2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)最新文献

筛选
英文 中文
Designing a Low-Cost and Portable Infusion Pump 低成本便携式输液泵的设计
Muhammad Irfan Ali
{"title":"Designing a Low-Cost and Portable Infusion Pump","authors":"Muhammad Irfan Ali","doi":"10.1109/ICEEST48626.2019.8981680","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981680","url":null,"abstract":"This document describes the prototyping of a low-cost and portable infusion pump, which is used to provide a certain dose of a drug in certain time. This device uses the principles of electronics, mechanics and fluid mechanics to drive a syringe-based infusion pump, which delivers the prescribed amount of drug in required time to the patient. The designed device can deliver drug up-to 1 ml/hour with an adjustable range. The device detects and maintains flow of drug according to the input provided by the user. The most prominent feature of the device is its ability to detect bubble in the liquid. Whenever an air bubble is detected in the device it will instantly stop the flow. It is a low-cost and portable device which can be operated on a 12-volt battery and directly from the power socket. The cost of this prototype is only about $200 which will further diminish if the units are produced on an industrial scale.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122405152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Challenges in Adoption of Blockchain in Developing Countries 在发展中国家采用区块链面临的挑战
Rakesh Kumar, Muhammad Faizan Tahir, Surendar Kumar, A. Zia, Hallar Memon, Waqas Mahmood
{"title":"Challenges in Adoption of Blockchain in Developing Countries","authors":"Rakesh Kumar, Muhammad Faizan Tahir, Surendar Kumar, A. Zia, Hallar Memon, Waqas Mahmood","doi":"10.1109/ICEEST48626.2019.8981674","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981674","url":null,"abstract":"In today’s world of globalization where industries are becoming paperless, where robots are replacing human’s hard-core labor intensive work, where the whole world is connected with just one click, where predictive modeling and artificial intelligence AI is helping in tracking any big disaster and where biotech is helping in curing any disease in no time, Block-chain, one of the major innovations of today’s time, is all set to help humans in reaching to new heights of advancements in almost every field. But like other technologies, Blockchain is also facing some challenges, which must be addressed before widespread integration can take place. The mitigation these issues and all the obstacles in the adoption of Blockchain will have positive effects on the overall economy. This research, a questionnaire-based approach was adopted, aims to conclude and summarize the challenges faced by top-management of tech companies in the adoption of block-chain technology in developing countries.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"129 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114050574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Enhancing the Authentication Mechanism of Social Media Websites using Face Detection 基于人脸检测的社交媒体网站认证机制改进
Usman Ahmad, Anees Baqir, Faizan ul Mustafa, Sayyam Malik, Sana Ahmad Sani, S. Z. Shah
{"title":"Enhancing the Authentication Mechanism of Social Media Websites using Face Detection","authors":"Usman Ahmad, Anees Baqir, Faizan ul Mustafa, Sayyam Malik, Sana Ahmad Sani, S. Z. Shah","doi":"10.1109/ICEEST48626.2019.8981692","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981692","url":null,"abstract":"This paper includes different models used for the authentication of social media account. Importance of security in authentication is described in paper. Different security and privacy models and techniques for authentication are used over the social media. These techniques have limitations. In order to minimize the security risk of authentication and validation, a methodology called face detection and facial recognition is discussed in this paper. It provides the facility to improve security and to avoid unauthorized access of social media accounts.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129384474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Identifying Trends in Data Science Articles using Text Mining 使用文本挖掘识别数据科学文章的趋势
Syed Hasan Adil, Mansoor Ebrahim, S. Ali, Kamran Raza
{"title":"Identifying Trends in Data Science Articles using Text Mining","authors":"Syed Hasan Adil, Mansoor Ebrahim, S. Ali, Kamran Raza","doi":"10.1109/ICEEST48626.2019.8981702","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981702","url":null,"abstract":"The research conducted in this paper presents a detailed analysis of the latest research publications related to Data Science using information retrieval and text mining approach. The database used in this study was created by collecting the latest research papers from well-reputed Journals and Conference proceedings published by IEEE and Springer. This comprehensive study shows the significance of information retrieval and text mining in the identification of key insight from textual documents.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123279824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Synonym-based Attack to Confuse Machine Learning Classifiers Using Black-box Setting 基于同义词的黑盒设置攻击混淆机器学习分类器
Aasher Khan, Suriya Rehman, Muhammad U. S. Khan, Mazhar Ali
{"title":"Synonym-based Attack to Confuse Machine Learning Classifiers Using Black-box Setting","authors":"Aasher Khan, Suriya Rehman, Muhammad U. S. Khan, Mazhar Ali","doi":"10.1109/ICEEST48626.2019.8981685","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981685","url":null,"abstract":"Twitter being the most popular content sharing platform is giving rise to automated accounts called “bots”. Majority of the users on Twitter are bots. Various machine learning (ML) algorithms are designed to detect bots avoiding the vulnerability constraints of ML-based models. This paper contributes to exploit vulnerabilities of machine learning (ML) algorithms through black-box attack. An adversarial text sequence misclassifies the results of deep learning (DL) classifiers for bot detection. Literature shows that ML models are vulnerable to attacks. The aim of this paper is to compromise the accuracy of ML-based bot detection algorithms by replacing original words in tweets with their synonyms. Our results show 7.2% decrease in the accuracy for bot tweets, therefore classifying bot tweets as legitimate tweets.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121610286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of Camera and Laser Scanner based 3D Point Cloud 基于相机和激光扫描仪的三维点云比较
Yawar Rehman, Hafiz M. Ameem Uddin, Taha Hasan Masood Siddique, Haris, S. R. U. N. Jafri, Anas Ahmed
{"title":"Comparison of Camera and Laser Scanner based 3D Point Cloud","authors":"Yawar Rehman, Hafiz M. Ameem Uddin, Taha Hasan Masood Siddique, Haris, S. R. U. N. Jafri, Anas Ahmed","doi":"10.1109/ICEEST48626.2019.8981708","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981708","url":null,"abstract":"Three-dimensional (3D) modeling of objects play an important role in quality assurance, re-engineering of an object, and mapping of interior design for quality measurements. Hence, this field proves to be one of the hot research topics in the field of robotics. Although, using laser scanner is the most common method for 3D point cloud, the camera-based methods are also introduced in this field. In this paper, we propose and analyze two methods for making 3D point cloud for any given object. First one is camera-based 3D point cloud using structure from motion technique and secondly the laser scanner-based 3D point cloud. The result shows that camera-based 3D point cloud method produced dense point cloud but prone to outliers, whereas the laser scanner method is robust. It should also be noted that the camera is multiple times cost effective than laser scanner.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116152437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance of distributed multiple turbo code with MIMO antennas over frequency selective Rayleigh fading channels 基于MIMO天线的分布式多turbo码在频率选择瑞利衰落信道上的性能
R. Umar, Fengfan Yang, S. Mughal
{"title":"Performance of distributed multiple turbo code with MIMO antennas over frequency selective Rayleigh fading channels","authors":"R. Umar, Fengfan Yang, S. Mughal","doi":"10.1109/ICEEST48626.2019.8981689","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981689","url":null,"abstract":"This paper presents multiple turbo coded cooperative orthogonal frequency division multiplexing (MTCC-OFDM) scheme over a quasi-static frequency selective Rayleigh fading channel. The MTCC-OFDM scheme is composed of multiple input and multiple output antennas. As, in practical coded cooperative scenario, the relay terminal is mostly in outage due to noisy source to relay channel which causes an erroneous transmission towards the destination terminal that eventually results in a very low bit-error rate (BER) performance of the communication system. Therefore, in the proposed scheme, a turbo iterative decoding is being performed at the relay terminal that considerably improves the BER performance of the communication system. The numerical simulated results confirm that the proposed scheme not only out-performs its related coded non-cooperative scheme i.e., turbo coded OFDM scheme under a similar conditions in terms of bit error-correction performance but also offers robustness in a noisy (practical) source to relay channel scenario.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124540932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Analysis for MRI Based Brain Tumor Detection 基于MRI的脑肿瘤检测图像分析
Sidra Akbar, S. Nasim, Sarwar Wasi, Syed Muhammad Ussama Zafar
{"title":"Image Analysis for MRI Based Brain Tumor Detection","authors":"Sidra Akbar, S. Nasim, Sarwar Wasi, Syed Muhammad Ussama Zafar","doi":"10.1109/ICEEST48626.2019.8981681","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981681","url":null,"abstract":"Brain tumor is an irregular mass of tissue with inept expansion/enlargement inside the skull that attack and harm nerves and other sound tissues. The multiplication/ expansion of neurons can cause undesirable cell advancement. Brain Tumor is a testing errand as symptoms show up in the progressive phases of tumor. To provide accuracy in cerebrum tumor location MRI (Magnetic Resonance Image) is widely preferred imaging modality. To give better revelation of tumor without affecting a normal tissue is extremely difficult process. This research paper provided a solution to detect tumor using image processing technique, that include the image acquisition, preprocessing, enhancement, image segmentation, classification and volume calculation. This segmented image is further utilized for the evaluation of brain tumor in early stage.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129881194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Deep Facial Expression Recognition of facial variations using fusion of feature extraction with classification in end to end model 基于端到端模型的特征提取与分类融合的深度面部表情识别
Asad Ullah, Abid Jami, Muhammad Waqas Aziz, Farhan Naeem, Sadique Ahmad, M. Anwar, Wang Jing
{"title":"Deep Facial Expression Recognition of facial variations using fusion of feature extraction with classification in end to end model","authors":"Asad Ullah, Abid Jami, Muhammad Waqas Aziz, Farhan Naeem, Sadique Ahmad, M. Anwar, Wang Jing","doi":"10.1109/ICEEST48626.2019.8981687","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981687","url":null,"abstract":"Expression recognition is an important direction for computers to understand human emotions and an important aspect of human-computer interaction. Expression recognition refers to the selection of an expression state from a still photo or video sequence to determine the emotional and psychological changes to the character.Spectral Supervised Canonical Correlation Analysis has been used for Feature extraction. For proper classification VGG119 and softmax has been used. Facial variations such as redundant information in image, illumination variance and overfitting have been addressed in this paper. The images have been preprocessed using face detection, data augmentation and image normalization. After down-sampling, Spectral Supervised Canonical Correlation Analysis (SSCCA) holds the dimensions with factor data which constructs affinity matrix that incorporates both the class information and local structure of the data points. Features with having massive discriminative details have been taken. In order to attain low frequency coefficients more effectively the local structural information will be effectively utilized using SSCCA. Data is further provided to VGG19 for proper training. Meanwhile, the proposed method is more effective and robust comparing other methods in the area.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126568207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Real Time Ackerman Steering Angle Control for Self-Driving Car Autonomous Navigation 自动驾驶汽车自动导航的实时Ackerman转向角控制
Zia Mohi U Din, Waleed Razzaq, Usman Arif, Waqas Ahmad, Wasif Muhammad
{"title":"Real Time Ackerman Steering Angle Control for Self-Driving Car Autonomous Navigation","authors":"Zia Mohi U Din, Waleed Razzaq, Usman Arif, Waqas Ahmad, Wasif Muhammad","doi":"10.1109/ICEEST48626.2019.8981710","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981710","url":null,"abstract":"Unsupervised Ackermann’s principle is widely used in automobile market and other mobile vehicles to steer an autonomous vehicle. In real time self-driving car operation automatic lane detection and following is main task for autonomous navigation. Different type of sensors are being used for lane lines detection but cameras are the most cost effective and accurate sensory modality. This paper presents a novel method for lanes lines detection on a road and then controls the Ackermann Steering angle of the prototype car for autonomous navigation. A bird’s eye view input obtained from a monocular camera mounted at the head of car is fed to the processing unit.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127893581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信