By Topic

Emerging Technologies, 2009. ICET 2009. International Conference on

Date 19-20 Oct. 2009

Filter Results

Displaying Results 1 - 25 of 106
  • [Front cover]

    Publication Year: 2009, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (436 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (90 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (86 KB)
    Freely Available from IEEE
  • Foreword

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (83 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (58 KB)
    Freely Available from IEEE
  • Technical Program Committee

    Publication Year: 2009, Page(s):v - vi
    Request permission for commercial reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2009, Page(s): vii
    Request permission for commercial reuse | PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • Keynote speech: Research impact: A labyrinth of wrong myths

    Publication Year: 2009, Page(s): viii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (39 KB)

    The talk will focus on defining "quality research" from a CS/EE perspective. The speaker will first highlight the wrong myths circulating about "quality research". The emphasis will be on doing research that can bring change in the technology of the lives of people. In order to substantiate the case, the speaker will discuss two research projects as case studies: (1) Remote Patient Monitoring with... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Invited speeches: The language factor in ICT education: A case from rural Pakistan

    Publication Year: 2009, Page(s): ix
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (115 KB)

    ICTs have an immense potential to contribute to socio-economic development of Pakistan. ICT Education is a necessary pre-requisite, to enable Pakistanis to use ICTs to access online content and to generate it. However, 91% schools of Pakistan are not English medium, and only 10% of Pakistanis are English literate. In the context ICT education and use can only be effective in local languages. The c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New innovations in healthcare delivery and laparoscopic surgery in Pakistan

    Publication Year: 2009, Page(s): x
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (89 KB)

    Summary form only given. Pakistan is a densely populated country with major rural urban disparity in healthcare delivery. Use of Information Technology to improve the efficiency of existing healthcare services of Pakistan in the form of Telemedicine has proved its role beyond any doubts. Its advantages include better utilization of healthcare resources, early intervention, provision of expert advi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Table of contents

    Publication Year: 2009, Page(s):xi - xx
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • [Blank page]

    Publication Year: 2009, Page(s): xxi
    Request permission for commercial reuse | PDF file iconPDF (17 KB)
    Freely Available from IEEE
  • Identification of syntactic ambiguities in Pashto text

    Publication Year: 2009, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (194 KB) | HTML iconHTML

    Natural languages are inherently ambiguous. For a machine translation system, it is an essential task to resolve the ambiguities in the source language. Before resolution of ambiguities, their identification is an essential task. This research paper is about the classification and identification of syntactic ambiguities in Pashto text. Here, the identification is based on the parse trees build by ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lexical functional grammar for Urdu modal verbs

    Publication Year: 2009, Page(s):7 - 12
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    Lexical Functional Grammar (LFG) is developed to understand the syntactic and semantic structure of Urdu modal verbs from a corpus. The most popular tool XLE for parsing is used to implement LFG and analyze the results. Published literature of modal verbs in Urdu is very much short and limited in nature; however, modal verbs in Urdu are identified and collected from Urdu literature and English lit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Solving NP-complete problem using ACO algorithm

    Publication Year: 2009, Page(s):13 - 16
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB) | HTML iconHTML

    Recent studies have shown that Evolutionary Algorithms have had reasonable success at providing solutions to those problems that fall in NP-Complete class of algorithms. Ant Colony Optimization (ACO) algorithm is one of the promising field of evolutionary algorithms that gave acceptable solutions to Travelling Salesperson Problem and various Network Routing Optimization problems in polynomial time... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hash table based feed forward neural networks: A scalable approach towards think aloud imitation

    Publication Year: 2009, Page(s):17 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB) | HTML iconHTML

    In this paper, we deal with the problem of inefficient context modules of recurrent networks (RNs), which form the basis of think aloud: a strategy for imitation. Learning from observation provides a fine way for knowledge acquisition of demonstrated task. In order to learn complex tasks then simply learning action sequences, strategy of think aloud imitation learning applies recurrent network mod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Selecting predicate logic for knowledge representation by comparative study of knowledge representation schemes

    Publication Year: 2009, Page(s):23 - 28
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (226 KB) | HTML iconHTML

    In artificial intelligence, knowledge representation is a combination of data structures and interpretive procedures that leads to knowledgeable behavior. Therefore, it is required to investigate such knowledge representation technique in which knowledge can be easily and efficiently represented in computer. This research paper compares various knowledge representation techniques and proves that p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Relational WordNet model for semantic search in Holy Quran

    Publication Year: 2009, Page(s):29 - 34
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB) | HTML iconHTML

    The Holy Quran, due to its unique style and allegorical nature, needs special attention about searching and information retrieval issues. The legacy keyword searching techniques are incapable of retrieving semantically relevant verses. In this paper, we address the deficiencies of key word based searching and the issues related to semantic search in the Holy Quran, and propose a model that is capa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Face detection using 2D-Discrete Cosine Transform and Back Propagation Neural Network

    Publication Year: 2009, Page(s):35 - 39
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB) | HTML iconHTML

    Human brain can detect faces from the images constructed in their eyes. The face detection is a computerize method of locating the face in the digital image. It is an important challenge to locate faces from uncontrolled and indistinguishable background of the digital image. This paper presents human face detection from the colored images. Skin color segmentation is used for localizations of skin ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A realistic view of 3D models of artifacts using photogrammetric approach

    Publication Year: 2009, Page(s):40 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB) | HTML iconHTML

    Active research has been going on in both computer vision and computer graphics to have more accurate and more realistic 3D models of an object. Efforts are being made to have a realistic view of an object by texturing it with real images of the object, to have a feel as if it is a real object. A method has been proposed that also makes use of real orthomages of the object for texturing. A method ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Numeral recognition for Urdu script in unconstrained environment

    Publication Year: 2009, Page(s):44 - 47
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB) | HTML iconHTML

    Online character recognition of Urdu script based languages is one of the most difficult task due to cursive in nature. Urdu script based languages has not received much attestation even this script is used 1/6th of the population. The complexities in the script makes more complicated the recognition process. The problem in handwritten numeral recognition is the shape similarity between... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Host based intrusion detection using RBF neural networks

    Publication Year: 2009, Page(s):48 - 51
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (219 KB) | HTML iconHTML

    A novel approach of host based intrusion detection is suggested in this paper that uses Radial basis Functions Neural Networks as profile containers. The system works by using system calls made by privileged UNIX processes and trains the neural network on its basis. An algorithm is proposed that prioritize the speed and efficiency of the training phase and also limits the false alarm rate. In the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Finding a hybrid genetic algorithm-constraint satisfaction problem based solution for resource constrained project scheduling

    Publication Year: 2009, Page(s):52 - 56
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (804 KB) | HTML iconHTML

    Project scheduling has attracted many researchers in recent years. It is about single-item or small batch production where scarce resources have to be met when scheduling dependent activities over time. Because of high complexity of the problem uninformed search strategies cannot solve the problem optimally. This paper proposes a new evolutionary approach to resource constrained project scheduling... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of indexing techniques in Data warehousing

    Publication Year: 2009, Page(s):57 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1174 KB) | HTML iconHTML

    The explosive growth of information in recent years has brought up a new question/challenge of disseminating information from a huge plethora of data. This has led to an upscale development of interest in Data warehousing. Different indexing techniques have been developed which are being used for fast data retrieval in Data warehouse environment, but it is quite difficult to find an appropriate te... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model based approach for time-varying channel estimation in DS-CDMA systems using non-isotropic scattering environment

    Publication Year: 2009, Page(s):62 - 65
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (118 KB) | HTML iconHTML

    This paper deals with the estimation of rapidly time varying non isotropic Rayleigh fading channels in synchronous direct sequence spread spectrum (DS-CDMA) systems. The effects of non isotropic scattering can be captured by using Von Mises distribution for the angle of arrival (AOA) of the scattered waves at the receiver. Kalman Filter based on higher order autoregressive (AR) model is used for t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.