{"title":"Optimizing speed of mobile data collector in Wireless Sensor Network","authors":"Ali Sayyed, Leandro Buss Becker","doi":"10.1109/ICET.2015.7389213","DOIUrl":"https://doi.org/10.1109/ICET.2015.7389213","url":null,"abstract":"Introducing mobility in some of the components of WSN is one of the promising techniques for improving performance of the network in terms of connectivity, lifetime, data collection and data latency. Deliberate and controlled mobility, when best adjusted in terms of trajectory and speed, enhance the performance of the network to a desired level. This paper focus on the implementation details and performance analysis of controlling and fine tuning the speed of mobile data collector in WSNs. We consider a sensor network where nodes are deployed and organized into clusters on the basis of distance from each other. Nodes sense their environment and transmit data to their corresponding cluster heads, which in turn send it to a mobile data collector when it is in communication range. The goal is to optimize the speed of mobile data collector, and enable it to adaptively adjust it motion; move slower in areas where more time is needed to collect the required data and speeds up where there are no such constraints. This is achieved through cooperation between mobile nodes and static sensor nodes, through information sharing. Our simulation results show significant increase in data collection rate and reduction in the overall time and number of laps mobile data collector spend in data gathering.","PeriodicalId":166507,"journal":{"name":"2015 International Conference on Emerging Technologies (ICET)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115437594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimizing NEURON brain simulator with Remote Memory Access on distributed memory systems","authors":"Danish Shehzad, Z. Bozkus","doi":"10.1109/ICET.2015.7389167","DOIUrl":"https://doi.org/10.1109/ICET.2015.7389167","url":null,"abstract":"The Complex neuronal network models require support from simulation environment for efficient network simulations. To compute the models increasing complexity necessitated the efforts to parallelize the NEURON simulation environment. The computational neuroscientists have extended NEURON by dividing the equations for its subnet among multiple processors for increasing the competence of hardware. For spiking neuronal networks inter-processor spikes exchange consume significant portion of overall simulation time on parallel machines. In NEURON Message Passing Interface (MPI) is used for inter processor spikes exchange, MPI_Allgather collective operation is used for spikes exchange generated after each interval across distributed memory systems. However, as the number of processors become larger and larger MPI_Allgather method become bottleneck and needs efficient exchange method to reduce the spike exchange time. This work has improved MPI_Allgather method to Remote Memory Access (RMA) based on MPI-3.0 for NEURON simulation environment, MPI based on RMA provides significant advantages through increased communication concurrency in consequence enhances efficiency of NEURON and scaling the overall run time for the simulation of large network models1.","PeriodicalId":166507,"journal":{"name":"2015 International Conference on Emerging Technologies (ICET)","volume":"606 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115108030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Ullah, Asad I. Khan, Farhan Ullah, I. Khan, I. Khan, S. Jan
{"title":"Performance analysis of two-relay cooperative cognitive network with path loss effect","authors":"S. Ullah, Asad I. Khan, Farhan Ullah, I. Khan, I. Khan, S. Jan","doi":"10.1109/ICET.2015.7389189","DOIUrl":"https://doi.org/10.1109/ICET.2015.7389189","url":null,"abstract":"This paper conducts the comparative study of cooperative cognitive radio networks using Decode and Forward (DF) protocol at the relays. The aim of the study is to decrease the uncertain noise along with provision of efficient energy detection technique. Moreover, the detection accuracy and capability of the network in AWGN channel has been investigated by the addition of path loss effect. Multiple relays are used in different scenarios considering distances from source and destination. Path loss exponent is set as 3 and Monte Carlo simulations are performed for the desired results. The proposed system has been evaluated based on the Detection Probability (Pd), Unavailable Probability (Pna) and Collision Probability (Pc).","PeriodicalId":166507,"journal":{"name":"2015 International Conference on Emerging Technologies (ICET)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126458187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Nazreen Bin Zainal Abidin, S. Ali, Syed Hasan Adil
{"title":"3-degree-of-freedom real-time human hand following robot arm using visual feedback","authors":"M. Nazreen Bin Zainal Abidin, S. Ali, Syed Hasan Adil","doi":"10.1109/ICET.2015.7389202","DOIUrl":"https://doi.org/10.1109/ICET.2015.7389202","url":null,"abstract":"This paper presents a simple approach to mimic human motion. The objective of this research is to mimic the human motions using visual feedback and convert it into robotic motion. A 3 degree-of-freedom robotic arm is developed that utilizes visual feedback capturing the human hand motion. The motion of the robotic arm is governed by converting the workspace configuration into configuration space using inverse kinematics. The proposed approach is applied to freehand drawing and is implemented in real-time. The real-time human hand following robot arm shows that it can be used for environments endangered for humans effectively.","PeriodicalId":166507,"journal":{"name":"2015 International Conference on Emerging Technologies (ICET)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124451340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel approach for blind separation dereverberation of speech mixtures using multiplestep linear predictive coding","authors":"W. Ehsan, T. Jan","doi":"10.1109/ICET.2015.7389191","DOIUrl":"https://doi.org/10.1109/ICET.2015.7389191","url":null,"abstract":"A new method for the combination of blind separation and dereverberation of speech signals using linear convolutive mixing model is presented. The proposed algorithm consists of two parts. In the first part pre-filtering process is applied on speech mixtures to predict late reverberations by employing long-term multiple-step linear prediction (MSLP) and then these late reverberations are mitigated by using spectral subtraction (SS) technique. In the second part, a source separation technique has been applied consisting of various steps. Here in this part, first Independent component analysis (ICA) algorithm is used to separate target speech sources from sensor readings using the assumptions that sources involved in the mixing process are independent. Then by differentiating energy of individual time-frequency signatures of the separated target speech signals we compute ideal binary mask (IBM). Finally artifacts are suppressed which are normally the basis of time varying nature of IBM by means of cepstral smoothing. Simulated environment for reverberant mixtures is used to analyse the efficiency of our proposed algorithm. Simulations results evaluated in terms of signal to noise ratio (SNR) indicate a considerably enhanced quality of segregated speech as compared to a previous method.","PeriodicalId":166507,"journal":{"name":"2015 International Conference on Emerging Technologies (ICET)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127780581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced gain metamaterial-based Leaky-wave beam-forming antenna for the V2X communication","authors":"M. K. Khattak, S. Kahng","doi":"10.1109/ICET.2015.7389172","DOIUrl":"https://doi.org/10.1109/ICET.2015.7389172","url":null,"abstract":"In this paper, a (Composite Right/ Left Hand) CRLH Leaky-wave two-dimensional array antenna for hemispherical beam-forming aimed at V2X communication is proposed. This antenna is composed of 4×4 feed-network and 4 rows of CRLH leaky-wave radiating structures that adopt the capacitive inter-element coupled mushrooms. Every single capacitive coupling uses 0.75 pF. We will show beam-forming and enhanced gain performances.","PeriodicalId":166507,"journal":{"name":"2015 International Conference on Emerging Technologies (ICET)","volume":"343 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134172870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Altaf Hussain, Mudassar Riaz, Zain Ul Abdin, Afshah Saeed
{"title":"Automatic programmer: A software tool","authors":"Altaf Hussain, Mudassar Riaz, Zain Ul Abdin, Afshah Saeed","doi":"10.1109/ICET.2015.7389205","DOIUrl":"https://doi.org/10.1109/ICET.2015.7389205","url":null,"abstract":"Nowadays, Microcontroller has great impact in our life which can't be ignored. Many automatically controlled products i.e. automobile engine control systems, and embedded systems etc. are being programmed using microcontroller. Any person working in the field of electronics has knowledge to use a microcontroller but it's difficult for him/her to write code for microcontroller because every person may not have good programming skills to write code for microcontroller. So it's really tough task to program a microcontroller for such person. Our work aims to provide a solution in the form of Automatic Programmer for electronic engineers with such problems. It is basically software solution that allows the user to generate the code for microcontroller by providing a desired block diagram as an input. This tool allows its user to create the block diagram of desired circuit as input and generate the code for it and also generates its HEX file of the respective generated code.","PeriodicalId":166507,"journal":{"name":"2015 International Conference on Emerging Technologies (ICET)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131409433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zunaib Ali, N. Christofides, M. Tahir, K. Saleem, Mehmoona Gul, Syed Riaz ul Hasnain, B. Khan
{"title":"Generalized method for harmonic elimination in two and three level voltage sourced converters","authors":"Zunaib Ali, N. Christofides, M. Tahir, K. Saleem, Mehmoona Gul, Syed Riaz ul Hasnain, B. Khan","doi":"10.1109/ICET.2015.7389186","DOIUrl":"https://doi.org/10.1109/ICET.2015.7389186","url":null,"abstract":"Two and three level VSC inverters are the building blocks of most of inverter applications necessitating the employment of appropriate switching techniques that result in harmonic free sinusoidal output. The paper presents the generalized method for harmonic elimination in two and three level voltage sourced converter. The technique used for suppression of selective low-ordered harmonics form the inverter's output voltage waveform is Selective harmonic elimination (SHE). The inverter's output voltage waveform is mathematically modeled using Fourier series that results in the system of nonlinear equations. The non-linear equations are solved for eliminating the specific low order harmonics. The main objective in calculating appropriate switching angle is to minimize the value of Total Harmonic Distortion (THD). To solve the system of non-linear equations numerical method Newton Raphson is applied and appropriate switching angles are calculated. The remaining uneliminated higher order harmonics are eliminated by connecting appropriate value of filter at the output stage of VSC inverter. The model of two level VSC is simulated in SimPowerSystem Matlab tool bar together with the algorithm of Newton Raphson technique. The time domain plot and frequency spectrum of inverter's output waveform is presented in the results section. The results of two and three level VSC inverters are analyzed and debated together with the comparative analysis on the basis of THD. Moreover, a comparison is presented on the basis of IEEE standard Std. 519 and EN 50160.","PeriodicalId":166507,"journal":{"name":"2015 International Conference on Emerging Technologies (ICET)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124870502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Toqeer Mahmood, T. Nawaz, Rehan Ashraf, Mohsin Shah, Zakir Khan, Aun Irtaza, Zahid Mehmood
{"title":"A survey on block based copy move image forgery detection techniques","authors":"Toqeer Mahmood, T. Nawaz, Rehan Ashraf, Mohsin Shah, Zakir Khan, Aun Irtaza, Zahid Mehmood","doi":"10.1109/ICET.2015.7389169","DOIUrl":"https://doi.org/10.1109/ICET.2015.7389169","url":null,"abstract":"In today's modern life, digital images have significant importance because they have become a leading source of information dissemination. However, the availability of image editing tools made it easier to forge the contents of a digital image; making the authenticity untrustful. Different techniques can be used to forge the digital images. Copy move forgery is the most popular and common approach where a specific part of an image is copied and pasted elsewhere in the same image to conceal unwanted part or object. In this study, we attempted to survey several passive block based copy move forgery detection techniques. A passive technique attempts to identify forgery in digital images without any prior information. A comparison between various techniques is also included.","PeriodicalId":166507,"journal":{"name":"2015 International Conference on Emerging Technologies (ICET)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127457430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sahib Khan, Shamrez Khan, T. Khan, A. Hussain, Abubakar Siddique, Nasir Ahmad
{"title":"Wrinkles energy based age estimation using discrete cosine transform","authors":"Sahib Khan, Shamrez Khan, T. Khan, A. Hussain, Abubakar Siddique, Nasir Ahmad","doi":"10.1109/ICET.2015.7389184","DOIUrl":"https://doi.org/10.1109/ICET.2015.7389184","url":null,"abstract":"Human's faces are true representative of a human and information like gender, age and origin about a human. Age estimation on the bases of facial image is a complex phenomenon for the computer vision systems to predict human's age effectively. Facial image based Age estimation analysis has a lot of real world applications e.g. human computer interaction (HCI) and multimedia communication. In this paper a new method to predict human's age is presented. The proposed method is focusing on cheek's area and wrinkles analysis using discrete cosine transform (DCT). As the wrinkles on human face increase with increasing age, so it has been used as discriminating factor for age estimation. DCT is applied on the wrinkle detected. The energy in higher coefficients of DCT increases with the increasing wrinkle in other words with increasing age.","PeriodicalId":166507,"journal":{"name":"2015 International Conference on Emerging Technologies (ICET)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126920242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}