Sumair Aziz, Zeshan Kareem, Muhammad Umar Khan, Muhammad Atif Imtiaz
{"title":"Embedded System Design for Visual Scene Classification","authors":"Sumair Aziz, Zeshan Kareem, Muhammad Umar Khan, Muhammad Atif Imtiaz","doi":"10.1109/IEMCON.2018.8614864","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614864","url":null,"abstract":"Computer vision and robotics community is experiencing growing interest in visual scene classification due to availability of low cost and compact visual sensing devices. This paper presents framework aimed at embedded system design for visual scene classification. In the proposed framework we used data fusion of local and global descriptors as feature vectors for scene classification. We construct feature vector by integrating Local Quinary Patterns (LQP), Bag of Visual Words (BoW) and Histogram of Oriented Gradients (HOG). For classification multiclass Support Vector Machines (SVM) is used. Experiments are performed on publicly available MIT indoor scene classification database. Comparison of our approach with other methods show that our approach is efficient in terms of overall accuracy.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"28 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120999221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Mirror - a Secured Application of Artificial Intelligence Recognizing Human Face and Voice","authors":"Koushiki Mukhopadhyay, Chandrava Sinha, Himadri Nath Saha, Sukanya Rakshit, Supratim Auddy","doi":"10.1109/IEMCON.2018.8615072","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8615072","url":null,"abstract":"Smart mirrors are a brand new addition to the IoT product family that has been obtaining a great deal of attention in recent years by each industrial makers and hobbyists. This paper describes the planning associated implementation of a voice controlled wall mirror, referred to as “Magic Mirror” with Artificial Intelligence for the home environment. It is a mirror, which can display real time content like time, date, weather and news at the same time. The Magic Mirror consists of functionalities like real time information and data updates, voice commands, face recognition. The user can control the magic mirror by voice commands.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114321115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pritam Paul, B. Biswas, Zubayr Khalid, Shuva Biswas, Nixon Dutta, Himadri Nath Saha, Mautushi Das
{"title":"Using Browser Cookies for Event Monitoring and User Verification of an Account","authors":"Pritam Paul, B. Biswas, Zubayr Khalid, Shuva Biswas, Nixon Dutta, Himadri Nath Saha, Mautushi Das","doi":"10.1109/IEMCON.2018.8615105","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8615105","url":null,"abstract":"In a server-based system where end users use their own account to get connection to the server and possibly other accounts, encapsulation and protection of data of the accounts is a big factor. The administrator must be aware of data security of an account, so that it is not passed to any third party. Another job of administrator is to monitor the identity of the user of an account, which unfortunately is not taken care of most of the times. A third job that an administrator should take care of is monitoring the events in an account - such as devices used to open the website or whether more than one device is using a single account at the same time. In this paper, we have given a concept of using browser cookies effectively in order to monitor the identity of user and the events in an account. In this context we have managed to give solution for three different problems - a) Possibility and technology approach of how to control who is using login/password system; b) The login/password information is not passed to other person for use without the notice of administrator team; c) Ability to identify simultaneous use of login/password. We have used cookies for 2 different parameters - a) Protocol id: A unique id for each and every protocol (i.e., browser + device system); and b) Client id: Varies whenever the user changes his protocol, even if he opens the same account. Our system has efficiency to give solutions of all the said problems.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116160251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Understanding Tracking Methodology of Kernelized Correlation Filter","authors":"Srishti Yadav, S. Payandeh","doi":"10.1109/IEMCON.2018.8614990","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614990","url":null,"abstract":"Visual tracking as a field of research has undergone tremendous progress in the past decade. Researchers around the world have presented state-of-art trackers which work in presence of occlusions, clutter, variations in illumination and many others. Despite the significant progress the challenge continues in presenting real-time trackers which are computationally efficient and accurate. Kernelized Correlation Filter (KCF) is one of the recent finding which has shown good results. Based on the idea of traditional correlational filter, it uses kernel trick and circulant matrices to significantly improve the computation speed. Given the complexity of this tracker, a clear step-by-step explanation is highly desirable in order to fully appreciate and expedite the research in real-time visual tracking. This paper aims to make the understanding of this tracker simpler for the benefit of the research community","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121642982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Fog Node Model for Multi-purpose Fog Computing Systems","authors":"Jemshit Tuvakov, Kee-Hyun Park","doi":"10.1109/IEMCON.2018.8614845","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614845","url":null,"abstract":"Fog computing aims to process the data locally and transmit only meaningful part of the data to the cloud instead of transmitting the raw data. Consequently, it helps reduce the volume of data and react to real-time events with lower latency for IoT systems. In this work, we introduced a conceptual fog node model for multi-purpose fog computing systems. This fog node model contains modules, such as analytics tools, collaboration logic, cryptography, etc. that are essential to accomplish the goals of fog computing.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":" 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113950670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Propagation Modeling of IoT Devices for Deployment in Multi-level Hilly Urban Environments","authors":"T. Olasupo","doi":"10.1109/IEMCON.2018.8614903","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614903","url":null,"abstract":"Internet of Things (IoT) devices are deployed in various environments to obtain desired information. Accurate propagation models are required for these devices to adequately relay the gathered information to the processing center. A comprehensive search of the literature reveals there are no sufficient studies on empirical propagation models to support reliable deployment of IoT devices in multi-level hilly and mountainous urban environments. This research provides empirical path loss models and data for low power wireless devices deployed in such environments. This paper compares the proposed models with theoretical models. Results show that theoretical models deviate from proposed models by 10 to 43 %. Finally, results also show that models established at low packet error rate and high signal-to-noise ratio are more reliable than those formed without considering these parameters. The provided models, as well as the measured data, can be used for proficient design and deployment of wireless sensor network that enables IoT in various similar hilly urban environments.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"177 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114009508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Control System Design, Analysis & Implementation of Two Wheeled Self Balancing Robot (TWSBR)","authors":"Muhammad Atif Imtiaz, Mahum Naveed, Nimra Bibi, Sumair Aziz, Syed Zohaib Hassan Naqvi","doi":"10.1109/IEMCON.2018.8614858","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614858","url":null,"abstract":"Self-balancing robot has the ability of locomotion with balancing capabilities. The two wheeled self-balancing robot can rotate to swiftly change its direction of motion and precisely navigate tight gaps as compared to a three or four-wheeled robot. The paper aims to present modeling, analysis and control design of Two Wheeled Self Balancing Robot (TWSBR) using simulation tools and hardware. Mathematical and state space modelling of TWSBR are performed using Lagrange equations. Based on the model, Linear Quadratic Regulator (LQR), Proportional Integral Derivative (PID) and pole placement control methods are anticipated for stabilization and balancing control of the system. A comparative assessment of the controllers is presented after analyzing performance of each controller individually. Based on results and simplicity of controller, PID controller is implemented in hardware. The implemented robust controller design is able to self balance the robot as expected on tuning PID parameters found from simulations. Hardware implementation of TWSBR shows that it has ability of motion with balancing aptitudes and can be used to handle plethora of tasks proficiently as humans do.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115750458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Video abstraction inspired by human visual attention models","authors":"S. O. Gilani, Mohsin Jamil","doi":"10.1109/IEMCON.2018.8614889","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614889","url":null,"abstract":"This paper describes an application of three different state-of-the-art human inspired visual attention models to video abstraction. Two types of video abstractions, video skim and key frame extraction, are performed over three different genres of videos. Qualitative and quantitative results are reported based on user studies and statistical tests. A comparison is made with human made video abstraction set to benchmark the current analysis. We report some abstraction similarities at scene level showing that all three models are successful in capturing semantic content despite having anatomical differences. However different models are more suitable for different genres of videos.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"50 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134245496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Challenges for Developing Countries to Adopt ICT in Government Services","authors":"Muhammad Aftab, Seounghwan Myeong","doi":"10.1109/IEMCON.2018.8614765","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614765","url":null,"abstract":"This paper talks about the adoption of information and communication technology in the governmental services in the developing nations. It has been observed that technological advancement needs a lot of investment and at the same time demands people to be very well educated so that they can use the technology otherwise the initiative is good for nothing. The adoption of ICT guarantees a sharp change in outlook where government organizations will be more responsive and straightforward, advance proficient Public Private Partnerships (PPP), and engagement of residents by making information more specifically available. In this paper a detailed discussion about the adoption of ICT in developing nations is being done to understand what are the different challenges which are being faced and how those challenges can be overcome. This article will be helpful for the decision makers from developing countries to understand the addressed challenges in order to successfully adopt Information and communication technologies in government services.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134337919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hanny Tufail, F. Azam, Muhammad Waseem Anwar, Iqra Qasim
{"title":"Model-Driven Development of Mobile Applications: A Systematic Literature Review","authors":"Hanny Tufail, F. Azam, Muhammad Waseem Anwar, Iqra Qasim","doi":"10.1109/IEMCON.2018.8614821","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614821","url":null,"abstract":"Mobile application development for cross platform has been struggling with the increase in numbers of mobile devices and their specifications (i.e. screen sizes, resolutions etc.). Model-Driven Development (MDD) is a significant method to cope with this problem and allow the ultimate solution to change management as well. MDD is the next level in harnessing UML and development environments to manage software development. Although researchers have devised many MDD techniques, languages and tools in the domain of mobile application development. Our conjecture to the best of our knowledge is, no research study is available yet that analyzes and summarizes the modern trends, tools and techniques in this context. Therefore, in this article, we performed a Systematic Literature Review (SLR) that recognizes 30 studies (2013–2018) where MDD is utilized for MAD. This leads to identification of 11 models, and 21 tools. Subsequently, a comprehensive analysis of MDD tools for mobile application is presented. The researchers and practitioners of mobile application domain shall find these findings amply valuable.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131516446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}