Mohsin Murad, A. Rehman, A. A. Shah, Salim Ullah, Muhammad Fahad, K. Yahya
{"title":"RFAIDE — An RFID based navigation and object recognition assistant for visually impaired people","authors":"Mohsin Murad, A. Rehman, A. A. Shah, Salim Ullah, Muhammad Fahad, K. Yahya","doi":"10.1109/ICET.2011.6048486","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048486","url":null,"abstract":"In this paper, we have presented a system utilizing Radio Frequency Identification (RFID) for the assistance of blind people. The proposed system incorporates a mobile RFID reader module with an integrated ZigBee transceiver [1] for transmitting the tag's information. Utensils and other objects in the house or building are embedded with passive RFID tags (transponders) along with an audio file, recorded for and unique to each object, residing on the server. This system further takes in the way finding technique by employing an RFID tag grid [4] using an ample separation area. The reader reads the tags and transmits the data wirelessly to the server PC which in turn scans for the particular ID in the database and plays the corresponding audio file. A self designed coordinates system with a server side routing application is used for routing the person to a particular room requested, based on his current tag coordinates. The audio playback is relayed wirelessly using an FM transmitter to either a headset with FM receiver or a Smart Phone's FM radio. The feasibility and reliability of the developed system was tested by deploying the proposed system at Government Institute for Blind, Peshawar, Pakistan [6].","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129456951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Time domain simulation of dispersive materials from microwave to optical frequencies","authors":"I. Ahmed, E. Li","doi":"10.1109/ICET.2011.6048493","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048493","url":null,"abstract":"Accurate material modeling is an important factor in simulation of dispersive materials. We present different dispersive models for the simulation of dispersive materials, and can be used from microwave to optical frequencies depending on the nature of application. Most of available dispersive models are in frequency domain, to make them consistent with time domain methods; different approaches are also discussed. The alternating differential implicit finite difference time domain method (ADI-FDTD) is implemented for few dispersive models and results are compared with the FDTD method.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122413465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Embedding data in edge boundaries with high PSNR","authors":"M. Hussain, M. Hussain","doi":"10.1109/ICET.2011.6048469","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048469","url":null,"abstract":"Data hiding is one of the most significant aspects in information security. Generally data embedding is achieved in communication, image, text, voice, or multimedia content for copyright, military communication, authentication and many other purposes. Currently available data hiding techniques do not pay much attention on stego-object (hidden information in original object) with respect to its originality with cover (original) object. Both cover and stego-objects are drifted in context of (quality measure in image, like) Peak Signal to Noise Ratio (PSNR) and Mean Square Error (MSE) aspects. This paper proposes a data hiding method around the edge boundary of an object with high PSNR. The stego-image can be utilized for further processing aspects (segmentation etc). The experimental results show very high rate of PSNR. Proposed scheme is targeted for low rate of hidden data capacity with high PSNR.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115332440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Majeed, S. Mahmood, Saqib Ubaid, Naveed Khalil, Sadaf Siddiqi, Fasiha Ashraf
{"title":"A burst resolution technique for data streams management in the real-time data warehouse","authors":"F. Majeed, S. Mahmood, Saqib Ubaid, Naveed Khalil, Sadaf Siddiqi, Fasiha Ashraf","doi":"10.1109/ICET.2011.6048446","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048446","url":null,"abstract":"Data stream sources are currently emerged with the evolution of traditional data warehouse towards real-time data warehouse. Different solutions have been proposed to extract, transform and load the data streams but investigation is still needed to handle the bursts of incoming data streams. In this paper, we have proposed a flow regulation technique which regulates the fast and time varying bursts of data streams. For this purpose, we have adapted and used the token bucket that is simple and flexible mechanism having little overhead. The objective of this research is to minimize the probability of dropping data streams, synchronize processing power and balancing the load of arriving data streams. An algorithm for the flow regulation technique has been proposed to efficiently regulate the data streams. We have evaluated our technique on synthetic dataset and found that flow regulation technique works well in presence of bursty data streams.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124449237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image matching using feature set transformations","authors":"Shahid Razzaq, S. Khalid","doi":"10.1109/ICET.2011.6048473","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048473","url":null,"abstract":"The paper presents a novel idea for filtering nearest neighbor feature point pairs in order to yield greater accuracy in the image matching problem. Filtering is based on the alignment of feature points which is achieved by the application of affine transformations on the complete feature set. Using affine transformations, nearest neighbor feature point pairs from different images, which are geometrically dissimilar in the inter feature point geometrical structure in their neighboring regions, are filtered from the nearest neighbor calculations. The feature alignment resulting from the affine transformations is followed by the filtering step which removes outlier nearest neighbor feature pairs. The algorithm makes the assumption that the feature points, for a given object type, maintain their general inter feature point geometrical structure from one image to another. The algorithm can be combined with existing image matching techniques to yield greater accuracy. We show that the algorithm gives good results on known image datasets over 1-NN nearest neighbor based image matching. Furthermore we discuss the extent of increase in the inter image distance due to the filtering of outlier feature pairs.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124119532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Maira Islam, M. Fraz, Zulqarnain Zahid, Muhammad Arif
{"title":"Optimizing Common Spatial Pattern and feature extraction algorithm for Brain Computer Interface","authors":"Maira Islam, M. Fraz, Zulqarnain Zahid, Muhammad Arif","doi":"10.1109/ICET.2011.6048480","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048480","url":null,"abstract":"Brain Computer Interface is the communication channel between the brain and the computer for recording of electrical activity along the scalp produced by the firing of neurons within the brain. The brain signals which are also known as Electroencephalography (EEG) can be used to direct and control some external activity. This work reports a methodology for acquisition and detection and of EEG signals, and extraction of useful information in order to differentiate the signals related to particular type of movement. A modified Common Spatial Pattern (CSP) algorithm has been used at preprocessing stage. Logarithmic transform along with the information theoretic feature extraction has also been used for feature extraction. KNN, SVM and Artificial Neural Networks are employed for classification. The proposed methodology is tested on publically available data sets and the results are found to be comparable with the published approaches.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126494214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Version information support for software architecture recovery","authors":"Maryum Bibi, O. Maqbool","doi":"10.1109/ICET.2011.6048495","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048495","url":null,"abstract":"Software systems evolve over time due to changes in user requirements. As evolution takes place, it is often the case that documentation is not updated to reflect these changes. It thus becomes difficult to understand the systems. Higher level understanding of software systems is provided by architectural documentation, which needs to be updated through architecture recovery. For architecture recovery, unsupervised learning techniques such as clustering have been used. When recovering the architecture for a certain version, architectural information of the previous version provides useful information. However, when clustering is employed for architecture recovery, this information is typically not used. In this paper, we explore supervised learning techniques to recover the architecture of a version of a software system using architectural information of past versions. For this purpose we use Bayesian and k-Nearest-Neighbor classification techniques. We perform experiments on two open source software systems. Our results show that both techniques may be used for architecture recovery when version information is available. Moreover, the performance of Bayesian classifier is better than that of the k-Nearest-Neighbor classifier.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127432841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of autonomous Lawn-Mower Robot controller","authors":"M. Wasif","doi":"10.1109/ICET.2011.6048466","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048466","url":null,"abstract":"The objective of this paper is to design and implement a Behavior-Based Lawn Mower Robot controller that can be used to mow grass from lawns and play grounds autonomously. The controller uses “sense-act” approach to work in dynamic, unstructured and unknown environment without having any reliance on surrounding world information. The controller is implemented using Motor Schema architecture, which uses continuous response encoding and cooperative coordination method for behavior coordination. A set of concurrently running behaviors are defined to perform mowing operation. Sonar ranging is used to detect and avoid obstacles. Shaft and visual odometry in coordinated form are exploited for local positioning, while Global Positioning System (GPS) is used for global positioning. Camera is used to detect grass field and optocouple sensors are utilized to differentiate between mown and un-mown grass.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122256980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shamyl Bin Mansoor, Zaheer Mukhtar, Muddassir Malik, Zohaib Amjad, H. Qureshi
{"title":"Parameter evaluation for virtual Laparoscopic simulation","authors":"Shamyl Bin Mansoor, Zaheer Mukhtar, Muddassir Malik, Zohaib Amjad, H. Qureshi","doi":"10.1109/ICET.2011.6048481","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048481","url":null,"abstract":"Virtual Reality based surgical simulators have become quite common for training of surgeons for different surgical skills. Simulators have been widely used particularly in minimal invasive surgery. In this paper we find parameters that would be required to create a real time working simulation for exercises given in the Fundamentals of Laparoscopic Surgery curriculum. We use peg transfer exercise as our example in this work and create simulations for parameter analysis using SOFA, an open source surgical framework [1]. The parameters we choose are generic and can be used to create other more complex simulations like cholecystectomy [2] (gall bladder removal) and appendectomy (appendix removal). We show the implementation of these parameters and their behavior in a virtual reality surgical simulation. This work can be used by researchers and developers to choose the right parameters in the context of the simulation they are developing. It also shows the cost and behavior of achieving good visualization (frames per second), physical characteristics and a realistic behavioral model to be used in simulations for training purposes.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132582554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient signcryption schemes based on Hyperelliptic curve cryptosystem","authors":"Nizamuddin, S. A. Ch, W. Nasar, Qaisar Javaid","doi":"10.1109/ICET.2011.6048467","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048467","url":null,"abstract":"Securing data over wireless medium got significant importance because of inherent problems of power, memory and processing constraints. Hyper elliptic curve cryptosystem (HECC) is an emerging public key cryptosystem suitable for such resource constrained environment due to its high efficiency and shorter key size, HECC can be used for digital signatures and encryption to provide confidentiality and authenticity. In this paper, we proposed a resource efficient signcryption schemes based on Hyperelliptic curve cryptosystem. Compared with existing schemes our proposed scheme can save up to 40% computational cost and a minimum of 40% of Communication Overhead.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133346707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}