{"title":"Node failure detection and path repairing scheme in virtual circuit routing algorithm for wireless ad hoc micro sensor networks","authors":"A. A. Minhas, C. Steger, R. Weiss, S. Ehsan","doi":"10.1109/ICET.2005.1558860","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558860","url":null,"abstract":"Routing algorithms haveshowntheir importance in the power aware wireless micro-sensor networks. In this paper,we presenttheimproved virtuial circulit routingalgorithm (IVCRA)implemented in temperatuire sensorapplication developed bytus. We introduce a method todetect nodefailure andthen to repair thepathtoroutte thedatapack-et safely to basestation. Weverified itbysimulating inTOSSIM andthenimplementing on real motesnetwork. The motes are fromBerkeley USA andare being operated byusingTinyOS-operating systemand nesClanguage. Energy analysis showsthat IVCRAis energy efficient. ForIVCRA,we theninclude the packet sizerecommended byZigbee/IEEE 802.15.4 standard, an emerging standard forwireless sensor networks, alongwithftatures ofitsNetwork Layer. We prove thereliabilitv ofnetwork withIVCRA. Energycfficiencies fbrdifferent packet sizereveal that ourpacket size isoptimal.","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134227179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Speech enabled algorithm for multilingual educational game","authors":"A. Shah, A. W. Ansari, I. A. Ismaili","doi":"10.1109/ICET.2005.1558880","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558880","url":null,"abstract":"In this paper we propose an algorithmii that utilizes the Artificial Intelligence bcased techniques including Heuristic Search and natural language processing to enable tlhe single user to plaiy the game at any time with the coimputer withoutt waiting far the availability of other player. As well as we propose to acldd tlhe support of the vocabularv oJ other regional languages such as Urdu / Sindhi/ Paslhto witha the speech synthesis based pronunciation facility. Thae tools and tlhe technologies that are to be used for the implemtientation of the algorithm include: Microsoft VB and AI Techniques along with mttultilingual dictioncaries. The imtplemlentation of this algoritlhm wouldfacilitate any one in general and studcents in particulair to butild a strong ivocabulary of acny language with just the fun of playing. Thlis wouild provide a direct contriburtion to thze educcation an1d literacyaclong with entertainment.","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133706132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An improved laplacian distortion model of Mpeg-4 FGS","authors":"Xie Li, Wenjun Zhang","doi":"10.1109/ICET.2005.1558853","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558853","url":null,"abstract":"In this paper, we did research on the relationship between rate and distortion for mpeg-4 FGS enhancement layer. During the course of research on the relationship between rate and distortion of meg-4 FGS enhancement layer, we found that there are big discrepancy between the real data and the RD model based on Laplacian distribution. And what's more, the higher the rate is, the larger the error is. Based on the detailed analysis of quantisation approach used in the mpeg-4 FGS encoder, we put forward an improved distortion model. Experiments' results show that the proposed improved distortion model not only can keep good approximation with the real data when the rate is low, the same as the distortion model based on Laplacian model, but also can keep good approximation with the real empirical data when the rate is high. Our proposed new distortion model has a better performance","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122909266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of odd bit QAM constellation","authors":"Habibullah Jamal","doi":"10.1109/ICET.2005.1558876","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558876","url":null,"abstract":"Quadrature amplitude modulation (QAM) is used for transmission at high data rate in band-limited channels. A great deal of attention has been devoted to derive expressions for bit error probability of QAM. In this paper, a generalized expression for bit error rate (BER) for odd bit QAM using symmetry properties of Gray code is derived and its performance is compared with existing closed form expression for arbitrary QAM constellation. New BER expression offers a convenient way to evaluate the performance of odd bit QAM for various cases of practical interest","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121161600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative analysis and design philosophy of next generation unified enterprise application security","authors":"R.A. Shaikh, S. Rajput, S. Zaidi, K. Sharif","doi":"10.1109/ICET.2005.1558935","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558935","url":null,"abstract":"Unified enterprise application security is a newly emerging approach for providing protection against application level attacks. Conventional application security approaches that embed security into each critical application results into scattered security mechanism, which is not only difficult to manage but also creates security loopholes. Therefore, new unified enterprise application security concept is evolving in the industry that consists of centralized authentication, access control, incident response and auditing. Industries such as Computer Associate, Cerebit, Entrust, Evidian, IBM Tivoli, Netegrity, Ohlix and SunOne have comes up with the identity and access management solutions that are based on this concept. Significant amount of misunderstanding exists in the industry and research community about appropriate features of such a unified product. Therefore we have proposed new enterprise application security (EAS) comparison framework to compare existing enterprise application security products. This framework helps an enterprise in selecting appropriate application security product. From comparison we found that Computer Associate and Netegrity solutions are the best available solutions, however none of the current available solutions are providing complete enterprise application security. Therefore we have proposed new unified enterprise application security architecture. This architecture provides all basic information security and other critical services such as, auditing, reporting, authentication, access control, confidentiality, integrity, commitment to standards, incident response, scalability. flexibility, manageability, and compliance of regulatory mandates.","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129062915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of period-3 behavior in genomic sequences using singular value decomposition","authors":"M. Akhtar, E. Ambikairajah, J. Epps","doi":"10.1109/ICET.2005.1558846","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558846","url":null,"abstract":"Manydigital signal processing techniques have beenusedtoautomatically distinguish theprotein coding regions (exons) fromnon-coding regions (introns) inaDNAsequence. Recently, Auto-regressive (AR) technique hasbeenused forthedetection of3periodicty present inprotein coding regions of genomic sequences. The. sequence length, average spacing between coding regions, andaverage coding region length arethemainfactors thataffect the performance ofanyprediction method Inthis paper, wepropose theuseofSingular Value Decomposition (SVD) methodfor thedetection ofperiod-3 behavior in DNA sequences. Results showthatSVDmethod outperforms theARtechnique.","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116893650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Horizontally opposed pressure loaded computer generated artificial feel control column for a motion base flight simulation system using fused hard & soft computing","authors":"S.M. Raza, B. Zeir","doi":"10.1109/ICET.2005.1558927","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558927","url":null,"abstract":"To induce true feel of flight in a flight simulation system, flight controls play a vital role. The varying loading of the flight column during flight, is based entirely on the aerodynamics characteristics of the aircraft set by the flight controls. Replication of such forces in a simulator poses multiple challenges, including generation of simulated aerodynamic forces, mapping of the forces on a mechanical assembly and development of a mechanical assembly for translation of such forces on the flight column. The addition of non-linearities in the system increases the degree of difficulty. The paper presents such a developed system, which uses a simulation software for generating flight data, a 3-mode feed forward PID control loop for maintaining the mechanical system close to the set-points generated by the simulation software, a fuzzy logic based inference engine for modifying control loop parameters according to changing system conditions and a horizontally opposed spring loaded mechanical system for mapping controller responses on the flight column. The usage of a fused hard & soft computing approach results in increased repeatability, reliability and robustness. The initial testing and experimental results have been very encouraging.","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117228679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic queue deadline first scheduling algorithm for soft real time systems","authors":"A. lqbal, A. Zafar, B. Siddique","doi":"10.1109/ICET.2005.1558906","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558906","url":null,"abstract":"Most embedded real time systems are based on uiniprocessor architecture, and deadline miss ratio is always a mainstay .fr anv type of real time system. This paper presents the design and analysis of a new scheduling algorithm, Dynamic Queue Deadline First (DQDF) to handle scheduling of dynamic multiple tasks in real time systems. Soft real-time processing is a realtime processing in which some or all applicati6ns are allowed to miss deadlines, particularly in situations of system load. In this paper, a new scheduler is introduced to minimize the overhead and percentage of deadline misses to improve the system utilization andfairness. We have used Earliest Deadline First (EDF) with dynamic queuing technique, as it is an optimal scheduling algorithm for uniprocessor systems. Simulation results show that with DQDF algorithm, the deadline miss ratio is improved and fairness is restored by utsing static priority approach. The comparison of the new scheduler DQDF with simple EDF scheduler results the perjbrmance improvement upto 68%.","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"07 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130164031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data acquisition and handling for the simulation of ASIC by utilizing SW/HW co-design methodology","authors":"K. Muhammad, Feng Shi, A.Q. Suhail","doi":"10.1109/ICET.2005.1558895","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558895","url":null,"abstract":"","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133027214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Geographical information systems and digital cartography in environment planning and development of Islamabad","authors":"M.F. Mahbub, S. Jawad, S. Ahmed","doi":"10.1109/ICET.2005.1558910","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558910","url":null,"abstract":"Geographical information systems have evolved over the past thirty years keeping pace with the ever-clumping computing facilities. Today it is possible to operate almost all components required for GIS development from the desktop PC. GIS incorporates thematic mapping with techniques to use raster maps that have been rectified, geo-referenced and digitized to provide accurate vector data of a study area thus allowing intelligent and reasonably credible inference by its users. For such goals and the processes involved therein, sophisticated software including AutoCAD Map, ERDAS IMAGINE and ArcGIS are vital tools available in the industry. It is possible to conveniently develop customized GIS solution for almost any domain dealing with a geographic location and requiring spatial analysis. The work presented in this paper discusses the methods that may be employed to conveniently develop a GlS application with cartographic functions for automation of tasks dependent on accurate mapping in environmental planning and development. A GlS based solution has been developed for an environment planning authority with an objective to present a model work using GIS technologies focused around improving city planning, development and management in Pakistan. The model can be used for meeting water requirements, fault diagnosis and corrective actions by water management authority. As the geo-referenced data was readily available for Islamabad hence the case study is focused around it.","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133078297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}