2015 International Conference on Emerging Technologies (ICET)最新文献

筛选
英文 中文
Optimizing speed of mobile data collector in Wireless Sensor Network 无线传感器网络中移动数据采集器的速度优化
2015 International Conference on Emerging Technologies (ICET) Pub Date : 2015-12-01 DOI: 10.1109/ICET.2015.7389213
Ali Sayyed, Leandro Buss Becker
{"title":"Optimizing speed of mobile data collector in Wireless Sensor Network","authors":"Ali Sayyed, Leandro Buss Becker","doi":"10.1109/ICET.2015.7389213","DOIUrl":"https://doi.org/10.1109/ICET.2015.7389213","url":null,"abstract":"Introducing mobility in some of the components of WSN is one of the promising techniques for improving performance of the network in terms of connectivity, lifetime, data collection and data latency. Deliberate and controlled mobility, when best adjusted in terms of trajectory and speed, enhance the performance of the network to a desired level. This paper focus on the implementation details and performance analysis of controlling and fine tuning the speed of mobile data collector in WSNs. We consider a sensor network where nodes are deployed and organized into clusters on the basis of distance from each other. Nodes sense their environment and transmit data to their corresponding cluster heads, which in turn send it to a mobile data collector when it is in communication range. The goal is to optimize the speed of mobile data collector, and enable it to adaptively adjust it motion; move slower in areas where more time is needed to collect the required data and speeds up where there are no such constraints. This is achieved through cooperation between mobile nodes and static sensor nodes, through information sharing. Our simulation results show significant increase in data collection rate and reduction in the overall time and number of laps mobile data collector spend in data gathering.","PeriodicalId":166507,"journal":{"name":"2015 International Conference on Emerging Technologies (ICET)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115437594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Optimizing NEURON brain simulator with Remote Memory Access on distributed memory systems 优化神经元大脑模拟器与远程记忆访问分布式记忆系统
2015 International Conference on Emerging Technologies (ICET) Pub Date : 2015-12-01 DOI: 10.1109/ICET.2015.7389167
Danish Shehzad, Z. Bozkus
{"title":"Optimizing NEURON brain simulator with Remote Memory Access on distributed memory systems","authors":"Danish Shehzad, Z. Bozkus","doi":"10.1109/ICET.2015.7389167","DOIUrl":"https://doi.org/10.1109/ICET.2015.7389167","url":null,"abstract":"The Complex neuronal network models require support from simulation environment for efficient network simulations. To compute the models increasing complexity necessitated the efforts to parallelize the NEURON simulation environment. The computational neuroscientists have extended NEURON by dividing the equations for its subnet among multiple processors for increasing the competence of hardware. For spiking neuronal networks inter-processor spikes exchange consume significant portion of overall simulation time on parallel machines. In NEURON Message Passing Interface (MPI) is used for inter processor spikes exchange, MPI_Allgather collective operation is used for spikes exchange generated after each interval across distributed memory systems. However, as the number of processors become larger and larger MPI_Allgather method become bottleneck and needs efficient exchange method to reduce the spike exchange time. This work has improved MPI_Allgather method to Remote Memory Access (RMA) based on MPI-3.0 for NEURON simulation environment, MPI based on RMA provides significant advantages through increased communication concurrency in consequence enhances efficiency of NEURON and scaling the overall run time for the simulation of large network models1.","PeriodicalId":166507,"journal":{"name":"2015 International Conference on Emerging Technologies (ICET)","volume":"606 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115108030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance analysis of two-relay cooperative cognitive network with path loss effect 考虑路径损失效应的双中继协同认知网络性能分析
2015 International Conference on Emerging Technologies (ICET) Pub Date : 2015-12-01 DOI: 10.1109/ICET.2015.7389189
S. Ullah, Asad I. Khan, Farhan Ullah, I. Khan, I. Khan, S. Jan
{"title":"Performance analysis of two-relay cooperative cognitive network with path loss effect","authors":"S. Ullah, Asad I. Khan, Farhan Ullah, I. Khan, I. Khan, S. Jan","doi":"10.1109/ICET.2015.7389189","DOIUrl":"https://doi.org/10.1109/ICET.2015.7389189","url":null,"abstract":"This paper conducts the comparative study of cooperative cognitive radio networks using Decode and Forward (DF) protocol at the relays. The aim of the study is to decrease the uncertain noise along with provision of efficient energy detection technique. Moreover, the detection accuracy and capability of the network in AWGN channel has been investigated by the addition of path loss effect. Multiple relays are used in different scenarios considering distances from source and destination. Path loss exponent is set as 3 and Monte Carlo simulations are performed for the desired results. The proposed system has been evaluated based on the Detection Probability (Pd), Unavailable Probability (Pna) and Collision Probability (Pc).","PeriodicalId":166507,"journal":{"name":"2015 International Conference on Emerging Technologies (ICET)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126458187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
3-degree-of-freedom real-time human hand following robot arm using visual feedback 利用视觉反馈的3自由度实时人手跟随机械臂
2015 International Conference on Emerging Technologies (ICET) Pub Date : 2015-12-01 DOI: 10.1109/ICET.2015.7389202
M. Nazreen Bin Zainal Abidin, S. Ali, Syed Hasan Adil
{"title":"3-degree-of-freedom real-time human hand following robot arm using visual feedback","authors":"M. Nazreen Bin Zainal Abidin, S. Ali, Syed Hasan Adil","doi":"10.1109/ICET.2015.7389202","DOIUrl":"https://doi.org/10.1109/ICET.2015.7389202","url":null,"abstract":"This paper presents a simple approach to mimic human motion. The objective of this research is to mimic the human motions using visual feedback and convert it into robotic motion. A 3 degree-of-freedom robotic arm is developed that utilizes visual feedback capturing the human hand motion. The motion of the robotic arm is governed by converting the workspace configuration into configuration space using inverse kinematics. The proposed approach is applied to freehand drawing and is implemented in real-time. The real-time human hand following robot arm shows that it can be used for environments endangered for humans effectively.","PeriodicalId":166507,"journal":{"name":"2015 International Conference on Emerging Technologies (ICET)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124451340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel approach for blind separation dereverberation of speech mixtures using multiplestep linear predictive coding 一种基于多步线性预测编码的语音混合盲分离去噪方法
2015 International Conference on Emerging Technologies (ICET) Pub Date : 2015-12-01 DOI: 10.1109/ICET.2015.7389191
W. Ehsan, T. Jan
{"title":"A novel approach for blind separation dereverberation of speech mixtures using multiplestep linear predictive coding","authors":"W. Ehsan, T. Jan","doi":"10.1109/ICET.2015.7389191","DOIUrl":"https://doi.org/10.1109/ICET.2015.7389191","url":null,"abstract":"A new method for the combination of blind separation and dereverberation of speech signals using linear convolutive mixing model is presented. The proposed algorithm consists of two parts. In the first part pre-filtering process is applied on speech mixtures to predict late reverberations by employing long-term multiple-step linear prediction (MSLP) and then these late reverberations are mitigated by using spectral subtraction (SS) technique. In the second part, a source separation technique has been applied consisting of various steps. Here in this part, first Independent component analysis (ICA) algorithm is used to separate target speech sources from sensor readings using the assumptions that sources involved in the mixing process are independent. Then by differentiating energy of individual time-frequency signatures of the separated target speech signals we compute ideal binary mask (IBM). Finally artifacts are suppressed which are normally the basis of time varying nature of IBM by means of cepstral smoothing. Simulated environment for reverberant mixtures is used to analyse the efficiency of our proposed algorithm. Simulations results evaluated in terms of signal to noise ratio (SNR) indicate a considerably enhanced quality of segregated speech as compared to a previous method.","PeriodicalId":166507,"journal":{"name":"2015 International Conference on Emerging Technologies (ICET)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127780581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced gain metamaterial-based Leaky-wave beam-forming antenna for the V2X communication V2X通信中基于增强增益超材料的漏波波束形成天线
2015 International Conference on Emerging Technologies (ICET) Pub Date : 2015-12-01 DOI: 10.1109/ICET.2015.7389172
M. K. Khattak, S. Kahng
{"title":"Enhanced gain metamaterial-based Leaky-wave beam-forming antenna for the V2X communication","authors":"M. K. Khattak, S. Kahng","doi":"10.1109/ICET.2015.7389172","DOIUrl":"https://doi.org/10.1109/ICET.2015.7389172","url":null,"abstract":"In this paper, a (Composite Right/ Left Hand) CRLH Leaky-wave two-dimensional array antenna for hemispherical beam-forming aimed at V2X communication is proposed. This antenna is composed of 4×4 feed-network and 4 rows of CRLH leaky-wave radiating structures that adopt the capacitive inter-element coupled mushrooms. Every single capacitive coupling uses 0.75 pF. We will show beam-forming and enhanced gain performances.","PeriodicalId":166507,"journal":{"name":"2015 International Conference on Emerging Technologies (ICET)","volume":"343 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134172870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Automatic programmer: A software tool 自动编程器:一个软件工具
2015 International Conference on Emerging Technologies (ICET) Pub Date : 2015-12-01 DOI: 10.1109/ICET.2015.7389205
Altaf Hussain, Mudassar Riaz, Zain Ul Abdin, Afshah Saeed
{"title":"Automatic programmer: A software tool","authors":"Altaf Hussain, Mudassar Riaz, Zain Ul Abdin, Afshah Saeed","doi":"10.1109/ICET.2015.7389205","DOIUrl":"https://doi.org/10.1109/ICET.2015.7389205","url":null,"abstract":"Nowadays, Microcontroller has great impact in our life which can't be ignored. Many automatically controlled products i.e. automobile engine control systems, and embedded systems etc. are being programmed using microcontroller. Any person working in the field of electronics has knowledge to use a microcontroller but it's difficult for him/her to write code for microcontroller because every person may not have good programming skills to write code for microcontroller. So it's really tough task to program a microcontroller for such person. Our work aims to provide a solution in the form of Automatic Programmer for electronic engineers with such problems. It is basically software solution that allows the user to generate the code for microcontroller by providing a desired block diagram as an input. This tool allows its user to create the block diagram of desired circuit as input and generate the code for it and also generates its HEX file of the respective generated code.","PeriodicalId":166507,"journal":{"name":"2015 International Conference on Emerging Technologies (ICET)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131409433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Generalized method for harmonic elimination in two and three level voltage sourced converters 二电平和三电平电压源变换器谐波消除的广义方法
2015 International Conference on Emerging Technologies (ICET) Pub Date : 2015-12-01 DOI: 10.1109/ICET.2015.7389186
Zunaib Ali, N. Christofides, M. Tahir, K. Saleem, Mehmoona Gul, Syed Riaz ul Hasnain, B. Khan
{"title":"Generalized method for harmonic elimination in two and three level voltage sourced converters","authors":"Zunaib Ali, N. Christofides, M. Tahir, K. Saleem, Mehmoona Gul, Syed Riaz ul Hasnain, B. Khan","doi":"10.1109/ICET.2015.7389186","DOIUrl":"https://doi.org/10.1109/ICET.2015.7389186","url":null,"abstract":"Two and three level VSC inverters are the building blocks of most of inverter applications necessitating the employment of appropriate switching techniques that result in harmonic free sinusoidal output. The paper presents the generalized method for harmonic elimination in two and three level voltage sourced converter. The technique used for suppression of selective low-ordered harmonics form the inverter's output voltage waveform is Selective harmonic elimination (SHE). The inverter's output voltage waveform is mathematically modeled using Fourier series that results in the system of nonlinear equations. The non-linear equations are solved for eliminating the specific low order harmonics. The main objective in calculating appropriate switching angle is to minimize the value of Total Harmonic Distortion (THD). To solve the system of non-linear equations numerical method Newton Raphson is applied and appropriate switching angles are calculated. The remaining uneliminated higher order harmonics are eliminated by connecting appropriate value of filter at the output stage of VSC inverter. The model of two level VSC is simulated in SimPowerSystem Matlab tool bar together with the algorithm of Newton Raphson technique. The time domain plot and frequency spectrum of inverter's output waveform is presented in the results section. The results of two and three level VSC inverters are analyzed and debated together with the comparative analysis on the basis of THD. Moreover, a comparison is presented on the basis of IEEE standard Std. 519 and EN 50160.","PeriodicalId":166507,"journal":{"name":"2015 International Conference on Emerging Technologies (ICET)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124870502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A survey on block based copy move image forgery detection techniques 基于块的复制移动图像伪造检测技术综述
2015 International Conference on Emerging Technologies (ICET) Pub Date : 2015-12-01 DOI: 10.1109/ICET.2015.7389169
Toqeer Mahmood, T. Nawaz, Rehan Ashraf, Mohsin Shah, Zakir Khan, Aun Irtaza, Zahid Mehmood
{"title":"A survey on block based copy move image forgery detection techniques","authors":"Toqeer Mahmood, T. Nawaz, Rehan Ashraf, Mohsin Shah, Zakir Khan, Aun Irtaza, Zahid Mehmood","doi":"10.1109/ICET.2015.7389169","DOIUrl":"https://doi.org/10.1109/ICET.2015.7389169","url":null,"abstract":"In today's modern life, digital images have significant importance because they have become a leading source of information dissemination. However, the availability of image editing tools made it easier to forge the contents of a digital image; making the authenticity untrustful. Different techniques can be used to forge the digital images. Copy move forgery is the most popular and common approach where a specific part of an image is copied and pasted elsewhere in the same image to conceal unwanted part or object. In this study, we attempted to survey several passive block based copy move forgery detection techniques. A passive technique attempts to identify forgery in digital images without any prior information. A comparison between various techniques is also included.","PeriodicalId":166507,"journal":{"name":"2015 International Conference on Emerging Technologies (ICET)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127457430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Wrinkles energy based age estimation using discrete cosine transform 基于离散余弦变换的皱纹能量年龄估计
2015 International Conference on Emerging Technologies (ICET) Pub Date : 2015-12-01 DOI: 10.1109/ICET.2015.7389184
Sahib Khan, Shamrez Khan, T. Khan, A. Hussain, Abubakar Siddique, Nasir Ahmad
{"title":"Wrinkles energy based age estimation using discrete cosine transform","authors":"Sahib Khan, Shamrez Khan, T. Khan, A. Hussain, Abubakar Siddique, Nasir Ahmad","doi":"10.1109/ICET.2015.7389184","DOIUrl":"https://doi.org/10.1109/ICET.2015.7389184","url":null,"abstract":"Human's faces are true representative of a human and information like gender, age and origin about a human. Age estimation on the bases of facial image is a complex phenomenon for the computer vision systems to predict human's age effectively. Facial image based Age estimation analysis has a lot of real world applications e.g. human computer interaction (HCI) and multimedia communication. In this paper a new method to predict human's age is presented. The proposed method is focusing on cheek's area and wrinkles analysis using discrete cosine transform (DCT). As the wrinkles on human face increase with increasing age, so it has been used as discriminating factor for age estimation. DCT is applied on the wrinkle detected. The energy in higher coefficients of DCT increases with the increasing wrinkle in other words with increasing age.","PeriodicalId":166507,"journal":{"name":"2015 International Conference on Emerging Technologies (ICET)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126920242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信