{"title":"High speed data transmitters for wireless applications","authors":"F. Abbas","doi":"10.1109/ICET.2005.1558857","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558857","url":null,"abstract":"In this work the high speed data transmitters for wireless applications has been investigated. The work reviews concepts and techniques related to the effect of modulation accuracy on high speed downlink packet access (HSDPA) radio link performance. The Error Vector Magnitude (EVM) results are simulated and discussed by using the test models without HSDPA (test model 1) and with HSDPA (test model 5) defined in 3rd generation partnership project (3gpp) [11 for RF part by introducing some non-linearity in the test signal passing through RF transmitter (RFTX) chain. In this work from the figures 5 (PSat = 10.1 dBm), 6 (PSat = 13.2 dBm) and the discussions based on 3gpp specs (EVM = 17.5 % without HSDPA and 12.5 % with HSDPA) it can be concluded that the RF TX path got to be (PSat =3.1 dBm) more linear to support the HSDPA. In1dex Terts-Communication system nonlinearities, Highspeed integrated circuits, Radio transmitters, Wireless LAN.","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123104585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptanalytic weaknesses in modern stream ciphers and recommendations for improving their security levels","authors":"S. Ullah, A. A. Tabassam, S. H. Khiyal","doi":"10.1109/ICET.2005.1558887","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558887","url":null,"abstract":"Inthis paperwediscuiss security problems insom'1e modern stream ciphers. Asweobserve somie tinmes that adesigner claims that thealgorithm designed is mnore secure butt whenitcomestoopenliteratuire we finda numberQfproblems. We discuss SNOW, Scream andRabbit. Someejforts havebeenmadeto overcome theproblems those werepointed outin these cryptosystems bvdifferent cryptanalysts. The stream ciphers arefaster andefficient thanblock ciphers butconmparatively less secure. Ouremphasis inthis paperistomak-e somecompromise on efficiency buttogetnmor-e security. IndexTerms- Streamciphers, Blockciphers, SNOW,Scream, Rabbit, chaotic.","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125308246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information extraction from heterogeneous sources using domain ontologies","authors":"W.-R. Chaudhry, F. Meziane","doi":"10.1109/ICET.2005.1558934","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558934","url":null,"abstract":"The main objective of this paper is to describe the KAARE (knowledge availability, access, retrieval and extraction) system, a generic business model for knowledge extraction of semi structured and unstructured data from Web pages. The system is ontology driven and provides a set of generic tools that will enable an effective access, retrieval and filtering of information available on the World Wide Web. The interactive model is composed of five managers namely the query manager, the ontology manager, the search manager, the information manager, and the presentation manager. Each manager is responsible for carrying out the delegated tasks from which valid inferences can be made.","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128711166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi agent foraging - taking a step further Q-leaming with search","authors":"S. Hayat, M. Niazi","doi":"10.1109/ICET.2005.1558883","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558883","url":null,"abstract":"The paper discusses a foraging model which accomplishes coordination obliged tasks. This is done through communication techniques and by learning from and about other agents in a confined, previously unseen environment. A new reinforcement learning technique, Q-Learning with search has been proposed. It is shown to boost the convergence of optimal paths learnt by the agents as compared to traditional QLearning. Different foraging tasks are solved requiring varying degree of collective and individual efforts using the new proposed mechanism. The model enables us to characterize the ability of agents to solve complex foraging tasks rapidly and effectively.","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126451859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Syeda Zahra Ali Naqvi, Shaukat Ali, Muhammad Uzair Khan
{"title":"An evaluation of aspect oriented testing techniques","authors":"Syeda Zahra Ali Naqvi, Shaukat Ali, Muhammad Uzair Khan","doi":"10.1109/ICET.2005.1558925","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558925","url":null,"abstract":"Aspect oriented programming (R.T. Alexander, et al) promises to enhance software quality by increasing the cohesion of classes and localizing both core and crosscutting concerns. The quality of software, however, can only be validated by testing the software. Testing aspect oriented programs remains just as important as testing any other software. This paper presents an analysis of the testing strategies for AOPs. Three testing strategies have been examined and their effectiveness is measured in terms of their ability to find different kind of faults as described in a fault model by R.T. Alexander, et al. Based on this analysis, conclusions have been drawn about the current state of the research in the testing of aspect oriented programs and future directions have been explored.","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125244159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Restoration routing in multi-protocol label switching (MPLS) networks","authors":"Z. A. Uzmi","doi":"10.1109/ICET.2005.1558842","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558842","url":null,"abstract":"MPLS Networks are known to provide flexibility of IP networks without compromising scalability. Guaranteed QoS in an MPLS network requires backup paths to be preset in the network. This tutorial introduces the single-layer restoration routing by placing primary as well as backup paths in MPLS networks. Our focus will be on characterizing the fault models, computing and establishing backup paths, and bandwidth sharing along such backup paths. A quick overview of MPLS routing will be provided followed by the routing information scenarios and the type of information propagated through routing protocols and their extensions. We will also cover the information locally stored at MPLS nodes that assists in efficient restoration routing and the algorithms for computing backup paths using the local and propagated infonnation. Biography: Zartash Afzal Uzmi received his B.Sc. in Electrical Engineering from UET, Taxila and M.S. and Ph.D. in Electrical Engineering from Stanford University, CA. He is currently an Assistant Professor in the Computer Science and Engineering Department at Lahore University of Management Sciences (LUMS) where he is part of the communications and networking group. Within this group, he is heading the efforts in MPLS restoration routing, Class-based preemption, and multilayer recovery. His interests lie in routing protocols, information capacity of ad hoc networks, and signal processing for communications.","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128548424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Terminating load dependent width optimization of global inductive VLSI interconnects","authors":"B. Kaushik, S. Sarkar, R. P. Agarwal","doi":"10.1109/ICET.2005.1558898","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558898","url":null,"abstract":"In this paper interconnect width is optimized for a matched condition to reduce power and delay parameters. Width optimization is done for two sets of interconnect terminating conditions viz, 1) by active gate, and 2) by passive capacitance. For a driver interconnect load model terminated by an active gate, a tradeoff exists between short circuit and dynamic power in inductive interconnects, since with wider lines dynamic power increases, but short circuit power of the load gate decreases due to reduced transient delay. Whereas, for a line terminated by a capacitor, such tradeoff does not exist. The power consumption continues to increase even with reduced transient delay for wider lines. Many of the previous researches have modeled the active gate load at terminating end by its input parasitic gate capacitance. This paper shows that such modeling leads to inaccuracy in estimation of power, and therefore non-optimal width selection, especially for large fan-out conditions.","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133362644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Urdu online handwriting recognition","authors":"S. Malik, S.A. Khan","doi":"10.1109/ICET.2005.1558849","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558849","url":null,"abstract":"Handwriting has continued to persist as a mean of communication and recording information in day-to-day life even with the introduction of new technologies. Handwritten information can be used as computer input once it is converted to digital form. This paper focus on Urdu online handwriting recognition system that converts user hand written information into Urdu text. The working of recognition system is based on analytical approach to segmentation for feature extraction, rule based slant analysis for slant removal and tree based dictionary search for classification. The proposed tree search technique reduces the search space up to 96.2% and is therefore significantly faster than searching techniques, in which we have to process the whole dictionary to come up with the correct answer","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125684311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A.R. Khan, K. Mundboth, J. Stangl, G. Bauer, H. von Kanel, A. Fedorovt, G. Isella, D. Colombo
{"title":"X-ray investigation of thick epitaxial GaAs/InGaAs layers on Ge pseudosubstrates","authors":"A.R. Khan, K. Mundboth, J. Stangl, G. Bauer, H. von Kanel, A. Fedorovt, G. Isella, D. Colombo","doi":"10.1109/ICET.2005.1558902","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558902","url":null,"abstract":"We present an investigation ofa series ofsamples with GaAs/InGaAs layers grown on Ge/Si pseudo-substrates. The strain in the GaAs and InGaAs layers were calculated after measuring the lattice constants of the layers using the x-ray diffraction technique. Both layers were found to be under low tensile stress restulting from the lattice mismatch and the difference in thermal expansion coefficients between the adjacent layers. We explore a new concept based on cotnterbalancing this thermal","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"185 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121190553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Innovative development of spaceborne InSAR simulator","authors":"Z. Bawar, L. Teng, T. Zeng","doi":"10.1109/ICET.2005.1558908","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558908","url":null,"abstract":"A software based interferometric synthetic aperture radar (InSAR) simulator is presented in this paper for producing SAR images and InSAR products. The raw data generation is based on pulse to pulse synthesis in the time domain. As inputs, the simulator requires a digital elevation model (DEM), space craft attitude and altitude, orbital information and back scattering model of the terrain surface. A fractal interpolation algorithm has been used to extract the fractal dimension from the natural terrain. The raw data simulation has been combined with the interferogram simulation to validate phase to height conversion and geocoding process. The interferogram simulation has been developed using a method which works with two real radar sensors.","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"601 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123174942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}