{"title":"QoS-aware device selection using user preferences for tasks in ubiquitous environments","authors":"M. E. Ahmed, H. Mukhtar, D. Belaid, J. Song","doi":"10.1109/ICET.2011.6048484","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048484","url":null,"abstract":"Ubiquitous environments are characterized by devices that share information with one another. Such environments can be created dynamically by creating association between devices at runtime. This association requires selection of services on these devices, a technique known as service composition. The existing service composition approaches are mostly restricted to service matching and consider functional aspects of the association only. We propose a QoS-aware device selection in the ubiquitous environment, but also integrating user-preferences with QoS by taking into account network heterogeneity (variety of access technologies). We search for the nearly optimal solution among a number of candidate solutions of service composition that maximizes QoS parameters and user-preferences specified by user keeping in view network heterogeneity.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"46 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130798148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Position-based and geocast routing protocols in VANETs","authors":"Huma Ghafoor, K. Aziz","doi":"10.1109/ICET.2011.6048483","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048483","url":null,"abstract":"We study position-based and geocast routing protocols, which are two categories of Vehicular Ad-hoc Network (VANETs) routing protocols based on the information of position and location respectively. Two scenarios for position-based routing are discussed — the highway scenario and the city scenario. We also study geocast routing protocols that are based on flooding by defining the forwarding zone. Forwarding zone is the region where the destination node is located. The advantages and challenges for these position-based and geocast routing protocols are also discussed followed by a discussion on the suitability of the position-based protocols for the highway and city scenarios.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124391497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Threat modeling using formal methods: A new approach to develop secure web applications","authors":"Shafiq Hussain, H. Erwin, P. Dunne","doi":"10.1109/ICET.2011.6048492","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048492","url":null,"abstract":"Software security problems exist since the early days of computer systems. Operating system level approaches, network level approaches and machine level approaches are not sufficient for the security of software systems. Software security has gained attention in the recent years as an internal security issue of software systems as compared to external protective measures. Threat modeling is a technique being used to model threats into software systems. By applying threat modeling at the early stages of software development life cycle, all possible threats to software systems can be identified and mitigated and hence in this way, a more secure software application can be developed. Various threat modeling approaches such as CLASP, SDL, STRIDE, DREAD, TAM and Touch Points are being used by many organizations for threat modeling into software systems. But all of the approaches being used for threat modeling are based on informal and semi formal techniques. Formal methods are based on mathematics and provide state of the art techniques for secure software development. Formal methods had been used successfully in many critical systems such as CICS, Paris Railway System and British Air Traffic Control System etc. In the proposed approach VDM++, will be used for specification of core components: STRIDE, DREAD and Security Mechanisms. VDM++Tools will be used for type checking and proof obligations.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128390854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Activity-based correlation of personal documents and their visualization using association rule mining","authors":"Zafar Saeed, Abida Sadaf, Siraj Muhammad","doi":"10.1109/ICET.2011.6048448","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048448","url":null,"abstract":"It is a common observation nowadays that the personal information of user is difficult to manage, the material which is copied by the users to their personal system are often forgotten by the users. So when they require their information it becomes very difficult to find the relevant information from huge repository. We have introduced a method using which the activities of user for reading documents are captured from running process list and managed in a dataset along with accessing time, then frequent item set and associated weights are calculated for each document with other using Apriori Algorithm and confidence measure in conjunction with combined access time. When user searches a document, the document list appears using any conventional model of retrieval, we have used primary metadata including title, author, type for document searching. Beside this, a visual interface is designed to display the list correlated document on the basis of users activities may help them to indentify documents according to their past activities.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124113884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Shiraz, Anam Zaman, Saba Zia, Abdullah Mansoor, Farooq Ahmed
{"title":"Block Aging Prevention technique (BAP) for flash based Solid State Disks","authors":"S. Shiraz, Anam Zaman, Saba Zia, Abdullah Mansoor, Farooq Ahmed","doi":"10.1109/ICET.2011.6048453","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048453","url":null,"abstract":"Solid State Disks (SSDs) are becoming increasingly popular due to enhancement in speed and reduction in size, power and cost. It is an obvious choice for many applications including personal computers, embedded systems, medical and healthcare devices etc. However, the reliability of SSD has now become a critical issue and this is an area of active research. SSD uses Flash technology which is a fast, efficient nonvolatile storage chip and offers cost-effective solution for SSDs. However, with all these features, flash memory defines a limit of write-erase on its blocks. Wearleveling policies extend SSD life time by ensuring even wearleveling of the blocks in a flash memory. Several algorithms have been proposed to improve wearleveling of SSD including Hot-Cold Swapping, Dual pool Algorithm (DP), Kim and Lee algorithm (KL) and Cost Age and Times Algorithm (CAT). This paper discusses all these wearleveling policies and introduces a Block Aging Prevention (BAP) technique which has been tested on 8Gb Flash. The comparison of all these algorithms show that the proposed technique has reduced the erasure count deviation of NAND flash blocks by 6.71% and 20% compared to DP and CAT respectively. It has also reduced overhead by 4% comparatively to DP.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131616161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy efficient outlier detection in WSNs based on temporal and attribute correlations","authors":"N. Shahid, I. Naqvi","doi":"10.1109/ICET.2011.6048470","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048470","url":null,"abstract":"Support vector machines (SVM) have formulated the main concepts of machine learning, ever since their introduction. The one-class quarter sphere SVM has received recent interest, as it extends the concepts of machine learning to the domain of linear optimization problems with cost efficiency. This paper deals with the novel idea of a quarter-sphere SVM based only on temporal-attribute correlations. To avoid communication overhead the system complexity at individual sensor nodes is slightly increased. The outlier and event detection rate keeps up with the detection rate obtained via previous approaches with an added advantage of no communication cost.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127168797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scattering parameter measurements of infinite tunable reflectarrays","authors":"M. Inam, M. Ismail","doi":"10.1109/ICET.2011.6048488","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048488","url":null,"abstract":"This paper presents a simple and effective technique for the scattering parameter measurements of infinite tunable reflectarrays in X-band frequency range. Tunable reflectarrays have been designed by using different types of slot configurations embedded in the patch elements. The scattering parameter measurements have been carried out using waveguide simulator technique and the measured results are found out to be in close agreement with the analysis carried out using Finite Element Method (FEM) and Finite Integral Method (FIM) techniques. A maximum change of 17% (10GHz to 8.3GHz) in the resonant frequency has been demonstrated by using rectangular and circular slots. Furthermore the achievable dynamic phase range of 314° demonstrates a feasibility of employing the proposed slot configurations for the design of active tunable reflectarray antennas.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117110779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Sharif, N. Ramzan, F. Lodhi, O. Hasan, S. R. Hasan
{"title":"Quantitative analysis of State-of-the-Art synchronizers: Clock domain crossing perspective","authors":"N. Sharif, N. Ramzan, F. Lodhi, O. Hasan, S. R. Hasan","doi":"10.1109/ICET.2011.6048485","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048485","url":null,"abstract":"Reliable transferring of data from one clock domain to another requires synchronization. Therefore, synchronizers play an important role in clock domain crossing (CDC). But despite their wide applications, there is no standard quantitative metric available to analyze various synchronizer configurations on common grounds. To overcome this limitation, this paper presents a comparison of three basic and widely used synchronizers. Latency and power consumption metric are measured for level, edge-detecting and pulse generating synchronizers. Furthermore, effects of these synchronizers are studied when applied to some commonly used asynchronous handshaking protocols under 90nm CMOS technology.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117168184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Malfree web server response","authors":"Mahmood Ahmad, Rana Faisal Munir","doi":"10.1109/ICET.2011.6048478","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048478","url":null,"abstract":"The trend of spreading malicious web contents through legitimate but compromised websites is not very rare to find. Websites bearing the trust of millions of clients are chosen to exploit the trust of its users by installing unwanted and malevolent contents on client machines through drive by download. This stealthier mechanism is aimed to convert a client machine into a botnet and to gain access on its resources like stored passwords, sensitive information and fingerprinting of running softwares. To deal with it, there are different solutions like honeypots and system state observers but all these antidotes are client resident. In this paper we have devised a heuristic based solution which resides on web servers and circumvents the movement of malicious contents toward client machines while keeping the server repute trusted and its availability 24/7 even after the compromise. Instead of blocking the complete website or any of its page, only malevolent contents are sanitized which adds novelty to the proposed system.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134067661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An algorithmic transformation for FPGA implementation of high throughput filters","authors":"H. M. Kamboh, S. Khan","doi":"10.1109/ICET.2011.6048450","DOIUrl":"https://doi.org/10.1109/ICET.2011.6048450","url":null,"abstract":"This paper proposes novel design methodologies for generating feed forward and recursive architectures for optimal mapping on Field Programmable Gate Arrays (FPGAs). The new methodology keeps in perspective the architecture of FPGA, structural design of logic blocks, their interconnectivity and available special purpose embedded blocks during filter transformation. Higher throughput is achieved through selective application of different transformations, taking into consideration limited pipelining options of these embedded blocks and general construction of FPGA slice fabric. The paper demonstrates the methodology and shows its applicability by synthesizing the designs and comparing the results that show improved performance as compared to traditional designs.","PeriodicalId":167049,"journal":{"name":"2011 7th International Conference on Emerging Technologies","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131170583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}