K. Samad, E. Ahmed, W. Mahmood, K. Sharif, A. Chaudhry
{"title":"Efficient Clustering Approach for Intrusion Detection in Ad Hoc Networks","authors":"K. Samad, E. Ahmed, W. Mahmood, K. Sharif, A. Chaudhry","doi":"10.1109/SCONEST.2005.4382879","DOIUrl":"https://doi.org/10.1109/SCONEST.2005.4382879","url":null,"abstract":"Mobile ad-hoc networks (MANETs) are temporary wireless networks useful in emergency rescue services, battlefields operations, mobile conferencing and a variety of other useful applications. Due to dynamic nature and lack of centralized monitoring points, these networks are highly vulnerable to attacks. Intrusion detection systems (IDS) provide audit and monitoring capabilities that offer the local security to a node and help to perceive the specific trust level of other nodes. We take benefit of the clustering concept in MANETs for the effective communication between nodes, where each cluster involves a number of member nodes and is managed by a cluster-head. It can be taken as an advantage in these battery and memory constrained networks for the purpose of intrusion detection, by separating tasks for the head and member nodes, at the same time providing opportunity for launching collaborative detection approach. The clustering schemes are generally used for the routing purposes to enhance the route efficiency. However, the effect of change of a cluster tends to change the route; thus degrades the performance. This paper presents a low-overhead clustering algorithm for the benefit of detecting intrusion rather than efficient routing. It also discusses the intrusion detection techniques with the help of this simplified clustering scheme.","PeriodicalId":447083,"journal":{"name":"2005 Student Conference on Engineering Sciences and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130002028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Optimized NCO for FSK Modem","authors":"Muhammad Asif, Zeeshan Ahmed","doi":"10.1109/SCONEST.2005.4382880","DOIUrl":"https://doi.org/10.1109/SCONEST.2005.4382880","url":null,"abstract":"Paper highlights the design of a FSK modulator-demodulator on Verilog using Xilnix ISE with the careful memory efficient design of NCO. Reconfigurable radio design on FPGA has become the hot area of research these days. The design includes implementation details of Modulator and Decoder; decoder has been design in number of ways, paper briefly discusses the advantage and disadvantage of the approaches. Clock frequency is the only determining factor for the carrier frequency while the designed NCO creates accurate sine wave with low memory utilization. Memory requirement is as low as 4 bytes; hardware optimization is achieved using simplified multiplication and shift operation. Decoder can lock with wide variations of frequency digital PLL design is also considered.","PeriodicalId":447083,"journal":{"name":"2005 Student Conference on Engineering Sciences and Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128290010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software Release Methodology: A Case Study","authors":"Arti Rana, M. Arfi","doi":"10.1109/SCONEST.2005.4382893","DOIUrl":"https://doi.org/10.1109/SCONEST.2005.4382893","url":null,"abstract":"Software release management is an important key technology for distributing the project/product to the customer. The key success factor of any software product lies in how delicately the product is released to the customer. The traditional SCM system does not guarantee to handle release management issues of a complex system. Complex systems involve complex database, N-tiers just to name a few. Each kind of application involves special technical consideration from a release perspective. In this paper, we analyze different quality parameters related to the release of a product. This parameters should be handled through software release model. The chosen model that supports those parameters is discussed. A controlled environment is tested for those parameters through the use of this model.","PeriodicalId":447083,"journal":{"name":"2005 Student Conference on Engineering Sciences and Technology","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130499282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hardware Implementation of DES Encryption Cracker","authors":"B. Shahid, H. Tauqeer, M.S. Ilyas","doi":"10.1109/SCONEST.2005.4382874","DOIUrl":"https://doi.org/10.1109/SCONEST.2005.4382874","url":null,"abstract":"As the security of the e-property is becoming a major concern, the field of cryptography has gained much importance. It is becoming essential to ensure that only those intended to see the information should see it. Cryptography enables you to manipulate your message using different encryption algorithms in such a way that only authorized people can view it. The robustness of these algorithms is usually determined by putting them under numerous attacks known as encryption cracking and the surviving one is considered the securest. One of these algorithms is DES (Data Encryption Standard). In this paper we discuss the design and implementation of DES encryption cracker, proving the power of the dedicated hardware, using brute force attack.","PeriodicalId":447083,"journal":{"name":"2005 Student Conference on Engineering Sciences and Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130551626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Ajaz, M. Asim, M. Ozair, M. Ahmed, Mansoor Siddiqui, Z. Mushtaq
{"title":"Autonomous Vehicle Monitoring & Tracking System","authors":"S. Ajaz, M. Asim, M. Ozair, M. Ahmed, Mansoor Siddiqui, Z. Mushtaq","doi":"10.1109/SCONEST.2005.4382882","DOIUrl":"https://doi.org/10.1109/SCONEST.2005.4382882","url":null,"abstract":"In the modern world of today, where technology prevails and scientific researches present a new era of discoveries and provide numerous luxuries to the common man; one also has to suffer the worse consequences of this advancement in technology. Just as the first gun was invented for the security of mankind, the criminal minded people used it for harming their own brethren. Similarly new & alarming technological methods have been adopted by the same people to harm peoples' comfort and have become a nuisance for the mankind. So the need of more security and safety has increased more than ever before. Complex systems like face & voice recognition systems, thumb print sensors have been deployed to enhance security concerns. One of the major areas where security is needed round the clock is Automobiles. This is a major industry of the world and cars need to be secured otherwise they are packed gifts for the criminals. In a widely populated city, take Karachi for example, where cars are robbed or hijacked in huge numbers daily; the need of car security systems has become inevitable. So here we discuss the most modernized & cost-effective automobile monitoring systems.cars Automobiles.","PeriodicalId":447083,"journal":{"name":"2005 Student Conference on Engineering Sciences and Technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114305526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real Time Traffic Support in Wireless Sensor Networks","authors":"M. Channa, I. Memon","doi":"10.1109/SCONEST.2005.4382896","DOIUrl":"https://doi.org/10.1109/SCONEST.2005.4382896","url":null,"abstract":"Wireless sensor networks (WSN) represent a new generation of embedded systems, which deploy wireless ad hoc communication mechanisms to route sensory data from the originator sensor node to the control station. This particular form of distributed computing arises many challenges in terms of realtime communication and coordination in wireless sensor networks due to the large number of constraints that must be satisfied simultaneously, including power, limited CPU speed, storage capacity and bandwidth. Many routing and MAC layer protocols have been designed for handling real-time applications in wireless sensor networks, by keeping in view their constraints. The majority of these protocols are energy efficient. The real-time applications require some guarantees in terms of throughput and end-to-end delay. Transmission of real-time traffic over such networks requires both energy and QoS aware network management for their efficient performance. This paper describes the major challenges for handling real-time applications in wireless sensor networks. We also outline the major open research issues in this area.","PeriodicalId":447083,"journal":{"name":"2005 Student Conference on Engineering Sciences and Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116280229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DSP Implementation of Voice Recognition Using Dynamic Time Warping Algorithm","authors":"F. Muzaffar, B. Mohsin, F. Naz, F. Jawed","doi":"10.1109/SCONEST.2005.4382877","DOIUrl":"https://doi.org/10.1109/SCONEST.2005.4382877","url":null,"abstract":"Voice recognition is a process of an automatic system to perceive speech. The paper discusses voice recognition using cepstral analysis and DTW of a set of five words. The software model was designed using DSP block library in Simulink. The developed model provide us with the necessary tools to record, filter, and analyze different voice samples and compare them with the archived sample. The paper concludes with discussion about the implementation of the speech recognition algorithm on a DSP processor. The algorithm was implemented on the target DSP via embedded target for TI DSP toolbox and real time workshop (RTW).","PeriodicalId":447083,"journal":{"name":"2005 Student Conference on Engineering Sciences and Technology","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114467032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FPGA Implementation of a Low Complexity Efficient Traceback Viterbi Decoder for Wireless Applications","authors":"Z. Mahtab","doi":"10.1109/SCONEST.2005.4382903","DOIUrl":"https://doi.org/10.1109/SCONEST.2005.4382903","url":null,"abstract":"Convolutional coding is a coding scheme often employed in deep space communications and more recently in digital wireless communications. Viterbi decoders are used to decode convolutional codes. Viterbi decoders employed in digital wireless communications are complex and dissipate large power. With the proliferation of battery powered devices such as cellular phones and laptop computers, power dissipation, along with speed and area, is a major concern in VLSI design. In this project, a novel architecture, low-complexity design of Viterbi decoders for wireless applications is proposed. The focus of my design is the modified trace back approach for final decoding. A 4 state Viterbi decoder following the proposed architecture is implemented and the synthesis results are presented. Testing is done by simulating the synthesized model on MODEL SIM.","PeriodicalId":447083,"journal":{"name":"2005 Student Conference on Engineering Sciences and Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127969304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Building Mobile Application with .NET Compact Framework","authors":"Hammad-ul-Hasnain","doi":"10.1109/SCONEST.2005.4382871","DOIUrl":"https://doi.org/10.1109/SCONEST.2005.4382871","url":null,"abstract":"Today is the age of mobile computing, the concept of virtual offices have been developed a large, therefore systems are being developed by the designers and developers which provide not only mobile but also remote access to different resources. For this purpose the tools for developing such application are very important. There are different development kits available for the developers. .NET Compact Framework is one of them. Mobile applications have a very large scope in future world and only those programming tool will survive which provides user both hardware support and software excellencies.","PeriodicalId":447083,"journal":{"name":"2005 Student Conference on Engineering Sciences and Technology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131991990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of a Video Teleconferencing System for Low-Bandwidth Networks and Medium-End Systems","authors":"F. Nasim, M. Adeel, M.U. Ghani, N. Jamal","doi":"10.1109/SCONEST.2005.4382895","DOIUrl":"https://doi.org/10.1109/SCONEST.2005.4382895","url":null,"abstract":"Long distance learning is in vogue these days. This requires a setup where an attendee can participate in lectures delivered from a university while sitting at some remote location. Generally this requires very high bandwidth network and a high end system on the attendee's end. Interuniversity collaboration also creates a demand for a teleconferencing system. To make these applications possible on medium and low end systems and low bandwidth networks, a video teleconferencing system was developed. This paper describes its structure.","PeriodicalId":447083,"journal":{"name":"2005 Student Conference on Engineering Sciences and Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115546222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}