Uzair Khaleeq uz Zaman, Mujtaba Rafique Ghoto, A. Siadat, A. Baqai, A. B. Aqeel, Usman Qamar
{"title":"Integrated Product-Process Design: Conceptual Framework for Data Driven Manufacturing Resource Selection","authors":"Uzair Khaleeq uz Zaman, Mujtaba Rafique Ghoto, A. Siadat, A. Baqai, A. B. Aqeel, Usman Qamar","doi":"10.1109/ICoDT255437.2022.9787394","DOIUrl":"https://doi.org/10.1109/ICoDT255437.2022.9787394","url":null,"abstract":"With the extensive development of new technologies and the application of information in the manufacturing industry, immense volumes of distinct data are being generated and collected daily. However, this data is largely unusable as its not meticulously cleaned and processed. The effective utilization of such complex data is the cornerstone of data analytics, as successful analysis leads to useful, relevant, and actionable knowledge, which in the long run can prove to be revolutionary for any field and open new avenues. Although the application of data analytics in areas such as sales & marketing, healthcare, cybersecurity, and climate change is largely prevalent, the implementation of data analysis and its tools for efficient product & process design is an unexplored opportunity with large volumes of data generated by major stakeholders throughout the manufacturing and product-process design activity remaining underutilized. This paper, therefore, defines a novel conceptual framework that applies data analysis to integrated product-process design (IPPD) for weighted data-driven IPPD that amalgamates data generated from multiple streams. Primarily from the user perspective, supply chain network, current & upcoming technological processes, and competitor process and product designs, will be utilized. The proposed framework can be further used to create new products better aligned with customer requirements, enhance the overall quality of the product, improve production efficiency through new technological advancements, support the supply chain network, and give the applicant industry a competitive advantage against its competitors.","PeriodicalId":291030,"journal":{"name":"2022 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122755208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Usama Iqbal, Sajid Gul Khawaja, S. Khan, A. Shaukat
{"title":"Framework for Dynamic Partial Configuration of Algorithms for Zynq-7000 SoC using JPEG as Case Study","authors":"Muhammad Usama Iqbal, Sajid Gul Khawaja, S. Khan, A. Shaukat","doi":"10.1109/ICoDT255437.2022.9787460","DOIUrl":"https://doi.org/10.1109/ICoDT255437.2022.9787460","url":null,"abstract":"The ability of the Field Programmable Gate Arrays (FPGAs) to reconfigure themselves makes them stand out and a preferred choice while designing an embedded system. The basic hardware architecture of FPGAs is the reason behind the availability of this unique feature. Most of the SRAM-based FPGAs supports partial reconfiguration (PR) feature. Many complex algorithms can be implemented using dynamic partial reconfiguration on FPGAs while occupying minimum possible area. Many applications implemented on FPGAs do not execute in a parallel fashion where different modules of the application are implemented over dedicated part of the hardware. Most of the time these modules are dependent on each other’s result therefore they cannot execute in parallel and leave a big amount of the FPGA area sitting idle most of the execution period. We propose a framework based on Dynamic partial reconfiguration, which allows scheduling the execution of multiple logic designs over the same area of FPGA fabric. In order to validate the proposed methodology, JPEG compression has been implemented as a case study Zynq-7000 SOC using both proposed framework and a single static implementation. In addition, the effectiveness of the proposed methodology is quantified by comparing the FPGA resource utilization of the original JPEG compression engine design and that of the partial re-configurable prototype. The results indicate a significant reduction in hardware resource utilization where 34%, 39% and 66% reduction has been achieved in Slice LUTs, Slice Registers and DSP blocks respectively.","PeriodicalId":291030,"journal":{"name":"2022 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129579080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power profiling-based side-channel attacks on FPGA and Countermeasures: A survey","authors":"Ali Hasnain, Yame Asfia, S. G. Khawaja","doi":"10.1109/ICoDT255437.2022.9787473","DOIUrl":"https://doi.org/10.1109/ICoDT255437.2022.9787473","url":null,"abstract":"In recent years, there are many attacks revealed that can extract secret information from systems. These attacks are so powerful and serious threat to the security of systems. The side-channel attacks which use the power leakage of the cryptographic circuit during performing any operation to obtain a secret key are called power-based side-channel attacks. In this paper, we present a novel definition to explain these attacks, we present the difference between physical and remote power profiling methods and attacks. For our survey, we collect the more related and main information contained about power profiling-based attacks for purpose of a better literature survey. For the prevention of these attacks, we present the countermeasures based on masking and hiding techniques. We also present a brief discussion on attacks and their countermeasures.","PeriodicalId":291030,"journal":{"name":"2022 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128226914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Analytic Hierarchy Process for urban heat stress mitigation","authors":"A.M. Qureshi, A. Rachid","doi":"10.1109/ICoDT255437.2022.9787426","DOIUrl":"https://doi.org/10.1109/ICoDT255437.2022.9787426","url":null,"abstract":"In this study, an Analytic Hierarchy Process based approach is proposed for the selection of heat stress prevention measures. This approach provides decision makers with an easy way to evaluate the criteria that help the decision-making process in choosing appropriate measures for hotspots. The study focuses on the key pre-criteria before implementing an intervention. The proposed scheme is based on a comparison between the interventions to show the importance of the alternatives. The evaluation of the measures is obtained from a questionnaire where human judgment is used for a comparison, based on their perception and priorities. The final results showed that green roof is most beneficial option for heat stress mitigation with respect to criteria taken into account.","PeriodicalId":291030,"journal":{"name":"2022 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2)","volume":"11 Suppl 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117261640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optical flow estimation technique for hazy scenes","authors":"Rao Kashif, Sana Rao","doi":"10.1109/icodt255437.2022.9805761","DOIUrl":"https://doi.org/10.1109/icodt255437.2022.9805761","url":null,"abstract":"Hazy scenes limit the visibility and make the optical flow estimation task challenging due to low contrast images. Previous methods are not robust when applied to hazy image sequences because the two assumptions (brightness constancy and smoothness) break down due to the low contrast outdoor effects. Based on the pre-processing work on images, we applied an image dehazing method on image sequences first to handle haze and then estimated optical flow. The proposed method is based on a classical pyramidal technique. Results show that our method performs well on hazy scenes as compared to the other existing method.","PeriodicalId":291030,"journal":{"name":"2022 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133731208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. I. Moazzam, U. S. Khan, Tahir Nawaz, W. S. Qureshi
{"title":"Crop and Weeds Classification in Aerial Imagery of Sesame Crop Fields Using a Patch-Based Deep Learning Model-Ensembling Method","authors":"S. I. Moazzam, U. S. Khan, Tahir Nawaz, W. S. Qureshi","doi":"10.1109/ICoDT255437.2022.9787455","DOIUrl":"https://doi.org/10.1109/ICoDT255437.2022.9787455","url":null,"abstract":"Sesame (Sesamum indicum L.) is an important commercial and food crop, and its yields is limited by many insects, pests, diseases, and weeds. Autonomous aerial agrochemicals spray application on sesame fields using a drone aims to save crop from these yield limiting factors and in addition agrochemicals application quantity and site could be controlled, and human health is expected to be protected. For accurate and selective spray application, autonomous systems would need some parameters to distinguish between crop, weed and background. In this research an aerial sesame field dataset has been collected with the focus to classify patch areas of sesame and weeds present in the field. Dataset was captured using Agrocam. We have developed a patch image-based classification approach along with a novel SesameWeedNet convolutional neural network (CNN) inspired by the layer’s configuration of VGG networks and depth-wise convolutions of the MobileNet. The small model contains 6 convolutional layers, and it runs faster and accurately on small patch images. Our approach breaks 1920×1080-pixel images into smaller patch images of size 45×45 pixels. After that, these small patch images are fed to a relatively small CNN for training, validation, and finally for classification. Patch based model ensemble and dataset grouping are two major parts in our methodology. Our system recommends the dataset grouping according to vegetation present in the images to enhance classification results. We have achieved accuracy up to 96.7% with our proposed method. We have tested our system under sunlight variation, in wet and dry soil conditions and at different growth stages. To the best of our knowledge, no attempt has been made to classify and treat crop and weeds in sesame fields at the post-emergence stage previously. In this research we have made the contribution of aerial sesame-weed dataset and a complete deep learning-based approach to classify weeds in sesame fields under variable lighting conditions.","PeriodicalId":291030,"journal":{"name":"2022 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116249698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Salman, Muhammad Sohaib Khan, Sarmad Idrees, F. Akram, Muhammad Junaid, A. Malik
{"title":"File Integrity Checkers: Functionality, Attacks, and Protection","authors":"A. Salman, Muhammad Sohaib Khan, Sarmad Idrees, F. Akram, Muhammad Junaid, A. Malik","doi":"10.1109/ICoDT255437.2022.9787428","DOIUrl":"https://doi.org/10.1109/ICoDT255437.2022.9787428","url":null,"abstract":"Intrusion detection systems are a critical component of a network's security. Intrusion detection systems exist in a variety of shapes and sizes, with various methodologies and analytic procedures. Host-based intrusion detection systems, or HIDS, are intrusion detection systems that operate at the host level and use a signature database (DB) or a profile to do detection analysis. The integrity of the database is fully dependent on the detection in all host-based systems. If an attacker can edit the database to his liking, he can simply circumvent the HIDS. In this paper, we have focused our study on file integrity checking HIDS. An endeavor has been made to study this specific type of HIDs functionality and various attacks against its trusted operation. Different techniques used to secure the system database have been studied, however, none are found to be flawless. We conclude that the use of Blockchain can be a viable solution in the future to secure the critical database integrity in such systems.","PeriodicalId":291030,"journal":{"name":"2022 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116530440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Analytic Hierarchy Process for urban heat stress mitigation","authors":"A.M. Qureshi, A. Rachid","doi":"10.1109/ICoDT255437.2022.9787481","DOIUrl":"https://doi.org/10.1109/ICoDT255437.2022.9787481","url":null,"abstract":"In this study, an Analytic Hierarchy Process based approach is proposed for the selection of heat stress prevention measures. This approach provides decision makers with an easy way to evaluate the criteria that help the decision-making process in choosing appropriate measures for hotspots. The study focuses on the key pre-criteria before implementing an intervention. The proposed scheme is based on a comparison between the interventions to show the importance of the alternatives. The evaluation of the measures is obtained from a questionnaire where human judgment is used for a comparison, based on their perception and priorities. The final results showed that green roof is most beneficial option for heat stress mitigation with respect to criteria taken into account.","PeriodicalId":291030,"journal":{"name":"2022 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130226782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey On Prevalent Approaches To Predict The Popularity Of Social Content","authors":"A. Shahid, M. Akram, Anum Abdul Salam, Jahan Zeb","doi":"10.1109/ICoDT255437.2022.9787430","DOIUrl":"https://doi.org/10.1109/ICoDT255437.2022.9787430","url":null,"abstract":"The destiny of social media images depends upon their popularity: some of the uploaded images/videos get a lot of fame among people while others just get completely unnoticed. Why is this so? This survey paper addresses this question and discusses all the features related to an image/video that are responsible for its popularity among people. Their must be some common features in the images/videos that gets fame, if we get to learn the pattern or features that are responsible for the fame then we can predict if media will get fame or not before actually uploading the media on social media platforms. The prediction of engagement level for an image can be used by companies to improve their marketing strategies. This can be very useful to target the right audience sagaciously, manage the resources efficiently and make strategical decisions. In this survey paper, different prevalent methodologies are discussed that are used by researchers in the past, the techniques they have used to predict the popularity score of an image for a specific number of days and the types of features they have used. This survey paper manifest that the features related to the image context outperforms the features related to image content.","PeriodicalId":291030,"journal":{"name":"2022 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128253432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Hayat, Faisal Rehman, Naveed Riaz, Hana Sharif, Sadaf Irshad, Shahid Shareef
{"title":"Using Machine Learning Algorithms to Detect Dysplasia in Barrett's Esophagus","authors":"S. Hayat, Faisal Rehman, Naveed Riaz, Hana Sharif, Sadaf Irshad, Shahid Shareef","doi":"10.1109/ICoDT255437.2022.9787479","DOIUrl":"https://doi.org/10.1109/ICoDT255437.2022.9787479","url":null,"abstract":"Machine learning is a division or branch of mathematical models that are used to learn data to generate computerized algorithms. This concept could be a predictive model. Machine learning is part of the learning key function that can predict other noisy data. One possible method is to separate the two types according to the features of the measurement content. These models can be used to cause people associated with the disease. In our research, different algorithms are applied to the data set to correctly predict dysplasia. This opens the door to standardized training and qualitative analysis steps for staff performing endoscopy in Barrett's esophagus. In this study, Five classification techniques were used in the implementation of principal component analysis, e.g. K-Nearest Neighbors, SVM (Support Vector Machines). The basic goal is to measure the exact value of information about output and feasibility, with each evaluation being for accuracy, recall, and specificity. The exploratory output shows the support of vector analysis with PCA. The single score for the K neighbor (0.97) and the SVM value is 0.91.","PeriodicalId":291030,"journal":{"name":"2022 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128289617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}