{"title":"Conservation Laws for Dynamical System Via Generalized Differential Variational Principles of Jourdian and Gauss","authors":"Amjad Hussain, Muhammad Asim","doi":"10.1109/ICAEM.2018.8536266","DOIUrl":"https://doi.org/10.1109/ICAEM.2018.8536266","url":null,"abstract":"In this paper we study the conservation law of a partially conservative dynamical system whose virtual work are non-zero by using the Gauss and Jourdian differential variational principles. In second part of this paper we study the solution which is based upon the linear first integral.","PeriodicalId":427270,"journal":{"name":"2018 International Conference on Applied and Engineering Mathematics (ICAEM)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124175432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of False Data in Wireless Sensor Network Using Hash Chain","authors":"Mahak Tariq, Mashal Khan, Sana Fatima","doi":"10.1109/ICAEM.2018.8536305","DOIUrl":"https://doi.org/10.1109/ICAEM.2018.8536305","url":null,"abstract":"Wireless Sensor Network (WSN) is often to consist of adhoc devices that have low power, limited memory and computational power. WSN is deployed in hostile environment, due to which attacker can inject false data easily. Due to distributed nature of WSN, adversary can easily inject the bogus data into the network because sensor nodes don't ensure data integrity and not have strong authentication mechanism. This paper reviews and analyze the performance of some of the existing false data filtering schemes and propose new scheme to identify the false data injected by adversary or compromised node. Proposed schemes shown better and efficiently filtrate the false data in comparison with existing schemes.","PeriodicalId":427270,"journal":{"name":"2018 International Conference on Applied and Engineering Mathematics (ICAEM)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121483916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Arslan Ali, Bilal M. Yousuf, Haris Moshsin, Sidra Saeed Gillani
{"title":"Formation of Multiple Underactuated Autonomous Underwater Vehicle Based on Position and Approximation Control","authors":"Arslan Ali, Bilal M. Yousuf, Haris Moshsin, Sidra Saeed Gillani","doi":"10.1109/ICAEM.2018.8536273","DOIUrl":"https://doi.org/10.1109/ICAEM.2018.8536273","url":null,"abstract":"Underactuated autonomous underwater vehicle (AUV) is one of significant interest research areas for most of the researcher in recent years. These vehicles are currently used for scientific and military underwater application like in exploration in the sea, monitoring, etc. Systematic dynamic and kinematic modeling and it's control are the most active part of research in marine engineering. This paper mainly concerned with the modeling of the AUV in both dynamic and kinematic which used integration action to stabilize in the horizontal plane. The mathematical model is extracted from Lagrangian formulation and transformed into kinematic model. The main goal of this research is to enhance its performance in term of robustness and to make the system uniformly bounded stable in the presence of disturbances. Furthermore, this work is extended to formation control of AUVs in the leader follower scenario. For converging the trajectory as the reference for the follower a virtual vehicle is constructed. The design of the controller depends on the position based estimation along with back-stepping technique, which enable the follower to move along the path defined by the leader. Lyapunov analysis is being carried out as the proof of controller perfromance. Simulation result is provided to show the efficacy of the control algorithm in the presence of unknown disturbance and parametric variations.","PeriodicalId":427270,"journal":{"name":"2018 International Conference on Applied and Engineering Mathematics (ICAEM)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130805780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sensor Based PUF IoT Authentication Model for a Smart Home with Private Blockchain","authors":"Kashif Rahim, Hasan Tahir, N. Ikram","doi":"10.1109/ICAEM.2018.8536295","DOIUrl":"https://doi.org/10.1109/ICAEM.2018.8536295","url":null,"abstract":"With ubiquitous adoption of connected sensors, actuators and smart devices are finding inroads into daily life. Internet of Things (IoT) authentication is rapidly transforming from classical cryptographic user-centric knowledge based approaches to device signature based automated methodologies to corroborate identity between claimant and a verifier. Physical Unclonable Function (PUF) based IoT authentication mechanisms are gaining widespread interest as users are required to access IoT devices in real time while also expecting execution of sensitive (even physical) IoT actions immediately. This paper, delineates combination of BlockChain and Sensor based PUF authentication mechanism for solving real-time but non-repudiable access to IoT devices in a Smart Home by utilizing a mining less consensus mechanism for the provision of immutable assurance to users' and IoT devices' transactions i.e. commands, status alerts, actions etc.","PeriodicalId":427270,"journal":{"name":"2018 International Conference on Applied and Engineering Mathematics (ICAEM)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114142797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zehra Akther Naveed, Mehwish Shafi Khan, M. Khan, S. Ali
{"title":"Exact Solutions Incompressible Viscous Fluid Flow for General Function of Degree Six","authors":"Zehra Akther Naveed, Mehwish Shafi Khan, M. Khan, S. Ali","doi":"10.1109/ICAEM.2018.8536298","DOIUrl":"https://doi.org/10.1109/ICAEM.2018.8536298","url":null,"abstract":"The flow characteristic of any fluid can be described by solving the governing equations introduced by Navier later known as Navier-Stokes equations. It is difficult to obtain the exact solution of the equations due to its non-linear nature. Literature review provides that the general solutions has not been presented for complete set of governing equations. In this paper, some exact solutions obtained for incompressible viscous fluid flow with general function of degree six. The obtained exact solution can be used for different fluid flow cases. Finally, Matlab routine is used to simplify obtained solutions.","PeriodicalId":427270,"journal":{"name":"2018 International Conference on Applied and Engineering Mathematics (ICAEM)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122137565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mathematical Modeling and Simulation for the Dengue Fever Epidemic","authors":"Didar Murad, N. Badshah, S. Ali","doi":"10.1109/ICAEM.2018.8536289","DOIUrl":"https://doi.org/10.1109/ICAEM.2018.8536289","url":null,"abstract":"A deterministic model for the dengue disease is proposed and analyzed. In modeling to examine transmission dynamics of the disease, threshold quantity like re-breeding ratio $R_{0}$ and equilibrium states such as disease free equilibrium $E_{0}$ and disease present equilibrium $E^{*}$ are found. Lastly, numerical simulations for the state variables susceptible, infected and recovered human populations are presented for the disease epidemic.","PeriodicalId":427270,"journal":{"name":"2018 International Conference on Applied and Engineering Mathematics (ICAEM)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123025185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zahoor Ahmed Alizai, Noquia Fatima Tareen, Iqra Jadoon
{"title":"Improved IoT Device Authentication Scheme Using Device Capability and Digital Signatures","authors":"Zahoor Ahmed Alizai, Noquia Fatima Tareen, Iqra Jadoon","doi":"10.1109/ICAEM.2018.8536261","DOIUrl":"https://doi.org/10.1109/ICAEM.2018.8536261","url":null,"abstract":"Internet of Things (IoT) device authentication is weighed as a very important step from security perspective. Privacy and security of the IoT devices and applications is the major issue. From security perspective, important issue that needs to be addressed is the authentication mechanism, it has to be secure from different types of attacks and is easy to implement. The paper gives general idea about how different authentication mechanisms work, and then secure and efficient multi-factor device authentication scheme idea is proposed. The proposed scheme idea uses digital signatures and device capability to authenticate a device. In the proposed scheme device will only be allowed into the network if it is successfully authenticated through multi-factor authentication otherwise the authentication process fails and whole authentication process will restart. By analyzing the proposed scheme idea, it can be seen that the scheme is efficient and has less over head. The scheme not only authenticates the device very efficiently through multi-factor authentication but also authenticates the authentication server with the help of digital signatures. The proposed scheme also mitigates the common attacks like replay and man in the middle because of nonce and timestamp.","PeriodicalId":427270,"journal":{"name":"2018 International Conference on Applied and Engineering Mathematics (ICAEM)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115906035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sensitivity and Specificity Analysis of Fingerprints Based Algorithm","authors":"M. Sabir","doi":"10.1109/ICAEM.2018.8536268","DOIUrl":"https://doi.org/10.1109/ICAEM.2018.8536268","url":null,"abstract":"Recently, sensitivity and specificity of biometric based algorithms have gained too much attentions of researchers because of frequently reported fraud cases to defense related organizations. A similar study is presented in this paper to depict the different aspects of a biometric system so that its features such as sensitivity., specificity., precision and accuracy may be figure out well before its installation. In this regard., fingerprints based biometric system is considered; where fingerprints are first enhanced to remove the unwanted contents from them using Gabor filter. So that feature extraction may be accomplished. However., for matching of fingerprints support vector machine has been employed. Experiments are performed with FVC2000 and FVC2002 fingerprints databases and improved results have been found.","PeriodicalId":427270,"journal":{"name":"2018 International Conference on Applied and Engineering Mathematics (ICAEM)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127405128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Zeeshan Khan, Muhammad Khairul Ali Hassan, Ammarah Farooq, Muhammad Usman Ghanni Khan
{"title":"Deep CNN Based Data-Driven Recognition of Cricket Batting Shots","authors":"Muhammad Zeeshan Khan, Muhammad Khairul Ali Hassan, Ammarah Farooq, Muhammad Usman Ghanni Khan","doi":"10.1109/ICAEM.2018.8536277","DOIUrl":"https://doi.org/10.1109/ICAEM.2018.8536277","url":null,"abstract":"Cricket is one of the most played and watched sports, specially in the South Asian region. This paper deals with identifying and categorizing various batting shots from cricket videos. Proposed method is based on deep convolution neural networks. Results have been evaluated for both 2D convolution followed by recurrent network for processing sequence of video frames and 3D convolution network for capturing spatial and temporal features simultaneously. In order to train and evaluate models, dataset comprising of about 800 batting shot clips have been locally developed. Obtained models are able to recognize a shot being played with 90% accuracy. The distinction of such visually similar shots with this high accuracy is novel in literature and indicates the high implications of modern AI and deep learning in applications for detecting various cricket activities as well as for decision making purposes. The prepared dataset will be made publicly available for research community.","PeriodicalId":427270,"journal":{"name":"2018 International Conference on Applied and Engineering Mathematics (ICAEM)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131954745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Facial Expression Recognition in Image Sequences Using 1D Transform and Gabor Wavelet Transform","authors":"Maria Mahmood, A. Jalal, Hawke A. Evans","doi":"10.1109/ICAEM.2018.8536280","DOIUrl":"https://doi.org/10.1109/ICAEM.2018.8536280","url":null,"abstract":"Magnifying emotions recognition from facial expression is highly demanded in several applications domains such as security, education, psychology, medical diagnosis, marketing and business negotiations. For the growth and productivity of these domains, researchers are keenly involved in improving the effectiveness of facial expression recognition (FER) systems. However, they still lack potency in terms of recognition accuracy, inter-subject facial variations and appearance complexity. This paper attempts to improve recognition accuracy by employing Radon transform and Gabor wavelet transform along with robust classifiers. Facial detection is examined by oval parameters approach and facial tracking is achieved using vertex mask generation. Radon transform and Gabor transform filters have been applied to extract variable features. Finally, self-organized maps and neural network are used as recognizer engine to measure six basic facial expressions. Unlike conventional results that were evaluated using a single dataset, our experimental results have shown state-of-the-art accuracy of 86 and 83.7 percent over two public datasets as Cohn-Kanade and AT&T datasets respectively.","PeriodicalId":427270,"journal":{"name":"2018 International Conference on Applied and Engineering Mathematics (ICAEM)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132618768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}