By Topic

Open Source Systems and Technologies (ICOSST), 2012 International Conference on

Date 20-22 Dec. 2012

Filter Results

Displaying Results 1 - 25 of 26
  • [Front matter]

    Publication Year: 2012 , Page(s): 1 - 3
    Save to Project icon | Request Permissions | PDF file iconPDF (610 KB)  
    Freely Available from IEEE
  • [Front matter]

    Publication Year: 2012 , Page(s): 1 - 3
    Save to Project icon | Request Permissions | PDF file iconPDF (123 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (132 KB)  
    Freely Available from IEEE
  • Preface

    Publication Year: 2012 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (125 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Organizing committees

    Publication Year: 2012 , Page(s): ii - iii
    Save to Project icon | Request Permissions | PDF file iconPDF (136 KB)  
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2012 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (190 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012 , Page(s): 1 - 2
    Save to Project icon | Request Permissions | PDF file iconPDF (453 KB)  
    Freely Available from IEEE
  • A systematic map of integration of aspect orientation and model-driven engineering

    Publication Year: 2012 , Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (906 KB) |  | HTML iconHTML  

    An integration of aspect orientation and model-driven engineering is expected to enhance software development from many perspectives. Different approaches for this integration have already appeared in literature. In general, all such approaches use aspect-oriented model as the primary artifact and apply different techniques to obtain an executable from it. In this study we have provided a survey o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Can mathematical cognition formulate consciousness?

    Publication Year: 2012 , Page(s): 7 - 11
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (642 KB) |  | HTML iconHTML  

    Mind is a compound information handling and processing mechanism and consciousness - (the processed information) is the core component of mind. The spirit of consciousness is definite correspondence between substance with some rules or laws. Information processed in the mind approaching from both the outer world (physical world) and the inner world (mind). The information can be represented in man... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transition between flow charts and Jackson Structured Program (JSP)

    Publication Year: 2012 , Page(s): 12 - 15
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (541 KB) |  | HTML iconHTML  

    This paper aims to bridge the gap between two widely used methods of screening program flow, and enhancing interoperability between Jackson Structured Programming (JSP) diagrams and flow charts. Both the techniques are commonly practiced and are used to define the program flow for easy understanding and development. This conversion will facilitate software engineers/architects during designing pha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Open source algorithm for storage area and temporally optimized run length coding for image compression technology used in biomedical imaging

    Publication Year: 2012 , Page(s): 16 - 21
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1618 KB) |  | HTML iconHTML  

    The objective of this paper is to prove the significance of the optimized run length coding algorithm for biomedical imaging technology and open source the idea behind the optimized algorithm in a comprehensive way. An optimized scheme for entropy encoding part of JPEG image compression by modifying the run length encoding method has been provided by the authors for a Space Research Program at Ins... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Low-cost Machine Vision System for dimension measurement of fast moving conveyor products

    Publication Year: 2012 , Page(s): 22 - 27
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1244 KB) |  | HTML iconHTML  

    Product manufacturing industries growth and efficiency greatly depends upon the quality of end product. Hence, it is necessary to inspect each and every object for its quality during manufacturing process. Machine Vision system can be implies here for indispensable advantages. Commercial Vision systems available in market are very expensive. Industries especially in third world countries like Paki... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multi-Agent system for documents classification

    Publication Year: 2012 , Page(s): 28 - 32
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (759 KB) |  | HTML iconHTML  

    Text classification is one of the important areas in data mining. Most of the Current text classification techniques concentrated on centralized/hierarchical approach. Due to the limited computing resources, these approaches could not classify large amount of data. The hierarchical approaches are also less robust and vulnerable due to system failure. We present a distributed documents classificati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Runtime analysis of application binaries for function level parallelism potential using QEMU

    Publication Year: 2012 , Page(s): 33 - 39
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (885 KB) |  | HTML iconHTML  

    Efficacy of automatic parallelization techniques that rely on source code analysis alone is often limited due to lack of information about runtime characteristics of target applications. In order to exploit runtime application behavior for its parallelization, we need: (1) tools/techniques for dynamic instrumentation and profiling; and (2) a methodology to identify areas of application that are am... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optical fiber switches

    Publication Year: 2012 , Page(s): 40 - 45
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (672 KB) |  | HTML iconHTML  

    The switching speed of electronics can never match the transmission capacity offered by the optics. This paper basically describes some basic kinds of optical switches. Behaviour of different optical switches i.e. OEO (Optical-Electrical-Optical) and OOO (Optical-Optical-Optical) switches is discussed with reference to open source optical communication. Some basic technologies used for optical swi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal modeling of ATC signals using Z notation

    Publication Year: 2012 , Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (646 KB) |  | HTML iconHTML  

    The light signals play a vital role in the management of traffic systems. They are the key component of traffic control systems, which properly channelize the traffic flow. Therefore, the area of air traffic control (ATC) signals also becomes critical concerning the movement of airplanes because a failure in ATC light signal could cause the loss of human life and financial disasters. The air traff... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of an embedded system for transmitting human ECG and web server for emergency services and remote health monitoring: A low cost ECG signal simulator and its transmitter, to send and store data in electronic databases, in remote location, to be accessed by authorized personnel when needed

    Publication Year: 2012 , Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1134 KB) |  | HTML iconHTML  

    This paper highlights the design of an embedded telemedicine system and web server for remote health monitoring of patients. It enlightens the technique to remotely monitor patient data. We proposed a real time telemedicine system utilizing GSM/GPRS protocol for the third world countries with the help of which, the patients can be monitored from any part of the world by the doctor via the internet... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel mutual authentication protocol for H(e)NB and mobile devices using S8 S-box

    Publication Year: 2012 , Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (740 KB) |  | HTML iconHTML  

    In wireless communication, femtocell is a feasible option to enhance the signal strength. Authentication of the legal user and legitimate femtocell is a serious issue. Many protocols have been proposed for mutual authentication but each has its own pros and cones. In this paper we first investigate the weakness of a previously presented mutual authentication protocol, Rapid Development and Authent... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Classification of localization algorithms for wireless sensor network: A survey

    Publication Year: 2012 , Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (919 KB) |  | HTML iconHTML  

    Localization is an active field of research in wireless sensor networks WSNs. The information of exact physical location of the sensor nodes in WSNs is useful for various application e.g. intrusion detection, target tracking, environmental monitoring and network services etc. In this paper we present the classification and comparative study of localization algorithms. The goal of our consideration... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of Bessel beamformer with LMS algorithm for smart antenna array

    Publication Year: 2012 , Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (620 KB) |  | HTML iconHTML  

    The objective of this paper is to analyze the mathematical model of Bessel beamformer with least mean square (LMS) beamforming algorithm using offset quadrature phase shift keying (OQPSK) which is one of the efficient digital modulation techniques. The desired user is placed at an angle 20 degree and all other users as interfering signals in a Rayleigh fading scenario. The performance is judged in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient capacity improvement technique for multiuser DS-CDMA-based fixed wireless applications

    Publication Year: 2012 , Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (576 KB) |  | HTML iconHTML  

    In Fixed Wireless Applications (FWA), the Direct Sequence Code Division Multiple Access (DS-CDMA) is the most promising candidate for wideband data access. The reason is the high throughput and soft limit on the number of active mobile devices. Soft limit on the network capacity means degradation of the performance by increasing the number of mobile devices. In many Fixed Wireless Applications, it... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ambulatory ECG system for cardiologists

    Publication Year: 2012 , Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1275 KB) |  | HTML iconHTML  

    A low cost ECG machine and research on ECG features with its implementation has been presented in this paper. The features presented can help in classifying the signals. This paper attempts to achieve the same functionality as a traditional ECG machine but based on three leads, hence reducing the size and cost as compared to a 12-lead ECG machine. The live data was obtained on the PC using a sound... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resource efficient and area optimized Gr⊘stl implementation on FPGA

    Publication Year: 2012 , Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (676 KB) |  | HTML iconHTML  

    SHA-3 is the next family of cryptographic hash algorithms. The purpose to develop SHA-3 is to remove the vulnerabilities of SHA-1 and SHA-2. This paper implements Grostl hash algorithm on FPGA, which was among the five finalists of the competition. This work focuses on low area implementation of Grostl for optimum throughput to area ratio (TPA). For this purpose fully autonomous interleaved design... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mutual authentication protocol for LTE based mobile networks

    Publication Year: 2012 , Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (814 KB) |  | HTML iconHTML  

    Femtocells are used to enhance the service coverage inside the office or home, particularly where access is narrow or engaged. Femtocells enhance the service quality that is attractive for the client and the mobile operator. Currently, security of core network from the unauthorized user in public environment is a big issue and there is no integrated solution to verify a rouge femtocell or unauthor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecture based software system cost estimation

    Publication Year: 2012 , Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (623 KB) |  | HTML iconHTML  

    Personal Integrated Process (PIP) is the extended form of Personal Software Process (PSP). Processes for software architecture design and evaluation are integrated in the PIP. The PIP process is supported by a software quality management system. This paper highlights the detail for estimation of cost for software development and process improvement. The software cost can neither be estimated by co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.