19-21 Dec. 2016
Filter Results
-
[Front cover]
Publication Year: 2016, Page(s): c1|
PDF (11645 KB)
-
[Title page i]
Publication Year: 2016, Page(s): i|
PDF (29 KB)
-
[Title page iii]
Publication Year: 2016, Page(s): iii|
PDF (72 KB)
-
[Copyright notice]
Publication Year: 2016, Page(s): iv|
PDF (128 KB)
-
Table of contents
Publication Year: 2016, Page(s):v - xi|
PDF (143 KB)
-
-
Conference Organization
Publication Year: 2016, Page(s):xiv - xvi|
PDF (142 KB)
-
Reviewers
Publication Year: 2016, Page(s):xvii - xxii|
PDF (161 KB)
-
Beyond Linear Control Approaches - Sliding Mode Control of Flexible Robotic Manipulator
Publication Year: 2016, Page(s):1 - 6
Cited by: Papers (3)Flexibility in robotic manipulators offers various benefits in terms of operational speed, power consumption, maneuverability, and weight. However, these advantages lead to complex controller design. This paper presents two laws, nonlinear sliding mode control (SMC) and linear quadratic regulator (LQR) for addressing the control problem of flexible joint manipulator. The aim is to accurately track... View full abstract»
-
Adaptive 3D-Virtual Learning Environments: From Students' Learning Perspective
Publication Year: 2016, Page(s):7 - 10Adaptive 3D-Virtual Learning Environments (3D-VLEs) have the ability to dynamically change its contents according to the learning goals of each student which result in improved learning. This paper presents a new idea of horizontal transition inside adaptive 3D-VLEs. Using the proposed approach, same teaching concept is presented with more examples and learning material which help students underst... View full abstract»
-
Optimal Controller Design for Self-Balancing Two-Wheeled Robot System
Publication Year: 2016, Page(s):11 - 16
Cited by: Papers (2)In this paper an optimal controller is designed for a self-balancing two-wheeled robot system based on the robust Model Predictive Control (MPC) scheme. The MPC controller computes the trajectory of the manipulated variable in order to optimize the behavior of the system future output. A limited time window is used for the optimization described by the length of time and initial time. By minimizin... View full abstract»
-
Coverage Control Algorithm for Node Scheduling in Wireless Sensor Networks
Publication Year: 2016, Page(s):17 - 22A large number of wireless sensor nodes (SNs) are usually deployed in a remote area, where these nodes accurately monitor the environment and communicate the data collected by the SNs, to a central processing station wirelessly. Since the SNs are powered by batteries, therefore, to prolong the network operating life, they must utilize energy efficiently. In this paper, we propose a method to contr... View full abstract»
-
Where to Kill the Cyber Kill-Chain: An Ontology-Driven Framework for IoT Security Analytics
Publication Year: 2016, Page(s):23 - 28
Cited by: Papers (2)In this paper we propose an ontology-based framework for the Internet of Things (IoT) to safeguard against Advanced Persistent Threats (APTs). The framework grasps the understanding of attack kill-chain, leveraged attack patterns and vulnerabilities and aligns them with network semantics to gauge their applicability on IoT systems. Followed by that, it automatically infers efficient solutions for ... View full abstract»
-
Architectural Enhancement of LEON3 Processor for Real Time and Feedback Applications
Publication Year: 2016, Page(s):29 - 34The trade-off between performance and power consumptionfor dynamic and complex applications is inevitable andis considered as a key design challenge for system architects. Performance statistics for hard real time systems must be readilyavailable for a feedback system, specifically for reconfigurablearchitectures. The feedback in terms of performance statisticscan be useful for run-time reconfigur... View full abstract»
-
ANN-Based Data Mining for Better Resource Management in the Next Generation Wireless Networks
Publication Year: 2016, Page(s):35 - 39The recent years have witnessed a sharp increase in the use of smart phones for internet applications, video calling, social networking and emails, etc. resulting in an unprecedented increase in the worldwide wireless network traffic. During the deployment of the wireless network topologies the prime focus has to be given towards the requirement for the bandwidth, user capacities and provision of ... View full abstract»
-
Cloud to Cloudlet - An Intelligent Recommendation System for Efficient Resources Management: Mobile Cache
Publication Year: 2016, Page(s):40 - 45
Cited by: Papers (1)Mobile devices are gaining impact in last few years due to their versatility of platform to run various types of applications. Over the years, the storage of mobile devices is increased but still it cannot fulfill all users requirements. Most of the times, users faced limited memory issues on mobile devices, therefore to free up space users often delete files abruptly without considering the usage... View full abstract»
-
Teaching and Learning Object-Oriented Analysis and Design with 3D Game
Publication Year: 2016, Page(s):46 - 51
Cited by: Papers (1)Game based-learning methods are largely adopted in many academic fields. The multi-dimensional virtual reality based learning games help the learners to understand the problem dynamics effectively and to construct optimal solutions for them. This shows that games help learners in problem solving and enhancing their performance. Still the implementation of game-based learning is new to software eng... View full abstract»
-
Regression Test Suite Optimization Using Adaptive Neuro Fuzzy Inference System
Publication Year: 2016, Page(s):52 - 56Regression testing is an important activity performed to ensure thatchanges in the baseline version of the system do not influence thealready tested part of the system. It becomes difficult to run the entiretest suite due to constrained or limited resources. A subset of test casesthat is as efficient as the original test suite is searched as optimal suite.Computational intelligence approaches has ... View full abstract»
-
On Test Patterns for Cloud Applications
Publication Year: 2016, Page(s):57 - 62Software testing is an important aspect for the quality of software. Different levels of experience, types of application and needs enforce differences in performing testing activity for same features of applications. Testing as an activity within a development house usually includes testing of recurrent situation e.g., testing of security features etc. Development of a homogeneous test ground req... View full abstract»
-
Internet Addiction Impacts on Time Management That Results in Poor Academic Performance
Publication Year: 2016, Page(s):63 - 68
Cited by: Papers (2)Internet addiction also called as "internet dependency" is a disorder related to excessive or poorly controlled preoccupations regarding computer use and internet access. Although the advantages of internet are undeniable, however, from the pathological perspective its excessive usage is creating disturbances not only in family and relationships but also in health, academics and memory recall in u... View full abstract»
-
Admission Criteria in Pakistani Universities: A Case Study
Publication Year: 2016, Page(s):69 - 74Since the performance of educational institutions depends critically on their students, it is imperative that educational institutions deploy an efficient and reliable admission criteria. In the context of Pakistan, a variety of admission criteria has been developed-mostly in isolation-by different universities. Despite the importance of these admission criteria, limited systematic information exi... View full abstract»
-
Poshida II, a Multi Group Distributed Peer to Peer Protocol for Private Web Search
Publication Year: 2016, Page(s):75 - 80Web Search Engines allow the user to retrieve data from the Internet using search query. WSEs maintain search query log to improve the result quality by retrieving personalized search result. WSE are known to sell query log related data to the marketing organizations for boosting revenues, which poses a threat to user privacy. Private web search is a concept in which the user gets data from the In... View full abstract»
-
Evolving the Taxonomy Based on Hierarchical Clustering Approach
Publication Year: 2016, Page(s):81 - 86Taxonomy is an effective mean of organizing, managing and accessing large amount of information available in today's digital world. However, data changes frequently in today's digitally connected world. Taxonomy needs to be evolved when underlying data set changes, otherwise, it could not represent the changed data set accurately. Many automatic techniques are available that are generating taxonom... View full abstract»
-
Comparative Study of Discretization Methods on the Performance of Associative Classifiers
Publication Year: 2016, Page(s):87 - 92In this article we investigate the effect of discretization Methods on the Performance of Associative Classifiers. Most of the classification approaches work on the dicretized databases. There are various approaches exploited for the discretizion of the database to compare the performance of the classifiers. The selection of the discretization method greatly influences the classification performan... View full abstract»
-
Coin Recognition with Reduced Feature Set SIFT Algorithm Using Neural Network
Publication Year: 2016, Page(s):93 - 98
Cited by: Papers (1)Coin recognition is one of the prime important activities for modern banking and currency processing systems. These systems are widely used for coin sorting, automatic counting, and vending machines. The technique at the heart of such systems is object recognition in a digital image. Object classification and recognition is still one of the challenging research areas because we put our cognitive c... View full abstract»