A. A. Shah, Salim Ullah, S. Ali Shah, M. Asif Manzoor, K. Yahya
{"title":"An efficient off-grid high-elevation electric generation system using wind power","authors":"A. A. Shah, Salim Ullah, S. Ali Shah, M. Asif Manzoor, K. Yahya","doi":"10.1109/ICET.2014.7021032","DOIUrl":"https://doi.org/10.1109/ICET.2014.7021032","url":null,"abstract":"Though Wind Energy being the most readily usable source of electric power, in general, amongst the class of renewable resources, cannot readily be used as potential electric power source when compared to fossil fuels ; the comparatively bleak energy content at lower heights being its drawback. In the proposed work an effort is made to overcome this shortcoming by taking the advantage of greater wind speeds at higher elevations by bringing into use the heights of the high rise structures .e.g. Residential and shopping complexes, Mobile communication towers etc. As the electric power generated by a wind turbine increases in a cubic order with wind speed so the heights of relatively taller buildings and towers, in the order of tens of feet, is one of great significance. The prototype system, consisting of a small wind turbine interfaced with PC, deployed at a test site was used for monitoring the wind conditions as well as the actual electric power generation on a small scale. The data acquired thus along with actual wind profile recorded at the site over a period of time from other sources were further used in the simulation of a system harnessing power at different heights. A budgeting software was also used in order to keep track of the prices incorporated and financial assessment of the system. While keeping structural stresses within safe limits, the ultimate electrical power generated can be of such orders that it can be used to partly fulfill the running demand of a residential building.","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125950413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A state-based fitness function for the integration testing of object-oriented programs","authors":"Muhammad Bilal Bashir, A. Nadeem","doi":"10.1109/ICET.2014.7021011","DOIUrl":"https://doi.org/10.1109/ICET.2014.7021011","url":null,"abstract":"Testing object-oriented program is quite challenging task due to the nature of its features like inheritance and polymorphism. In practice test case generation is the most laborious and resource consuming process in software testing hence generating test data for object-oriented programs is even more challenging and effort demanding. Object-oriented evolutionary testing aims at automating test case generation process using evolutionary strategies like Genetic Algorithm. Evolutionary testing gives a helping hand to the software testers to speed up the process and to reduce the amount of project resources. The existing approaches provide sound platform to the researchers to take the work further to meet the challenges that object-oriented paradigm has introduced. One of the limitations in existing approaches is that they combine branch distance of object's state variables with local variables that leaves no guidance for the search process whether object has gained desired state or not. We propose a state-based fitness function for the evolutionary testing of object-oriented programs that can solve object's state problem by evaluating object's state as an independent segment of overall test case fitness. Our initial experiments show that by separating object's state evaluation, search gets better guidance to prevent object's state problem.","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"126 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132240316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance comparison of Hadoop Clusters configured on virtual machines and as a cloud service","authors":"M. F. Hyder, M. A. Ismail, Hameeza Ahmed","doi":"10.1109/ICET.2014.7021017","DOIUrl":"https://doi.org/10.1109/ICET.2014.7021017","url":null,"abstract":"Cloud computing is an emerging trend for online computing and resource management. OpenStack is one of the most widely used open source platform for building public and private clouds. Whereas, Apache Hadoop is an open source framework use to process large data sets spread across clusters of computers. Currently both OpenStack and Apache Hadoop are sharing the major consideration in research and open source communities. This paper focuses on integration of Hadoop Cluster on OpenStack cloud as it's one of the services and then highlights the performance comparison of Hadoop cluster implemented with that of Hadoop cluster configured separately. The results concluded show the successful implementation of Hadoop as a cloud service and its performance enhancement in comparison to native virtual Hadoop cluster.","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130193519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel design of RF MEMS shunt switch with dimples and meanders","authors":"M. Hassan, F. A. Tahir, H. Rahman","doi":"10.1109/ICET.2014.7021028","DOIUrl":"https://doi.org/10.1109/ICET.2014.7021028","url":null,"abstract":"The paper presents the design of an RF MEMS capacitive shunt switch with the use of dimples and meanders. With optimized meander structure and the use of two dimples below the bridge, the switch presents excellent RF performance. The EM modeling and results are achieved in HFSS and the mechanical modeling and stress analysis is done in ANSYS. The bridge structure with dimples and meanders shows the insertion loss to be less than 0.09 dB up to 35GHz and the isolation as high as 29 dB up to 40GHz. The calculated actuation voltage is 59V.","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"282 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122950452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative analysis of chaotic and non-chaotic image encryption schemes","authors":"M. Bin Younas, Jawad Ahmad","doi":"10.1109/ICET.2014.7021021","DOIUrl":"https://doi.org/10.1109/ICET.2014.7021021","url":null,"abstract":"In modern era, multimedia technologies have been developed significantly. Multimedia data such as audio, video and image transfers over the internet is open and insecure. Security is required for storage and transmission of digital images to avoid from unauthorized entities. A number of encryption schemes have been developed for security of multimedia data over insecure channel. So, there is a real need to compare encryption schemes that which technique is better for multimedia application. This paper presents the estimation for the good image encryption algorithm. Chaos based image encryption algorithm are used now a days because of better security and good performance. Behaviour of chaotic system is nonlinear, deterministic and sensitive to initial condition. A number of parameters, like correlation coefficient, information entropy, compression friendliness, number of pixels change rate, average intensity and unified average change intensity etc., are used to check the quality of cipher-text image. This work is review of two image encryption schemes, namely Compression Friendly Encryption Scheme (CFES) and Chaos Based Encryption Scheme (CBES).","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126346716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Atta-ur Rahman, Ansar Ul Haq, M. Adnan, I. Khan, I. Shah
{"title":"Performance of double threshold energy detection in cooperative-cognitive networks over Nakagami-m fading channels using square law combining technique","authors":"Atta-ur Rahman, Ansar Ul Haq, M. Adnan, I. Khan, I. Shah","doi":"10.1109/ICET.2014.7021027","DOIUrl":"https://doi.org/10.1109/ICET.2014.7021027","url":null,"abstract":"This paper presents the performance of double threshold energy detection in cooperative cognitive networks over Nakagami-m fading channel. Square Law Combining (SLC) diversity technique helps in detection at cognitive center for different values of shape factor M and this algorithm is examined by placing multiple relays between Primary user (PU) and Secondary user (SU). Performance of the network has been analyzed for amplify and forward relaying scheme as irrespective of their location and distance from the primary users and cognitive center. The simulated results are shown for detection probability (Pd), collision probability (Pc) and unavailable probability (Pn).","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132670290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysing the performance of EIT images using the point spread function","authors":"Alamgir Naushad, A. Rashid, Suleman Mazhar","doi":"10.1109/ICET.2014.7021013","DOIUrl":"https://doi.org/10.1109/ICET.2014.7021013","url":null,"abstract":"Electrical impedance tomography (EIT) is a noninvasive medical imaging technique in which a small current is applied to the electrodes attached to the surface of a subject body and a cross-sectional image of the resistivity (or conductivity) distribution inside the body is reconstructed using an inverse algorithm. Due to the ill-posed nature of EIT inverse problem, EIT bears poor spatial resolution and behaves non-linearly in nature. Point spread function (PSF), which is calculated over the whole domain as responses to a small circular anomaly moving around the entire domain, is a characteristic parameter to estimate the performance of imaging systems. In order to analyze the quality of EIT reconstructed image, PSF is employed in this work. PSF incorporates the key imaging attributes, comprising amplitude response, resolution, position error, shape deformation and ringing effect. This paper presents a numerical study on the use of PSF for static and dynamic EIT image reconstruction. The static image reconstruction is done using the modified Newton Raphson (mNR) algorithm whereas the dynamic image reconstruction is done with extended Kalman filter (EKF). A detailed analysis of the performance of mNR and EKF has been carried out based upon on the imaging attributes gathered using the said algorithms. The results are convincing and provide a fresh perspective to use the PSF in order to analyze the performance of EIT image reconstruction.","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115301786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A mitigation strategy against malicious Primary User Emulation Attack in Cognitive Radio networks","authors":"Bilal Naqvi, Shafaq Murtaza, B. Aslam","doi":"10.1109/ICET.2014.7021026","DOIUrl":"https://doi.org/10.1109/ICET.2014.7021026","url":null,"abstract":"The increasing demand of usable spectrum range startled the world of serious shortage in coming years. Cognitive Radio technology emerged to solve this problem by allowing unlicensed users to utilize the spectrum resources whenever the licensed users are not active. With the emergence of this technology many security issues arose, that if successful may hamper all the benefits this promising technology has to offer. Among many other security issues Primary User Emulation Attack is one. In this paper we discuss the Primary User Emulation Attack. We also discuss the existing work in the field, along with its limitations. We also elucidate the effects of this attack through simulation results. In the end we describe our proposed approach to counter the Primary User Emulation Attack.","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116711642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Utilizing distinct terms for proximity and phrases in the document for better information retrieval","authors":"M. I. Rafique, M. Hassan","doi":"10.1109/ICET.2014.7021024","DOIUrl":"https://doi.org/10.1109/ICET.2014.7021024","url":null,"abstract":"The rapid increase in web data has led the users to search the web for information. Users want their queries to be more relevant to the documents. For this purpose, the idea of proximity is utilized where close query terms in the document show high proximity and hence the document is likely to be more relevant. But almost every retrieval function (e.g., BM25) uses bag-of-words technique, thus ignoring the importance of proximity. In this paper, we find such short sentences (sub-sentences) or group of words that are made by distinct words or terms on their first occurrence in the documents to calculate the proximity and subsequently incorporate it into a retrieval function to improve the ranking of the documents. We have shown that there are significant numbers of short sentences formed by distinct words that can be used to exploit proximity and phrase search. Furthermore, turning the non-positional (record level) inverted index into partial-positional inverted index by utilizing distinct terms (UDT), the UDT partial-positional inverted index has been separated from the full positional (word level) inverted index to calculate proximity among the distinct terms efficiently. As calculating proximity with full positional inverted index is complex and computationally expensive, the proximity with the UDT partial-positional inverted index can be computed easily and efficiently. Experiments on various data sets have shown that the proposed approach has improved the precision of the documents.","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115961568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Adil Murad, Salim Ullah, A. A. Shah, L. Hasan, K. Khan, A. Khan
{"title":"Design and implementation of an intelligent energy saving system","authors":"Adil Murad, Salim Ullah, A. A. Shah, L. Hasan, K. Khan, A. Khan","doi":"10.1109/ICET.2014.7021031","DOIUrl":"https://doi.org/10.1109/ICET.2014.7021031","url":null,"abstract":"The energy crisis is one of the major problems faced by Pakistan at the moment. It has adversely affected the industrial growth and restrained business nourishment which in turn has affected the overall economy of Pakistan. Proper energy saving measures need to be implemented in order to reduce the energy shortfall. The proper and efficient use of energy also helps in reducing different kinds of pollution. In this paper, we have presented an intelligent power saving system, capable of saving electricity, minimizing electricity risks in workplaces, all in an automated manner. The developed system is economical and easy to install. It can be used to reduce the energy consumption of every kind of electric device in residential as well commercial buildings.","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129284792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}