{"title":"Automation of Vaccination and Blood Sampling Procedures","authors":"N. Dr, S. Yousuf, R. Kamran","doi":"10.1109/ICET.2007.4516338","DOIUrl":"https://doi.org/10.1109/ICET.2007.4516338","url":null,"abstract":"This paper describes the applications of a robotic arrangement in the automation of human, poultry and livestock mass-vaccination and human blood sampling. The implications of these applications are vast; basically, the robot provides quarantine of the subjects and eliminates the contact of operators with the blood of subjects which is essential in some cases to prevent health hazards. It will also provide speed, accuracy and fully automatic procedures on a mass-scale which promise to be very cost effective. The concept of automatic vaccination can be easily extended to automatic sterility and medication. In epidemics, this arrangement can prove to be invaluable as it will save a lot of time and money and will eliminate health hazards to the workers. The project from its present crude form can be advanced by incorporating ideas of 3-D imaging or 2-D imaging of the site under target via software tools or image recognition or images having pathological importance. It presents a very clear working idea of \"automate infusion and sampling process \" at this stage.","PeriodicalId":346773,"journal":{"name":"2007 International Conference on Emerging Technologies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114259203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An N+1 redundant GOP based FEC algorithm for improving Streaming Video Quality due to Packet Loss and Delay Jitter","authors":"M.S. Koul, K. Rao","doi":"10.1109/ICET.2007.4516325","DOIUrl":"https://doi.org/10.1109/ICET.2007.4516325","url":null,"abstract":"One of the greatest challenges in deploying streaming video content over wireless is the existence of random packet loss and delay variance (jitter). Due to the nature of real-time transmissions, packet retransmission is not always the preferred viable solution to this problem. Retransmission based error recovery schemes add overhead in terms of time taken for packets retransmissions, which can lead to undesirable packet delays, resulting in video quality degradation. In this paper we propose an error resilient coding scheme using Forward Error Correction (FEC), by encoding every next I-frame as an extra Predictive P-frame as a part of the preceding Group of Pictures (GOP), thus virtually making the GOP size N+1, but adding selective redundancy to the video stream. This scheme for adding redundancy to selected frames in the video transmission makes them less susceptible to errors and thus makes the video stream more robust towards error propagation.","PeriodicalId":346773,"journal":{"name":"2007 International Conference on Emerging Technologies","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115477181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Malik, Ji-shun Kuang, iakang Liu, M. Kamran, Qiang Liu
{"title":"Energy Efficiency Analysis of Hybrid-MAC Protocols with Application Constraints in Wireless Sensor Networks","authors":"A. Malik, Ji-shun Kuang, iakang Liu, M. Kamran, Qiang Liu","doi":"10.1109/ICET.2007.4516309","DOIUrl":"https://doi.org/10.1109/ICET.2007.4516309","url":null,"abstract":"Various energy and computational constraints for sensor nodes in wireless sensor networks have led to the development of many protocols with emphasis on medium access control (MAC) layer protocols. Several applications have already been envisioned for wireless sensor networks. This paper classifies the existing MAC protocols & the applications/ scenarios for wireless sensor networks. In addition the paper analyses and compares the application specific-ness of the existing Hybrid-MAC protocols depicting the effect of the inefficient behavior of these protocols if imposed on some other applications/ scenarios. Simulation results also verify their application dependency which highlights the need for a generalized, standardized & adaptive MAC protocol suitable for a wider range of applications. The paper concludes with some recommendations for such protocols.","PeriodicalId":346773,"journal":{"name":"2007 International Conference on Emerging Technologies","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121892330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trust Establishment: an enabler for dynamic Virtual Organizations","authors":"M. W. Hassan, T. Sultana","doi":"10.1109/ICET.2007.4516336","DOIUrl":"https://doi.org/10.1109/ICET.2007.4516336","url":null,"abstract":"The need for security is particularly acute when highspeed Internet connections are used to combine widespread computational resources into Grids. It is envisioned that in real Grids there will be many usage scenarios where collaborations will take place among small and dynamic working groups. For this to happen, the ability to establish transient collaboration with little or no intervention from resource administrators is a key requirement. Recent research seeks to provide manageable Grid security services for self-regulating, stable communities. This paper revolves around the idea that establishment of Trust plays a key role in enabling an environment for ad-hoc Virtual Organizations to support collaborations that are relatively spontaneous, short-lived, across cross-administrative domains, and involve few individuals.","PeriodicalId":346773,"journal":{"name":"2007 International Conference on Emerging Technologies","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121187683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interactive Voice Response with Pattern Recognition Based on Artificial Neural Network Approach","authors":"S.A.A. Shah, A. ul Asar, S.W. Shah","doi":"10.1109/ICET.2007.4516352","DOIUrl":"https://doi.org/10.1109/ICET.2007.4516352","url":null,"abstract":"In the present era of information technology, information nowadays is just a telephone call away. However, applications such as telephone banking etc. need extra security for making it a reliable service for the people. Application of PIN code/password via telephone is not enough and additional user specific information is required that can protect the user identity in a more effective way. In this paper, we propose an approach that uses interactive voice response (IVR) with pattern recognition based on neural networks. In this case, after entering the correct password the user is asked to input his voice sample which is used to verify his identity. The addition of voice pattern recognition in the authentication process can potentially further enhance the security level. As both are simultaneously applied so there is lesser probability of misuse. The developed system is fully compliant with hind line phone system.","PeriodicalId":346773,"journal":{"name":"2007 International Conference on Emerging Technologies","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126390205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Iris Recognition Using Wavelet","authors":"khaliq. masood","doi":"10.1109/ICET.2007.4516353","DOIUrl":"https://doi.org/10.1109/ICET.2007.4516353","url":null,"abstract":"Biometric systems are getting more attention in the present era. Iris recognition is one of the most secure and authentic among the other biometrics and this field demands more authentic, reliable and fast algorithms to implement these biometric systems in real time. In this paper, an efficient localization technique is presented to identify pupil and iris boundaries using histogram of the iris image. Two small portions of iris have been used for polar transformation to reduce computational time and to increase the efficiency of the system. Wavelet transform is used for feature vector generation. Rotation of iris is compensated without shifts in the iris code. System is tested on Multimedia University (MMU) Iris Database and results show that proposed system has encouraging performance.","PeriodicalId":346773,"journal":{"name":"2007 International Conference on Emerging Technologies","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117328810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy Logic based design of a Diagnostic System for the T56 Turboprop Engine","authors":"O. H. Khan","doi":"10.1109/ICET.2007.4516342","DOIUrl":"https://doi.org/10.1109/ICET.2007.4516342","url":null,"abstract":"The paper aims to present a design layout for an efficient diagnostic system for the T56-A-15 turboprop engine utilizing two vital information aids i.e. the test cell and the aircraft itself. Lying at the core of the proposed system, would be an engine health monitoring software module capable of detecting and isolating the occurrence of anomalies, as well as predicting future degraded operation for maintenance scheduling. The design would integrate statistical data analysis with fuzzy logic reasoning processes aiming to obtain a powerful data fusion capability to achieve the desired objectives.","PeriodicalId":346773,"journal":{"name":"2007 International Conference on Emerging Technologies","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116366249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Haider, M. Imran, I. A. Niaz, S. Ullah, M. Ansari
{"title":"Component Based Proactive Fault Tolerant Scheduling in Computational Grid","authors":"S. Haider, M. Imran, I. A. Niaz, S. Ullah, M. Ansari","doi":"10.1109/ICET.2007.4516328","DOIUrl":"https://doi.org/10.1109/ICET.2007.4516328","url":null,"abstract":"Computational Grids have the capability to provide the main execution platform for high performance distributed applications. Grid resources having heterogeneous architectures, being geographically distributed and interconnected via unreliable network media are extremely complex and prone to different kinds of errors, failures and faults. Grid is a layered architecture and most of the fault tolerant techniques developed on grids use its strict layering approach. In this paper, we have proposed a cross-layer design for handling faults proactively. In a cross-layer design, the top- down and bottom-up approach is not strictly followed, and a middle layer can communicate with the layer below or above it [1]. At each grid layer there would be a monitoring component that would decide on predefined factors that the reliability of that particular layer is high, medium or low. Based on Hardware Reliability Rating (HRR) and Software Reliability Rating (SRR), the Middleware Monitoring Component / Cross- Layered Component (MMC/CLC) would generate a Combined Rating (CR) using CR calculation matrix rules. Each grid participating node will have a CR value generated through cross layered communication using HMC, MMC/CLC and SMC. All grid nodes will have their CR information in the form of a CR table and high rated machines would be selected for job execution on the basis of minimum CPU load along with different intensities of check pointing. Handling faults proactively at each layer of grid using cross communication model would result in overall improved dependability and increased performance with less overheads of check pointing.","PeriodicalId":346773,"journal":{"name":"2007 International Conference on Emerging Technologies","volume":"114 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131942478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Building Local Ontology from Database Relations in Data Integration","authors":"K. Sonia, S. Khan","doi":"10.1109/ICET.2007.4516326","DOIUrl":"https://doi.org/10.1109/ICET.2007.4516326","url":null,"abstract":"Source models help in integrating distributed data sources. They need to be represented in conceptual model in order to provide scalable and flexible data integration of autonomous and heterogeneous data sources. Ontology is explicit specification of conceptualization and can handle semantic heterogeneity of the local sources. The technique in this paper, maps database relations to OWL based ontology for the local sources. It minimizes errors and effort involved in manual ontology building. Its distinguished feature is to create ontology from relations in the absence of necessary metadata. Compared with existing techniques, the technique builds ontology automatically and allows adding additional semantics. The technique is presented with examples in this paper.","PeriodicalId":346773,"journal":{"name":"2007 International Conference on Emerging Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130928864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adhesive and mechanical properties of Carbon nanotube filled thermoplastic polyimide films for microelectronics packaging","authors":"M. Saeed","doi":"10.1109/ICET.2007.4516362","DOIUrl":"https://doi.org/10.1109/ICET.2007.4516362","url":null,"abstract":"In this study the mechanical and adhesive properties of Multi-walled carbon nano- tubes (MWNTs) filled polyimide composite films (MWNT-PI) are investigated to determine their usefulness as thermo-conductive packaging materials in microelectronics. MWNTs were mixed in low wt% during synthesis at poly(amic acid) (PAA) stage. MWNT-PI films were characterized using DMTA and tensile testing to determine viscoelastic behavior and mechanical properties. Adhesive strength and adhesive energy of bonded samples were determined in accordance with ASTM D 1002 and ASTM D 3762 respectively. The fractured surfaces were examined by scanning electron microscope (SEM) to determine failure patterns. The results showed that viscoelastic behavior of MWNT-PI films changes from liquid-like to solid-like with increasing MWNT wt content. Elastic modulus and strength at break of the composite films were found to increase with increase in MWNTs wt%. However, elongation at break and breaking energy of films and lap shear strength and adhesive energy of bonded samples were found to initially increase with increase in MWNTs wt%, but then after a critical value decreases.","PeriodicalId":346773,"journal":{"name":"2007 International Conference on Emerging Technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123208572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}