Affan Hasan Khan, O. Khalid, A. Mumtaz, M. K. Islam
{"title":"DWDM based system for optical generation and transmission of impulse radio UWB signals","authors":"Affan Hasan Khan, O. Khalid, A. Mumtaz, M. K. Islam","doi":"10.1109/ICET.2011.6048465","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048465","url":null,"abstract":"This paper presents a simple technique for generation of Impulse Radio Ultra-wideband pulses in optical domain. This system can transmit the data in Giga-bits-per-second range for 32 users across a 1 km optical fiber link using Dense Wavelength Division Multiplexing (DWDM). A multiple access technique using Direct Sequence Ultra-wideband (DS UWB) pulses has also been presented. Moreover, we have analyzed the relationship between the input data rate and signal bandwidth and also studied the effect of pulse width on the bandwidth of a signal.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124815210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient authentication and key establishment scheme for heterogeneous sensor networks","authors":"Sarmad Ullah Khan, Rafiullah Khan","doi":"10.1109/ICET.2011.6048451","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048451","url":null,"abstract":"Wireless Sensor Networks (WSNs) consists of a large number of small and resource constrained devices. Due to their low cost, flexibility and self-organizing nature, these devices are used in various applications such as home and industrial automation, environmental and habitat monitoring and even in more security sensitive military applications in which security of the information in terms of both snooping and tampering is very important. Such applications introduce various security challenges to these resource constrained devices. To cope with these challenges, a proper authentication and key establishment is required. In this paper, we present an effective authentication and key establishment scheme for the heterogeneous sensor networks. The proposed solution is tested using the OMNET++ simulator and results show that it provides better network connectivity, consume less memory and has better network resilience against attacks.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130015549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A framework based on OWL-S for healthcare information provision","authors":"S. Iftikhar, Farooq Ahmad, Kiran Fatima","doi":"10.1109/ICET.2011.6048449","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048449","url":null,"abstract":"In healthcare domain there is a plethora of health information but no mechanism of satisfying customized users' requirements and providing demand oriented information. Healthcare domain is facing challenge of finding healthcare information that meets user requirements. Semantics can provide interoperable, automated and seamlessly meaningful communication for healthcare domain. Healthcare information is increasing with the increase of medical databases over the internet. In this matter provision of right information to appropriate users over the web is a great challenge. Semantic web technologies can address this issue by ensuring extensible, flexible and efficient information discovery related to diseases and clinical processes. We proposed a semantic registry that will be a service registry as well as metadata registry. It will manage healthcare information and processes in a consistent way in compliance with emerging international standards and technical specifications. We evaluate our system through Patient Registration Scenario implemented semantically through our OWL-S framework.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127425567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Camera network localization using trajectory estimation","authors":"N. Anjum, M. J. Mirza, A. Cavallaro","doi":"10.1109/ICET.2011.6048454","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048454","url":null,"abstract":"We present an algorithm for non-overlapping camera network localization using trajectory estimation. The localization refers to the extrinsic calibration of a network i.e., the recovery of relative position and orientation of each camera in the network on a common ground plane coordinate system. To this end, Kalman filtering is initially used to model the observed trajectories in each camera's field of view. This information is then used to estimate the missing trajectory information in the unobserved regions by integrating the results of forward and backward linear regression estimation from adjacent cameras. These estimated trajectories are then filtered and used to recover the relative position and orientation of the cameras by analyzing the estimated and observed exit and entry points of an object in each camera's field of view. We fix one camera as a reference and find the final configuration of the network by adjusting the remaining cameras with respect to this reference. We evaluate performance of the algorithm on both simulated and real data and compare the results with state-of-the-art approaches.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121325845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient implementation of linearisation attacks on F-FCSR-16 type key-stream generators","authors":"Arshad Ali","doi":"10.1109/ICET.2011.6048468","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048468","url":null,"abstract":"Feedback with Carry Shift Registers (FCSRs) are being explored as a potential replacement of Linear Feedback Shift Registers (LFSRs) in the design of stream ciphers. Many cryptographic schemes based on FCSRs have been proposed in the open literature. The most efficient attack against ciphers based on FCSRs are ‘linearisation attacks’, which consists of three variants, namely ‘Conventional Linearisation Attacks (CLAs)’, ‘Fast Linearisation Attacks (FLAs)’ and ‘Improved Linearisation Attacks (ILAs)’. This paper describes applications of linearisation attacks on F-FCSR-16 key-stream generator. For this purpose, the paper presents State Recovery Algorithms (SRAs) based on CLAs, FLAs and ILAs for F-FCSR-16. The paper also presents efficient techniques of implementation for these attacks on F-FCSR-16 type key-stream generators. Further more, the paper also presents a comparative analysis of the results of CLAs, FLAs and ILAs on F-FCSR-16 key-stream generator. This analysis shows the trade-offs between CLAs, FLAs and ILAs in terms of data time and memory complexities, when compared with each other and determines the relative efficiency of these attacks on F-FCSR-16.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126192760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MIPS64 user mode emulation: A case study in open source software engineering","authors":"K. Butt, Ehsan-ul-Haq, A. Qadeer, A. Waheed","doi":"10.1109/ICET.2011.6048477","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048477","url":null,"abstract":"This paper presents our experience of developing Octeon MIPS64r2 ‘User Mode Emulation’ (UME) support into open source ‘Quick Emulator’ (QEMU). QEMU can emulate numerous target architectures. Like many other open source projects, available documentation of the software is either scant or stale. Modifying and extending such code becomes especially challenging due to the sheer size of the code base (654K lines of code spread over 1251 source files). Sporadic or no developer support makes things even more challenging. Therefore, a team of developers is effectively left with the source code to understand it and to correctly change it without causing any regression bugs. We overcame this challenge using methodical software engineering techniques. This paper discusses various problems that we encountered and solutions that we employed. In addition, we present QEMU's software architecture, which we constructed in a bottom-up manner using source code. We believe that such experiences are relevant for understanding and extending any software of substantial size.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126669078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis, design, and simulation of phased array radar front-end","authors":"M. Afzal, A. A. Qureshi, M. Tarar, T. Tauqeer","doi":"10.1109/ICET.2011.6048452","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048452","url":null,"abstract":"Phased array technology has brought revolution not only in the defense but also in the commercial industry. Considering the development taking place in this area, it can be safely said that the future belongs to the phased array technology. This paper presents system level modeling and integration of the front end of phased array radar. This includes the modeling and simulation of an antenna array, transceiver (TR) module and the target detection. Concept of beam formation and steering is also explained with the help of simulation. The system level modeling is carried out in Advance Design System (ADS) and Momentum — an Electromagnetic (EM) tool of ADS. An effort in the simulations is made towards the realization, understanding and highlighting the challenges involved in the practical implementation of the system.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126964232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Video segmentation into scenes using entropy and SURF","authors":"Junaid Baber, N. Afzulpurkar, Maheen Bakhtyar","doi":"10.1109/ICET.2011.6048496","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048496","url":null,"abstract":"In this paper we present a framework for video segmentation into scenes. Segmenting videos into scenes is the basic step for video analysis, efficient video indexing and content-based video retrieval. In our framework we used frame entropy and SURF descriptor to find shot boundaries from the videos. We extracted key frames from each shot and segmented the video into semantic scenes by key frame matching. The proposed algorithm gave promising results when applied to different genres of videos and dramas.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126058743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Azeem Abbas, M. Qadir, M. Ahmad, Tariq Ali, N. A. Sajid
{"title":"Graph based query trimming of conjunctive queries in semantic caching","authors":"Muhammad Azeem Abbas, M. Qadir, M. Ahmad, Tariq Ali, N. A. Sajid","doi":"10.1109/ICET.2011.6048472","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048472","url":null,"abstract":"In semantic cache query processing, an important step is query trimming. Trimming a query can potentially reduce the answer size that is required to retrieve from a remote server. Existing query trimming technique is based on Boolean logic, which inhibits several shortcomings such as after trimming it expands number of predicate terms and induces disjunction even if conjunctive queries are under consideration. It trims the query segment wise and can not process the combined semantics of all the segments in a cache. In this paper we propose a query trimming technique that is based on variation of modeling approach (graph based) used for satisfiability and implication testing. We demonstrated with a case study that our proposed technique overcomes limitations of the previous query trimming technique and hence improves semantic cache query processing.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125935444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accelerating MATLAB slow loop execution with CUDA","authors":"Ubaidullah, S. Khan","doi":"10.1109/ICET.2011.6048447","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048447","url":null,"abstract":"MATLAB's high-level programming syntax and user-friendly environment makes it best suited to write technical code. MATLAB is extensively used in a number of scientific fields, such as digital image processing, digital signal processing, mathematics (just to name a few). The significance of MATLAB's programming is its rich library of built-in functions that provide programming ease. However, MATLAB uses an interpreter which slows down the processing, especially while executing loops. This becomes a performance bottleneck in programs that make excessive use of loops. In the field of digital image processing, for example, the operations performed on a matrix usually involve many nested loop structures. Therefore, MATLAB is often exposed to the issues of slow execution and memory latency. In order to accelerate MATLAB's processing, we utilize NVIDIA's CUDA parallel processing architecture. We demonstrate that interfacing MATLAB with CUDA and parallelizing the most time-consuming portions of MATLAB's code, the processing can be speeded up significantly. As a proof of concept, we present some results of JPEG compression with MATLAB using CUDA. Not only our results show a significant performance boost in MATLAB's processing, but are also in perfect agreement with quality.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127982660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}