2011 7th International Conference on Emerging Technologies最新文献

筛选
英文 中文
Camera network localization using trajectory estimation 基于轨迹估计的摄像机网络定位
2011 7th International Conference on Emerging Technologies Pub Date : 2011-10-20 DOI: 10.1109/ICET.2011.6048454
N. Anjum, M. J. Mirza, A. Cavallaro
{"title":"Camera network localization using trajectory estimation","authors":"N. Anjum, M. J. Mirza, A. Cavallaro","doi":"10.1109/ICET.2011.6048454","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048454","url":null,"abstract":"We present an algorithm for non-overlapping camera network localization using trajectory estimation. The localization refers to the extrinsic calibration of a network i.e., the recovery of relative position and orientation of each camera in the network on a common ground plane coordinate system. To this end, Kalman filtering is initially used to model the observed trajectories in each camera's field of view. This information is then used to estimate the missing trajectory information in the unobserved regions by integrating the results of forward and backward linear regression estimation from adjacent cameras. These estimated trajectories are then filtered and used to recover the relative position and orientation of the cameras by analyzing the estimated and observed exit and entry points of an object in each camera's field of view. We fix one camera as a reference and find the final configuration of the network by adjusting the remaining cameras with respect to this reference. We evaluate performance of the algorithm on both simulated and real data and compare the results with state-of-the-art approaches.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121325845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Signal analysis, design methodolgy, and modular development of a TR module for phased array radars 相控阵雷达TR模块的信号分析、设计方法和模块化开发
2011 7th International Conference on Emerging Technologies Pub Date : 2011-10-20 DOI: 10.1109/ICET.2011.6048490
A. A. Qureshi, M. Afzal, T. Tauqeer, M. Tarar
{"title":"Signal analysis, design methodolgy, and modular development of a TR module for phased array radars","authors":"A. A. Qureshi, M. Afzal, T. Tauqeer, M. Tarar","doi":"10.1109/ICET.2011.6048490","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048490","url":null,"abstract":"Phased array radars have received considerable importance both in commercial and defense communications. Lot of research has been carried out regarding development of its necessary components such as the antenna array, transmit/receive module (TRM) and processor unit. The cost, efficiency, wide bandwidth, and fabrication technology for the TRM have been pursued as key research areas. Cost reduction techniques till date have focused on the use of high tech MMIC fabrication techniques. Literature lacks in guiding a novice design engineer working on TRM in a cost effective manner. This paper presents mathematical analysis of signals processed in a TRM to enable a design engineer understand the constraints involved in the system design. The behavioral simulation, at 2.0 GHz, of TR module has been performed and, simulated results of phase shifter and TR switch sub-modules are also presented. Detailed system simulation is performed using lumped components for cost effective implementation in a lab environment. The results depict a close realization of the mathematical formulation.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116434331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A framework based on OWL-S for healthcare information provision 用于医疗保健信息提供的基于OWL-S的框架
2011 7th International Conference on Emerging Technologies Pub Date : 2011-10-20 DOI: 10.1109/ICET.2011.6048449
S. Iftikhar, Farooq Ahmad, Kiran Fatima
{"title":"A framework based on OWL-S for healthcare information provision","authors":"S. Iftikhar, Farooq Ahmad, Kiran Fatima","doi":"10.1109/ICET.2011.6048449","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048449","url":null,"abstract":"In healthcare domain there is a plethora of health information but no mechanism of satisfying customized users' requirements and providing demand oriented information. Healthcare domain is facing challenge of finding healthcare information that meets user requirements. Semantics can provide interoperable, automated and seamlessly meaningful communication for healthcare domain. Healthcare information is increasing with the increase of medical databases over the internet. In this matter provision of right information to appropriate users over the web is a great challenge. Semantic web technologies can address this issue by ensuring extensible, flexible and efficient information discovery related to diseases and clinical processes. We proposed a semantic registry that will be a service registry as well as metadata registry. It will manage healthcare information and processes in a consistent way in compliance with emerging international standards and technical specifications. We evaluate our system through Patient Registration Scenario implemented semantically through our OWL-S framework.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127425567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparison of reconstruction and example-based Super-Resolution 重建与基于实例的超分辨率的比较
2011 7th International Conference on Emerging Technologies Pub Date : 2011-10-20 DOI: 10.1109/ICET.2011.6048463
Rehanullah Khan, Robert Sablatnig, Abdul Bais, Y. M. Khawaja
{"title":"Comparison of reconstruction and example-based Super-Resolution","authors":"Rehanullah Khan, Robert Sablatnig, Abdul Bais, Y. M. Khawaja","doi":"10.1109/ICET.2011.6048463","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048463","url":null,"abstract":"By comparing two classes of Super-Resolution (SR) namely Example-Based Super-Resolution (EBSR) and Reconstruction-Based Super-Resolution (RBSR), we investigate two points: Firstly, which SR technique EBSR or RBSR will produce SR image that preserves Structure Similarity (SSIM) to the original image? Secondly, which SR technique will produce SR image that is more appealing to human eyes? For resultant SR image, EBSR predicts the relation between high and low frequencies in an image, whereas RBSR algorithms rely on a sequence of frames. From the experimental results on test images, we find that compared to RBSR, EBSR preserves the structure of the original image. Knowing this capability is important for detection and recognition systems. In terms of visual appearance, RBSR is preferred except when there are large motions in consecutive frames. Moreover, the aliasing artifacts cannot be removed by EBSR algorithms.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132479384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Efficient implementation of linearisation attacks on F-FCSR-16 type key-stream generators 对F-FCSR-16型密钥流发生器进行线性化攻击的有效实现
2011 7th International Conference on Emerging Technologies Pub Date : 2011-10-20 DOI: 10.1109/ICET.2011.6048468
Arshad Ali
{"title":"Efficient implementation of linearisation attacks on F-FCSR-16 type key-stream generators","authors":"Arshad Ali","doi":"10.1109/ICET.2011.6048468","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048468","url":null,"abstract":"Feedback with Carry Shift Registers (FCSRs) are being explored as a potential replacement of Linear Feedback Shift Registers (LFSRs) in the design of stream ciphers. Many cryptographic schemes based on FCSRs have been proposed in the open literature. The most efficient attack against ciphers based on FCSRs are ‘linearisation attacks’, which consists of three variants, namely ‘Conventional Linearisation Attacks (CLAs)’, ‘Fast Linearisation Attacks (FLAs)’ and ‘Improved Linearisation Attacks (ILAs)’. This paper describes applications of linearisation attacks on F-FCSR-16 key-stream generator. For this purpose, the paper presents State Recovery Algorithms (SRAs) based on CLAs, FLAs and ILAs for F-FCSR-16. The paper also presents efficient techniques of implementation for these attacks on F-FCSR-16 type key-stream generators. Further more, the paper also presents a comparative analysis of the results of CLAs, FLAs and ILAs on F-FCSR-16 key-stream generator. This analysis shows the trade-offs between CLAs, FLAs and ILAs in terms of data time and memory complexities, when compared with each other and determines the relative efficiency of these attacks on F-FCSR-16.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126192760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
MIPS64 user mode emulation: A case study in open source software engineering MIPS64用户模式仿真:开源软件工程中的一个案例研究
2011 7th International Conference on Emerging Technologies Pub Date : 2011-10-20 DOI: 10.1109/ICET.2011.6048477
K. Butt, Ehsan-ul-Haq, A. Qadeer, A. Waheed
{"title":"MIPS64 user mode emulation: A case study in open source software engineering","authors":"K. Butt, Ehsan-ul-Haq, A. Qadeer, A. Waheed","doi":"10.1109/ICET.2011.6048477","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048477","url":null,"abstract":"This paper presents our experience of developing Octeon MIPS64r2 ‘User Mode Emulation’ (UME) support into open source ‘Quick Emulator’ (QEMU). QEMU can emulate numerous target architectures. Like many other open source projects, available documentation of the software is either scant or stale. Modifying and extending such code becomes especially challenging due to the sheer size of the code base (654K lines of code spread over 1251 source files). Sporadic or no developer support makes things even more challenging. Therefore, a team of developers is effectively left with the source code to understand it and to correctly change it without causing any regression bugs. We overcame this challenge using methodical software engineering techniques. This paper discusses various problems that we encountered and solutions that we employed. In addition, we present QEMU's software architecture, which we constructed in a bottom-up manner using source code. We believe that such experiences are relevant for understanding and extending any software of substantial size.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126669078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis, design, and simulation of phased array radar front-end 相控阵雷达前端的分析、设计与仿真
2011 7th International Conference on Emerging Technologies Pub Date : 2011-10-20 DOI: 10.1109/ICET.2011.6048452
M. Afzal, A. A. Qureshi, M. Tarar, T. Tauqeer
{"title":"Analysis, design, and simulation of phased array radar front-end","authors":"M. Afzal, A. A. Qureshi, M. Tarar, T. Tauqeer","doi":"10.1109/ICET.2011.6048452","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048452","url":null,"abstract":"Phased array technology has brought revolution not only in the defense but also in the commercial industry. Considering the development taking place in this area, it can be safely said that the future belongs to the phased array technology. This paper presents system level modeling and integration of the front end of phased array radar. This includes the modeling and simulation of an antenna array, transceiver (TR) module and the target detection. Concept of beam formation and steering is also explained with the help of simulation. The system level modeling is carried out in Advance Design System (ADS) and Momentum — an Electromagnetic (EM) tool of ADS. An effort in the simulations is made towards the realization, understanding and highlighting the challenges involved in the practical implementation of the system.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126964232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Video segmentation into scenes using entropy and SURF 利用熵和SURF对视频进行场景分割
2011 7th International Conference on Emerging Technologies Pub Date : 2011-10-20 DOI: 10.1109/ICET.2011.6048496
Junaid Baber, N. Afzulpurkar, Maheen Bakhtyar
{"title":"Video segmentation into scenes using entropy and SURF","authors":"Junaid Baber, N. Afzulpurkar, Maheen Bakhtyar","doi":"10.1109/ICET.2011.6048496","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048496","url":null,"abstract":"In this paper we present a framework for video segmentation into scenes. Segmenting videos into scenes is the basic step for video analysis, efficient video indexing and content-based video retrieval. In our framework we used frame entropy and SURF descriptor to find shot boundaries from the videos. We extracted key frames from each shot and segmented the video into semantic scenes by key frame matching. The proposed algorithm gave promising results when applied to different genres of videos and dramas.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126058743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Graph based query trimming of conjunctive queries in semantic caching 语义缓存中基于图的连接查询修剪
2011 7th International Conference on Emerging Technologies Pub Date : 2011-10-20 DOI: 10.1109/ICET.2011.6048472
Muhammad Azeem Abbas, M. Qadir, M. Ahmad, Tariq Ali, N. A. Sajid
{"title":"Graph based query trimming of conjunctive queries in semantic caching","authors":"Muhammad Azeem Abbas, M. Qadir, M. Ahmad, Tariq Ali, N. A. Sajid","doi":"10.1109/ICET.2011.6048472","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048472","url":null,"abstract":"In semantic cache query processing, an important step is query trimming. Trimming a query can potentially reduce the answer size that is required to retrieve from a remote server. Existing query trimming technique is based on Boolean logic, which inhibits several shortcomings such as after trimming it expands number of predicate terms and induces disjunction even if conjunctive queries are under consideration. It trims the query segment wise and can not process the combined semantics of all the segments in a cache. In this paper we propose a query trimming technique that is based on variation of modeling approach (graph based) used for satisfiability and implication testing. We demonstrated with a case study that our proposed technique overcomes limitations of the previous query trimming technique and hence improves semantic cache query processing.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125935444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Accelerating MATLAB slow loop execution with CUDA 用CUDA加速MATLAB慢循环执行
2011 7th International Conference on Emerging Technologies Pub Date : 2011-10-20 DOI: 10.1109/ICET.2011.6048447
Ubaidullah, S. Khan
{"title":"Accelerating MATLAB slow loop execution with CUDA","authors":"Ubaidullah, S. Khan","doi":"10.1109/ICET.2011.6048447","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048447","url":null,"abstract":"MATLAB's high-level programming syntax and user-friendly environment makes it best suited to write technical code. MATLAB is extensively used in a number of scientific fields, such as digital image processing, digital signal processing, mathematics (just to name a few). The significance of MATLAB's programming is its rich library of built-in functions that provide programming ease. However, MATLAB uses an interpreter which slows down the processing, especially while executing loops. This becomes a performance bottleneck in programs that make excessive use of loops. In the field of digital image processing, for example, the operations performed on a matrix usually involve many nested loop structures. Therefore, MATLAB is often exposed to the issues of slow execution and memory latency. In order to accelerate MATLAB's processing, we utilize NVIDIA's CUDA parallel processing architecture. We demonstrate that interfacing MATLAB with CUDA and parallelizing the most time-consuming portions of MATLAB's code, the processing can be speeded up significantly. As a proof of concept, we present some results of JPEG compression with MATLAB using CUDA. Not only our results show a significant performance boost in MATLAB's processing, but are also in perfect agreement with quality.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127982660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信