{"title":"Optimizing the performance of turbo code HDL model for rapid prototype","authors":"Samra Kahkashan, R. Badar, Amna Mahboob","doi":"10.1109/ICET.2009.5353145","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353145","url":null,"abstract":"Turbo code is a class of convolutional codes which have great deal of interest as they attain the ultimate limits of the capacity of communication channel. They are known as “The ultimate Error Control Codes” which made them move rapidly from research laboratories to practical applications throughout the world. The use of these codes has been proposed for several applications where highly reliable transmission is required at very low SNR. In this paper we discuss hardware implementation aspect of turbo codes along with some previous work done and their limitations. We also present the results of RTL modeling and simulation and the synthesis report of turbo encoder using Xilinx ISE 10.1. The performance of turbo codes can be optimized in terms of power consumption and resource utilization of hardware.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126473755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Syeda Uzma Gardazi, Haroon Khan, Syeda Faiza Gardazi, A. A. Shahid
{"title":"Motivation in software architecture and software project management","authors":"Syeda Uzma Gardazi, Haroon Khan, Syeda Faiza Gardazi, A. A. Shahid","doi":"10.1109/ICET.2009.5353138","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353138","url":null,"abstract":"Software architecture (SA) is considered an active research area nowadays, although it is not a new activity while developing software. Software architecture is a structure represented using Architecture Description Languages (ADLs) and graphical diagrams of the system, showing different components and relationships among them. Software Project Management (SPM) pertains to the management and controlling activities involved in Software Development Life Cycle (SDLC) and includes planning, organizing, staffing, leading and controlling the software processes. This paper aims to identify the motivational factors affecting software architects and software project managers using the survey technique. We have collected results from questionnaire surveys technique which will help software project managers and software architects to understand the factors that can affect the overall quality of the software and its architecture. The last step will be to propose an updated framework for Systematic Literature Review (SLR). This new concept of using Clustering, Genetic Algorithm and Agents in SLR was proposed to produce an efficient and optimized query search strings and searches for search engines.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124633818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of association rule mining using CUDA","authors":"Syed Hasan Adil, S. Qamar","doi":"10.1109/ICET.2009.5353149","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353149","url":null,"abstract":"The purpose of this paper is to implement association rule mining algorithm using Nvidia CUDA framework for general purpose computing on GPU. The major objective is to perform performance comparison of association rule mining algorithm using C based implementation on Intel Quad Core/Core2 Duo CPU with CUDA based implementation on Nvidia G80 and GTX 200 series GPU. The final outcome of this research is the bitmap based association rule mining algorithm and its performance statistics on CPU and GPU.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125739955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On design and fabrication of a prototype teleoperated mobile surveillance robot","authors":"S. Kayani, W. H. Bhatti, Khawar Khalil Jarral","doi":"10.1109/ICET.2009.5353184","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353184","url":null,"abstract":"An indigenous prototype mobile teleoperated robot has been designed and fabricated for urban surveillance [1]. This class of mobile robots finds its application in hazardous area exploration, explosives handling, disarming mines and improvised explosive devices (IEDs), remote monitoring and urban surveillance for law enforcement. This paper is a brief description of the design and fabrication process followed for development of the prototype robot. Robot telecontrol, real-time location identification and real-time video transfer are the main design characteristics along with development of a graphical user interface for controlling robot operation.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132608675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Solving NP-complete problem using ACO algorithm","authors":"Muhammad Asif, R. Baig","doi":"10.1109/ICET.2009.5353209","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353209","url":null,"abstract":"Recent studies have shown that Evolutionary Algorithms have had reasonable success at providing solutions to those problems that fall in NP-Complete class of algorithms. Ant Colony Optimization (ACO) algorithm is one of the promising field of evolutionary algorithms that gave acceptable solutions to Travelling Salesperson Problem and various Network Routing Optimization problems in polynomial time. These classic computer science problems belong to a NP-Complete class of problems that is amongst some of the most interesting in mathematics, including the Sudoku Puzzle Problem. People have tried to automate solving Sudoku Puzzle Problem using brute force, tabu search. Given the success of ACO algorithm with problems within NP-Complete class of problems, it would be interesting to see how it handles this puzzle. A novel technique is presented as modification to standard ACO algorithm. Moreover, we will compare performance matrix (quality of solution and time complexity) of ACO algorithm with other techniques presented in the past to solve the Sudoku puzzle.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132430168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative analysis of invariant schemes for logo classification","authors":"Syed Yasser Arafat, M. Saleem, S. Hussain","doi":"10.1109/ICET.2009.5353163","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353163","url":null,"abstract":"Logo or Trademark is of high importance because it carries the goodwill of the company and the product. Products are mostly recognized by their brand logos. Their recognition is a major problem. A number of techniques are there for logo recognition. In this paper, a number of invariant techniques are compared to find out their effectiveness on various categories of brand logos. Techniques which were investigated are Hu's Invariant Moments, Log-Polar Transform (LPT), Fourier-Mellin transform (FMT), Gradient Location-Orientation Histogram (GLOH). Experiments were performed on University of Marry Land (UMD) database. Results are given, along with recognition rate and time taken. Results show that GLOH performs the best with approximately 97% recognition rate but need a more computational time while on the other extreme FMT technique performs poorest with recognition rate with average of approx. 85% but with least computational time compared to all other techniques.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"151 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130989275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis and verification of Two-Phase Commit & Three-Phase Commit Protocols","authors":"M. Atif","doi":"10.1109/ICET.2009.5353152","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353152","url":null,"abstract":"This paper introduces a formal model of the distributed commit protocols in the process algebra mCRL2 and also their general requirements in the modal µ-calculus. We show how to make straightforward models of protocols and by doing so, how it becomes easy to identify problems. We apply this to the well-known Two-Phase Commit Protocol (2PC) and prove it problematic for single site failure. We also apply our method to its “amended” variant, the Three-Phase Commit Protocol (3PC) and prove it to be erroneous for simultaneous site failures. We present 2PC and 3PC in different communication settings and verify them with respect to their requirements.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"96 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113953917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust controller using LMI framework for PEM fuel cell system","authors":"I. H. Kazmi, A. I. Bhatti","doi":"10.1109/ICET.2009.5353188","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353188","url":null,"abstract":"In this work, an H infinity controller has been designed for regulation of output voltage of polymer electrolyte membrane (PEM) fuel cell system using Linear Matrix Inequality (LMI) framework. Load variations affect the output voltage of the system and degradation in the output voltage appears which results in the variable voltage. Variable voltage cannot be considered appropriate for almost all electrical devices. Therefore a steady voltage is necessary and in this communication, the output voltage of the system has been maintained by manipulating the reactant feed of oxidizer for small load variations. The available different linear models of the system were treated as vertices of the polytope. These linear models were identified under different loads. The LMI's have been generated from a convex region of desired pole placement. The simulation results show that the controller synthesized using the LMI framework is deemed more effective.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115003079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. H. Farooqi, Qurat-ul-ain, S. B. Kazmi, F. A. Khan
{"title":"Performance analysis of peer-to-peer overlay architectures for Mobile Ad hoc Networks","authors":"A. H. Farooqi, Qurat-ul-ain, S. B. Kazmi, F. A. Khan","doi":"10.1109/ICET.2009.5353123","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353123","url":null,"abstract":"Mobile adhoc networks (MANETs) are good candidate for peer-to-peer (P2P) overlay architectures. In both, nodes work independently and are distributed in nature. P2P overlays are mostly built over traditional underlying IP network like Internet. There are two flavors of it; unstructured P2P such as Gnutella and structured P2P such as Chord. In this paper, we explain and evaluate Gnutella and Chord for different scenarios in NS-2 while keeping Adhoc On-demand Distance Vector (AODV) as underlying routing protocol. Simulation results show that unstructured P2P architecture achieves high hit rate and produces less updates. We further investigate Gnutella by changing the underlying routing protocol.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125738274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Ahmad, Junaid Qadir, N. Rehman, A. Baig, Hammad Majeed
{"title":"Prediction-based channel zapping latency reduction techniques for IPTV systems — A survey","authors":"M. Ahmad, Junaid Qadir, N. Rehman, A. Baig, Hammad Majeed","doi":"10.1109/ICET.2009.5353126","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353126","url":null,"abstract":"Internet Protocol Television — IPTV is a new form of traditional TV, in which TV content is delivered using IP based networks which are managed to provide the required level of quality of service, experience, security, interactivity and reliability. Quality of Service (QoS) and Quality of Experience (QoE) are the two major factors which need to be ensured in order to achieve IPTV customer satisfaction. Channel zapping latency is the major problem which affects QoE for IPTV users. In IPTV systems while switching channels, a delay occurs due to different factors like IGMP Join/Leave latency, video steam encoding and decoding time, network jitter and traffic load. These factors hinder the process of IPTV deployment at large scale and pose scalability issues to IPTV. In order to solve IPTV channel zapping latency problem, a number of approaches have been contributed by different researchers but due to bandwidth limitation and video quality issues, every approach has its own tradeoff. In this paper, we survey the current state-of-art in this thread of research and present the insights behind various approaches that have been proposed in literature to solve the problem of increased channel zapping time. In conclusion, we also point out open research questions and future research areas.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123615462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}