough measurement results that an eye mask derived from the NRZ 10G ratio small mask defined in ITU-t recommendation G.959.1 can serve the purpose.","PeriodicalId":166149,"journal":{"name":"2012 10th International Conference on Frontiers of Information Technology","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121118668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Extendable Simulation Framework for Modeling Application Processing Potentials of Smart Mobile Devices for Mobile Cloud Computing","authors":"M. Shiraz, A. Gani, R. Khokhar, E. Ahmed","doi":"10.1109/FIT.2012.66","DOIUrl":"https://doi.org/10.1109/FIT.2012.66","url":null,"abstract":"The recent efforts in Mobile Cloud Computing (MCC) focus on defining novel methods, policies and mechanisms for efficiently leveraging the services of cloud data centers for mitigating resources constraints in mobile devices. To test these newly developed methods and policies, researchers need tools for evaluating the hypothesis prior to deployment on the real time system. Simulation based approaches in evaluating the deployment mechanism for accessing distributed services and application behaviors offer significant benefits, as they allow mobile application developers to test performance of the operational logic of distributed deployment in a repeatable and controllable environment free of cost and to tune the performance bottlenecks before real world deployment on commercial MCC environment. This paper presents SmartSim, which is a simulation toolkit developed for modeling the application processing capabilities of Smart Mobile Devices (SMDs). SmartSim simulates the system and behavior modeling of mobile devices. The toolkit provides an easy to configure simulation environment for modeling application processing attributes of SMD and arbitrary resources intensive mobile application. SmartSim models the mechanism of runtime partitioning of elastic mobile application and determines resources utilization on SMDs during the execution of the elastic application.","PeriodicalId":166149,"journal":{"name":"2012 10th International Conference on Frontiers of Information Technology","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123356543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}