2007 International Conference on Information and Emerging Technologies最新文献

筛选
英文 中文
Availability simulation of Switch over for FSO and MMW FSO与毫米波切换的有效性仿真
2007 International Conference on Information and Emerging Technologies Pub Date : 2007-07-06 DOI: 10.1109/ICIET.2007.4381317
F. Nadeem, E. Leitgeb, M.S. Khan, M. S. Awan
{"title":"Availability simulation of Switch over for FSO and MMW","authors":"F. Nadeem, E. Leitgeb, M.S. Khan, M. S. Awan","doi":"10.1109/ICIET.2007.4381317","DOIUrl":"https://doi.org/10.1109/ICIET.2007.4381317","url":null,"abstract":"Free Space Optics (FSO) links get attraction due to high bandwidth and the flexibility of wireless communication links. However weather patterns like fog and heavy snow fall effect the availability of FSO. Microwave links operating at 40-43 GHz can be considered as back up link due to similar properties regarding offered data rates and flexibility of set up. However rain limits microwave link availability. Redundant use of these links has proved as highly available high bandwidth wireless connection. But it needs redundant transmission on back up link of microwave even when FSO link is available. In this paper a switch over between these links has been proposed. Its performance has been simulated for one year measured availability data for these links.","PeriodicalId":167980,"journal":{"name":"2007 International Conference on Information and Emerging Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129579676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Requirements Analysis of Air Traffic Control System Using Formal Methods 基于形式化方法的空中交通管制系统需求分析
2007 International Conference on Information and Emerging Technologies Pub Date : 2007-07-06 DOI: 10.1109/ICIET.2007.4381340
Maryam Jamal, N. Zafar
{"title":"Requirements Analysis of Air Traffic Control System Using Formal Methods","authors":"Maryam Jamal, N. Zafar","doi":"10.1109/ICIET.2007.4381340","DOIUrl":"https://doi.org/10.1109/ICIET.2007.4381340","url":null,"abstract":"Formal methods is an emerging technology that uses mathematical notations to write precise and unambiguous specifications which makes it possible to prove and analyze certain properties of the system so that errors and inconsistencies are identified during early stages of the development process. In this paper formal methods in terms of Z notation is applied for the specification of safety critical system of Air Traffic Control (ATC). Firstly, ATC system model in real world is described. For connectivity of different zones of airspace, the real world ATC system is transformed into a directed graph, which is then used to formalize the major components of formal ATC Model i.e static Topology, Network State, Aircraft and Controller. The whole Formal ATC Model is then presented as encapsulation of formal models of its basic components. Finally, the Formal A TC system Model is checked and analyzed with Z/EVES tool-set.","PeriodicalId":167980,"journal":{"name":"2007 International Conference on Information and Emerging Technologies","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116026822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Multiple Neural Networks over Clustered Data (MNCD) to Obtain Instantaneous Frequencies (IFs) 基于聚类数据(MNCD)的多神经网络获取瞬时频率(if)
2007 International Conference on Information and Emerging Technologies Pub Date : 2007-07-06 DOI: 10.1109/ICIET.2007.4381301
S.I. Shah, I. Shafi, J. Ahmad, F. M. Kashif
{"title":"Multiple Neural Networks over Clustered Data (MNCD) to Obtain Instantaneous Frequencies (IFs)","authors":"S.I. Shah, I. Shafi, J. Ahmad, F. M. Kashif","doi":"10.1109/ICIET.2007.4381301","DOIUrl":"https://doi.org/10.1109/ICIET.2007.4381301","url":null,"abstract":"In this paper we present advantage of training MNCD for obtaining time localized frequencies (also called IF), which is one useful concept for describing the changing spectral structure of a time-varying signal, arising so often in time frequency distribution (TFD) theory. It has been found that training does not give the same results every time; this is because the weights are initialized to random values and high validation error may end up training early. Moreover once a network is trained with selected input, its performance improves significantly as opposed to the one that does not receive selected input data for training. The performance of MNCD can be compared by computing the entropy, mean square error (MSE) and time consumed for convergence.","PeriodicalId":167980,"journal":{"name":"2007 International Conference on Information and Emerging Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128238935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Stabilization of the Oscillating Eccentric Rotor via Multiple Sliding Surfaces 多滑动面对偏心转子振动的镇定作用
2007 International Conference on Information and Emerging Technologies Pub Date : 2007-07-06 DOI: 10.1109/ICIET.2007.4381342
N. Qaiser, N. Iqbal
{"title":"Stabilization of the Oscillating Eccentric Rotor via Multiple Sliding Surfaces","authors":"N. Qaiser, N. Iqbal","doi":"10.1109/ICIET.2007.4381342","DOIUrl":"https://doi.org/10.1109/ICIET.2007.4381342","url":null,"abstract":"A new solution for the stabilization and disturbance attenuation problems of the oscillating eccentric rotor (OER), a widely studied nonlinear mechanical system, is presented in this paper. The under actuation property, posing problems in exact feedback linearization, makes design of the control law for OER a challenging task. A novel nonlinear controller design exploiting the recently introduced Multiple Sliding Surface Control technique is presented for the OER. The task of the nonlinear controller is not only to de-spin the rotor but also to stop the translational oscillations. The design procedure is simpler and more intuitive than currently available integrator backstepping or energy shaping based designs. Stability is analyzed by decomposing the system into a cascade of several sub-systems. Advantages over existing controller designs are analyzed theoretically and verified using numerical simulations..","PeriodicalId":167980,"journal":{"name":"2007 International Conference on Information and Emerging Technologies","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130454636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Family of Multimodulus Algorithms for Blind Equalization of Square-QAM Signal 方形qam信号盲均衡的多模算法
2007 International Conference on Information and Emerging Technologies Pub Date : 2007-07-06 DOI: 10.1109/ICIET.2007.4381304
S. Abrar
{"title":"A Family of Multimodulus Algorithms for Blind Equalization of Square-QAM Signal","authors":"S. Abrar","doi":"10.1109/ICIET.2007.4381304","DOIUrl":"https://doi.org/10.1109/ICIET.2007.4381304","url":null,"abstract":"In this paper, a modified family of blind equalization algorithms is proposed for use in quadrature amplitude modulation (QAM) based digital communication systems. We have called this family: the generalized multimodulus algorithms: MMA(p, q). This family is derived by introducing two degrees of freedom in the conventional MM criterion. We have shown that one of the members of this family, MM(2, 1), (which, to the best of our knowledge, has never been discussed) exhibits the fastest convergence for 16-QAM signal. The dynamic convergence behavior of MM(2, 1) is analyzed and shown to be conforming with simulation results.","PeriodicalId":167980,"journal":{"name":"2007 International Conference on Information and Emerging Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133908569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Random Key Encryption a New Cryptographic Scheme 随机密钥加密——一种新的加密方案
2007 International Conference on Information and Emerging Technologies Pub Date : 2007-07-06 DOI: 10.1109/ICIET.2007.4381311
Muhammad Shafeeq, Mehr Yahya Durrani, Ifraseab Afzal
{"title":"Random Key Encryption a New Cryptographic Scheme","authors":"Muhammad Shafeeq, Mehr Yahya Durrani, Ifraseab Afzal","doi":"10.1109/ICIET.2007.4381311","DOIUrl":"https://doi.org/10.1109/ICIET.2007.4381311","url":null,"abstract":"Data security has become one of the major challenges in computing. Among them cryptography is one of the various methods in data security, although many algorithms of cryptography are in use since long but every algorithm has its own set of problems. Similarly all these algorithms have broken up by hackers. An algorithm which is safe with minimal problems is yet to be developed. For the development of such an algorithm one should understand the strengths and weaknesses of current algorithms. This paper discusses various problems of the existing cryptographic schemes and proposes a new scheme RKE.","PeriodicalId":167980,"journal":{"name":"2007 International Conference on Information and Emerging Technologies","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115744704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Digital Attendance Recording System 数字考勤系统
2007 International Conference on Information and Emerging Technologies Pub Date : 2007-07-06 DOI: 10.1109/ICIET.2007.4381320
A.A. Khan, S. Ahmed, A. Abeer, A. Afzal, K. ul Haq Malik
{"title":"Digital Attendance Recording System","authors":"A.A. Khan, S. Ahmed, A. Abeer, A. Afzal, K. ul Haq Malik","doi":"10.1109/ICIET.2007.4381320","DOIUrl":"https://doi.org/10.1109/ICIET.2007.4381320","url":null,"abstract":"Attendance recording in educational institutions is an imperative task. Most present systems provide database management but still involve laborious manual data entry procedures. The design presented in this paper offers a twofold solution to the problem. It relieves from handling paper records of attendance taken in the class by providing firsthand entry into a portable gadget built around the AVR ATmega8 microcontroller. The attendance entered is firstly stored in the microcontroller's EEPROMfrom where it is transferred to an application software residing on a computer through the serial port. This application stores the attendance data in a database and also displays requested information extracted from them.","PeriodicalId":167980,"journal":{"name":"2007 International Conference on Information and Emerging Technologies","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122819835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A New Solution for Password Key Transferring in Steganography Methods by CAPTCHA through MMS Technology 一种利用MMS技术实现CAPTCHA隐写密码密钥传输的新方案
2007 International Conference on Information and Emerging Technologies Pub Date : 2007-07-06 DOI: 10.1109/ICIET.2007.4381325
M. Shirali-Shahreza, M. Shirali-Shahreza
{"title":"A New Solution for Password Key Transferring in Steganography Methods by CAPTCHA through MMS Technology","authors":"M. Shirali-Shahreza, M. Shirali-Shahreza","doi":"10.1109/ICIET.2007.4381325","DOIUrl":"https://doi.org/10.1109/ICIET.2007.4381325","url":null,"abstract":"The Multimedia Messaging System (MMS) allows a user of a mobile phone to send messages containing multimedia objects, such as images, audio or video clips. On the other hand establishing hidden communication is an important subject of discussion that has gained increasing importance nowadays with the development of the Internet. One of the methods introduced for establishing hidden communication is steganography. Therefore steganography in MMS is an interesting idea. One of the problems in steganography methods is the security of transferring password key used for steganography between sender and receiver of secure data. In this paper a new method is proposed for solving this problem using CAPTCHA method through MMS messages. In this method the password key is spoken in an audio file and the data are hidden in the image by this password key. Then the image and audio files are inserted in a MMS message and sent to the receiver. Therefore the human receiver can recognize the password from the audio file and extract the data from the image using this password, but the computer cannot recognize the spoken word from the audio file and extracting the password. By this method the user does not need to memorize any password for extracting the data. This method has been implemented in J2ME programming language.","PeriodicalId":167980,"journal":{"name":"2007 International Conference on Information and Emerging Technologies","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134482177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Enhancing Invisibility and Robustness of DWT based Video Watermarking scheme for Copyright Protection 增强基于DWT的版权保护视频水印方案的不可见性和鲁棒性
2007 International Conference on Information and Emerging Technologies Pub Date : 2007-07-06 DOI: 10.1109/ICIET.2007.4381321
S.A. Rathore, S. Gilani, A. Mumtaz, T. Jameel, A. Sayyed
{"title":"Enhancing Invisibility and Robustness of DWT based Video Watermarking scheme for Copyright Protection","authors":"S.A. Rathore, S. Gilani, A. Mumtaz, T. Jameel, A. Sayyed","doi":"10.1109/ICIET.2007.4381321","DOIUrl":"https://doi.org/10.1109/ICIET.2007.4381321","url":null,"abstract":"Requirements for digital watermarking are mainly application dependent. Robustness is one of the main requirements for many watermarking applications. In this paper a blind discrete wavelet transform (DWT) based video watermarking algorithm for copyright protection is proposed. We have embedded a meaningful watermark invisibly into uncompressed video. The watermark is embedded in high frequency sub-band coefficients of the DWT to improve the invisibility of the marked video sequence. The watermark is first scrambled and then encoded to minimize the error probabilities during watermark detection. We have applied 2-D automorphic transform and BCH error correction coding on the binary image for scrambling and encoding the watermark respectively before the watermark embedding. We have applied key based pseudo random 3-D interleaving on the coefficients selected for watermark insertion. We have also embedded the frame number as the synchronization information instead of using the sliding correlation as proposed in [1, 5]. Experimental results have proved that the embedded data with the proposed scheme is visually transparent, robust against unintentional or malicious attacks such as frames deleting, frames inserting and frame statistical averaging. 3-D interleaving has significantly improved the robustness of the proposed scheme against temporal attacks. The watermark embedded in such way is high bit rate and thus more robust. The series of experiments conducted has revealed the effectiveness and usefulness of the proposed watermark generation and embedding strategy.","PeriodicalId":167980,"journal":{"name":"2007 International Conference on Information and Emerging Technologies","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132337620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Paired Spectral Content Measure for Gene and Exon Prediction in Eukaryotes 真核生物基因和外显子预测的配对光谱含量测量
2007 International Conference on Information and Emerging Technologies Pub Date : 2007-07-06 DOI: 10.1109/ICIET.2007.4381323
M. Akhtar, J. Epps, E. Ambikairajah
{"title":"Paired Spectral Content Measure for Gene and Exon Prediction in Eukaryotes","authors":"M. Akhtar, J. Epps, E. Ambikairajah","doi":"10.1109/ICIET.2007.4381323","DOIUrl":"https://doi.org/10.1109/ICIET.2007.4381323","url":null,"abstract":"In this paper, we report on a new discrete Fourier transform (DFT) based method for gene and exon prediction in eukaryotes. The proposed paired spectral content (PSC) measure is compared with the well-known DFT based spectral content and spectral rotation measures, using the GENSCAN test set. False positive vs. sensitivity, receiver operating characteristic (ROC) curve and exonic nucleotides detected as false positive results all show that the newly proposed PSC outperforms existing methods, with 50% less DFT processing.","PeriodicalId":167980,"journal":{"name":"2007 International Conference on Information and Emerging Technologies","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116484626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信