2016 International Conference on Open Source Systems & Technologies (ICOSST)

15-17 Dec. 2016

Filter Results

Displaying Results 1 - 25 of 35
  • [Front and back cover & spine art]

    Publication Year: 2016, Page(s):1 - 3
    Request permission for commercial reuse | |PDF file iconPDF (1324 KB)
    Freely Available from IEEE
  • [Front matter]

    Publication Year: 2016, Page(s):1 - 2
    Request permission for commercial reuse | |PDF file iconPDF (71 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | |PDF file iconPDF (62 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2016, Page(s):[i] - [2]
    Request permission for commercial reuse | |PDF file iconPDF (57 KB)
    Freely Available from IEEE
  • Organizing committees

    Publication Year: 2016, Page(s):1 - 3
    Request permission for commercial reuse | |PDF file iconPDF (68 KB)
    Freely Available from IEEE
  • Reviewers: Technical committee

    Publication Year: 2016, Page(s):[ii] - [x]
    Request permission for commercial reuse | |PDF file iconPDF (187 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2016, Page(s):[xiv] - [xv]
    Request permission for commercial reuse | |PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2016, Page(s):164 - 166
    Request permission for commercial reuse | |PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • Calibration of flux gate compass for underwater applications

    Publication Year: 2016, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (573 KB) | HTML iconHTML

    Ring core flux gate compass is cheap and reliable solution for measurement of magnetic north of movable platforms. It finds its applications in variety of underwater applications. Prior to its use, the compass needs to be calibrated in a nonmagnetic environment which is prone to errors due to environmental conditions such as test location and on board components. The paper discusses the quick and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Safe regression test suite optimization: A review

    Publication Year: 2016, Page(s):7 - 12
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (281 KB) | HTML iconHTML

    Systems are frequently regression tested for frequently occurring changes due to corrective, preventive, adaptive or perfective actions. Regression testing is used to prevent the undesired effect of these changes on the previously tested version. Due to these changes, new test cases become part of the test suite making it huge and inefficient for `retest all' strategy. The ultimate solution of thi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless communication a sustainable solution for future smart grid networks

    Publication Year: 2016, Page(s):13 - 17
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (774 KB) | HTML iconHTML

    In recent years there have been an enduring argument regarding the mobilization of finest sustainable and economically feasible smart grid communication technology. One of the most suitable structure of communication technology for the future smart grid networks is Wireless Communication Technology (WCT). WCT networks can be conveniently commissioned with truncated capital and operational expendit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal verification of energy consumption for an EEG monitoring wireless body area sensor network

    Publication Year: 2016, Page(s):18 - 22
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (374 KB) | HTML iconHTML

    Wireless Body Area Sensor Networks (BASNs) are increasingly gaining notable attention in the domain of real-time and non-invasive human health care due to their cost-effectiveness. Minimizing their energy consumption under given data delay and distortion constraints is considered to be the most critical design factor for BASNs and specialized algorithms are developed for finding optimal parameters... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparative analysis of motion planning techniques for autonomous mobile robots

    Publication Year: 2016, Page(s):23 - 28
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (409 KB) | HTML iconHTML

    This paper presents a comparative analysis of different Motion Planning (MP) techniques currently popular for Autonomous Mobile Robot (AMR) applications. The discussion separates the techniques into two major categories: Classic and Heuristic. The techniques are assessed on the basis of their efficiency and effectiveness under varying constraints such as static, dynamically changing environments a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predicting bug inducing source code change patterns

    Publication Year: 2016, Page(s):29 - 35
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (494 KB) | HTML iconHTML

    A change in source code without the prior analysis of its impact may generate one or more defects. Fixing of such defects consumes maintenance time which ultimately increases the cost of software maintenance. Therefore, in the recent years, several research works have been done to develop techniques for the automatic impact analysis of changes in source code. In this paper, we propose to use Frequ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulation based performance evaluation of TCP variants along with UDP flow analysis of throughput with respect to delay, buffer size and time

    Publication Year: 2016, Page(s):36 - 41
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (435 KB) | HTML iconHTML

    In a data communication network, several flows contend to utilize limited and shared network resources, however, this gives rise to congestion along with other network issues. So, this leads to the development of congestion control based methods/ protocols to support the deployment of real-time multimedia applications while ensuring reliability and fairness. This paper presents a simulation based ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Novel Mania: A semantic search engine for Urdu

    Publication Year: 2016, Page(s):42 - 47
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (566 KB) | HTML iconHTML

    With the increasing trend of reading Urdu e-novels, the retrieval of specific information regarding a particular novel is also important. This paper presents a new semantic search engine for Urdu novels named Novel Mania. The search engine is primarily composed of three layers namely ontology modeling, information retrieval and dynamic ontology updations. The ontology modeling is primarily respons... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An unsigned autocorrelation based blind spectrum sensing approach for cognitive radio

    Publication Year: 2016, Page(s):48 - 53
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (394 KB) | HTML iconHTML

    A large part of unoccupied licensed spectrum can be vital for many applications and can be accessed opportunistically by Cognitive Radio. Cognitive Radio serves to be a framework for forthcoming 5G communication systems and therefore, extensive research is being carried out in its different domains. The task of sensing spectrum should be efficient and reliable to avoid interference between license... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure AES OFDM with channel reciprocity exploitation through relative calibration

    Publication Year: 2016, Page(s):54 - 61
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (939 KB) | HTML iconHTML

    Now-a-days, secure communication is a significant characteristic that should be proficient to accommodate increasing demand of wireless communication. The fundamental principle of secure communication is the extraction of secret key and keeping this secret. In this paper, we propose innovative approach for secret key extraction and reconciliation. We exploit channel reciprocity through relative ca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real time recognition of human faces

    Publication Year: 2016, Page(s):62 - 65
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (436 KB)

    A simple yet efficient face detection and recognition system is proposed in this paper which has the capability to recognize human faces in single as well as multiple face images in a database in real time. Preprocessing of the proposed frame work includes noise removal and hole filling in color images. After preprocessing, face detection is performed by using viola jones algorithm. Detected faces... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formalizing structural semantics of UML 2.5 activity diagram in Z Notation

    Publication Year: 2016, Page(s):66 - 71
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (207 KB) | HTML iconHTML

    UML 2.5 Activity Diagram, being the latest version released in 2015, faces some serious problems inherent in UML itself. UML diagrams lack precise mathematical semantics which leads to ambiguities in its interpretation. Therefore, UML cannot be executed by model checkers for the presence of errors and inconsistencies. Z Notation is a widely used Formal Method, which offers robust notations for spe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deep belief networks for iris recognition based on contour detection

    Publication Year: 2016, Page(s):72 - 77
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (565 KB) | HTML iconHTML

    Iris recognition has proved to be one of the most reliable and stable biometric for human identification. This paper outlines an iris recognition approach based on deep learning. In addition, contour based feature vector has been used to discriminate samples belonging to different classes i.e. difference of sclera-iris and iris-pupil contours, and is named as “Unique Signature”. More... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An ensemble classification approach for automated diagnosis of Alzheimer's disease and mild cognitive impairment

    Publication Year: 2016, Page(s):78 - 83
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (270 KB) | HTML iconHTML

    Effective and robust detection of Alzheimer disease (AD) and mild cognitive impairment (MCI), which is a prodromal stage of AD, has attracted a lot of attention in the recent years. So far, multiple feature types such as hippocampal volume and shape, voxel based morphometry, and cortical thickness based features extracted from structural magnetic resonance imaging (MRI) have been proved to be effe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integration of smart parking in distributed ITS architecture

    Publication Year: 2016, Page(s):84 - 88
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (430 KB) | HTML iconHTML

    In this paper, a new architecture has been proposed to enable distributed sensing in intelligent transportation system (ITS) and to facilitate the transition of legacy systems by the use of gateways (GW) which provide the existing systems with their native interface while also implementing the new functions for local communication and intelligence. The prompt detection of smart parking events are ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the power allocation of non-orthogonal multiple access for 5G wireless networks

    Publication Year: 2016, Page(s):89 - 94
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (688 KB) | HTML iconHTML

    This paper addresses the power allocation issue in non-orthogonal multiple access (NOMA) systems. In NOMA, multiple paired users can simultaneously utilize the frequency bands of each other such that the message signals of all these users are superimposed by the transmitter by allocating different powers to all users. As the paired users communicate over the same frequency band, high amount of int... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient intrusion detection scheme for cluster based AMI networks

    Publication Year: 2016, Page(s):95 - 101
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (566 KB) | HTML iconHTML

    Advanced Metering Infrastructure; it is an imperative component of the smart grid and a responsible ingredient to collecting, measuring and analyzing energy usage data which is transmitted to concentrator and control centre on utility side. The security of advanced metering infrastructure is one of the most concerning issue in smart grid implementation. Advanced Metering Infrastructure exhibits di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.