{"title":"A novel embedded system for better detection of perilous gases","authors":"A. Asaduzzaman, M. Mridha, K. K. Chidella","doi":"10.1109/SKIMA.2014.7083559","DOIUrl":"https://doi.org/10.1109/SKIMA.2014.7083559","url":null,"abstract":"Gas leakage is a major problem in industrial sectors, residential premises, and gas-powered vehicles such as compressed natural gas (CNG) cars. The gas detection kits are used to detect the gas leakage at vulnerable places to prevent accidents due to harmful gases. Studies show that modern embedded systems have potential to detect gases and alert people. Various sensors are used (in the embedded systems) to detect various harmful gases. However, most commercially available systems can detect only one gas. The aim of this paper is to introduce an embedded system that can detect various perilous gases and automatically alert about gas leakage in vulnerable premises as needed. The experimental gas leakage system consists of a Carbon Dioxide (CO2) sensor, Carbon Monoxide (CO) sensor, temperature sensor, microcontroller, air conditioner, and a buzzer. The use of temperature sensor is not just confined to detect the temperature but it is used to control the heating ventilation and air conditioning (HVAC) applications inside the residential premises. According to preliminary experiments, the proposed system can detect both CO and CO2 with up to 98% accuracy, control HVAC applications, and alert people in case of a gas leakage. Comparing with two similar contemporary systems, the proposed system offers more and better useful features such as detecting multiple gases, displaying messages, and triggering alarm system.","PeriodicalId":22294,"journal":{"name":"The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014)","volume":"37 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78353716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Md. Kishwar Shafin, Kazi Lutful Kabir, I. Ridwan, Tanvir Ahmed Fuad, Sharmistha Bardhan, Md Ismail Hossain Raju, Afifa Tahira, Ibtasham Afrin, Sushmita Mondal, Sanjida Nasreen Tumpa, Ashfaque Ahmed, Minhajul A. Badhon, Muhammad Tanvirul Islam Jony, Fahim Hasan Khan, Md. Mahboob Karim, Md. Afzal Hossain
{"title":"Mongol Barota: A next generation rover","authors":"Md. Kishwar Shafin, Kazi Lutful Kabir, I. Ridwan, Tanvir Ahmed Fuad, Sharmistha Bardhan, Md Ismail Hossain Raju, Afifa Tahira, Ibtasham Afrin, Sushmita Mondal, Sanjida Nasreen Tumpa, Ashfaque Ahmed, Minhajul A. Badhon, Muhammad Tanvirul Islam Jony, Fahim Hasan Khan, Md. Mahboob Karim, Md. Afzal Hossain","doi":"10.1109/SKIMA.2014.7083564","DOIUrl":"https://doi.org/10.1109/SKIMA.2014.7083564","url":null,"abstract":"This paper scrutinizes Mongol Barota - a fully functional, stand-alone mobile platform rover which is capable to act as a human assistant to perform various scientific tasks in extreme adversities. The control system of the rover is designed in such a way that it can be commanded from a blind station within 1 kilometer range. It has successfully taken part in 8th annual University Rover Challenge organized by the Mars Society at the Mars Desert Research Station (MDRS) in the remote, barren desert of southern Utah, USA in late May, 2014. It has been traced out as the first entrance in this competition from Bangladesh and occupied 12th position out of 31 registered teams from 6 countries of 4 continents. The rover architecture maps the associated components to make it capable to perform the assigned tasks namely - Sample Return Task, Astronaut Assistance Task, Equipment Servicing Task and Terrain Traversing Task. Among these, the first task refers to search for the evidence to identify the existence of life after detailed analysis of collected soil sample from a selected site. In Equipment servicing task, rover has to perform a sequence of operations that mainly includes switching on a compressor and working with a series of pipes, hoses, valves and other such equipment. Astronaut assistance task intends the rover to collect tools from some given GPS locations and then delivery of each of them to the corresponding locations with provided GPS coordinates. Rover has to traverse an adverse terrain in order to pass through a set of target gates for completion of the terrain traversing task. This paper provides a detailed demonstration of the Mongol Barota rover, ins and outs of its architecture, facts and features, system components, logic, logistics and techniques adopted to implement several tasks representing its overall capabilities.","PeriodicalId":22294,"journal":{"name":"The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014)","volume":"74 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81629331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Al-Mamun, W. Srisukkham, C. Fall, R. Bass, Md. Alamgir Hossain, D. Farid
{"title":"A cellular automaton model for hypoxia effects on tumour growth dynamics","authors":"M. Al-Mamun, W. Srisukkham, C. Fall, R. Bass, Md. Alamgir Hossain, D. Farid","doi":"10.1109/SKIMA.2014.7083562","DOIUrl":"https://doi.org/10.1109/SKIMA.2014.7083562","url":null,"abstract":"Cancer is one of the biggest killers in the western world; every two minutes someone is diagnosed with cancer in the UK. Tumour growth and progression is a complex biological process, normally beginning with genetic mutations in a single cell. It starts with the early or avascular phase where growth is limited by nutrient diffusion, then the vascular stage where angiogenesis occurs to stimulate blood vessel production by the secretion of tumour angiogenesis factors and finally the metastasitic phase where the tumour spreads from the site of origin to distant sites around the body. While considering these events at the cellular level, these processes involve many microenvironment parameters like oxygen concentration, hypoglycaemia, acidity, hypoxia (lack of oxygen), cell-cell adhesion, cell migration and cell-extracellular matrix interactions. In this paper, a computational model is proposed which considered hypoxia as a microenvironment constraint of tumour growth. The model is built on two dimensional cellular automata grid and artificial neural network is considered for establishing signaling network of tumour cells. Each tumour cell can take its own decision in this model. A hypoxia impact was implemented in the model by varying different oxygen concentrations. The results show that hypoxia was introduced in the tumour mass due to lack of oxygen. The model measured tumour invasion and the number of apoptotic cells to support that hypoxia has a critical impacts on avascular tumour growth. This model could inform a better understanding of the impacts of hypoxia in tumour growth from the computational point of view.","PeriodicalId":22294,"journal":{"name":"The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014)","volume":"6 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76364593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A stability analysis of discrete-time interconnected systems with mixed passivity, negative-imaginary and small-gain properties","authors":"M. Rahman, A. Al Mamun, K. Yao","doi":"10.1109/SKIMA.2014.7083553","DOIUrl":"https://doi.org/10.1109/SKIMA.2014.7083553","url":null,"abstract":"A stability analysis of discrete-time interconnected systems with mixed passivity, negative-imaginary and small-gain properties is briefly presented in this paper. These results are analogous to previously established continuous-time case. Nowadays most of the control design is done in discrete-time. Hence, this paper provides a foundation for discretization of mixed system with passivity, negative-imaginary and small-gain properties. Numerical example and practical plant model example with simulation results substantiate the usefulness of the proposed stability analysis.","PeriodicalId":22294,"journal":{"name":"The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014)","volume":"17 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80884590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ant Colony Optimization, Genetic Programming and a hybrid approach for credit scoring: A comparative study","authors":"Rojin Aliehyaei, Shamim Khan","doi":"10.1109/SKIMA.2014.7083391","DOIUrl":"https://doi.org/10.1109/SKIMA.2014.7083391","url":null,"abstract":"Credit scoring is a commonly used method for evaluating the risk involved in granting credits. Both Genetic Programming (GP) and Ant Colony Optimization (ACO) have been investigated in the past as possible tools for credit scoring. This paper reports an investigation into the relative performances of GP, ACO and a new hybrid GP-ACO approach, which relies on the ACO technique to produce the initial populations for the GP technique. Performance of the hybrid approach has been compared with both the GP and ACO approaches using two well-known benchmark data sets. Experimental results demonstrate the dependence of GP and ACO classification accuracies on the input data set. For any given data set, the hybrid approach performs better than the worse of the other two methods. Results also show that use of ACO in the hybrid approach has only a limited impact in improving GP performance.","PeriodicalId":22294,"journal":{"name":"The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014)","volume":"1 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89834196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BLASTAssemb: An approach to construct genetic elements using BLAST","authors":"Tasnim Rahman, Tasnova Chowdhury, Shamira Tabrejee, Md Miraj Kobad Chowdhury, M. Shoyaib","doi":"10.1109/SKIMA.2014.7083544","DOIUrl":"https://doi.org/10.1109/SKIMA.2014.7083544","url":null,"abstract":"With the availability of recent next generation sequencing technologies and cheap price, genome of different organisms is now being sequenced frequently. Therefore, quick assembling of a genetic element from the raw genome generated through the sequencing technologies has become necessary for better understanding of different biological systems. This paper proposes an algorithm for constructing genetic elements from raw genome using reference sequences. For this, we considered a weighted frequency based consensus making mechanism. Furthermore, we have used BLAST (Basic local alignment search tool), a well known tool to the community of bioinformaticians, in this regard. The proposed method, thus applies the capability of BLAST, which enables the construction of genetic elements from raw sequences. For evaluating our algorithm, we have chosen Pokkali (a verity of rice) raw genome and few promoters of Japonica (another verity of rice) as our reference data. Experimental results demonstrated that our proposed algorithm could accurately construct the promoter sequences of Pokkali from its raw genome sequences.","PeriodicalId":22294,"journal":{"name":"The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014)","volume":"1 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90684069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An approach to provide security to unstructured Big Data","authors":"M. Islam, Md. Ezazul Islam","doi":"10.1109/SKIMA.2014.7083392","DOIUrl":"https://doi.org/10.1109/SKIMA.2014.7083392","url":null,"abstract":"Security of Big Data is a big concern. In broad sense Big Data contains two types of data such as structured and unstructured. To provide security to unstructured data is more difficult than that of structured. In this paper we have developed an approach to give adequate security to the unstructured data by considering the types of the data and their sensitivity levels. We have reviewed the different analytics methods of Big Data, which gives us the facility to build a data node of databases of different types of data. Each type of data has been further classified to provide adequate security and enhance the overhead of the security system. To provide security to data node a security suite has been designed by incorporating different security standards and algorithms. The proper security standards or algorithms can be activated using an algorithm, which has been interfaced with the data node. We have shown that data classification with respect to sensitivity levels enhance the performance of the system.","PeriodicalId":22294,"journal":{"name":"The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014)","volume":"22 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84668153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Freeman chain code with digits of unequal cost","authors":"Sohag Kabir, Tanzima Azad, A. S. M. Ashraful Alam","doi":"10.1109/SKIMA.2014.7083531","DOIUrl":"https://doi.org/10.1109/SKIMA.2014.7083531","url":null,"abstract":"Chain codes are the most size-efficient lossless compression methods for representing rasterised binary objects and contours. Satisfactory compression ratio, low processing cost and low storage requirements of the decoder make chain code technique interesting for storage and transmission of predefined graphical objects in embedded environments. Each element in the chain is encoded to show the relative angle difference between two adjacent pixels along the boundary of an object. The cost of binary bits representing the codes are considered to be equal. Yet, more efficient encoding is possible by considering and applying technique that treats the binary bits differently considering its requirement of storage space, energy consumption, speed of execution and etc. This paper considers cost of binary digits as unequal and proposes a new representation of the eight-direction Freeman chain code based on a variation of Huffman coding technique, which considers cost of bits as unequal. The evaluation and comparison of the cost efficiency between classical Freeman chain code and the new representation of the chain code is provided. Our experiments yield that the proposed representation of Freeman Chain code reduces overall storage/transmission cost of encoded objects considerably with compared to classical Freeman chain code.","PeriodicalId":22294,"journal":{"name":"The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014)","volume":"252 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84456135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kamlesh Mistry, Li Zhang, S. Neoh, Ming Jiang, Md. Alamgir Hossain, Benoit Lafon
{"title":"Intelligent Appearance and shape based facial emotion recognition for a humanoid robot","authors":"Kamlesh Mistry, Li Zhang, S. Neoh, Ming Jiang, Md. Alamgir Hossain, Benoit Lafon","doi":"10.1109/SKIMA.2014.7083542","DOIUrl":"https://doi.org/10.1109/SKIMA.2014.7083542","url":null,"abstract":"In this paper, we present an intelligent facial emotion recognition system with real-time face tracking for a humanoid robot. The system is able to detect facial actions and emotions from images with up to 60 degrees of pose variations. We employ the Active Appearance Model to perform real-time face tracking and extract both texture and geometric representations of images. A POSIT algorithm is also used to identify head rotations. The extracted texture and shape features are employed to detect 18 facial actions and seven basic emotions. The overall system is integrated with a humanoid robot platform to further extend its vision APIs. The system is proved to be able to deal with challenging facial emotion recognition tasks with various pose variations.","PeriodicalId":22294,"journal":{"name":"The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014)","volume":"38 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78112176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security of SIP-based infrastructure against malicious message attacks","authors":"A. Shrestha","doi":"10.1109/SKIMA.2014.7083519","DOIUrl":"https://doi.org/10.1109/SKIMA.2014.7083519","url":null,"abstract":"Nowadays Session Initiation Protocol (SIP) has become the most widely used signaling protocol by the vendors in the Voice over Internet Protocol (VoIP) communication. As the SIP is gaining popularity, open architecture of VoIP often makes SIP vulnerable to so many threats. The paper introduces SIP along with its different security mechanisms with the focus on attack signatures generation technique to identify the malformed SIP messages. It aims to generate various malicious SIP messages and to verify the limitations of the existing classical Intrusion Detection System (IDS) in identifying the malicious messages. Then it sets out to implement an improved detection framework using the rules as regular expression. The experiments were carried out using SER as an open source SIP server, Kphone and X-lite as SIP clients and the SIPSAK as an attacking tool on a testbed architecture which was in a form of virtual environment created with VMware. The platforms used were BackTrack7 and Windows 7. The test was first performed on SNORT, an open source IDS and later by adding the improved detection rules in the configuration file of the SIP server. The successful attacks on the classical attack-signatures generation framework proved that the existing IDSs couldn't identify logical errors in the malicious SIP messages. The proposed detection module identified and rejected all kind of malicious SIP messages with acceptable processing overheads. Moreover the associated signatures database can also be incorporated into other VoIP protocols and open source IDSs like SNORT. This paper has provided the effective mechanism in creating well-formed defense against malicious SIP message attacks to ensure the integrity and security of VoIP subsystems.","PeriodicalId":22294,"journal":{"name":"The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014)","volume":"25 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74563114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}