{"title":"Enterprises application integration","authors":"K. Qureshi","doi":"10.1109/ICET.2005.1558905","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558905","url":null,"abstract":"","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121520496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effect of buffer length on rate distortion bound for different PLC methods","authors":"M. Ehsan, G. Kubin","doi":"10.1109/ICET.2005.1558848","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558848","url":null,"abstract":"Real-time multimedia communication due to its stringent delay requirements needs low delay PLC (packet loss concealment) methods to reduce the effect of lost packets. For audiovisual communications several PLC methods are utilized such as zero substitution or waveform substitution, we compare zero substitution and waveform repetition for a Gaussian source on the Gilbert-Elliott channel model. This allows to model the decrease of distortion with increasing buffer length","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114778329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy-aware fuzzy routing for wireless sensor networks","authors":"M. Yusuf, T. Haider","doi":"10.1109/ICET.2005.1558856","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558856","url":null,"abstract":"In recent vears. many approaches and techniques have been explored fbr the optinmization of energy usage in wireless sensor network-s. Routing is one of these areas in which attempts fjr etjicient utilization of energy have been made. These attempts use fixed (crisp) metrics for making energy-aware rouiting decisions. In this paper, we present a novel generalized fizzy, logic based approach for energyaware routting in wireless sensor networks. This generalized approach is soft acnd tutnable and hence it can accommodate sensor networks comprising of different types of sensor nodes.","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121860951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Minimization of torque ripple in switched reluctance machine for direct drive applications","authors":"R. T. Naayagi, V. Kamaraj","doi":"10.1109/ICET.2005.1558913","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558913","url":null,"abstract":"A major problem of switched reluctance motors (SRM) is the torque ripple, which causes undesirable acoustic noise and vibration. If is caused by saliency of the stator and rotor. In this paper, a novel method on the basis of genetic algorithm (GA) is proposed to reduce the torque dip. thereby reducing the associated torque ripple, with simultaneous increase in torque output using GA. by maximizing the flux linkage and inductance ratio and the results are compared with that produced by a standard 8/6 pole, 4 phase, 1 KW, 100 V, 25 A.1500 rpm SRM. The obtained results are encouraging and verified using finite element analysis (FEA).","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121980852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Use case model of genetic algorithms of agents for control of distributed power system networks","authors":"S.M. Alamdar Raza, M. Akbar, F. Kamran","doi":"10.1109/ICET.2005.1558916","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558916","url":null,"abstract":"The paper proposes an agent system for distributed generation setup identifying role and requirements of each agent. Genetic algorithms, due to their applicability for optimization solutions of nonlinear and stochastic scenarios, can find place in development of agents for distributed control. Advantages and special features of genetic algorithms for optimization are discussed, identifying some input and output variables. Requirement of compensator as an agent/sub-agent is also proposed. Finally the use case model is proposed showing assigned role of each agent. Each use case has been elaborated with its purpose, data handling, stimuli and responses. A lay out of the sub-systems of each of the proposed main agents has also been included.","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134109262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Taxonomy of statistical based anomaly detection techniques for intrusion detection","authors":"A. Qayyum, M.H. Islam, M. Jamil","doi":"10.1109/ICET.2005.1558893","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558893","url":null,"abstract":"Security threats to the computer systems have raised the importance of intrusion detection systems. With the advent of new vulnerabilities to computer systems new techniques for intrusion detection have been implemented. Statistical based anomaly detection techniques use statistical properties and statistical tests to determine whether \"observed behavior\" deviate significantly from the \"expected behavior\". Statistical based anomaly detection has been a wide area of interest for researchers since it provides the base line for developing a promising technique. This paper presents a guideline for statistical based anomaly detection techniques with the perspective of various scenarios and areas of implementation. Inde.x TermsAnomaly detection, Intrusion detection, Security threats, Statistical analysis technique, Statistical models.","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131008214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling and design of shape optimized SRM with reduced ripple","authors":"R. T. Naayagi, V. Kamaraj","doi":"10.1109/ICET.2005.1558915","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558915","url":null,"abstract":"This paper describes the shape optimization and torque ripple minimization of switched reluctance machine (SRM) using genetic algorithm. In this paper, a novel method on the basis of genetic algorithm (GA) is proposed to reduce the torque dip, thereby reducing the associated torque ripple, with simultaneous reduction in size with increase in torque output using GA, by maximizing the flux linkage, torque per unit rotor volume and inductance ratio. The results are compared with that produced by a standard 8/6 pole, 4 phase SRM, The obtained results are encouraging and verified using finite element analysis (FEA).","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115437250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Architecture for de-centralized, distributed event communication mechanism through overlay network","authors":"F. Umer, A. Qayyum","doi":"10.1109/ICET.2005.1558890","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558890","url":null,"abstract":"Overlay Networks have.found widespread popularity inrecenttimes, attributed mainly totheir prerogative andproductivity inmultitude ofnetworking areas, rangingfrommulticasting andpacket routing to efficient object or resourcelocation ina distributed environment. This paper explores theemployment of overlaynetworksin ubiquitous computing environments, encompassingthedesign ofan event managementmechanism forubiquitous entities. The devised architecture makesuse ofan existing DHT basedstructured overlay network andintegrates it withCORBA to develop a decentralized Event CommunicationMechanismfor Ubiquitous Environments. Thecontrived architecture emanates a completely decentralized, fault resilient andscalable Event Management Mechanism.","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115692806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The statistical average carrier-to-interference ratio (CIR) of an ad hoc CSMA/CA wireless network providing multiple service-classes","authors":"S. A. Qasmi, K.T. Wong","doi":"10.1109/ICET.2005.1558855","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558855","url":null,"abstract":"This work characterizes the statistically expected carrier-tointerference ratio (CIR, C/R) of an ad hoc CSMA/CA wireless communication network, via Monte Carlo simulations. This paper is first in the open literature to model an ad hoc network accounting for all these following factors: (1) more realistic modeling of the network nodes' spatial distribution as via a two-dimensional Poisson process, whereby the network nodes are randomly placed arbitrarily on a two-dimensional plane (instead of the nodes locating deterministically at regularly spaced grid points), (2) suppression of nodes within the carrier-sensing range of a transmitting node, to micmac the CSMA/CA Medium Access Control (MAC) protocol (i.e. a node would self-restrain from transmission if close to a transmitting node), (3) microscopic Rayleigh fading, (4) propagation-distance-dependent path-loss, and (5) more than one service class. Monte Carlo simulations of a CSMA/CA ad hoc network generate the CIR data, whose statistical expected value and dependence on node's spatial Poisson intensity and relative power level are investigated. 1. THE CIR's SIGNIFICANCE & THE FACTORS AFFECTING THE CIR An ad hoc wireless communication network consists of a set of triansceiving nodes, routing each other's data packets without centralized control. An ad hoc network's performance metrics include its channel capacity, throughput, packet transmission time, queuing delay, transmission blocking probability [121, and outage probability. All these quality-of-service (QoS) perlormance metrics depend critically on the carrier-tointerierence ratio (CIR, C/R) at the network nodes. If the CIR is considered a stochastic variable, then each aforementioned QoS metric is also a stochastic entity, whose statistics depends on the CIR's statistics. Various propagation-channel parameters and networkprotocol factors affect this CIR, e.g., propagation-path loss in power, microscopic fading (often statistically modeled as Rayleigh distributed), the spatial distribution of the network's nodes, the network's number of service classes, the network's medium-access-control (MAC) protocol. More precisely, consider a kth-class transmission from node 'n0 to an intended node l transmitted with signal power Pkx) Node irix Tlhe authors were supported by Canada's Naitural Sciences & Engineering Research Council's Discovery Research Grant # NSERC-RGPIN-24977502 and the C;mnadian province of Ontario's 'Premier's Research Excellence Award\". receives this signal at power:","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123664562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M.Z. Aziz, Mahmoud Shafik, B. Mertsching, A. Munir
{"title":"Color segmentation for visual attention of mobile robots","authors":"M.Z. Aziz, Mahmoud Shafik, B. Mertsching, A. Munir","doi":"10.1109/ICET.2005.1558865","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558865","url":null,"abstract":"Segmentation is a very iniportant step in most qf the nmachine vision applications. A method for color segmentation is proposed as a basic requirement qf visuial attention system of mobile robots. After experiments with different color spaces, the HSI color space is selected for segmentation with nminimtm influence of shades and shadows. The proposed method first classifies the color ofseed pixel and then selects a method for region growing according to nature of the seed pixel Results obtained are very encouraging and accor-ding to requtiremcents qf the application area. This paper addresses the problem of obtaining regions from colored images such that the regions may have minimum influence of shades and shadows in order to produce good input for higher level processing in visual attention systems of mobile robots. HSI (HueSaturation-Intensity) space, sometimes also called HSV (Hue-Saturation-Value) or HSL (Hue-SaturationLuminance), has a good representation of the colors of human perception [3] and has good capability of dealing with highlights, shades, and shadows [2]. As these features suite the requirements of our application area hence our approach performs segmentation in HSI color space and proposes an improved algorithm to obtain better results.","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128172476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}