{"title":"A New Perspective towards Analysis of Human Facial Expression Using Supervised Classification Algorithms","authors":"Tahreem Iqbal, S. Javed","doi":"10.1109/ICICT47744.2019.9001928","DOIUrl":"https://doi.org/10.1109/ICICT47744.2019.9001928","url":null,"abstract":"As cost-effective and relatively accurate models for behavior classification, automatic facial expression analysis has the potential to be applied to multiple disciplines. The current research deals with real-time classification of evoked emotions in children. Reason behind analyzing children behavior is that they possess immature cognitive abilities compared to adults, they are more likely to be influenced by external stimuli and they are less likely to pose and hide expression. This research work uses a three-phase classification model to analyze real time captured emotion varying children facial expressions. Two classifiers K-Nearest Neighbor and SVM were used for classification. The classification model was tested using our own real time recorded children Facial Expression (CFE).","PeriodicalId":351104,"journal":{"name":"2019 8th International Conference on Information and Communication Technologies (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129367862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recent Progress in Blockchain in Public Finance and Taxation","authors":"Behraj Khan, T. Syed","doi":"10.1109/ICICT47744.2019.9001998","DOIUrl":"https://doi.org/10.1109/ICICT47744.2019.9001998","url":null,"abstract":"Blockchain technology is an open-source decentralized (peer-to-peer) transaction model with offers transparency among participants without third party validation. It is impacting any traditional industries. This paper reviews its potential in the public financial sector along with its technical challenges and limitations. We also raise and identify potential questions in the current trend, challenges and future directions for Blockchain technology pertaining to its application to national taxation. The work also includes core components and underlying infrastructure to address its associated challenges.","PeriodicalId":351104,"journal":{"name":"2019 8th International Conference on Information and Communication Technologies (ICICT)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115959201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards ontology editing, querying and visualization in .net environment","authors":"Noman Islam, Z. Shaikh","doi":"10.1109/ICICT47744.2019.9001977","DOIUrl":"https://doi.org/10.1109/ICICT47744.2019.9001977","url":null,"abstract":"In this paper, a .net based ontology editor has been proposed. Despite the growing interest in ontology engineering, a review of current literature reveals that most of the developments have been mainly concentrated on open source platforms. The feedback obtained from .net developers show their disappointment over current progress in the domain of semantic web and raises the need for urgent response for catering to current demands. Realizing this research gap, this paper proposed a .net based tool for ontology development and editing (TODE). Based on the developer's feedback, it has been identified that visualization and query management are one of the most important demands of .net semantic web community. Therefore, TODE provides integrated support for these features. The evaluation of proposed tool has been performed by different usability experts, which concluded that TODE provides a convenient approach for ontology development to end-users.","PeriodicalId":351104,"journal":{"name":"2019 8th International Conference on Information and Communication Technologies (ICICT)","volume":"87 17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126301366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The IBA","authors":"M. S. Shaikh","doi":"10.1109/icict47744.2019.9001948","DOIUrl":"https://doi.org/10.1109/icict47744.2019.9001948","url":null,"abstract":"The Faculty of Computer Science (FCS) at IBA, originally known as the Center for Computer Studies, was established in 1983 with the collaboration of International Business Machines Corporation (IBM). The center was converted into Faculty of Computer Science (FCS) in 2009. The Department of Computer Science, being one of two departments at FCS offers a four-year BS along with MS and PhD programs in Computer Science.","PeriodicalId":351104,"journal":{"name":"2019 8th International Conference on Information and Communication Technologies (ICICT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114882408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Customizable algorithm for university timetabling and scheduling","authors":"Hira Ansari, Amsa Aijaz, Vijay Kumar, Masood Junejo, Saeed Shah, M. Saad, Zahid Hussain Khaskheli, Qasim, Imran Memon","doi":"10.1109/ICICT47744.2019.9001953","DOIUrl":"https://doi.org/10.1109/ICICT47744.2019.9001953","url":null,"abstract":"University course timetable problem is considered to be Np hard problem which increases exponentially with the size of problem. In this paper we have introduced algorithm which is made in accordance with Mehran Uet (Pakistan) Timetable. Timetabling is a sort of issue in which events (slots, teachers, courses, and so on) must be organized into various slots to such an extent that conflicts must be avoided for given resources. New functions are introduced in accordance with soft and hard constraints to be satisfied accordance with Mehran Uet Pakistan.","PeriodicalId":351104,"journal":{"name":"2019 8th International Conference on Information and Communication Technologies (ICICT)","volume":"8 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129351906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sabir Ali Changazi, Imran Shafi, Khaled Saleh, M. H. Islam, Syed Muzammil Hussainn, Atif Ali
{"title":"Performance Enhancement of Snort IDS through Kernel Modification","authors":"Sabir Ali Changazi, Imran Shafi, Khaled Saleh, M. H. Islam, Syed Muzammil Hussainn, Atif Ali","doi":"10.1109/ICICT47744.2019.9001286","DOIUrl":"https://doi.org/10.1109/ICICT47744.2019.9001286","url":null,"abstract":"Performance and improved packet handling capacity against high traffic load are important requirements for an effective intrusion detection system (IDS). Snort is one of the most popular open-source intrusion detection system which runs on Linux. This research article discusses ways of enhancing the performance of Snort by modifying Linux key parameters related to NAPI packet reception mechanism within the Linux kernel networking subsystem. Our enhancement overcomes the current limitations related to NAPI throughput. We experimentally demonstrate that current default budget B value of 300 does not yield the best performance of Snort throughput. We show that a small budget value of 14 gives the best Snort performance in terms of packet loss both at Kernel subsystem and at the application level. Furthermore, we compare our results to those reported in the literature, and we show that our enhancement through tuning certain parameters yield superior performance.","PeriodicalId":351104,"journal":{"name":"2019 8th International Conference on Information and Communication Technologies (ICICT)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123769417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mudassar Ahmad, Safina Kanwal, Maryam Cheema, Muhammad Asif Habib
{"title":"Performance Analysis of ECG Big Data using Apache Hive and Apache Pig","authors":"Mudassar Ahmad, Safina Kanwal, Maryam Cheema, Muhammad Asif Habib","doi":"10.1109/ICICT47744.2019.9001287","DOIUrl":"https://doi.org/10.1109/ICICT47744.2019.9001287","url":null,"abstract":"Big Data has been observed as a revolution due to technological advancement since last few years. The process of examining the massive, gigantic, heterogeneous and multiplex datasets that are changing very often is called Big Data Analytics. Decision making by extracting information from complex and multi-structured data is not possible by using traditional means. Two keys elements of Hadoop, Apache Hive and Apache Pig are the most systematic and cost-effective for implementation of ECG Big Data. Apache Pig and Apache Hive are open source initiatives for examining huge sets of data in a high-level language. In this research, performance analysis of various datasets of ECG Big Data is performed by Apache Hive and Apache Pig. Different parameters of ECG Big Data have been observed and it is showed from results that Apache Pig has been considered more efficient and systematic in providing quick results in less time as compared to Apache Hive.","PeriodicalId":351104,"journal":{"name":"2019 8th International Conference on Information and Communication Technologies (ICICT)","volume":"270 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125364951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Saad Sultan, A. Asad, M. Abubakar, Suleman Khalid, Shahab Ahmed, Aamir Wali
{"title":"Dynamic Cloud Resources Allocation","authors":"Saad Sultan, A. Asad, M. Abubakar, Suleman Khalid, Shahab Ahmed, Aamir Wali","doi":"10.1109/ICICT47744.2019.9001996","DOIUrl":"https://doi.org/10.1109/ICICT47744.2019.9001996","url":null,"abstract":"Many software companies have clients that use Microsoft Azure services. Clients may have varying needs for resources, so Microsoft Azure has a very dynamic feature called elastic pool that allows resources to expand and shrink automatically on demand. However, this dynamic feature is very costly both for the clients and the software companies. Thus, there is a growing need to be able to predict the usage ahead of time on daily basis. In this paper we propose and develop an intelligent usage prediction model using the user's resource usage history. According to our research, the work done till date is limited to other specific cloud providers or private servers but none related to Microsoft Azure. The classification algorithm that we use is LSTM. However, we have also report and document results obtained by ARIMA, SVM and Bayesian Networks. The best performance is given by LSTM.","PeriodicalId":351104,"journal":{"name":"2019 8th International Conference on Information and Communication Technologies (ICICT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129022508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Aftab Hayat, Goutian Yang, A. Iqbal, A. Saleem, M. Mateen
{"title":"Comprehensive and Comparative Study of Drowning Person Detection and Rescue Systems","authors":"Muhammad Aftab Hayat, Goutian Yang, A. Iqbal, A. Saleem, M. Mateen","doi":"10.1109/ICICT47744.2019.9001918","DOIUrl":"https://doi.org/10.1109/ICICT47744.2019.9001918","url":null,"abstract":"Drowning is the leading cause of death for the past few years because of this. It has become a severe problem for progressive countries. This article is the extensive surveys of current progress made towards the swimming pool rescue systems by using different techniques. Different aspects of human drowning systems are discussed here with their core technologies and applications. Various methodologies have been adopted for autonomous swimming pool safety with their intelligent control systems. Different detection and rescue techniques like motion detection, pressure sensing, image processing, heartbeat sensing, video-based detection, HSV based detection, and LASER-LDR mechanism have been used. Our analysis, which aims to provide a broad state-of-the-art review of the field which also addresses different challenges related to these systems and applications. Additionally, in this evaluation, several applications are debated in excessive detail. This article is the scrutiny of used approaches and an intermingling which can quickly and accurately implemented. Finally, after surveying the territory, we have also mentioned the future scope of research which can be fulfilled the requirements of the domestic swimming pools. At the end we also proposed our model which can satisfy all the flaws present in the existing pool rescue systems.","PeriodicalId":351104,"journal":{"name":"2019 8th International Conference on Information and Communication Technologies (ICICT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125257978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Study of SDN for Emulating Virtual LANs","authors":"Abdul Hameed, M. Wasim","doi":"10.1109/ICICT47744.2019.9001947","DOIUrl":"https://doi.org/10.1109/ICICT47744.2019.9001947","url":null,"abstract":"Management of Virtual LANs (VLANs) is a tedious, error-prone and time-consuming process that can increase the operational cost (OPEX). Software-defined networking (SDN) on the other hand is an emerging paradigm providing an agile and application-driven method of networking. SDN is believed to ease the management of large and complex networks and decrease the OPEX. Both VLANs and SDN provide Layer-2 isolation on top of which further network functions can be orchestrated. VLANs functionality is limited to Layer-2 while SDN can be utilized for an extended set of network functions. Despite the evolving nature of SDN compared to VLANs, network administrators are quite fascinated by its new features. The desire for migrating existing VLANs functions to SDN may be throttled by the lack of performance results and the undefined benefits versus challenges tradeoff. Is such function migration can fade out VLANs in favor of SDN? What might be the possible hurdles that can hinder SDN in completely replacing VLANs? This paper takes a step towards answering such questions. We implement and studied four VLANs functions with SDN. The experience of implementing and studying these functions from a network administrator perspective give the insights that although VLANs function implementation with SDN presents some benefits there however exist various challenges that make it difficult to foresee the readily oust of VLANs. The major challenges include the evolving nature of SDN, the better performance, and scalability of new VLANs standards for larger carrier networks and the existing investment in VLANs-based network infrastructure.","PeriodicalId":351104,"journal":{"name":"2019 8th International Conference on Information and Communication Technologies (ICICT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133951071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}