{"title":"Finding focused itemsets from software defect data","authors":"Hafsa Zafar, Z. Rana, S. Shamail, M. Awais","doi":"10.1109/INMIC.2012.6511437","DOIUrl":"https://doi.org/10.1109/INMIC.2012.6511437","url":null,"abstract":"Software product measures have been widely used to predict software defects. Though these measures help develop good classification models, studies propose that relationship between software measures and defects still needs to be investigated. This paper investigates the relationship between software measures and the defect prone modules by studying associations between the two. The paper identifies the critical ranges of the software measures that are strongly associated with defects across five datasets of PROMISE repository. The paper also identifies the ranges of the measures that do not necessarily contribute towards defects. These results are supported by information gain based ranking of software measures.","PeriodicalId":396084,"journal":{"name":"2012 15th International Multitopic Conference (INMIC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116772092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Heading control of a fixed wing UAV using alternate control surfaces","authors":"M. Ahsan, Hamza Rafique, Z. Abbas","doi":"10.1109/INMIC.2012.6511475","DOIUrl":"https://doi.org/10.1109/INMIC.2012.6511475","url":null,"abstract":"Unmanned Air Vehicles (UAVs) have incredible competencies in forces and civil relevancies. The flight and navigation of a UAV is autonomously controlled by an onboard autopilot. The heading control of a UAV is a vital operation of autopilot, executed by employing a design algorithm that controls its direction and navigation. Commercially available autopilots mostly exploit Proportional-Integral-Derivative (PID) based heading controllers using aileron deflection as the input variable. In this paper, we give a comparison of the performances of two heading-controller design techniques i.e. aileron based heading controller and rudder based heading controller using a Proportional Integral Differential (PID) controller. We have taken a nonlinear model of a small sized UAV-Aerosonde. This model is then linearized around a stable trim point and subsequently decoupled for longitudinal and lateral designs. The small perturbation control theory helps us test the designed controllers with the nonlinear model. The compensated linear and nonlinear models along with their results are presented. Our exploration reveals that rudder based heading controller has intrinsic potency compared to commercially employed aileron based heading controllers for UAV heading control, with regard to better transient response, thus improving the overall response as well as payload performance during a heading change maneuver. The conclusion may show the way to a valuable outcome in autopilot design of UAV.","PeriodicalId":396084,"journal":{"name":"2012 15th International Multitopic Conference (INMIC)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121637874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy adaptive pitch controller of a wind turbine","authors":"M. Kadri, Shehryar Ali Khan","doi":"10.1109/INMIC.2012.6511439","DOIUrl":"https://doi.org/10.1109/INMIC.2012.6511439","url":null,"abstract":"In case of wind turbine induction generators which are directly connected to grid a control problem arises when the wind speed increases above the rated wind speed, some measure needs to be taken to limit the aerodynamic torque of the wind turbine in order to keep the output power at its rated value. For this purpose various controlling variables may be chosen, like generator speed, generator power and wind speed. There are number of self-tuning controllers, Tan's controller is a model reference adaptive controller (MRAC) and has been tested on various non-linear plants and has proved to be robust with tight control performance. Here we have tried to test the proposed self-learning neuro-fuzzy controller by Tan [2] for the pitch angle control of wind turbine using simulink. The self-learning neuro-fuzzy control strategy has the potential when the system contains strong non-linearity, such as wind turbulence is strong. The self-learning neuro-fuzzy model will try to develop the inverse plant model of the system and will use that to generate the required control action to keep the output at its rated value. In order to carry out this comparison wind turbine induction generator (WTIG) from Simulink distributed resources is used. Comparison of the self-learning neuro-fuzzy control and PI controller has been carried out in different wind profiles and overall results show that self-learning neuro-fuzzy controller can give better results in presence of strong wind disturbances.","PeriodicalId":396084,"journal":{"name":"2012 15th International Multitopic Conference (INMIC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124381353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mian Muhammad Mubasher, M. S. Farid, Abdul Khaliq, M. Yousaf
{"title":"A parallel algorithm for change detection","authors":"Mian Muhammad Mubasher, M. S. Farid, Abdul Khaliq, M. Yousaf","doi":"10.1109/INMIC.2012.6511449","DOIUrl":"https://doi.org/10.1109/INMIC.2012.6511449","url":null,"abstract":"Change detection is an important research area in image and video processing due to wide applications in medicine, surveillance, remote sensing, geographical information processing and in defense and security. This paper presents a real-time distributed algorithm to detect changes in videos. The proposed algorithm may be used in many change detection applications that require real-time performance like CCTV Security Surveillance Camera Systems. In such applications fast change detection is very important. Many a times, we need to search a video captured by security camera for an event with significant change. Doing it manually is very time consuming and cumbersome, a fast automatic algorithm is desired in such cases. The proposed parallel algorithm runs on a cluster and detects the significant changes in real-time. The algorithm is implemented in C using MPICH2 in Linux environment and is tested over a number of videos for correctness, accuracy and execution time. The proposed approach is also compared with serial change detection techniques and gained a speedup of approximately 3.4 on cluster with 4 average machines.","PeriodicalId":396084,"journal":{"name":"2012 15th International Multitopic Conference (INMIC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123492407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive self-regulating null navigation in cognitive radio","authors":"S. A. Hussain, A. Malik","doi":"10.1109/INMIC.2012.6511445","DOIUrl":"https://doi.org/10.1109/INMIC.2012.6511445","url":null,"abstract":"In this paper, we have taken the scenario that cognitive user is fix while the primary user in mobility mode. We capitalize on the power in the direction of the cognitive user and create nulls in the direction of the primary user with self-regulating null navigation technique. When the primary user travel in direction of cognitive user, the cognitive user adaptively regulate the weights and construct null headed for the primary user with notion that, direction of arrivals (DOA) of the primary user are known by cognitive user. When the primary user changes the direction, cognitive user adjusts the complex weights adaptively and creates null toward primary user. In this technique we use the two weights for pair of consecutive antenna elements and attain summer output at different stages. The nulls are generated corresponding to the primary angle and the entire weights are adaptively optimized only reference to angle. When both the primary and the cognitive user revolutionize the direction then all the weights are changes and improve the spectral efficiency of the spectrum with navigating the beam toward cognitive user and bring into being self-generating nulls in direction of primary users. We suppress the interference to primary user by navigating lower power in the direction of primary user and construct the main lobe toward cognitive user. Simulation results established the algorithm effectiveness.","PeriodicalId":396084,"journal":{"name":"2012 15th International Multitopic Conference (INMIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128695937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QoS analysis of VoIP traffic for different codecs and frame counts per packet in multimedia environment using OPNET","authors":"Muhammad Aamir, Syed Ali Jafar Zaidi","doi":"10.1109/INMIC.2012.6511508","DOIUrl":"https://doi.org/10.1109/INMIC.2012.6511508","url":null,"abstract":"Voice over IP (VoIP) is nowadays a common component of multimedia converged networks. In this paper, Quality of Service (QoS) analysis of VoIP traffic is presented in a multimedia network having other types of network traffic also deployed i.e. video, database and web. In such traffic occupied network, VoIP is configured with different codecs and frame counts per packet to observe the effect of these variations on the QoS of VoIP in terms of queuing delay, jitter, packet end-to-end delay and packet delay variation (end-to-end jitter) metrics. The significance of this paper is the emphasis on QoS evaluations in a VoIP deployment while observing the effects of variations in voice codecs and packet lengths. Many previous research papers focus on the perceived speech quality and packet losses; whereas queuing delays and end-to-end latency are usually not considered when analysis is done for different codecs and packet lengths at a time. We consider three main voice codecs (G.711, G.729 and G.723.1) and three frame counts per packet values (10, 25 and 50 voice frames per packet) under each codec. The simulation results show that G.723.1 voice encoding experiences higher queuing delays and queue delay variations (jitter) for higher numbers of frames per packet. However, the least packet end-to-end delay is observed in voice packets encoded with G.729 codec for all configured values of frames per packet.","PeriodicalId":396084,"journal":{"name":"2012 15th International Multitopic Conference (INMIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128771342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Persuading students for behavior change by determining their personality type","authors":"Muhammad Adnan, H. Mukhtar, M. Naveed","doi":"10.1109/INMIC.2012.6511472","DOIUrl":"https://doi.org/10.1109/INMIC.2012.6511472","url":null,"abstract":"Our research integrates human personality with Fogg Behavior Grid. We believe that human personality layer surrounds Fogg Behavior Grid. To prove our statement an experimental study was carried out on graduate students comprising of two surveys. The first survey was carried out to determine students personality types while in the second survey students were asked to recommend different study behavior options. Our survey results revealed strong association between students personality types and their study behavior. After the two surveys, a prototype mobile application was developed and tested with an aim to facilitate and persuade students in further increasing their study behavior in the right direction keeping in view their personality types and study behavior preferences. Different persuasion strategies through mobile application were applied on students with different personality types and study behavior. At the end it was concluded that Fogg Behavior Grid which suggests fifteen behavior types could be made more systematic and detailed if humans personality types are considered first. Subsequently humans can be persuaded more effectively in achieving their target behavior if their personality types are considered first.","PeriodicalId":396084,"journal":{"name":"2012 15th International Multitopic Conference (INMIC)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125201182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. A. Hussain, A. Nadeem, O. Khan, S. Iqbal, A. Salam
{"title":"Evaluating network layer selfish behavior and a method to detect and mitigate its effect in MANETs","authors":"M. A. Hussain, A. Nadeem, O. Khan, S. Iqbal, A. Salam","doi":"10.1109/INMIC.2012.6511441","DOIUrl":"https://doi.org/10.1109/INMIC.2012.6511441","url":null,"abstract":"A Mobile Ad Hoc Network (MANET) is an infrastructureless network of autonomous devices formed dynamically. At network layer routing protocols in MANETs expect every node to cooperate in routing and data forwarding tasks. However, this cooperation leads towards a state in which nodes consumes their scarce resources for example battery power. Resource constraints of MANET nodes can derive dynamic selfish behavior in terms of not forwarding packets & not cooperating in routing operations. This can lead to degradation in network performance. In this paper, we first perform a simulation based study to evaluate the effects of selfish nodes on network performance. Then in contrast with most of the selfish node detection approaches in literature which are based on fully watchdog methods using promiscuous monitoring. We propose a proactive mechanism that first detects nodes that are exhibiting selfish behavior based on the factors which derives selfish behavior and then mitigate its effect on network performance. Initial simulation results of a case study shows that our method can detect & mitigate the effect of selfish behavior with an affordable overhead on the network.","PeriodicalId":396084,"journal":{"name":"2012 15th International Multitopic Conference (INMIC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121856340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vocabulary of Quranic Concepts: A semi-automatically created terminology of Holy Quran","authors":"Tayyeba Mukhtar, H. Afzal, A. Majeed","doi":"10.1109/INMIC.2012.6511467","DOIUrl":"https://doi.org/10.1109/INMIC.2012.6511467","url":null,"abstract":"The identification and organization of terminology is the foremost step while organizing the domain knowledge for any domain as it is the terms and their inter-relationships that define the conceptual knowledge base. Quran, comprising the divine words of wisdom has been considered and used as prime source of knowledge and guidance for Muslims throughout the world for fourteen centuries. The concepts/topics discussed in Quran have been organized/indexed by many scholars which are used by Muslims who use them to search for guidance regarding various issues of daily life. In current era of information technology, various search services for Quranic topics are available online. They mostly use the terminologies (concepts hierarchy) manually built by scholars. In our work, we have used a semi-automatic approach to identify important concepts/topics from six English translations of Quran, and organized them into a hierarchical structure, named as Vocabulary of Quranic Concepts (VQC). CNC Value method of term recognition is used to identify significant concepts, which are then manually analyzed by domain expert, and are then organized into a hierarchy using the term-head principle. Due to extreme sensitivity of this work, complete automation of system is avoided and outcomes at all steps are manually analyzed. Currently, we have developed a vocabulary from translation of only second chapter of Quran (Al-Bakara). VQC is available at: https://sites.google.com/a/mcs.edu.pk/codteem/projects/qwn","PeriodicalId":396084,"journal":{"name":"2012 15th International Multitopic Conference (INMIC)","volume":"35 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125727327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Handover delay analysis for cooperative Ad-hoc Interconnected Mobile Networks","authors":"R. Qureshi, A. Dadej","doi":"10.1109/INMIC.2012.6511503","DOIUrl":"https://doi.org/10.1109/INMIC.2012.6511503","url":null,"abstract":"When a number of mobile networks, e.g. networks on vehicles, travel together, they can be interconnected in a dynamic mesh structure, here called Ad hoc Interconnected Mobile Network or AIMNET. The mesh topology interconnecting the mobile networks not only facilitates communication among the networks themselves, but more importantly allows sharing of Internet access available to individual mobile networks. AIMNET is expected to move in a heterogeneous wireless access environment where ubiquitous Internet access demands handovers. In this paper, we examine delays experienced at various levels of AIMNET in different types of handovers and identify main contributors of these delays. Based on this examination, we discuss methods to reduce handover delays. We also present simulation based evaluation of handovers in AIMNET employing these methods. The results of these simple simulations demonstrate the acceptable performance of AIMNET under proposed methods.","PeriodicalId":396084,"journal":{"name":"2012 15th International Multitopic Conference (INMIC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132491611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}