System Maintenance:
There may be intermittent impact on performance while updates are in progress. We apologize for the inconvenience.
By Topic

9th International Multitopic Conference, IEEE INMIC 2005

Date 24-25 Dec. 2005

Filter Results

Displaying Results 1 - 25 of 135
  • A Security Architecture for Multihop Mobile Ad hoc Networks With Mobile Agents

    Publication Year: 2005 , Page(s): 1 - 8
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (8699 KB) |  | HTML iconHTML  

    The traditional stipulation of security services in the mobile ad hoc networks (MANET) context faces a set of challenges specific to this new technology. While a multihop wireless mobile ad hoc network as an extended MANET can be formed without the need for any pre-existing infrastructure with minimum setup and administration costs; the security is undeniably a major "roadblock" in the commercial application of this technology at a production scale. Unlike other commercial grade wireless networking technologies, and wired networks, which rely mainly on existing infrastructure and favor urban areas with varying degree of in-place security infrastructure and centralized administration, these multihop MANETs are to be deployed to remote geographical locations, even inside hostile territories. The security challenges of such networks therefore, do not just include security of data and communication channels, but also the physical security of the hardware resources as well. This work is an attempt to resolve two fundamental and flaming security vulnerabilities in these multihop MANETs: The identification of a malicious node(s) and design of a robust security model that could be implemented, even in a hostile environment in the presence of a number of non-colluding nodes. The solutions are proposed by exploiting the mobile agent technologies. The only requirement is that any nodes that wish to communicate securely must simply establish a priori a shared set of mobile agents to be used subsequently by their communicating protocol suites View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Speaker Identification for Speakers with Deliberately Disguised Voices using Glottal Pulse Information

    Publication Year: 2005 , Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (330 KB) |  | HTML iconHTML  

    Glottal pulse corresponds to the glottal plosive produced in human speech. It is one of the consonants that exist phonemically in almost all languages. This paper utilizes the fact that the utterance of glottal stop is a unique quality of the speaker's way of pronunciation as well as his physical characteristics. The research work presented in this paper analyzes the energy and frequency responses of the glottal plosives, which provides a better basis for the purpose of speaker identification with deliberately disguised voices View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparisons of Encoded and Function Approximation Models of Neural Network Control Charts for Pattern Recognition

    Publication Year: 2005 , Page(s): 1 - 7
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (4577 KB) |  | HTML iconHTML  

    Increasing rapid changes and highly precise manufacturing environments require timely monitoring and intervention when deemed necessary. Traditional SPC charting, a popular tool but not effective and an appropriate in the case of automotive manufacturing system. Therefore, in this paper two type of pattern recognition models were suggested and compared each other for neural network control charts. This study was focused on these two models. It was observed that the generalization ability of the encoded model in terms of error percentage, the generalization ability of the function approximation approach was significantly greater for all levels of slopes varied from 0.25 to 1 View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Synchronous Dataflow Based Modeling and Implementation of a Motion Detection and Compression System

    Publication Year: 2005 , Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (7015 KB) |  | HTML iconHTML  

    This paper presents an architectural framework of a motion detection and compression system for surveillance applications. The emphasis is on use of a dataflow based design paradigm that can be dynamically linked to an extensible framework for simulation and algorithm development. The framework is based on Ptolemy II software environment and is built around synchronous dataflow (SDF) domain. It employs Ptolemy's flexibility for the development of functional and behavioral simulations and rapid prototyping of embedded systems View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Generalized Thinning Algorithm for Cursive and Non-Cursive Language Scripts

    Publication Year: 2005 , Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3471 KB) |  | HTML iconHTML  

    One of the most crucial phases in the process of text recognition is thinning of characters to a single pixel notation. The success measure of any thinning algorithm lies in its property to retain the original character shape, which are also called unit-width skeletons. No agreed universal thinning algorithm exists to produce character skeletons from different languages, which is a pre-process for all subsequent phases of character recognition such as segmentation, feature extraction, classification, etc. Written natural languages based on their intrinsic properties can be classified as cursive and non-cursive. Thinning algorithms when applied on cursive languages, poses greater complexity due to their distinct non-isolated boundaries and complex character shapes such as in Arabic, Sindhi, Urdu, etc. Such algorithms can easily be extended for parallel implementations. Selecting certain pixel arrangement grid templates over the other pixel patterns for the purpose of generating character skeletons exploits the parallel programming. The success key is in determining the right pixel arrangement grids that can reduce the cost of iterations required to evaluate each pixel for selecting for thinning or ignoring. This paper presents an improved parallel thinning algorithm, which can be easily extended for cursive or non-cursive languages alike by introducing a modified set of preservation rules via pixel arrangement grid templates, making it both robust to noise and speed. Experimental results show its success over cursive languages like Arabic, Sindhi, Urdu and non-cursive languages like English, Chinese and even numerals. Thus making it probably a universal thinning algorithm View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementing Biometric Security in Intelligent Transportation Systems (ITS)

    Publication Year: 2005 , Page(s): 1 - 5
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (4793 KB) |  | HTML iconHTML  

    Recently, intelligent transportation systems (ITS) are getting popular in the developing world, as they include wide range of communication and information technologies such as traffic cameras, ramp meters, variable message signs (VMS), traffic control centers (TCC), accident avoidance technologies, incident management and more, that promises to improve the transportation system operations. Changes to such critical ITS subsystems by disgruntled workers and employees, without permission and training to manage functions, hackers, or aggressive terrorists could create dangerous roadway situations. For these reasons, the conventional password protection techniques must be converted into more promising and advanced biometric security systems, e.g. fingerprint recognition for personal access to the traffic control systems of ITS. In this paper, we propose a biometric security system for the ITS, which can be integrated in the subsystems of ITS, then we present a performance evaluation model to measure the efficiency of a robust biometric system for the ITS environment View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design Methodology of FIR Filtering IP Cores for dsp based Systems

    Publication Year: 2005 , Page(s): 1 - 5
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3817 KB) |  | HTML iconHTML  

    In this paper, intellectual property (IP) core for unfolded direct form finite impulse response (FIR) filter is proposed for reusable system design. The designed core is programmable and parameterized in terms of data bits, coefficient bits, filter order and type of filter (low pass, high pass, band pass etc). The IP core is described in Verilog HDL and the core programmability and parameterization features are tested by changing type of filters (low pass, high pass and band pass) and taps of filters. The core is synthesized on Spartan 2S50E FPGA for 8 bit and 16 bit widths using an 11 taps FIR filter. Design methodology and core architecture are described in detail and favorable results for area/speed performance are reported View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Customizing Project Management Methodology

    Publication Year: 2005 , Page(s): 1 - 6
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (6562 KB) |  | HTML iconHTML  

    Well-structured processes and methods are keys to successful construction and management of any project, however a formal methodology is detrimental when its costs outweigh the benefits, it provides. Moreover projects and teams differ, so one methodology won't fit all of them. Different set of processes are required to manage different projects. This selection of processes for each project is not simple because a lot of factors effect the decision. To address the long standing issue, we conducted a survey to make this part of the project management easier by facilitating the customization of the existing methodologies and knowledge areas View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Project Management Trends of Pakistani Software Industry

    Publication Year: 2005 , Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (5082 KB) |  | HTML iconHTML  

    The ability to produce cost effective and quality software is heavily dependent on the maturity of the processes used to build the software. Software industry in general and Pakistani software industry in particular emerged and witnesses turmoil in the recent years. Now it is the right time to assess the project management capabilities, trends and requirements of the local industry. To assess the level of maturity of Pakistan software industry in software project management, an interview-based survey of the some Islamabad based well-known companies was carried out. The results of the survey highlight the trends and practices of the industry regarding project management, and its level of maturity View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multi-DSP based Simulator for Architecture and High Density Algorithm Exploration

    Publication Year: 2005 , Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (538 KB) |  | HTML iconHTML  

    This paper presents a novel architecture of a multi DSP based simulator. The simulator can be used for evaluating numerous DSP configurations in multi processor environment across several parameters and criteria. The simulator can also evaluate performance of different multi processor scheduling algorithms for high density signal processing applications. The simulator is designed to explore design space for up to OC48 media gateway controller running different VOIP algorithms View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pressure Effect on Microwave Heating of Gas

    Publication Year: 2005 , Page(s): 1 - 3
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2676 KB) |  | HTML iconHTML  

    In connection to microwave heating of gas molecules, characterizing equations of microwave attenuation of gas filled media under molecular resonance and off-resonance were derived. The attenuation constant was found to be an increasing function with pressure when the molecule is at off-resonance. The attenuation constant was a decreasing function with pressure when the molecule is at resonance. This result supports previously reported experimental observations View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Proposed Model To Use ID3 Algorithm In The Classifier of A Network Intrusion Detection System

    Publication Year: 2005 , Page(s): 1 - 8
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (4657 KB) |  | HTML iconHTML  

    Classifiers of the contemporary network intrusion detection systems do not use any inductive learning technique to take inferences from the available independent data to arrive at a conclusion for classification of unknown threats. This makes the systems vulnerable to new attacks. The author proposes a model to embed primitive intelligence in the network intrusion detection systems. This model is based on Quinlain ID3 algorithm of decision tree construction and inductive learning. This model can be very useful to detect unknown attacks because it develops an optimized decision tree from available training set and can takes inference from the known (test) data to classify unknown patterns by adding new rules in the rule set View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Emitter Recognition using Fuzzy Adaptation of ARTMAP Neural Networks

    Publication Year: 2005 , Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (5466 KB) |  | HTML iconHTML  

    Emitter recognition is the problem of classifying the radar type from intercepted radar signals. This capability is crucial for classifying approaching enemy ships and aircrafts. The sensed parameters may vary from their actual or reported values because of man-made variations in the form of agility or staggering. Another cause of variation could be dispersion because of atmospheric effects and equipment noise. Associating the measured radar parameter set with a known sighting is a pattern recognition problem in a multi-dimensional space. Several authors have attacked the problem with various data association tools with different merits and de-merits. Most of them are marred by the massive computing power required and unrealistically large training data requirements. In this paper a simple but elegant technique is proposed to solve the above problem using well-established framework of fuzzy logic and neural networks View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spectral Analysis of Bangla Vowels

    Publication Year: 2005 , Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (4316 KB) |  | HTML iconHTML  

    Spectral analysis of Bangla vowel based on articulatory properties of vocal tract plays a significant role in Bangla speech synthesis and recognition. A vowel system through the spectral analysis is classified into distinct vowel region within articulatory space. This paper synthesize vowel space illustration by spectral analysis of Bangla vowel sounds to locate them in both "acoustic" and "articulatory" space of the vocal tract tube. Measurements of the spectral characteristics and the formant frequencies were made for each vowel from isolated Bangla word spoken by both male and female speakers. All these measurements were tested in synthesis of isolated utterance View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Terrestrial Free Space Optical Links for High Bandwidth Connectivity

    Publication Year: 2005 , Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (6568 KB) |  | HTML iconHTML  

    Free space optics (FSO) is rapidly gaining popularity as an effective means of transferring data at high rates over short distances. Light beams propagating through the atmosphere carry the information from the optical transmitter to the receiver. FSO facilitates rapidly deployable, lightweight, high-bandwidth communication without licensing fee and tariffs. We present FSO system and network concepts, modeling of the terrestrial (near ground) channel, modulation and channel coding aspects and investigations in estimating the probability density function View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • State and Event Loop Model of Evolutionary Programs of Multi-Agent Systems for Control of Distributed Renewable Energy Network

    Publication Year: 2005 , Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (4033 KB)  

    The paper proposes an agent system for distributed generation setup identifying role and requirements of each genetic algorithms, due to their applicability for optimization solutions of nonlinear and stochastic scenarios, can find place in development of agents for distributed control. Advantages and special features of genetic algorithms far optimization are discussed, identifying some input and output variables. Requirement of compensator as an agent/sub-agent is also proposed. The state machine model/event loop model is proposed showing behaviour of system in real time scenarios. To facilitate understanding, object model of the agent system has also been suggested, correlation with state/event loop model where possible View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulation of reduced order hydro turbine models to study its hydraulic transient characteristics

    Publication Year: 2005 , Page(s): 1 - 6
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (5390 KB) |  | HTML iconHTML  

    The elasticity of water column effect in penstock of a hydro power plant represents an irrational term in turbine-penstock transfer function (TF) model. In this paper, this function is reduced to an order r= 1,2,3 & 4 using H-infinity approximant method. The gate position-turbine power nonlinear steady-state characteristic is modeled for these reduced order TFs. The dynamic characteristic is determined using multi-step signal. And the time-domain and frequency-domain simulations of turbine power are presented and compared with widely known Pade approximant method View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Tradeoff Analysis of an Area Efficient Viterbi Decoder

    Publication Year: 2005 , Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (4325 KB) |  | HTML iconHTML  

    The Viterbi decoder is widely used in digital communication systems. It performs the maximum-likelihood decoding of convolutional codes received from a noisy channel Depending on the application (terrestrial, satellite, digital modems, digital cellular telephone applications and others) a Viterbi decoder must be designed to meet specific requirements such as small area, high speed or maximum efficiency. This paper presents a novel architecture for area efficient Viterbi decoder, which can be used for low bitrate applications. The design schedules all computations on less number of ACS processing elements as compared to parallel implementation assuming that a lot of clock cycles are available for decoding View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Image Processing Based Approach for Real-Time Road Traffic Applications

    Publication Year: 2005 , Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3951 KB) |  | HTML iconHTML  

    Traffic engineers require various types of road traffic data to manage the traffic. The current sensors (inductive loops and axle sensors etc.) cannot collect all the data that are of interest to traffic engineers. Most important of all, if the data is to be collected at a different location, the installation of these equipments, which needs to be buried beneath the road, creates serious traffic disturbances. In order to overcome the above problems, many researchers have used vision-based system for collecting and analysing road traffic data. However, these techniques have not yielded good results due to various problems such as inefficiency of background updating, selection of a threshold value, change in ambient lighting etc. In this paper we describe a novel neural network and window-based image processing technique for road traffic applications. We use morphological edge detection techniques to detect vehicles. Once the vehicles have been detected, a back-propagation neural network is used for calculating various traffic parameters. This novel method has been implemented on a Pentium-based microcomputer system and the results are reported online in real-time. We also have compared our system with traditional image processing based systems and the results indicate that our proposed system provides better results than the traditional image processing based systems View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hybrid- Watermarking Scheme for Asymmetric and Symmetric Watermark Extraction

    Publication Year: 2005 , Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (5528 KB) |  | HTML iconHTML  

    In this paper, a hybrid-watermarking scheme is proposed that enables both asymmetric and symmetric watermark extraction by embedding public and private watermarks, respectively. Using the asymmetric extraction, anyone with the public-watermark key can extract the public watermark to verify some information, for example, the identity of the actual seller, etc. If the public watermark is destroyed by some attack, the symmetric watermark extraction allows the actual seller to extract the hidden private watermark to prove his ownership claim. We present experimental results to show the effectiveness of our proposed scheme View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Prediction of Backward Branches by Pattern Detection

    Publication Year: 2005 , Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (181 KB) |  | HTML iconHTML  

    A number of branch prediction schemes have been proposed in literature. In order to improve the prediction probability, all of them address the problem of accurate branch prediction in various ways. In this paper we have proposed a predictor which can accurately predict a branch which is once registered with it View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of Emerging JVT H.264/AVC with MPEG Video

    Publication Year: 2005 , Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (158 KB) |  | HTML iconHTML  

    The growing demand for higher quality compression of video resulted in emerging JVTH.264/AVC standard. It has wide range of applications such videoconferencing, digital storage media, television broadcasting, Internet streaming, and real-time communication. The standard has significant improvement over all previous video compression standards. In this paper, we provide comparison of the coding performance improvement of H. 264 over MPEG-2 and MPEG-4 standards. Our test results show that H.264 can achieve significant coding gains over MPEG-2 and MPEG-4 View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study of SVC's Fire Angle Variation to Enhance Capacitor Insulation Lifetime Against Network Imposed Harmonics

    Publication Year: 2005 , Page(s): 1 - 3
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (197 KB) |  | HTML iconHTML  

    Power electronics and other similar components can generate harmonic voltages and currents in power systems. Harmonic voltages will produce heat in insulating materials and then cause further aging of insulation. Different harmonic voltages may be produced by fire angle variation of a typical FACTS component. Imposed harmonic voltages from network also can cause aging of insulation. In this paper we study life assessment of a SVC capacitor with thyristor fire angle variation when we have voltage harmonic injection from network and automatically unusual aging is valid View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Electromagnetic Field Inside the Building Due to Lightning Stroke

    Publication Year: 2005 , Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (405 KB) |  | HTML iconHTML  

    The prediction of electromagnetic fields and their induced effects have become a mandatory requirement in the design phase of lightning protection systems. In the present paper authors are used NEC-2 (Numerical Electromagnetic Code) for computing electromagnetic field at different location, inside a building with 36 m height View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • STYX - Remote Monitoring of Awkward Body Postures

    Publication Year: 2005 , Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (5746 KB) |  | HTML iconHTML  

    You are walking with your friend who is as fit as you are. After some paces, you get tired but your friend does not. Why? Among several reasons, one that may not flash in your mind is that your gait pattern may be incorrect which may result in inappropriate muscle usage. Awkward posture may also be a root cause of other pains or injuries in the human body. Correct body posture is very important in performing routine activities more efficiently and may also help in preventing various future pains or injuries. Numerous consultations, brainstorming sessions and a needs analysis provided us the impetus for "Going Beyond the Boundaries" and explore the field of physiotherapy and ergonomics to provide a computer based solution to benefit the society. STYX proposes a daily wear, embedded with appropriate software and hardware which would be able to profile your body joint angles, monitor the body movements and trigger an alarm if the posture is not correct View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.