2014 International Conference on Emerging Technologies (ICET)最新文献

筛选
英文 中文
A bi-directional prototype mobile robot to experiment light scale object-transportation schemes 用于实验轻尺度物体运输方案的双向移动机器人原型
2014 International Conference on Emerging Technologies (ICET) Pub Date : 2014-12-01 DOI: 10.1109/ICET.2014.7021030
Muhammad Bilal Khan, Muhammad Awais Hussain, K. Shahzad, Sajid Nawaz, Muhammad Umar Touseef, Raja Jawad Ali Khan
{"title":"A bi-directional prototype mobile robot to experiment light scale object-transportation schemes","authors":"Muhammad Bilal Khan, Muhammad Awais Hussain, K. Shahzad, Sajid Nawaz, Muhammad Umar Touseef, Raja Jawad Ali Khan","doi":"10.1109/ICET.2014.7021030","DOIUrl":"https://doi.org/10.1109/ICET.2014.7021030","url":null,"abstract":"In this paper, we present the control and implementation schemes of a bi-directional prototype mobile robot for doing the repetitive tasks. The robot was built with the fundamental capabilities like autonomous navigation and autonomous decision making during the path planning stages. Different sensors were used for the acquisition of the useful data from the surroundings of the robot. Robot's mechanical structure was supporting the overall scheme of its use as a basic service transportation robot. A solid gripper was used in order to pick desired objects inside an arena. The prototype robot successfully managed to complete the tasks assigned to it with the given scenarios.","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129493212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security analysis of VoIP architecture for identifying SIP vulnerabilities 基于SIP漏洞的VoIP体系结构安全分析
2014 International Conference on Emerging Technologies (ICET) Pub Date : 2014-12-01 DOI: 10.1109/ICET.2014.7021022
U. Rehman, Abdul Ghafoor Abbasi
{"title":"Security analysis of VoIP architecture for identifying SIP vulnerabilities","authors":"U. Rehman, Abdul Ghafoor Abbasi","doi":"10.1109/ICET.2014.7021022","DOIUrl":"https://doi.org/10.1109/ICET.2014.7021022","url":null,"abstract":"Voice over Internet Protocol (VoIP) is an emerging technology that changes the way of communication services over IP networks. It provides flexible and low cost services to the users, which make it more popular than the existing Public Switch Telephone Network (PSTN). With the popularity of this technology, it became targeted victim of different attacks. In this paper we analyzed VoIP architecture, both theoretically and practically with more emphasizes on security of Session Initiation Protocol (SIP). In order to analyze theoretically, we performed a literature survey related to SIP security and classified it in term of existing SIP attacks and defenses. Our theoretical analysis reveals that most attacks on VoIP architecture were successful due to weaknesses of SIP, especially the authentication mechanism used in the session establishment phase. For practical analysis, we used open source Asterisk and pen-test it in different attacking scenarios using Kali Linux distribution. Our practical analysis studies revealed that open source asterisk server is still vulnerable to several attacks, which includes eavesdropping, intentional interruption, social threats, interception and modification, and unintentional interruption. We also provide a concise mitigating scheme based on Single Sign-On (SSO), which provides an efficient and reliable authentication mechanism for securing SIP.","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132022171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Oppel-2: A new family of FCSR-based stream ciphers Oppel-2:一个新的基于fcsr的流密码家族
2014 International Conference on Emerging Technologies (ICET) Pub Date : 2014-12-01 DOI: 10.1109/ICET.2014.7021020
Arshad Ali
{"title":"Oppel-2: A new family of FCSR-based stream ciphers","authors":"Arshad Ali","doi":"10.1109/ICET.2014.7021020","DOIUrl":"https://doi.org/10.1109/ICET.2014.7021020","url":null,"abstract":"This paper presents a new family of secure, small and fast stream ciphers referred to as Oppel-2. Oppel-2 uses Feedback with Carry Shift Registers in combination with an output function to produce pseudorandom keystream. Members of Oppel-2 family of ciphers can also be tailored for different applications to meet their implementation constraints while providing required level of security. The paper defines three instances of Oppel-2, which are referred to as Oppel-2 V0, Oppel-2 V1 and Oppel-2 V2. These instances of Oppel-2 provide security of 264, 280 and 2128 primitive operations, respectively. The paper also shows that Oppel-2 is immune to linearisation attacks, which are considered as most effective attacks against those ciphers whose theory depends upon properties of 2-adic numbers. In addition the paper also presents a security strength analysis of Oppel-2 against various other types of attacks. This analysis shows that Oppel-2 family of ciphers is suitable for implementation in practical applications.","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129475729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Throughput optimization for Cognitive Radio while bulwarking Primary User 认知无线电的吞吐量优化,同时保护主用户
2014 International Conference on Emerging Technologies (ICET) Pub Date : 2014-12-01 DOI: 10.1109/ICET.2014.7021025
Zunnorain Amer Ali Baig, A. Malik, I. Qureshi
{"title":"Throughput optimization for Cognitive Radio while bulwarking Primary User","authors":"Zunnorain Amer Ali Baig, A. Malik, I. Qureshi","doi":"10.1109/ICET.2014.7021025","DOIUrl":"https://doi.org/10.1109/ICET.2014.7021025","url":null,"abstract":"Electromagnetic spectrum, a natural limited resource, with the boom in applications of wireless communications, that limited resource is becoming congested more and more and the only solution for efficient spectrum utilization is Cognitive Radios, moreover spectrum sensing is the most irrefutably functionality in CRs and with spectrum sensing, throughput for secondary user's transmission plays an important role. In this paper after performing spectrum sensing using energy detection scheme, we have achieved the optimized throughput for Secondary User by ensuring the protection of Primary User's rights. For a total time in a frame, least time for sensing is desired and the residual time in that frame is used for transmission. Two parameters related to sensing are fallacious alarm probability and detection probability pertaining to secondary and primary users correspondingly, greater the probability of detection, more the licensed user's rights are protected, smaller the fallacious alarm probability, greater chance of using the underutilized band, applying the most famous technique known as energy detection scheme. In this paper we studied the problem of conniving sensing time in order to achieve maximum and optimal transmission time for secondary user keeping the restraint that licensed user is adequately bulwarked. Maximum achievable throughput was achieved with least sensing time, not achieved in previous work.","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129786502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vibration-based electromagnetic type energy harvester for bridge monitoring sensor application 基于振动的电磁式能量采集器用于桥梁监测传感器
2014 International Conference on Emerging Technologies (ICET) Pub Date : 2014-12-01 DOI: 10.1109/ICET.2014.7021029
F. Khan, I. Ahmad
{"title":"Vibration-based electromagnetic type energy harvester for bridge monitoring sensor application","authors":"F. Khan, I. Ahmad","doi":"10.1109/ICET.2014.7021029","DOIUrl":"https://doi.org/10.1109/ICET.2014.7021029","url":null,"abstract":"Fabrication and experimentation of vibration-based electromagnetic energy harvester is reported in this research paper. Energy harvester with both planar and wound coils have been developed and characterized under sinusoidal excitation. Energy harvester consists of two permanent magnets residing on a Latex membrane, two double sided PCB fabricated planar coils, Teflon spacers for providing gap between the permanent magnets and planar coils, and wound coils mounted on sides of Teflon spacers. When the harvester is subjected to vibration, due to the relative movement between the magnets and coils, the coils experience the change in magnetic flux density which causes an emf to generate at the coils terminals. Energy harvester has a dimension of 18 mm × 18 mm. Prototype has been characterized under sinusoidal excitation and are subjected to frequency sweep from 10 to 80 Hz at acceleration levels of 0.3 g, 0.5 g, 1 g, 2 g and 3 g. Single planar and wound coil of prototype generates an open circuit voltage of 15.7 mV and 11.05 mV respectively at 3 g and at resonant frequency 27 Hz. When excited at resonance and 3 g base acceleration a load power of 1.8 μW and 2.1 μW is obtained from single planar and wound coil respectively under matching impedance conditions for prototype.","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126651180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A novel vehicle-to-grid technology with constraint analysis-a review 一种基于约束分析的车辆到电网新技术综述
2014 International Conference on Emerging Technologies (ICET) Pub Date : 2014-12-01 DOI: 10.1109/ICET.2014.7021019
S. Habib, M. Kamran
{"title":"A novel vehicle-to-grid technology with constraint analysis-a review","authors":"S. Habib, M. Kamran","doi":"10.1109/ICET.2014.7021019","DOIUrl":"https://doi.org/10.1109/ICET.2014.7021019","url":null,"abstract":"This paper presents a detailed review of a vehicle-to-grid (V2G) technology, and analyzes its impacts on power distribution networks. It is shown in this study that a vehicle, equipped with the ability of a V2G application, offers various features such as regulation of active power, support for reactive power, load balancing, current harmonics filtering etc. These features can enable ancillary services including, spinning reserve and control of voltage and frequency. However, the technology of V2G also creates challenging issues, for instance, degradation of batteries, communication overhead between an EV and a grid, changes in whole infrastructure of a distribution network (DN). This paper shows the present scenarios and analyze the impact of implementation V2G & G2V modes on DNs. V2G system have an impact on major factors of electric grid like reliability, efficiency, losses, and system stability. Our study also shows that the economic benefits of a V2G technology heavily depend on the strategies of charging and vehicle aggregation.","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125623560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
The Internet of Things: Challenges & security issues 物联网:挑战与安全问题
2014 International Conference on Emerging Technologies (ICET) Pub Date : 2014-12-01 DOI: 10.1109/ICET.2014.7021016
G. Matharu, Priyanka Upadhyay, Lalita Chaudhary
{"title":"The Internet of Things: Challenges & security issues","authors":"G. Matharu, Priyanka Upadhyay, Lalita Chaudhary","doi":"10.1109/ICET.2014.7021016","DOIUrl":"https://doi.org/10.1109/ICET.2014.7021016","url":null,"abstract":"Propelled by large-scale advances in wireless technologies, sensing technologies and communication technologies, the transformation of the Internet into an integrated network of things termed as Internet of Things is rapidly unfolding. The Internet of Things enabled by Wireless Sensor Networks (WSN) and RFID sensors finds a plethora of applications in almost all the fields such as health, education, transportation and agriculture. This paper briefs the idea of Internet of Things (IoT) and the challenges to its future growth. Also, this paper describes the general layered architecture of IoT along with its constituent elements. Further, the paper provides for a secure construction of the IoT architecture, by tackling security issues at each layer of the architecture. The paper concludes by mentioning the potential applications of the IoT technologies in fields ranging from intelligent transportation to smart home to e-health care and green agriculture.","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131185111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 83
Electro-textile based wearable patch antenna on biodegradable poly lactic acid (PLA) plastic substrate for 2.45 GHz, ISM band applications 基于可降解聚乳酸(PLA)塑料基板的可穿戴贴片天线,适用于2.45 GHz ISM频段
2014 International Conference on Emerging Technologies (ICET) Pub Date : 2014-12-01 DOI: 10.1109/ICET.2014.7021036
Haroon, S. Ullah, J. Flint
{"title":"Electro-textile based wearable patch antenna on biodegradable poly lactic acid (PLA) plastic substrate for 2.45 GHz, ISM band applications","authors":"Haroon, S. Ullah, J. Flint","doi":"10.1109/ICET.2014.7021036","DOIUrl":"https://doi.org/10.1109/ICET.2014.7021036","url":null,"abstract":"Biodegradable polymers and plastics are environment friendly because they decrease environmental pollution, conserve resources and reduce non-recyclable waste. Poly lactic acid (PLA) is a biodegradable plant derived polymer. Their properties are improved by copolymerization, blending, plasticization, polymer alloy technology and by development of composites techniques. These polymers can be used in computers, mobile phones, housing, textiles, optical, packaging films and bags. In this paper the feasibility of 1.7 and 3 mm thicker PLA as a substrate in wearable patch antenna is investigated. For comparison patch antenna on identically thicker (1.7 and 3 mm) FR-4 substrate is also simulated under the same conditions in CST Microwave Studio. The return loss, gain, directivity and efficiency of both antennas were compared on operating frequency of 2.45GHz. The proposed antenna employing PLA substrates give return losses of -21 and -22dB, gain of 6 and 6.14 dBi, directivity of 7.58 and 7.54dBi and efficiency of 59 and 70% on 1.7and 3mm thicker substrates respectively, while reference antenna using FR4 substrates results in return losses of -19 and -19.3dB, gain of 2.7 and 3.45dBi, directivity of 7.02 and 6.92 dBi and efficiency of 35and 43% for 1.7 and 3 mm thicker FR4 substrates.","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122486511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A semantic rules & reasoning based approach for Diet and Exercise management for diabetics 基于语义规则和推理的糖尿病患者饮食和运动管理方法
2014 International Conference on Emerging Technologies (ICET) Pub Date : 2014-12-01 DOI: 10.1109/ICET.2014.7021023
Irshad Faiz, H. Mukhtar, A. M. Qamar, Sharifullah Khan
{"title":"A semantic rules & reasoning based approach for Diet and Exercise management for diabetics","authors":"Irshad Faiz, H. Mukhtar, A. M. Qamar, Sharifullah Khan","doi":"10.1109/ICET.2014.7021023","DOIUrl":"https://doi.org/10.1109/ICET.2014.7021023","url":null,"abstract":"Diabetes is a serious chronic disease and balance diet as well as regular exercise are leading important factors for diabetes control. Management of healthy diet and proper exercise involve many decision variables from different domains such as gender, weight, height, age, needed calories and nutrition values, preferences about food and exercise, clinical guidelines and current vital signs etc. We have implemented a semantic rules and reasoning based approach that generates diet and exercise recommendations for diabetes patients. The developed prototype application is named Semantic Healthcare Assistant for Diet and Exercise (SHADE). Individual ontologies are defined for different domains (person, disease, food and exercise) along with SWRL rules and then imported all into an integrated ontology. The integrated ontology semantically generates the recommendations as inferences based on data and rules by using Pellet reasoner. Each generated meal menu is a list of food items along with portion size such that food items are user's preferred and menu is personalized, healthy and balanced diet. Finally, SHADE recommends user's preferred activities as exercises along with duration and intensity.","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127907064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
On the controllability of a sampled-data system under nonuniform sampling 非均匀采样下采样数据系统的可控性
2014 International Conference on Emerging Technologies (ICET) Pub Date : 2014-12-01 DOI: 10.1109/ICET.2014.7021018
Muhammad Niaz Ahmad, G. Mustafa, Abdul Qayyum Khan, M. Rehan
{"title":"On the controllability of a sampled-data system under nonuniform sampling","authors":"Muhammad Niaz Ahmad, G. Mustafa, Abdul Qayyum Khan, M. Rehan","doi":"10.1109/ICET.2014.7021018","DOIUrl":"https://doi.org/10.1109/ICET.2014.7021018","url":null,"abstract":"In this paper, controllability of a sampled-data system under nonuniform sampling is investigated. The problem is motivated with the widespread networked and embedded control systems in which sampling periods may be varying and exact sampling instants are unknown. The continuous-time system is assumed to be controllable and a condition is derived for sampling intervals under which the resulting sampled-data system will also be controllable. The proposed condition requires lesser number of samples to make sampled system controllable as compared with the existing results.","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"79 15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117245431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信