2018 14th International Conference on Emerging Technologies (ICET)最新文献

筛选
英文 中文
Ligature Recognition in Urdu Caption Text using Deep Convolutional Neural Networks 基于深度卷积神经网络的乌尔都语字幕文本结扎识别
2018 14th International Conference on Emerging Technologies (ICET) Pub Date : 2018-11-01 DOI: 10.1109/ICET.2018.8603586
U. Hayat, Muhammad Aatif, Osama Zeeshan, I. Siddiqi
{"title":"Ligature Recognition in Urdu Caption Text using Deep Convolutional Neural Networks","authors":"U. Hayat, Muhammad Aatif, Osama Zeeshan, I. Siddiqi","doi":"10.1109/ICET.2018.8603586","DOIUrl":"https://doi.org/10.1109/ICET.2018.8603586","url":null,"abstract":"Textual content in videos contain rich information that can be exploited for semantic indexing and subsequent retrieval as well as development of video analytics solutions. The key modules in a textual content based video retrieval system include detection (localization) of text followed by its recognition, the later being the subject of our study. More specifically, this paper presents a caption text recognition system targeting Urdu text. The technique relies on a holistic approach using ligatures as units of recognition. Data driven feature extraction techniques are employed using a number of pre-trained deep convolution neural networks. The networks are used as feature extractors as well as fine-tuned on the ligature dataset under study and realized high ligature recognition rates.","PeriodicalId":443353,"journal":{"name":"2018 14th International Conference on Emerging Technologies (ICET)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129018321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Empirical evaluation of formation control scheme based on artificial potential fields for a team of nonholonomic mobile robots 基于人工势场的非完整移动机器人群体控制方案的经验评价
2018 14th International Conference on Emerging Technologies (ICET) Pub Date : 2018-11-01 DOI: 10.1109/ICET.2018.8603593
Abdullah bin Azhar, Muhammad Bilal Kadri
{"title":"Empirical evaluation of formation control scheme based on artificial potential fields for a team of nonholonomic mobile robots","authors":"Abdullah bin Azhar, Muhammad Bilal Kadri","doi":"10.1109/ICET.2018.8603593","DOIUrl":"https://doi.org/10.1109/ICET.2018.8603593","url":null,"abstract":"This study explores the practical implications of extending cooperative control scheme outlined by [1] to non-holonomic robots. The aim is to reach predefined goal points and follow trajectories while maintaining a geometric formation inside a 2D environment. The scheme establishes an artificial potential field emanating from each member robot including a virtual robot to blend goal-reaching and collision avoidance behaviors. Multiple Zumo 32U4 differential drive robots are used to observe the algorithm’s behavior in a test area where their positions and orientations are tracked via an overhead vision based motion capture system.","PeriodicalId":443353,"journal":{"name":"2018 14th International Conference on Emerging Technologies (ICET)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122474676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Metamorphic Relation based Approach for Testing a Chess Game 基于变质关系的象棋博弈测试方法
2018 14th International Conference on Emerging Technologies (ICET) Pub Date : 2018-11-01 DOI: 10.1109/ICET.2018.8603603
Aisha Liaqat, M. Sindhu
{"title":"A Metamorphic Relation based Approach for Testing a Chess Game","authors":"Aisha Liaqat, M. Sindhu","doi":"10.1109/ICET.2018.8603603","DOIUrl":"https://doi.org/10.1109/ICET.2018.8603603","url":null,"abstract":"Game software is becoming complex, therefore testing game software can be a tedious task as it can result in multiple complex and possible outcomes at a given point. Also most of testing is focused on certain parts of the software because of resource constraints. The game of chess also poses this problem as there are a large number of ways in which it can be played at a given point so testing it completely is impractical. We have proposed a metamorphic testing approach for testing chess game by using metamorphic relations for different moves of chess pieces to perform testing. We validated our proposed approach on an open source chess game by seeding errors. The results show that our approach for testing chess game through metamorphic testing reveals all the seeded errors. In the future, we can extend this approach to other complex games.","PeriodicalId":443353,"journal":{"name":"2018 14th International Conference on Emerging Technologies (ICET)","volume":"587 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134288075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Enhanced Biometric Based RFID Authentication Scheme Defending Against Illegitimate Access 一种增强的基于生物特征的RFID认证方案,防止非法访问
2018 14th International Conference on Emerging Technologies (ICET) Pub Date : 2018-11-01 DOI: 10.1109/ICET.2018.8603650
Umar Ayaz, Tayyaba Abdul Haq, Saba Taimour, Khwaja Mansoor, Saba Mahmood
{"title":"An Enhanced Biometric Based RFID Authentication Scheme Defending Against Illegitimate Access","authors":"Umar Ayaz, Tayyaba Abdul Haq, Saba Taimour, Khwaja Mansoor, Saba Mahmood","doi":"10.1109/ICET.2018.8603650","DOIUrl":"https://doi.org/10.1109/ICET.2018.8603650","url":null,"abstract":"Radio-frequency-identification (RFID) technology has been widely used to identify the RFID-Tags associated with objects through RFID-Reader using electromagnetic signals. The rapid growth of RFID technology is also accompanied by contemporary security challenges and threats. The highly secure authentication protocol is obligatory to overcome security challenges. Recently Srivastava et al. have proposed a Hash-biometric based authentication protocol for RFID Systems to resist the security threats. However, this study points out that Srivastava et al. scheme is vulnerable to 1) Possible Stolen Verifier Attack 2) Anonymity and Traceability Issue 3) Impersonation Attack by illegitimate user 4) Insider Attack. An enhanced and efficient protocol is presented in this paper for RFID Systems based on biometric authentication to handle security challenges and attacks found in Srivastava et al. scheme. The proposed protocol is formally tested and verified through well-known security automated tool (ProVerif). The proposed protocol is adequately secure and has a preferable efficiency in contrast to the other existing schemes.","PeriodicalId":443353,"journal":{"name":"2018 14th International Conference on Emerging Technologies (ICET)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130302515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Feasibility and Challenges of the Demand Side Management Implementation in Pakistan 巴基斯坦需求侧管理实施的可行性与挑战
2018 14th International Conference on Emerging Technologies (ICET) Pub Date : 2018-11-01 DOI: 10.1109/ICET.2018.8603559
U. Rehman
{"title":"Feasibility and Challenges of the Demand Side Management Implementation in Pakistan","authors":"U. Rehman","doi":"10.1109/ICET.2018.8603559","DOIUrl":"https://doi.org/10.1109/ICET.2018.8603559","url":null,"abstract":"The demand side management (DSM) is a special technique to modify the power network to achieve the diverse and enhanced performance. The basic objective of DSM is to motivate the power consumers to minimize the electricity use in peak hours, or to divert the power consumption during the off-peak hours. The main hurdle between the DSM implementation in Pakistan is the unavailability of power dispatch profile in real time, due to absence of smart metering devices. Even the present power grid infrastructure in Pakistan does not have sophisticated monitoring devices. This paper consists of a detailed study of the present power grid profile of Pakistan and highlights the challenges which are the main obstacles between the implementation of DSM and smart grid in the present power network. Moreover, the latest technologies have been explored which can help to minimize the complications of the present power network of Pakistan.","PeriodicalId":443353,"journal":{"name":"2018 14th International Conference on Emerging Technologies (ICET)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129640609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Identification and mapping of coral reefs using Landsat 8 OLI in Astola Island, Pakistan coastal ocean 利用Landsat 8 OLI在巴基斯坦沿海海域Astola岛识别和绘制珊瑚礁
2018 14th International Conference on Emerging Technologies (ICET) Pub Date : 2018-11-01 DOI: 10.1109/ICET.2018.8603584
A. Iqbal, W. Qazi, N. Shahzad, M. Nazeer
{"title":"Identification and mapping of coral reefs using Landsat 8 OLI in Astola Island, Pakistan coastal ocean","authors":"A. Iqbal, W. Qazi, N. Shahzad, M. Nazeer","doi":"10.1109/ICET.2018.8603584","DOIUrl":"https://doi.org/10.1109/ICET.2018.8603584","url":null,"abstract":"Recent field surveys have reported the presence of corals in many places in the Pakistan coastal ocean; Astola Island especially has been a subject of interest with regards to corals and overall marine biodiversity, and has in fact recently been declared Pakistan’s first Marine Protected Area. This study presents an analysis of coral reefs identification and their spatial distribution through optical satellite remote sensing in the surrounding area of Astola Island. Besides remote sensing data, the study considers sea survey data collected by divers in recent years. A benthic map of ocean ecosystem habitats is generated, through processing of Landsat 8 OLI (Operational Land Imager) imagery. The satellite data was selected at low-tide time to get maximum sunlight penetration in shallow water. Water-column correction was used to generate the depth-invariant index on multiple band-pairs. Water column corrected depth-invariant index bands were then segmented and classified through object-based classification. The results from the remote sensing data processing over Astola Island show good agreement with the field survey data, with nearly all the field survey points of coral reefs falling within the coral reefs class. Use of remote sensing imagery such as Landsat 8, and application of the water column correction method can allow for regular monitoring and management of coral reefs and other benthic ecosystems in the coastal ocean of Pakistan and coastal Arabian Sea.","PeriodicalId":443353,"journal":{"name":"2018 14th International Conference on Emerging Technologies (ICET)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114756884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Data Quality Techniques in the Internet of Things: Random Forest Regression 物联网中的数据质量技术:随机森林回归
2018 14th International Conference on Emerging Technologies (ICET) Pub Date : 2018-11-01 DOI: 10.1109/ICET.2018.8603594
M. M. Farooqi, Hasan Ali Khattak, Muhammad Imran
{"title":"Data Quality Techniques in the Internet of Things: Random Forest Regression","authors":"M. M. Farooqi, Hasan Ali Khattak, Muhammad Imran","doi":"10.1109/ICET.2018.8603594","DOIUrl":"https://doi.org/10.1109/ICET.2018.8603594","url":null,"abstract":"Internet of Things (IoTs) is one of the most promising fields in computer science. It consists of physical devices, automobiles, home appliances, embedded hardware, sensors and actuators which empowers these objects to interface and share information with other devices over the network. The data gathered from these devices is used to make intelligent decisions. If the data quality is poor, decisions are likely to be flawed. A little work has been carried out regarding data quality in the Internet of Things, but there is no scheme which is experimentally proved. In this paper we will identify data quality challenges in the Internet of Things domain and propose a model which ensure data quality standards provided by ISO 8000. We evaluated our model on the weather dataset and used the random forest prediction method to calculate the accuracy of our data. Results show that when compared with the baseline model the proposed system improves accuracy by 38.88%.","PeriodicalId":443353,"journal":{"name":"2018 14th International Conference on Emerging Technologies (ICET)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132169749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Automated Detection and Quantification of Erythrocytes and Leukocytes from Giesma Stains of Blood Smear 血涂片Giesma染色中红细胞和白细胞的自动检测和定量
2018 14th International Conference on Emerging Technologies (ICET) Pub Date : 2018-11-01 DOI: 10.1109/ICET.2018.8603620
Basit Ismail, Momina Moetesum
{"title":"Automated Detection and Quantification of Erythrocytes and Leukocytes from Giesma Stains of Blood Smear","authors":"Basit Ismail, Momina Moetesum","doi":"10.1109/ICET.2018.8603620","DOIUrl":"https://doi.org/10.1109/ICET.2018.8603620","url":null,"abstract":"Automated differential blood quantification is a fundamental prerequisite for the development of a computer-assisted diagnostic system for microscopic hematology. Digitized images of Giesma stained blood smears enable ease of analysis due to cell coloration. Nevertheless cell clustering adversely affects detection making quantification a challenging task. In this paper, we present a simple yet effective technique for detection and quantification of erythrocytes and leukocytes from Giesma stained images of blood smears. Contrary to colour based segmentation, we split the RGB images into their constituent channels. Green channel is then enhanced using histogram equalization. A key step of our proposed technique is the use of different binarization schemes for erythrocyte and leukocyte detection. Cell clustering is then removed using morphological operations. Later contour based detection is used for cell localization and size based segmentation is employed for quantification. With enhanced preprocessing, our proposed scheme yielded 70% and 99% accuracies for erythrocyte and leukocyte quantification respectively.","PeriodicalId":443353,"journal":{"name":"2018 14th International Conference on Emerging Technologies (ICET)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132182534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Scenario Based Performance Evaluation of Loop Configured Micorgrid Under Load Growth Using Multi Criteria Decision Analysis 负荷增长下基于多准则决策分析的环态微电网性能评估
2018 14th International Conference on Emerging Technologies (ICET) Pub Date : 2018-11-01 DOI: 10.1109/ICET.2018.8603588
M. A. Arshad, M. Junaid Afzal, S. Ahmad, Syed Ali Abbas Kazmi
{"title":"Scenario Based Performance Evaluation of Loop Configured Micorgrid Under Load Growth Using Multi Criteria Decision Analysis","authors":"M. A. Arshad, M. Junaid Afzal, S. Ahmad, Syed Ali Abbas Kazmi","doi":"10.1109/ICET.2018.8603588","DOIUrl":"https://doi.org/10.1109/ICET.2018.8603588","url":null,"abstract":"In this paper, a looped distribution network (LDN) is considered as a test micro grid (MG). A planning methodology has been proposed across a planning horizon of five years considering load growth in the system. Different scenarios with distributed generation (DG) in the system are considered for performance evaluation. Performance of these scenarios is evaluated against different conflicting objectives using multi-criteria decision analysis (MCDA) techniques. A sensitivity analysis is also done for validation and better analysis of results. Purpose of the proposed methodology is to come up with an optimal choice for accommodating DG in LDN under load growth. IEEE 69 bus system is used as a test Distribution network (DN). All simulations are carried in matlab Simulink framework.","PeriodicalId":443353,"journal":{"name":"2018 14th International Conference on Emerging Technologies (ICET)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131682097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evolutionary Algorithms in Cloud Computing from the Perspective of Energy Consumption: A Review 能源消耗视角下的云计算进化算法研究综述
2018 14th International Conference on Emerging Technologies (ICET) Pub Date : 2018-11-01 DOI: 10.1109/ICET.2018.8603582
Khola Maryam, M. Sardaraz, M. Tahir
{"title":"Evolutionary Algorithms in Cloud Computing from the Perspective of Energy Consumption: A Review","authors":"Khola Maryam, M. Sardaraz, M. Tahir","doi":"10.1109/ICET.2018.8603582","DOIUrl":"https://doi.org/10.1109/ICET.2018.8603582","url":null,"abstract":"Cloud Computing provides utility-based IT services. The services are available as pay per use. Cloud gives advantage to organizations in setting up fundamental hardware and software requirements i.e. instead of purchasing hardware or software cloud services can be used. The availability of cloud services any time and anywhere makes it a feasible solution for many applications. cloud services are constrained by some parameters such as Quality of Service (QoS), efficient utilization of cloud resources, user budget, user deadlines, energy consumption etc. In this article, we present a comprehensive review of techniques or algorithms designed to reduce energy consumption in cloud data centers. The review covers Evolutionary Algorithms (EA) such as Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO) and Genetic Algorithms (GA). We discuss each technique with strengths and weaknesses. Target objectives of each algorithm are also compared. The article is concluded with future research directions.","PeriodicalId":443353,"journal":{"name":"2018 14th International Conference on Emerging Technologies (ICET)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127367237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信