{"title":"Camera network localization using trajectory estimation","authors":"N. Anjum, M. J. Mirza, A. Cavallaro","doi":"10.1109/ICET.2011.6048454","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048454","url":null,"abstract":"We present an algorithm for non-overlapping camera network localization using trajectory estimation. The localization refers to the extrinsic calibration of a network i.e., the recovery of relative position and orientation of each camera in the network on a common ground plane coordinate system. To this end, Kalman filtering is initially used to model the observed trajectories in each camera's field of view. This information is then used to estimate the missing trajectory information in the unobserved regions by integrating the results of forward and backward linear regression estimation from adjacent cameras. These estimated trajectories are then filtered and used to recover the relative position and orientation of the cameras by analyzing the estimated and observed exit and entry points of an object in each camera's field of view. We fix one camera as a reference and find the final configuration of the network by adjusting the remaining cameras with respect to this reference. We evaluate performance of the algorithm on both simulated and real data and compare the results with state-of-the-art approaches.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121325845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Signal analysis, design methodolgy, and modular development of a TR module for phased array radars","authors":"A. A. Qureshi, M. Afzal, T. Tauqeer, M. Tarar","doi":"10.1109/ICET.2011.6048490","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048490","url":null,"abstract":"Phased array radars have received considerable importance both in commercial and defense communications. Lot of research has been carried out regarding development of its necessary components such as the antenna array, transmit/receive module (TRM) and processor unit. The cost, efficiency, wide bandwidth, and fabrication technology for the TRM have been pursued as key research areas. Cost reduction techniques till date have focused on the use of high tech MMIC fabrication techniques. Literature lacks in guiding a novice design engineer working on TRM in a cost effective manner. This paper presents mathematical analysis of signals processed in a TRM to enable a design engineer understand the constraints involved in the system design. The behavioral simulation, at 2.0 GHz, of TR module has been performed and, simulated results of phase shifter and TR switch sub-modules are also presented. Detailed system simulation is performed using lumped components for cost effective implementation in a lab environment. The results depict a close realization of the mathematical formulation.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116434331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A framework based on OWL-S for healthcare information provision","authors":"S. Iftikhar, Farooq Ahmad, Kiran Fatima","doi":"10.1109/ICET.2011.6048449","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048449","url":null,"abstract":"In healthcare domain there is a plethora of health information but no mechanism of satisfying customized users' requirements and providing demand oriented information. Healthcare domain is facing challenge of finding healthcare information that meets user requirements. Semantics can provide interoperable, automated and seamlessly meaningful communication for healthcare domain. Healthcare information is increasing with the increase of medical databases over the internet. In this matter provision of right information to appropriate users over the web is a great challenge. Semantic web technologies can address this issue by ensuring extensible, flexible and efficient information discovery related to diseases and clinical processes. We proposed a semantic registry that will be a service registry as well as metadata registry. It will manage healthcare information and processes in a consistent way in compliance with emerging international standards and technical specifications. We evaluate our system through Patient Registration Scenario implemented semantically through our OWL-S framework.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127425567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rehanullah Khan, Robert Sablatnig, Abdul Bais, Y. M. Khawaja
{"title":"Comparison of reconstruction and example-based Super-Resolution","authors":"Rehanullah Khan, Robert Sablatnig, Abdul Bais, Y. M. Khawaja","doi":"10.1109/ICET.2011.6048463","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048463","url":null,"abstract":"By comparing two classes of Super-Resolution (SR) namely Example-Based Super-Resolution (EBSR) and Reconstruction-Based Super-Resolution (RBSR), we investigate two points: Firstly, which SR technique EBSR or RBSR will produce SR image that preserves Structure Similarity (SSIM) to the original image? Secondly, which SR technique will produce SR image that is more appealing to human eyes? For resultant SR image, EBSR predicts the relation between high and low frequencies in an image, whereas RBSR algorithms rely on a sequence of frames. From the experimental results on test images, we find that compared to RBSR, EBSR preserves the structure of the original image. Knowing this capability is important for detection and recognition systems. In terms of visual appearance, RBSR is preferred except when there are large motions in consecutive frames. Moreover, the aliasing artifacts cannot be removed by EBSR algorithms.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132479384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient implementation of linearisation attacks on F-FCSR-16 type key-stream generators","authors":"Arshad Ali","doi":"10.1109/ICET.2011.6048468","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048468","url":null,"abstract":"Feedback with Carry Shift Registers (FCSRs) are being explored as a potential replacement of Linear Feedback Shift Registers (LFSRs) in the design of stream ciphers. Many cryptographic schemes based on FCSRs have been proposed in the open literature. The most efficient attack against ciphers based on FCSRs are ‘linearisation attacks’, which consists of three variants, namely ‘Conventional Linearisation Attacks (CLAs)’, ‘Fast Linearisation Attacks (FLAs)’ and ‘Improved Linearisation Attacks (ILAs)’. This paper describes applications of linearisation attacks on F-FCSR-16 key-stream generator. For this purpose, the paper presents State Recovery Algorithms (SRAs) based on CLAs, FLAs and ILAs for F-FCSR-16. The paper also presents efficient techniques of implementation for these attacks on F-FCSR-16 type key-stream generators. Further more, the paper also presents a comparative analysis of the results of CLAs, FLAs and ILAs on F-FCSR-16 key-stream generator. This analysis shows the trade-offs between CLAs, FLAs and ILAs in terms of data time and memory complexities, when compared with each other and determines the relative efficiency of these attacks on F-FCSR-16.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126192760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MIPS64 user mode emulation: A case study in open source software engineering","authors":"K. Butt, Ehsan-ul-Haq, A. Qadeer, A. Waheed","doi":"10.1109/ICET.2011.6048477","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048477","url":null,"abstract":"This paper presents our experience of developing Octeon MIPS64r2 ‘User Mode Emulation’ (UME) support into open source ‘Quick Emulator’ (QEMU). QEMU can emulate numerous target architectures. Like many other open source projects, available documentation of the software is either scant or stale. Modifying and extending such code becomes especially challenging due to the sheer size of the code base (654K lines of code spread over 1251 source files). Sporadic or no developer support makes things even more challenging. Therefore, a team of developers is effectively left with the source code to understand it and to correctly change it without causing any regression bugs. We overcame this challenge using methodical software engineering techniques. This paper discusses various problems that we encountered and solutions that we employed. In addition, we present QEMU's software architecture, which we constructed in a bottom-up manner using source code. We believe that such experiences are relevant for understanding and extending any software of substantial size.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126669078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis, design, and simulation of phased array radar front-end","authors":"M. Afzal, A. A. Qureshi, M. Tarar, T. Tauqeer","doi":"10.1109/ICET.2011.6048452","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048452","url":null,"abstract":"Phased array technology has brought revolution not only in the defense but also in the commercial industry. Considering the development taking place in this area, it can be safely said that the future belongs to the phased array technology. This paper presents system level modeling and integration of the front end of phased array radar. This includes the modeling and simulation of an antenna array, transceiver (TR) module and the target detection. Concept of beam formation and steering is also explained with the help of simulation. The system level modeling is carried out in Advance Design System (ADS) and Momentum — an Electromagnetic (EM) tool of ADS. An effort in the simulations is made towards the realization, understanding and highlighting the challenges involved in the practical implementation of the system.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126964232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Video segmentation into scenes using entropy and SURF","authors":"Junaid Baber, N. Afzulpurkar, Maheen Bakhtyar","doi":"10.1109/ICET.2011.6048496","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048496","url":null,"abstract":"In this paper we present a framework for video segmentation into scenes. Segmenting videos into scenes is the basic step for video analysis, efficient video indexing and content-based video retrieval. In our framework we used frame entropy and SURF descriptor to find shot boundaries from the videos. We extracted key frames from each shot and segmented the video into semantic scenes by key frame matching. The proposed algorithm gave promising results when applied to different genres of videos and dramas.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126058743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Azeem Abbas, M. Qadir, M. Ahmad, Tariq Ali, N. A. Sajid
{"title":"Graph based query trimming of conjunctive queries in semantic caching","authors":"Muhammad Azeem Abbas, M. Qadir, M. Ahmad, Tariq Ali, N. A. Sajid","doi":"10.1109/ICET.2011.6048472","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048472","url":null,"abstract":"In semantic cache query processing, an important step is query trimming. Trimming a query can potentially reduce the answer size that is required to retrieve from a remote server. Existing query trimming technique is based on Boolean logic, which inhibits several shortcomings such as after trimming it expands number of predicate terms and induces disjunction even if conjunctive queries are under consideration. It trims the query segment wise and can not process the combined semantics of all the segments in a cache. In this paper we propose a query trimming technique that is based on variation of modeling approach (graph based) used for satisfiability and implication testing. We demonstrated with a case study that our proposed technique overcomes limitations of the previous query trimming technique and hence improves semantic cache query processing.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125935444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accelerating MATLAB slow loop execution with CUDA","authors":"Ubaidullah, S. Khan","doi":"10.1109/ICET.2011.6048447","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048447","url":null,"abstract":"MATLAB's high-level programming syntax and user-friendly environment makes it best suited to write technical code. MATLAB is extensively used in a number of scientific fields, such as digital image processing, digital signal processing, mathematics (just to name a few). The significance of MATLAB's programming is its rich library of built-in functions that provide programming ease. However, MATLAB uses an interpreter which slows down the processing, especially while executing loops. This becomes a performance bottleneck in programs that make excessive use of loops. In the field of digital image processing, for example, the operations performed on a matrix usually involve many nested loop structures. Therefore, MATLAB is often exposed to the issues of slow execution and memory latency. In order to accelerate MATLAB's processing, we utilize NVIDIA's CUDA parallel processing architecture. We demonstrate that interfacing MATLAB with CUDA and parallelizing the most time-consuming portions of MATLAB's code, the processing can be speeded up significantly. As a proof of concept, we present some results of JPEG compression with MATLAB using CUDA. Not only our results show a significant performance boost in MATLAB's processing, but are also in perfect agreement with quality.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127982660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}