2012 15th International Multitopic Conference (INMIC)最新文献

筛选
英文 中文
Effect of receiver Signal to Noise Ratio on the classification performance of RF fingerprinting 接收信噪比对射频指纹分类性能的影响
2012 15th International Multitopic Conference (INMIC) Pub Date : 2012-12-01 DOI: 10.1109/INMIC.2012.6511506
Saeed Ur Rehman, K. Sowerby, C. Coghill
{"title":"Effect of receiver Signal to Noise Ratio on the classification performance of RF fingerprinting","authors":"Saeed Ur Rehman, K. Sowerby, C. Coghill","doi":"10.1109/INMIC.2012.6511506","DOIUrl":"https://doi.org/10.1109/INMIC.2012.6511506","url":null,"abstract":"Traditionally, Radio Frequency (RF) fingerprinting classification is performed by selecting an “unknown” signal from the pool, generating its RF fingerprint, and correlating the RF fingerprint with each profile RF fingerprint stored in the database. Most existing RF fingerprinting techniques have used high received SNR signals for generating the profile RF fingerprint of the transmitters and promising classification results has been reported in the literature. However, receiver SNR changes due to mobility of the transmitter/receiver and environment. Therefore, the RF fingerprints changes with the received SNR of the signals, which affect the classification results of the RF fingerprinting. This paper analyzes the effect of the receiver SNR on the overall RF fingerprinting classification. Three scenarios are considered, where profile RF fingerprint is generated by training the classifier with low, high and low/high SNR signals. These three scenarios correspond to the situation, when either transmitter or receiver is mobile and SNR changes from low to high or vice versa. The testing results show that accurate classification largely depends on the received SNR signal. Whereas high receiver SNR yields accurate results but high SNR is not typical in a wireless environment.","PeriodicalId":396084,"journal":{"name":"2012 15th International Multitopic Conference (INMIC)","volume":"925 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133321877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Intelligent Decision Support System for construction project monitoring 建设项目监控智能决策支持系统
2012 15th International Multitopic Conference (INMIC) Pub Date : 2012-12-01 DOI: 10.1109/INMIC.2012.6511501
M. Riaz, S. A. Husain
{"title":"Intelligent Decision Support System for construction project monitoring","authors":"M. Riaz, S. A. Husain","doi":"10.1109/INMIC.2012.6511501","DOIUrl":"https://doi.org/10.1109/INMIC.2012.6511501","url":null,"abstract":"Business Monitoring is a complex task and it has been noted that most of the reporting and analysis time is being spent on collecting data from the various systems. Over the past decade, a lot of research has been reported on Decision Support Systems (DSS) used in many fields. To improve the decision-making ability of an enterprise in construction management, information technology is being applied in each step of construction management. The problem is to organize and analyze the data in construction management to obtain quick analysis and decision support results. Various Data mining techniques have been used for clustering of data by using case examples. In this research we have applied Learning Vector Quantization (LVQ) to classify projects in one of the given categories and conducted a comparative analysis by using standard algorithm. A number of case examples have been used to verify the results and to obtain a comparison between various methodologies.","PeriodicalId":396084,"journal":{"name":"2012 15th International Multitopic Conference (INMIC)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130474966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
RFAP, a preventive measure against route request Flooding Attack in MANETS RFAP是一种针对路由请求泛洪攻击的城域网防范措施
2012 15th International Multitopic Conference (INMIC) Pub Date : 2012-12-01 DOI: 10.1109/INMIC.2012.6511487
Kashif Laeeq
{"title":"RFAP, a preventive measure against route request Flooding Attack in MANETS","authors":"Kashif Laeeq","doi":"10.1109/INMIC.2012.6511487","DOIUrl":"https://doi.org/10.1109/INMIC.2012.6511487","url":null,"abstract":"The operations of Mobile Ad-hoc Networks (MANETs) are still insecure due to some reasons. One of the main reasons is insecure routing protocol. Generally ad-hoc network operations utilize reactive routing protocol such as AODV, to complete their routing needs. The route construction phase of this protocol is vulnerable; the malicious node easily disrupts the communication. In one case malicious node sends bulk route request (RREQ) packets to void addresses that occupy the network resources. This type of attack is called RREQ Flooding Attack (RFA). There are various schemes to mitigate the RFA but they are inadequate towards mitigating the attack. One of the main issues present in majority of proposed solutions is not to recover malicious node after punishment. This paper introduces RFAP, a scheme for mitigating the RREQ flooding attack in MANET by utilizing AODV protocol. The RFAP is an amended form of AODV. The scheme is specially design for MANET that has higher node mobility. Recovery of malicious nodes after reasonable punishment is the main objective of the scheme. Simulations are performed using NS-2 simulator and results are presented. These results illustrate that RFAP has ability to separate the flooder node from the network with more reliable as compare to simple AODV.","PeriodicalId":396084,"journal":{"name":"2012 15th International Multitopic Conference (INMIC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132539914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A robust and enhanced approach for human detection in crowd 一种鲁棒和增强的人群人体检测方法
2012 15th International Multitopic Conference (INMIC) Pub Date : 2012-12-01 DOI: 10.1109/INMIC.2012.6511457
Robina Khatoon, S. Saqlain, Shafina Bibi
{"title":"A robust and enhanced approach for human detection in crowd","authors":"Robina Khatoon, S. Saqlain, Shafina Bibi","doi":"10.1109/INMIC.2012.6511457","DOIUrl":"https://doi.org/10.1109/INMIC.2012.6511457","url":null,"abstract":"In this paper we have presented and enhanced methodology for robust detection of human in videos. Our research covers most of the limitations for detection of human in crowded places like detection of non-human objects and large human shadow as humans. The proposed technique is based on hierarchal structure consisting of three phases. Firstly, segmentation of moving objects is done using Gaussian Mixture model. Secondly, shadow removal technique is applied to avoid detection of large human shadows as human. Finally, human detection is achieved by applying human detection algorithm [3] on shadowless segmented images. Experiments are performed on different videos having single and multiple humans in indoor and outdoor scenes and videos under different illumination producing large and small shadows. This paper also presents comparative results of our methodology with existing techniques and the results clearly proved that the proposed technique outperforms the existing techniques and this is proved by producing comparative results.","PeriodicalId":396084,"journal":{"name":"2012 15th International Multitopic Conference (INMIC)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127438992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
RBSRA: RSSI based Statistical Rate Adaptation for IEEE 802.11 WLANs RBSRA:基于RSSI的IEEE 802.11 wlan统计速率适配
2012 15th International Multitopic Conference (INMIC) Pub Date : 2012-12-01 DOI: 10.1109/INMIC.2012.6511502
Tahira Sadaf, M. Y. Javed
{"title":"RBSRA: RSSI based Statistical Rate Adaptation for IEEE 802.11 WLANs","authors":"Tahira Sadaf, M. Y. Javed","doi":"10.1109/INMIC.2012.6511502","DOIUrl":"https://doi.org/10.1109/INMIC.2012.6511502","url":null,"abstract":"In recent research, estimations for condition of channels are based on either (i) physical layer parameters (e.g. SNR, RSSI etc.) or (ii) statistics of transmitted data (e.g. no of retransmissions, throughput etc.). Our research evaluates that depending upon one approach entirely while ignoring other can lead to loss of valuable information about adaptation of rate to send data. This in turn can highly degrade throughput. In view of this, the proposed scheme, RBSRA, defines channel assessment as the function of combining PHY layer parameter with statistical metrics. RBSRA estimates accurate assessment of fluctuating channel conditions, so it leads to the substitution of data rates to yield higher throughput. RBSRA uses, the PHY layer parameter RSSI in cooperation with the statistical metric that is number of received ACK, in such a way that it avoids unnecessary fluctuations in data rates and provides more realistic selection amongst the available link speeds. Performance of RBSRA depicts that the data rate selection has been precisely synchronized with ups and downs of the channel conditions along with statistics of transmitted stream.","PeriodicalId":396084,"journal":{"name":"2012 15th International Multitopic Conference (INMIC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126827874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generic Lightweight Certificate Management Protocol (GLCMP) 通用轻量级证书管理协议(GLCMP)
2012 15th International Multitopic Conference (INMIC) Pub Date : 2012-12-01 DOI: 10.1109/INMIC.2012.6511492
Muhammad Asif, Abdul Ghafoor
{"title":"Generic Lightweight Certificate Management Protocol (GLCMP)","authors":"Muhammad Asif, Abdul Ghafoor","doi":"10.1109/INMIC.2012.6511492","DOIUrl":"https://doi.org/10.1109/INMIC.2012.6511492","url":null,"abstract":"This paper describes a Generic Light Weight Certificate Management Protocol (GLCMP) for handling certificates on mobile devices. Theoretically, various security solutions are designed to protect the valuable information of mobile users. But, its power, memory and processing constraints, high response time and authentication latencies are the main challenges for the researcher to develop and integrate standard security mechanisms in it. It is observed that, most of mobile users are not technical enough to configure security parameters and even already developed libraries do not support extended security features like transparent handling of certificates, verification of identities, and distribution of certificates. In this paper, an innovative and comparatively efficient protocol is designed and implemented. It does not only overcome the shortcoming of the certificate handling in mobile devices but also provides some extended certificate related features like registration, authentication and trust delegation. The designed GLCMP is lightweight because all complex and computation-intensive operations, involved in creation of certificate request in PKCS#10 standard format, are offloaded to a proxy server. It also provides domain based secure registration and verification of the identities without exchanging any confidential information to the proxy servers and even no user's credential is exchanged on network for authentication. After analyzing its performance, we noticed that authentication latency of GLCMP is 0.394 sec which is less than previously proposed protocols like NSI (4.7), PKI (5.01), and PKASSO (5.19 delegation time + 0.082 authentication times). We also formally verified our designed by using Z-Notation Modeling techniques and found that it is protected against man-in-the-middle, replay and impersonation and non-repudiation attacks.","PeriodicalId":396084,"journal":{"name":"2012 15th International Multitopic Conference (INMIC)","volume":"113 Pt A 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129694721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance evaluation of parallel numerical libraries 并行数值库的性能评价
2012 15th International Multitopic Conference (INMIC) Pub Date : 2012-12-01 DOI: 10.1109/INMIC.2012.6511484
Arfeen Ahmed Malik, A. Usman, Hanif Durad
{"title":"Performance evaluation of parallel numerical libraries","authors":"Arfeen Ahmed Malik, A. Usman, Hanif Durad","doi":"10.1109/INMIC.2012.6511484","DOIUrl":"https://doi.org/10.1109/INMIC.2012.6511484","url":null,"abstract":"The use of multiple processors in parallel gives a remarkable improvement in performance as compared to that of a single processor. Unfortunately, it is still very difficult to write algorithms that actually take advantage of those multiple-processor machines. However a number of parallel libraries have been developed that perform reasonably well on wide range of parallel architectures. Examples of such libraries include SCALAPACK and PETSc. The aim is to study and to evaluate the performance of these parallel numerical libraries. So that if someone runs into a situation where he needs to choose between different available parallel libraries then he might be able to choose the library that gives best performance for his problem.","PeriodicalId":396084,"journal":{"name":"2012 15th International Multitopic Conference (INMIC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130120506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sign language localization: Learning to eliminate language dialects 手语本地化:学习消除语言方言
2012 15th International Multitopic Conference (INMIC) Pub Date : 2012-12-01 DOI: 10.1109/INMIC.2012.6511463
Memona Tariq, A. Iqbal, A. Zahid, Zainab Iqbal, J. Akhtar
{"title":"Sign language localization: Learning to eliminate language dialects","authors":"Memona Tariq, A. Iqbal, A. Zahid, Zainab Iqbal, J. Akhtar","doi":"10.1109/INMIC.2012.6511463","DOIUrl":"https://doi.org/10.1109/INMIC.2012.6511463","url":null,"abstract":"Machine translation of sign language into spoken languages is an important yet non-trivial task. The sheer variety of dialects that exist in any sign language makes it only harder to come up with a generalized sign language classification system. Though a lot of work has been done in this area previously but most of the approaches rely on intrusive hardware in the form of wired or colored gloves or are specific language/dialect dependent for accurate sign language interpretation. We propose a cost-effective, non-intrusive webcam based solution in which a person from any part of the world can train our system to make it learn the sign language in their own specific dialect, so that our software can then correctly translate the hand signs into a commonly spoken language, such as English. Image based hand gesture recognition carries sheer importance in this task. The heart of hand gesture recognition systems is the detection and extraction of the sign (hand gesture) from the input image stream. Our work uses functions like skin color based thresholding, contour detection and convexity defect for detection of hands and identification of important points on the hand respectively. The distance of these important contour points from the centroid of the hand becomes our feature vector against which we train our neural network. The system works in two phases. In the training phase the correspondence between users hand gestures against each sign language symbol is learnt using a feed forward neural network with back propagation learning algorithm. Once the training is complete, user is free to use our system for translation or communication with other people. Experimental results based on training and testing the system with numerous users show that the proposed method can work well for dialect-free sign language translation (numerals and alphabets) and gives us average recognition accuracies of around 65% and 55% with the maximum recognition accuracies rising upto 77% and 62% respectively.","PeriodicalId":396084,"journal":{"name":"2012 15th International Multitopic Conference (INMIC)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128836755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Aiding web crawlers; projecting web page last modification 协助网络爬虫;投影网页上次修改
2012 15th International Multitopic Conference (INMIC) Pub Date : 2012-12-01 DOI: 10.1109/INMIC.2012.6511443
A. Anjum, Adnan Anjum
{"title":"Aiding web crawlers; projecting web page last modification","authors":"A. Anjum, Adnan Anjum","doi":"10.1109/INMIC.2012.6511443","DOIUrl":"https://doi.org/10.1109/INMIC.2012.6511443","url":null,"abstract":"Due to colossal amount of data on the Web, Web archivists typically make use of Web crawlers for automated collection. The Internet Archive is the largest organization based on a crawling approach in order to maintain an archive of the entire Web. The most important requirement of a Web crawler, specially when they are used for Web archiving, is to be aware of the date (and time) of last modification of a Web page. This strategy has various advantages, most important of them include i) presentation of an up-to-date version of a Web page to the end user ii) ease of adjusting the crawl rate that allows future retrieval of a Web page's version at a given date, or to compute its refresh rate. The typical way for this modification information of a Web page, that is, to use the Last-Modified: HTTP header, unfortunately does not provide correct information every time. In this work, we discuss various techniques that can be used to determine the date of last modification of a Web page with the help of experiments. This will help in adjusting the crawl rate for a specific page and also helps in presenting users with up to date information and thus allowing future versioning of a Web page more meticulous.","PeriodicalId":396084,"journal":{"name":"2012 15th International Multitopic Conference (INMIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128946675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
“A survey on TCP CUBIC variant regarding performance” TCP CUBIC变体性能调查
2012 15th International Multitopic Conference (INMIC) Pub Date : 2012-12-01 DOI: 10.1109/INMIC.2012.6511454
Mudassar Ahmad, A. Ngadi, Ambreen Nawaz, Usman Ahmad, T. Mustafa, Ahsan Raza
{"title":"“A survey on TCP CUBIC variant regarding performance”","authors":"Mudassar Ahmad, A. Ngadi, Ambreen Nawaz, Usman Ahmad, T. Mustafa, Ahsan Raza","doi":"10.1109/INMIC.2012.6511454","DOIUrl":"https://doi.org/10.1109/INMIC.2012.6511454","url":null,"abstract":"CUBIC is one of the most popular version of TCP being used by many flavours of Linux now a days. CUBIC [6] is an enhanced version of BIC TCP (Binary Increase Congestion Transmission Control Protocol) ??. To enhance the scalability of TCP in long distance network scenarios, CUBIC modified the linear window growth function of standard TCP to cubic [6] function. During communication, CUBIC decreases the size of congestion windows (cwnd) at Saturation-States and increases its size instantly at Stable-States. CUBIC protocol keeps the window-increase- rate independent of RTT, which helps the protocol TCP friendly in short and long RTTs. When the CUBIC window-growth-function is slower than standard TCP, CUBIC [6] behaves like standard TCP in order to provide fairness to standard TCP. In this Paper, CUBIC performance evaluation is done by Network Simulator-2 experiments. As this is a survey paper, performance analysis of other TCP versions is also discussed.","PeriodicalId":396084,"journal":{"name":"2012 15th International Multitopic Conference (INMIC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126541138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信