Muhammad Arshad Islam, M. Iqbal, Muhammad Aleem, Z. Halim
{"title":"Analysing connectivity patterns and centrality metrics for opportunistic networks","authors":"Muhammad Arshad Islam, M. Iqbal, Muhammad Aleem, Z. Halim","doi":"10.1109/C-CODE.2017.7918903","DOIUrl":"https://doi.org/10.1109/C-CODE.2017.7918903","url":null,"abstract":"Network centrality measures are used to identify important and influential nodes in any network. Several centrality measures are proposed in literature for static networks however these measures cannot be used for routing purpose in opportunistic networks as opportunistic networks are dynamic in nature. Opportunistic networks utilise pocket switching for routing messages where each device attempts to forward its messages to a suitable next node. Appropriate decision making for the selection of the forwarder node is crucial for the performance of a routing protocol in opportunistic networks. In any opportunistic network, some node play more important role in the routing process than the rest of the network. In this paper, we have analysed metrics that can be used to simplify the centrality measure computation in opportunistic networks. We have investigated the relationship between these node (ego) characteristics with centrality measures that are computed using novel network transformations. The aim of the transform mechanisms is to aggregate the link between any two nodes in a way that strongly relates the nodes which frequently come in contact with each other. Our experiment show that ego characteristics can be used to estimate centrality measures for dense opportunistic networks.","PeriodicalId":344222,"journal":{"name":"2017 International Conference on Communication, Computing and Digital Systems (C-CODE)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127357644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sajid Anwer, Ahmad Adbellatif, M. Alshayeb, Muhammad Shakeel Anjum
{"title":"Effect of coupling on software faults: An empirical study","authors":"Sajid Anwer, Ahmad Adbellatif, M. Alshayeb, Muhammad Shakeel Anjum","doi":"10.1109/C-CODE.2017.7918930","DOIUrl":"https://doi.org/10.1109/C-CODE.2017.7918930","url":null,"abstract":"Software product's quality is one of the important aspects that affect the user, the developer, and the product. Measuring quality in the early phases of the project life cycle is a major goal of project planning. Accordingly, several research studies have been proposed to measure the software product quality attributes. In this paper, we empirically study the impact of afferent coupling (Ca), efferent coupling (Ce) and coupling between object (CBO) metrics on fault prediction using bivariate correlation. We built a prediction model using these metrics to predict faults by using multivariate logistic linear regression. A case study of an open source object oriented systems is used to evaluate the correlation between coupling metrics and faults. The results indicate that the efferent coupling (Ce) is a better indicator for fault prediction than afferent coupling (Ca) and CBO (coupling between object)","PeriodicalId":344222,"journal":{"name":"2017 International Conference on Communication, Computing and Digital Systems (C-CODE)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132997217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Dynamic Round Robin algorithm for CPU scheduling","authors":"M. U. Farooq, Aamna Shakoor, A. Siddique","doi":"10.1109/C-CODE.2017.7918936","DOIUrl":"https://doi.org/10.1109/C-CODE.2017.7918936","url":null,"abstract":"The efficiency of embedded systems mainly depends on the process scheduling policy of operating systems running on them. Better scheduling algorithms make a system fast using less resources for small time. Out of some important scheduling algorithms, Round Robin algorithm is much efficient. But its efficiency fairly depends on choosen time quantum. In this paper, we have developed an efficient Round Robin algorithm using Dynamic Time Quantum. Some such systems have already been developed but they take advantage of other algorithms and their running time is much higher due to sorting of processes which is practically impossible. So, our goal is to reduce running time of an algorithm along with efficiency constraints such as context switches, average waiting and turnaround times. Lower the context switches, average waiting and turnaround times; higher the efficiency of an operating system and thus better embedded system. In the last section of this paper, we will present a comparison of our system with previously developed algorithms.","PeriodicalId":344222,"journal":{"name":"2017 International Conference on Communication, Computing and Digital Systems (C-CODE)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125450749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessment of quality of rice grain using optical and image processing technique","authors":"Z. Parveen, Muhammad Anzar Alam, Hina Shakir","doi":"10.1109/C-CODE.2017.7918940","DOIUrl":"https://doi.org/10.1109/C-CODE.2017.7918940","url":null,"abstract":"Rice is the most favorable and most consuming food for human being in all over the world and researchers are working to improve the quality of rice. The quality measurement of rice is also important because it is consumed as food as well as it is used for milling process in the national and international market. Many researchers have already worked on the quality of grain and proposed different techniques to characterize the quality of rice. Chalky is whiteness part in the rice grain and it is one of the most important parameter that is used to evaluate the quality of rice grain. We proposed an image processing technique using extended maxima operator to detect the chalky area in the rice. We also calculated the dimensions and color to classify rice grains. The experiment was performed on 22 sample images of rice grain to test the proposed method and was validated using visual inspection.","PeriodicalId":344222,"journal":{"name":"2017 International Conference on Communication, Computing and Digital Systems (C-CODE)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126220222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of different de-noising techniques for removal of poison noise from cervical X-Rays images","authors":"Muhammad Asim, M. Akram, A. A. Salam","doi":"10.1109/C-CODE.2017.7918943","DOIUrl":"https://doi.org/10.1109/C-CODE.2017.7918943","url":null,"abstract":"Digital X ray images normally suffer from poor quality and one of the main reason is the presence of poison noise which is added in X rays images during acquisition process. Different de-noising techniques have been presented in literature for enhancement of x ray images. This paper presents a comparative study for extraction of noise from X-Rays images. The comparison has been done for bilateral filtering, Dual Tree Complex Wavelet Transform, Gaussian filter, Wiener filter and Non-Local Mean filters and evaluation of these techniques have been done using cervical X-Ray images from NHANES-II database. The significance of each technique has been evaluated using different performance measures.","PeriodicalId":344222,"journal":{"name":"2017 International Conference on Communication, Computing and Digital Systems (C-CODE)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132713410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"High SNR analysis of inter-body interference in Body Area Networks","authors":"Furqan Jameel, Faisal, M. Haider, A. A. Butt","doi":"10.1109/C-CODE.2017.7918913","DOIUrl":"https://doi.org/10.1109/C-CODE.2017.7918913","url":null,"abstract":"Wireless Body Area Networks (BANs) have drawn significant attention of research community all over the world due to their applications in healthcare. This paper adopts the cluster based approach to analytically model the implications of inter-body interference in BANs. To be specific, we derive exact closed-form expression for outage probability for co-channel interference under Rayleigh and Rician fading. We consider two cases, where in first case channel between sensors and cluster head is Rice distributed and channel between main and interfering cluster head is Rayleigh distributed. In second case, channel between sensors and cluster head is Rayleigh distributed and channel between main and interfering cluster head is Rice distributed. We also evaluate the significance of Rician-K factor for both cases. Extensive simulations are performed to validate our findings which clearly show the effect of inter-body interference on the performance of BANs.","PeriodicalId":344222,"journal":{"name":"2017 International Conference on Communication, Computing and Digital Systems (C-CODE)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134303829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of VANETs under Rayleigh, Rician, Nakagami-m and Weibull fading","authors":"Furqan Jameel, Faisal, M. Haider, A. A. Butt","doi":"10.1109/C-CODE.2017.7918915","DOIUrl":"https://doi.org/10.1109/C-CODE.2017.7918915","url":null,"abstract":"Vehicular Ad-hoc Networks (VANETs) are considered as one of the promising technologies for reduction of accidents and provisioning of infotainment services on the road. Due to high mobility of vehicles, wireless channel response rapidly changes from time to time which results into random fading. Therefore, this paper provides in depth analysis of performance of VANETs under different fading channels. To be specific, we adopt the cluster based approach to analytically model VANETs. Closed-form expressions of packet loss probability for different fading (i.e. Rayleigh, Rician, Nakagami-m and Weibull channel) models have been provided considering both MAC and Physical Layer characteristics. The derived expressions also encompass the effect of decoding failure and packet collision based on signal to noise ratio (SNR) and back-off timer, respectively. Our results characterizes the impact of channel conditions, vehicle speed, and contention window on the performance of the cluster based VANETs. Extensive simulations are performed to verify our findings.","PeriodicalId":344222,"journal":{"name":"2017 International Conference on Communication, Computing and Digital Systems (C-CODE)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134640942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Umar Talha, Tariq Mairaj, Waleed Bin Yousuf, Omer Zia
{"title":"Morphological operations and re-projection based novel low-dose CT reconstruction scheme","authors":"Umar Talha, Tariq Mairaj, Waleed Bin Yousuf, Omer Zia","doi":"10.1109/C-CODE.2017.7918965","DOIUrl":"https://doi.org/10.1109/C-CODE.2017.7918965","url":null,"abstract":"Computed Tomography (CT) has been a major contributor in revolutionizing and commercializing the medical imaging industry. However, it does so with some significant drawbacks. Most of the commonly used CT reconstruction algorithms need heavy dose of hazardous X-ray radiations. Higher X-ray dose produces better reconstructed image resolution, whereas low radiation dose projection data induces artifacts in the reconstructed image. It also reduces the image quality of conventional CT reconstruction algorithms [1]. The paper presents a novel algorithm for efficient CT reconstruction from low radiation dose projection data. In the proposed method, the phantom is subjected to low X-ray dose and then the projection data is enhanced using a series of post-processing algorithms and a new interpolation technique. The proposed algorithm is supported by computer simulation and promising results were observed. The proposed algorithm reduces the radiation dose to great extent, with good quality reconstructed image.","PeriodicalId":344222,"journal":{"name":"2017 International Conference on Communication, Computing and Digital Systems (C-CODE)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115370487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantification of PIR protocols privacy","authors":"R. Khan, Mohibullah, Muhammad Arshad Islam","doi":"10.1109/C-CODE.2017.7918908","DOIUrl":"https://doi.org/10.1109/C-CODE.2017.7918908","url":null,"abstract":"In current era the best way to find the information over the internet is search engine. Web search engines maintains user profile for better search results which could raise serious privacy issues. In order to intact the users privacy in front of a web search engines Private information retrieval (PIR) protocols are used which hide the identity of the user by submitting his/her query through other group member. A basic problem is related with these protocols are their predictability. This paper is the extension of previous work in which a person with anonymous query was successfully identified. This paper aims to find all queries submitted by the target user using UPIR and UUP protocols. For experimentation purpose a machine learning based adversarial model is proposed to find the actual queries of user of interest based on the previous profile. The results shows that the precision, recall and f-measure of J48 in finding user's real queries is more then 0.70 on the average. Similarly J48 reported highest trues positive rate of above 0.7 and lowest false positive rate of 0.006. It was also observed that the size of training data has very little effect on accuracy according to this experiment.","PeriodicalId":344222,"journal":{"name":"2017 International Conference on Communication, Computing and Digital Systems (C-CODE)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116805103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cross gender voice morphing using Canonical Correlation Analysis","authors":"I. Baseer, Rabeea Basir","doi":"10.1109/C-CODE.2017.7918947","DOIUrl":"https://doi.org/10.1109/C-CODE.2017.7918947","url":null,"abstract":"Voice morphing one of the speech synthesis frameworks, in simplest term aim to transforms speaker's identity from source to target speaker while preserving the original content of message. This paper presents a novel spectral envelope mapping algorithm based on Canonical Correlation Analysis(CCA) that find the association between spectral envelope characteristics of source speaker and target speaker in terms of correlation as a similarity metric. Moreover, the speech also undergoes to prosodic modification using PSOLA as pitch frequency is also an important parameter for varying identity. This morphing algorithm is evaluated by taking the utterances from freely available CMU-ARCTIC speech dataset. The subjective experiment shows that the proposed method successfully transforms speaker identity and produced high-quality morphed signal.","PeriodicalId":344222,"journal":{"name":"2017 International Conference on Communication, Computing and Digital Systems (C-CODE)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127894702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}