2018 International Conference on Applied and Engineering Mathematics (ICAEM)最新文献

筛选
英文 中文
Conservation Laws for Dynamical System Via Generalized Differential Variational Principles of Jourdian and Gauss 基于Jourdian和Gauss广义微分变分原理的动力系统守恒定律
2018 International Conference on Applied and Engineering Mathematics (ICAEM) Pub Date : 2018-09-01 DOI: 10.1109/ICAEM.2018.8536266
Amjad Hussain, Muhammad Asim
{"title":"Conservation Laws for Dynamical System Via Generalized Differential Variational Principles of Jourdian and Gauss","authors":"Amjad Hussain, Muhammad Asim","doi":"10.1109/ICAEM.2018.8536266","DOIUrl":"https://doi.org/10.1109/ICAEM.2018.8536266","url":null,"abstract":"In this paper we study the conservation law of a partially conservative dynamical system whose virtual work are non-zero by using the Gauss and Jourdian differential variational principles. In second part of this paper we study the solution which is based upon the linear first integral.","PeriodicalId":427270,"journal":{"name":"2018 International Conference on Applied and Engineering Mathematics (ICAEM)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124175432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of False Data in Wireless Sensor Network Using Hash Chain 利用哈希链检测无线传感器网络中的假数据
2018 International Conference on Applied and Engineering Mathematics (ICAEM) Pub Date : 2018-09-01 DOI: 10.1109/ICAEM.2018.8536305
Mahak Tariq, Mashal Khan, Sana Fatima
{"title":"Detection of False Data in Wireless Sensor Network Using Hash Chain","authors":"Mahak Tariq, Mashal Khan, Sana Fatima","doi":"10.1109/ICAEM.2018.8536305","DOIUrl":"https://doi.org/10.1109/ICAEM.2018.8536305","url":null,"abstract":"Wireless Sensor Network (WSN) is often to consist of adhoc devices that have low power, limited memory and computational power. WSN is deployed in hostile environment, due to which attacker can inject false data easily. Due to distributed nature of WSN, adversary can easily inject the bogus data into the network because sensor nodes don't ensure data integrity and not have strong authentication mechanism. This paper reviews and analyze the performance of some of the existing false data filtering schemes and propose new scheme to identify the false data injected by adversary or compromised node. Proposed schemes shown better and efficiently filtrate the false data in comparison with existing schemes.","PeriodicalId":427270,"journal":{"name":"2018 International Conference on Applied and Engineering Mathematics (ICAEM)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121483916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Formation of Multiple Underactuated Autonomous Underwater Vehicle Based on Position and Approximation Control 基于位置和逼近控制的多欠驱动自主水下航行器形成
2018 International Conference on Applied and Engineering Mathematics (ICAEM) Pub Date : 2018-09-01 DOI: 10.1109/ICAEM.2018.8536273
Arslan Ali, Bilal M. Yousuf, Haris Moshsin, Sidra Saeed Gillani
{"title":"Formation of Multiple Underactuated Autonomous Underwater Vehicle Based on Position and Approximation Control","authors":"Arslan Ali, Bilal M. Yousuf, Haris Moshsin, Sidra Saeed Gillani","doi":"10.1109/ICAEM.2018.8536273","DOIUrl":"https://doi.org/10.1109/ICAEM.2018.8536273","url":null,"abstract":"Underactuated autonomous underwater vehicle (AUV) is one of significant interest research areas for most of the researcher in recent years. These vehicles are currently used for scientific and military underwater application like in exploration in the sea, monitoring, etc. Systematic dynamic and kinematic modeling and it's control are the most active part of research in marine engineering. This paper mainly concerned with the modeling of the AUV in both dynamic and kinematic which used integration action to stabilize in the horizontal plane. The mathematical model is extracted from Lagrangian formulation and transformed into kinematic model. The main goal of this research is to enhance its performance in term of robustness and to make the system uniformly bounded stable in the presence of disturbances. Furthermore, this work is extended to formation control of AUVs in the leader follower scenario. For converging the trajectory as the reference for the follower a virtual vehicle is constructed. The design of the controller depends on the position based estimation along with back-stepping technique, which enable the follower to move along the path defined by the leader. Lyapunov analysis is being carried out as the proof of controller perfromance. Simulation result is provided to show the efficacy of the control algorithm in the presence of unknown disturbance and parametric variations.","PeriodicalId":427270,"journal":{"name":"2018 International Conference on Applied and Engineering Mathematics (ICAEM)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130805780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sensor Based PUF IoT Authentication Model for a Smart Home with Private Blockchain 基于传感器的私有区块链智能家居PUF物联网认证模型
2018 International Conference on Applied and Engineering Mathematics (ICAEM) Pub Date : 2018-09-01 DOI: 10.1109/ICAEM.2018.8536295
Kashif Rahim, Hasan Tahir, N. Ikram
{"title":"Sensor Based PUF IoT Authentication Model for a Smart Home with Private Blockchain","authors":"Kashif Rahim, Hasan Tahir, N. Ikram","doi":"10.1109/ICAEM.2018.8536295","DOIUrl":"https://doi.org/10.1109/ICAEM.2018.8536295","url":null,"abstract":"With ubiquitous adoption of connected sensors, actuators and smart devices are finding inroads into daily life. Internet of Things (IoT) authentication is rapidly transforming from classical cryptographic user-centric knowledge based approaches to device signature based automated methodologies to corroborate identity between claimant and a verifier. Physical Unclonable Function (PUF) based IoT authentication mechanisms are gaining widespread interest as users are required to access IoT devices in real time while also expecting execution of sensitive (even physical) IoT actions immediately. This paper, delineates combination of BlockChain and Sensor based PUF authentication mechanism for solving real-time but non-repudiable access to IoT devices in a Smart Home by utilizing a mining less consensus mechanism for the provision of immutable assurance to users' and IoT devices' transactions i.e. commands, status alerts, actions etc.","PeriodicalId":427270,"journal":{"name":"2018 International Conference on Applied and Engineering Mathematics (ICAEM)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114142797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Exact Solutions Incompressible Viscous Fluid Flow for General Function of Degree Six 不可压缩粘性流体流动的一般六次函数的精确解
2018 International Conference on Applied and Engineering Mathematics (ICAEM) Pub Date : 2018-09-01 DOI: 10.1109/ICAEM.2018.8536298
Zehra Akther Naveed, Mehwish Shafi Khan, M. Khan, S. Ali
{"title":"Exact Solutions Incompressible Viscous Fluid Flow for General Function of Degree Six","authors":"Zehra Akther Naveed, Mehwish Shafi Khan, M. Khan, S. Ali","doi":"10.1109/ICAEM.2018.8536298","DOIUrl":"https://doi.org/10.1109/ICAEM.2018.8536298","url":null,"abstract":"The flow characteristic of any fluid can be described by solving the governing equations introduced by Navier later known as Navier-Stokes equations. It is difficult to obtain the exact solution of the equations due to its non-linear nature. Literature review provides that the general solutions has not been presented for complete set of governing equations. In this paper, some exact solutions obtained for incompressible viscous fluid flow with general function of degree six. The obtained exact solution can be used for different fluid flow cases. Finally, Matlab routine is used to simplify obtained solutions.","PeriodicalId":427270,"journal":{"name":"2018 International Conference on Applied and Engineering Mathematics (ICAEM)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122137565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mathematical Modeling and Simulation for the Dengue Fever Epidemic 登革热流行的数学建模与模拟
2018 International Conference on Applied and Engineering Mathematics (ICAEM) Pub Date : 2018-09-01 DOI: 10.1109/ICAEM.2018.8536289
Didar Murad, N. Badshah, S. Ali
{"title":"Mathematical Modeling and Simulation for the Dengue Fever Epidemic","authors":"Didar Murad, N. Badshah, S. Ali","doi":"10.1109/ICAEM.2018.8536289","DOIUrl":"https://doi.org/10.1109/ICAEM.2018.8536289","url":null,"abstract":"A deterministic model for the dengue disease is proposed and analyzed. In modeling to examine transmission dynamics of the disease, threshold quantity like re-breeding ratio $R_{0}$ and equilibrium states such as disease free equilibrium $E_{0}$ and disease present equilibrium $E^{*}$ are found. Lastly, numerical simulations for the state variables susceptible, infected and recovered human populations are presented for the disease epidemic.","PeriodicalId":427270,"journal":{"name":"2018 International Conference on Applied and Engineering Mathematics (ICAEM)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123025185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Improved IoT Device Authentication Scheme Using Device Capability and Digital Signatures 使用设备能力和数字签名的改进物联网设备认证方案
2018 International Conference on Applied and Engineering Mathematics (ICAEM) Pub Date : 2018-09-01 DOI: 10.1109/ICAEM.2018.8536261
Zahoor Ahmed Alizai, Noquia Fatima Tareen, Iqra Jadoon
{"title":"Improved IoT Device Authentication Scheme Using Device Capability and Digital Signatures","authors":"Zahoor Ahmed Alizai, Noquia Fatima Tareen, Iqra Jadoon","doi":"10.1109/ICAEM.2018.8536261","DOIUrl":"https://doi.org/10.1109/ICAEM.2018.8536261","url":null,"abstract":"Internet of Things (IoT) device authentication is weighed as a very important step from security perspective. Privacy and security of the IoT devices and applications is the major issue. From security perspective, important issue that needs to be addressed is the authentication mechanism, it has to be secure from different types of attacks and is easy to implement. The paper gives general idea about how different authentication mechanisms work, and then secure and efficient multi-factor device authentication scheme idea is proposed. The proposed scheme idea uses digital signatures and device capability to authenticate a device. In the proposed scheme device will only be allowed into the network if it is successfully authenticated through multi-factor authentication otherwise the authentication process fails and whole authentication process will restart. By analyzing the proposed scheme idea, it can be seen that the scheme is efficient and has less over head. The scheme not only authenticates the device very efficiently through multi-factor authentication but also authenticates the authentication server with the help of digital signatures. The proposed scheme also mitigates the common attacks like replay and man in the middle because of nonce and timestamp.","PeriodicalId":427270,"journal":{"name":"2018 International Conference on Applied and Engineering Mathematics (ICAEM)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115906035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Sensitivity and Specificity Analysis of Fingerprints Based Algorithm 基于指纹识别算法的敏感性和特异性分析
2018 International Conference on Applied and Engineering Mathematics (ICAEM) Pub Date : 2018-09-01 DOI: 10.1109/ICAEM.2018.8536268
M. Sabir
{"title":"Sensitivity and Specificity Analysis of Fingerprints Based Algorithm","authors":"M. Sabir","doi":"10.1109/ICAEM.2018.8536268","DOIUrl":"https://doi.org/10.1109/ICAEM.2018.8536268","url":null,"abstract":"Recently, sensitivity and specificity of biometric based algorithms have gained too much attentions of researchers because of frequently reported fraud cases to defense related organizations. A similar study is presented in this paper to depict the different aspects of a biometric system so that its features such as sensitivity., specificity., precision and accuracy may be figure out well before its installation. In this regard., fingerprints based biometric system is considered; where fingerprints are first enhanced to remove the unwanted contents from them using Gabor filter. So that feature extraction may be accomplished. However., for matching of fingerprints support vector machine has been employed. Experiments are performed with FVC2000 and FVC2002 fingerprints databases and improved results have been found.","PeriodicalId":427270,"journal":{"name":"2018 International Conference on Applied and Engineering Mathematics (ICAEM)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127405128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Deep CNN Based Data-Driven Recognition of Cricket Batting Shots 基于CNN的深度数据驱动的板球击球识别
2018 International Conference on Applied and Engineering Mathematics (ICAEM) Pub Date : 2018-09-01 DOI: 10.1109/ICAEM.2018.8536277
Muhammad Zeeshan Khan, Muhammad Khairul Ali Hassan, Ammarah Farooq, Muhammad Usman Ghanni Khan
{"title":"Deep CNN Based Data-Driven Recognition of Cricket Batting Shots","authors":"Muhammad Zeeshan Khan, Muhammad Khairul Ali Hassan, Ammarah Farooq, Muhammad Usman Ghanni Khan","doi":"10.1109/ICAEM.2018.8536277","DOIUrl":"https://doi.org/10.1109/ICAEM.2018.8536277","url":null,"abstract":"Cricket is one of the most played and watched sports, specially in the South Asian region. This paper deals with identifying and categorizing various batting shots from cricket videos. Proposed method is based on deep convolution neural networks. Results have been evaluated for both 2D convolution followed by recurrent network for processing sequence of video frames and 3D convolution network for capturing spatial and temporal features simultaneously. In order to train and evaluate models, dataset comprising of about 800 batting shot clips have been locally developed. Obtained models are able to recognize a shot being played with 90% accuracy. The distinction of such visually similar shots with this high accuracy is novel in literature and indicates the high implications of modern AI and deep learning in applications for detecting various cricket activities as well as for decision making purposes. The prepared dataset will be made publicly available for research community.","PeriodicalId":427270,"journal":{"name":"2018 International Conference on Applied and Engineering Mathematics (ICAEM)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131954745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Facial Expression Recognition in Image Sequences Using 1D Transform and Gabor Wavelet Transform 基于一维变换和Gabor小波变换的图像序列面部表情识别
2018 International Conference on Applied and Engineering Mathematics (ICAEM) Pub Date : 2018-09-01 DOI: 10.1109/ICAEM.2018.8536280
Maria Mahmood, A. Jalal, Hawke A. Evans
{"title":"Facial Expression Recognition in Image Sequences Using 1D Transform and Gabor Wavelet Transform","authors":"Maria Mahmood, A. Jalal, Hawke A. Evans","doi":"10.1109/ICAEM.2018.8536280","DOIUrl":"https://doi.org/10.1109/ICAEM.2018.8536280","url":null,"abstract":"Magnifying emotions recognition from facial expression is highly demanded in several applications domains such as security, education, psychology, medical diagnosis, marketing and business negotiations. For the growth and productivity of these domains, researchers are keenly involved in improving the effectiveness of facial expression recognition (FER) systems. However, they still lack potency in terms of recognition accuracy, inter-subject facial variations and appearance complexity. This paper attempts to improve recognition accuracy by employing Radon transform and Gabor wavelet transform along with robust classifiers. Facial detection is examined by oval parameters approach and facial tracking is achieved using vertex mask generation. Radon transform and Gabor transform filters have been applied to extract variable features. Finally, self-organized maps and neural network are used as recognizer engine to measure six basic facial expressions. Unlike conventional results that were evaluated using a single dataset, our experimental results have shown state-of-the-art accuracy of 86 and 83.7 percent over two public datasets as Cohn-Kanade and AT&T datasets respectively.","PeriodicalId":427270,"journal":{"name":"2018 International Conference on Applied and Engineering Mathematics (ICAEM)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132618768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信