2017 International Conference on Frontiers of Information Technology (FIT)

18-20 Dec. 2017

Filter Results

Displaying Results 1 - 25 of 71
  • [Title page i]

    Publication Year: 2017, Page(s): 1
    Request permission for commercial reuse | |PDF file iconPDF (99 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2017, Page(s): 2
    Request permission for commercial reuse | |PDF file iconPDF (135 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2017, Page(s): 3
    Request permission for commercial reuse | |PDF file iconPDF (116 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2017, Page(s):4 - 11
    Request permission for commercial reuse | |PDF file iconPDF (18 KB)
    Freely Available from IEEE
  • Foreword

    Publication Year: 2017, Page(s):12 - 13
    Request permission for commercial reuse | |PDF file iconPDF (98 KB)
    Freely Available from IEEE
  • Conference Organizers

    Publication Year: 2017, Page(s):14 - 15
    Request permission for commercial reuse | |PDF file iconPDF (93 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2017, Page(s):16 - 21
    Request permission for commercial reuse | |PDF file iconPDF (102 KB)
    Freely Available from IEEE
  • Performance Evaluation of CoDel Queue Mechanism and TFRC Transport Protocol when Using VoIP Flows

    Publication Year: 2017, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (799 KB)

    There is an increasing demand for delivering real-time interactive voice traffic with Quality of Experience (QoE) requirements over a best-effort IP network. Therefore, the use of either TCP or UDP has become problematic since TCP is not well suited for interactive traffic and UDP is unresponsive to congestion. As a result a number of Congestion Control Mechanism (CCM) have been proposed with emph... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Analysis of PID and State-Feedback Controller on the Depth Control of a Robotic Fish

    Publication Year: 2017, Page(s):7 - 11
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (480 KB)

    This paper presents time-domain performance analysis of a proportional integral derivative (PID) and a statefeedback control algorithm on a robotic fish plant. The nonlinear dynamics of the depth of the robotic fish are linearized and approximated as an integrating process with dead-time. The simulated results of robotic fish are then compared with the actual hardware of the robotic fish with vari... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling and Simulation of Resource constrained Vaccination Strategies and Epidemic Outbreaks

    Publication Year: 2017, Page(s):12 - 17
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (647 KB) | HTML iconHTML

    Pandemic occur and lead to extensive morbidity and mortality worldwide. Agent-based models are increasingly being used to model and predict the spread of epidemic. As long as there is life there will be fight for infectious diseases and will never cease. The work is aimed to provide a deep analysis of the way the virus propagates in the population. We have explored the impact of different vaccinat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User Association Techniques in Future Heterogeneous Networks

    Publication Year: 2017, Page(s):18 - 22
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (161 KB) | HTML iconHTML

    The exponential increase in the demand of data rate and scarcity of the available spectrum have evolved to the more advanced network topology which efficiently utilizes the radio spectrum such as Heterogeneous Networks (HetNets). HetNets consist of many tiers of base stations, having different transmit powers. The macro base stations transmit at high power level whereas pico and femto base station... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-feature Enterprise Traffic Characterization in OpenFlow-based Software Defined Networks

    Publication Year: 2017, Page(s):23 - 28
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (344 KB)

    Software defined networking (SDN) decouples the data forwarding plane from control logic, enabling real-time traffic engineering, difficult to realize in conventional networking. The prominent southbound OpenFlow protocol used in SDN environments provides an intuitive means for traffic monitoring. Limited statistical information based on generic OpenFlow flow measurements however, fails to represe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bluetooth Low Energy based Communication Framework for Intra Vehicle Wireless Sensor Networks

    Publication Year: 2017, Page(s):29 - 34
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (520 KB)

    In modern vehicles Controller Area Network (CAN) bus has significant importance to transfer data from sensors to Engine Control Unit (ECU) by employing two wire system. CAN bus is very efficient in terms of throughput and reliability but it requires very careful sensor deployment and wiring. In this paper, we propose low cost and energy efficient communication between sensor nodes and ECU using Bl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Physical Layer Security of Two Way Energy Harvesting Relays

    Publication Year: 2017, Page(s):35 - 40
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (223 KB)

    Energy harvesting relays are gathering significant research interest due to their applications in large-scale networks. This work focuses on the performance evaluation of two-way decode-and-forward (DF) relay with energy harvesting capability. More specifically, using relay activation threshold as power constraint, we determine the performance of two-way DF relay. The aggregated received power at ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Creating Domain Non-functional Requirements Software Product Line Engineering Using Model Transformations

    Publication Year: 2017, Page(s):41 - 45
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (255 KB)

    Requirement Engineering (RE) process during product development produces core artifacts to be analyzed during domain analysis phase of Software Product Line Engineering (SPLE). The product RE process can be a Software Requirement Specification (SRS) document, use case models or other artifacts containing both functional and nonfunctional requirements of the product. The analysis of these artifacts... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling of Sewerage System Using Internet of Things for Smart City

    Publication Year: 2017, Page(s):46 - 51
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (364 KB)

    Now a days, modeling and developing smart places is an open research problem. The concept of smart city can be observed in every field of life including smart parking, banking, sewerage, waste management, smart transport, environmental monitoring and healthcare centers. Internet of things (IoT) is an implementation of smart nodes that sense the data, interpret, process and give response within a r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fault Based Approach to Test Case Prioritization

    Publication Year: 2017, Page(s):52 - 57
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (247 KB)

    Regression testing is performed to ensure that the no new faults have been introduced in the software after modification and the software continues to work correctly. Regression testing is an expensive process because the test suite might be too large to execute in full. Thus to reduce the cost of such testing, regression testing techniques are used. One such technique is test case prioritization.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of Team Expertise in Software Development Organizations

    Publication Year: 2017, Page(s):58 - 63
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (325 KB)

    Good skills and expertise of employees in an organization are the key factors for producing the quality products and completing projects successfully. Keeping the skills and knowledge of employees updated is one of the toughest and challenging tasks of the project management process. In developing countries like Pakistan, this task becomes more challenging due to lack of training and skill buildin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation and Analysis of Novel Clustering Algorithm Without Initial Value Selection for Software Architectural Styles Data Set

    Publication Year: 2017, Page(s):64 - 69
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (536 KB)

    Data clustering algorithms such as K-Mean clustering works on initial point selection. According to the literature review, the performance of K-Mean clustering algorithm is not much better because K-Mean performs data clustering based on initial value selection from the data to be clustered. Similarly Fuzzy C-Means and agglomerative clustering also has low performance and are sensitive to noise an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic Topic Modeling for Single Document Short Texts

    Publication Year: 2017, Page(s):70 - 75
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (553 KB)

    This paper presents a novel approach to automate the process of extracting topic and main title from a single-document short text. The proposed approach uses online text mining and Natural Language Processing techniques. The title of any text provides an efficient way to concisely grasp the overview of the contents in the text by giving a glance on its main heading only, which is quicker than read... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GPS based Public Transport Arrival Time Prediction

    Publication Year: 2017, Page(s):76 - 81
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1191 KB)

    Users of public transport, in developing countries, face a lot of problems such as long waits on bus stops and often no bus arrival after a long wait. One of the novel solutions to the problem is to display the expected arrival times of the buses on respective bus stops. Many prediction systems have been developed based on different techniques.This paper presents a public transport arrival time pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resolving Class Imbalance and Feature Selection in Customer Churn Dataset

    Publication Year: 2017, Page(s):82 - 86
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (133 KB) | HTML iconHTML

    Churn prediction datasets pertaining to telecom sector often have the class imbalance problem. Due to large number of features, dimensionality reduction (or feature selection) and dataset balancing become important data preprocessing steps. This research utilizes a real dataset to classify defecting customers in the telecom sector. Three different feature selection and dataset balancing techniques... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ligature Analysis-based Urdu OCR Framework

    Publication Year: 2017, Page(s):87 - 92
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (302 KB)

    Urdu script belongs to Arabic script which is cursive in nature, written right to left with each word formation from top-right to bottom-left, along complex placement of diacritics. Characters are joined together to make ligature and combination of ligatures make words. In this paper, Nataleeq Urdu OCR framework is proposed consisting of three steps. These steps are normalization and segmentation,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Classification of Urdu Ligatures Using Convolutional Neural Networks - A Novel Approach

    Publication Year: 2017, Page(s):93 - 97
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (151 KB)

    Urdu Nasteleeq text recognition is one of the very challenging problems in document image processing. The cursive nature of Urdu script makes character segmentation very difficult. Therefore, most of the researchers have shifted the focus on segmentation free approaches based on Urdu ligatures. In most cases, these ligatures are characterized using complicated and extensive feature extraction tech... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Human, Object and Scene Centric Image Retrieval Engine to Enhance Image Management

    Publication Year: 2017, Page(s):98 - 103
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1823 KB)

    Image data available on internet and in personal computers is colossal. There is a need of a search engine that can effectively meet the retrieval demands of user. Most of the systems available consider low level features for retrieval without taking input from user. To handle this problem, we propose a search engine that can retrieve images from database based on specific request from user. We pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.