A novel, improved and economical approach for a universal voltage source sine-wave inverter is presented in this paper. Existing inverters methodologies with sine-wave output are expensive and sometime go beyond the budget for home application. Common drawbacks associated with existing low cost inverters are square-wave output, bulky size, noisy output voltage and poor efficiency. In addition to that, low cost inverters provide output only with one power distribution standard i.e. 60Hz/110V or 50Hz/220V. Proposed design of a low cost sine-wave inverter facilitates user to select any voltage standard of these two using a single physical unit. This brings novelty and universality in this proposed design. Proposed approach makes use of a micro controller unit (MCU) to generate the pulse-width modulation (PWM) sine-wave in contrast to the conventional sine/triangular PWM approach. The low-cost implementation, least harmonic sine-wave output, availability of two output power standards, and auto-shutdown protection against overloading make proposed methodology an ultimate choice for use in homes and offices as a supplementary way of power.
{"title":"Implementation of a Novel Microcontroller-Based Voltage Source Sine-Wave Inverter","authors":"M. U. Rafique, Saad Aslam, J. Anwer","doi":"10.1109/FIT.2011.38","DOIUrl":"https://doi.org/10.1109/FIT.2011.38","url":null,"abstract":"A novel, improved and economical approach for a universal voltage source sine-wave inverter is presented in this paper. Existing inverters methodologies with sine-wave output are expensive and sometime go beyond the budget for home application. Common drawbacks associated with existing low cost inverters are square-wave output, bulky size, noisy output voltage and poor efficiency. In addition to that, low cost inverters provide output only with one power distribution standard i.e. 60Hz/110V or 50Hz/220V. Proposed design of a low cost sine-wave inverter facilitates user to select any voltage standard of these two using a single physical unit. This brings novelty and universality in this proposed design. Proposed approach makes use of a micro controller unit (MCU) to generate the pulse-width modulation (PWM) sine-wave in contrast to the conventional sine/triangular PWM approach. The low-cost implementation, least harmonic sine-wave output, availability of two output power standards, and auto-shutdown protection against overloading make proposed methodology an ultimate choice for use in homes and offices as a supplementary way of power.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125167041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The purpose of this study is to examine factors that positively influence users to adopt latest banking services which are based on information technology (IT). The study focus on three main banking services, internet banking (IB), phone banking (PB) and ATM because latest statistics show that Pakistani population has rapidly accepted these three services, compared to other IT services provided by banks. The basic constructs of Technology Acceptance Model (TAM) along with other constructs are employed to study the cause of rapid acceptance of these banking technologies. A survey is conducted in twin cities of Islamabad and Rawalpindi by distributing a questionnaire to customers of four different banks. The study shows that the intention to use the service is mainly due to trust in the service provided by banks. Results of this empirical study also reveal that factors affecting customers' intention to use the technology are not same for the three banking technologies.
{"title":"Factors Influencing Adoption of Information Technology Based Banking Services: A Case Study of Pakistan","authors":"Malia Azim, A. Ali, Jahanzeb Sattar","doi":"10.1109/FIT.2011.16","DOIUrl":"https://doi.org/10.1109/FIT.2011.16","url":null,"abstract":"The purpose of this study is to examine factors that positively influence users to adopt latest banking services which are based on information technology (IT). The study focus on three main banking services, internet banking (IB), phone banking (PB) and ATM because latest statistics show that Pakistani population has rapidly accepted these three services, compared to other IT services provided by banks. The basic constructs of Technology Acceptance Model (TAM) along with other constructs are employed to study the cause of rapid acceptance of these banking technologies. A survey is conducted in twin cities of Islamabad and Rawalpindi by distributing a questionnaire to customers of four different banks. The study shows that the intention to use the service is mainly due to trust in the service provided by banks. Results of this empirical study also reveal that factors affecting customers' intention to use the technology are not same for the three banking technologies.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116740788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this study an industrial problem of classification of faulty fuel nozzles is considered and a solution is proposed by analyzing their spray pattern through vision based algorithms. The proposed solution is more reliable, accurate, cheap, and descriptive as compared to the manual techniques which are time consuming and error prone. We capture the dependency of spray patterns on imaging parameters using direction dependent enhancement, adaptive filtering and statistical feature extraction. In this study directional features of spray patterns affected by various disorders are extracted and are then used for classification of different fuel nozzles using Euclidean distance classifier. Moreover nozzle spray patterns are processed for spray angle measurement.
{"title":"Fuel Nozzle Spray Pattern Classifier","authors":"M. Ghafoor, U. I. Bajwa, I. A. Taj","doi":"10.1109/FIT.2011.63","DOIUrl":"https://doi.org/10.1109/FIT.2011.63","url":null,"abstract":"In this study an industrial problem of classification of faulty fuel nozzles is considered and a solution is proposed by analyzing their spray pattern through vision based algorithms. The proposed solution is more reliable, accurate, cheap, and descriptive as compared to the manual techniques which are time consuming and error prone. We capture the dependency of spray patterns on imaging parameters using direction dependent enhancement, adaptive filtering and statistical feature extraction. In this study directional features of spray patterns affected by various disorders are extracted and are then used for classification of different fuel nozzles using Euclidean distance classifier. Moreover nozzle spray patterns are processed for spray angle measurement.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133332745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Disrupted and disconnected networks cannot utilize traditional routing protocols due to long delays and frequent disconnections. It is from the start of this decade that proposition of routing protocols, capable of communicating data in disrupted networks, have been started. These routing protocols either suffer from high data delivery latency or lays undue burden upon the already stressed environment. The paper explains some of the prominent disruption tolerant routing protocols via algorithms and compares their performances with respect to average load laid upon a network in terms of number of bundle copies generated, number of contacts utilized during message delivery, average delivery rate and data delivery latency.
{"title":"Evaluating Contact-Ignorant and History-Based Routing Protocols of Disrupted Mobile Networks","authors":"Mah-Rukh Fida, Tabinda Salam, Ameer Shakayb Arsalaan","doi":"10.1109/FIT.2011.9","DOIUrl":"https://doi.org/10.1109/FIT.2011.9","url":null,"abstract":"Disrupted and disconnected networks cannot utilize traditional routing protocols due to long delays and frequent disconnections. It is from the start of this decade that proposition of routing protocols, capable of communicating data in disrupted networks, have been started. These routing protocols either suffer from high data delivery latency or lays undue burden upon the already stressed environment. The paper explains some of the prominent disruption tolerant routing protocols via algorithms and compares their performances with respect to average load laid upon a network in terms of number of bundle copies generated, number of contacts utilized during message delivery, average delivery rate and data delivery latency.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127433693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. A. Shah, G. A. Safdar, C. Maple, Khurram Sardar
Designing an efficient network to achieve desirable performance is a challenging task and it becomes more demanding if the network to be optimized for performance is already deployed and operational. In this paper, a case study of a campus network which is operational has been considered to enhance the network performance. Campus network of COMSATS Institute of Information Technology Islamabad, Pakistan has been analyzed which provides local and internet connectivity to approximately 1200 nodes, the problems in the existing network has been identified with the aim to enhance network performance without incorporating additional hardware cost. OPNET Modeler 14.5 simulator has been used to first implement the entire network infrastructure and then a new design for CIIT network has been proposed which provides better performance. The simulation results of both the existing and proposed networks have been compared, it could be observed that the proposed design significantly performs better especially in terms of aggregated throughput of Wireless Local Area Network. The proposed network design also outperforms the existing approach in different parameters such as Ethernet delay and WLAN load by approximately 26% and 19% respectively.
{"title":"Network Performance Optimization: A Case Study of Enterprise Network Simulated in OPNET","authors":"M. A. Shah, G. A. Safdar, C. Maple, Khurram Sardar","doi":"10.1109/FIT.2011.18","DOIUrl":"https://doi.org/10.1109/FIT.2011.18","url":null,"abstract":"Designing an efficient network to achieve desirable performance is a challenging task and it becomes more demanding if the network to be optimized for performance is already deployed and operational. In this paper, a case study of a campus network which is operational has been considered to enhance the network performance. Campus network of COMSATS Institute of Information Technology Islamabad, Pakistan has been analyzed which provides local and internet connectivity to approximately 1200 nodes, the problems in the existing network has been identified with the aim to enhance network performance without incorporating additional hardware cost. OPNET Modeler 14.5 simulator has been used to first implement the entire network infrastructure and then a new design for CIIT network has been proposed which provides better performance. The simulation results of both the existing and proposed networks have been compared, it could be observed that the proposed design significantly performs better especially in terms of aggregated throughput of Wireless Local Area Network. The proposed network design also outperforms the existing approach in different parameters such as Ethernet delay and WLAN load by approximately 26% and 19% respectively.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115647809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A new version of numerical solver for simulating two-phase incompressible viscous flows is developed in the present study. The governing equations consists of the Navier-Stokes equations with Boussinesq approximation and surface tension terms acting at the interface coupled with the phase field equation representing the moving interface. The system of equations is cast into a conservative form suitable for the implementation with artificial compressibility method. The resulting hyperbolic system is discretized in space with high order weighted essentially non-oscillatory (WENO) finite difference scheme. The well known dual-time stepping technique is applied for obtaining time accuracy at each physical time step, and the approximate factorization based alternating direction implicit(AF-ADI) algorithm is used to solve the resulting system of equations. Endowing the system with suitable initial and boundary conditions, the performance of the method is analyzed by computing several benchmark two-fluid flow problems with moving interface.
{"title":"Computer-Based Simulation of Multiphase Flow","authors":"A. Shah","doi":"10.1109/FIT.2011.52","DOIUrl":"https://doi.org/10.1109/FIT.2011.52","url":null,"abstract":"A new version of numerical solver for simulating two-phase incompressible viscous flows is developed in the present study. The governing equations consists of the Navier-Stokes equations with Boussinesq approximation and surface tension terms acting at the interface coupled with the phase field equation representing the moving interface. The system of equations is cast into a conservative form suitable for the implementation with artificial compressibility method. The resulting hyperbolic system is discretized in space with high order weighted essentially non-oscillatory (WENO) finite difference scheme. The well known dual-time stepping technique is applied for obtaining time accuracy at each physical time step, and the approximate factorization based alternating direction implicit(AF-ADI) algorithm is used to solve the resulting system of equations. Endowing the system with suitable initial and boundary conditions, the performance of the method is analyzed by computing several benchmark two-fluid flow problems with moving interface.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117108151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Kolodziej, S. Khan, Lizhe Wang, N. Min-Allah, S. Madani, N. Ghani, Hongxiang Li
One of the most important objectives of a wireless network is to facilitate a prediction of users mobility regardless of their point of attachment to the network. In indoor environments the effective users motion prediction system and wireless localization technology play an important role in all aspects of peoples daily lives. In this paper we propose an activity-based continuous-time Markov model to define and predict the human movement patterns. This model is a simple extension of an Activity based Mobility Prediction algorithm using Markov modeling (AMPuMM) technique. Both models are experimentally evaluated in realistic small university campus scenario. The obtained results show us the high efficiency of the jump methodology in the prediction of the students activities in the indoor campus environment.
{"title":"An Application of Markov Jump Process Model for Activity-Based Indoor Mobility Prediction in Wireless Networks","authors":"J. Kolodziej, S. Khan, Lizhe Wang, N. Min-Allah, S. Madani, N. Ghani, Hongxiang Li","doi":"10.1109/FIT.2011.17","DOIUrl":"https://doi.org/10.1109/FIT.2011.17","url":null,"abstract":"One of the most important objectives of a wireless network is to facilitate a prediction of users mobility regardless of their point of attachment to the network. In indoor environments the effective users motion prediction system and wireless localization technology play an important role in all aspects of peoples daily lives. In this paper we propose an activity-based continuous-time Markov model to define and predict the human movement patterns. This model is a simple extension of an Activity based Mobility Prediction algorithm using Markov modeling (AMPuMM) technique. Both models are experimentally evaluated in realistic small university campus scenario. The obtained results show us the high efficiency of the jump methodology in the prediction of the students activities in the indoor campus environment.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124752383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rana Faisal Munir, N. Ahmed, Hafiz Abdul Razzaq, Ali Hur, H. F. Ahmad
Web applications after their revolutionary advent and popularity are target of variety of attacks. Magnitude and complexity of attacks is continuously growing with every minute development in World Wide Web. There are plenty of web attack detection techniques but they cannot fully comprehend the required degree of security for complex web applications. The reasons include static nature of attack detection mechanism, lack of expressiveness in attack detection rules, and absence of reasoning capability to detect unanticipated ways an attack can be launched. To cater these issues, a formal approach is required that has more expressiveness and equipped with reasoning. These traits are fully adhered to by the Semantic techniques. This paper introduces an approach for utilizing Semantic techniques in web application security. This has never been introduced previously to the best of our knowledge. Here the HTTP Protocol ontology is presented to mitigate the communication protocol attacks. In this paper we are focusing on communication protocol attacks including abnormal HTTP messages, HTTP request smuggling and HTTP response splitting. While dealing with these attacks, the proposed technique outperforms the existing solutions with higher detection rate and low false positives as indicated by evaluation results.
{"title":"Detect HTTP Specification Attacks Using Ontology","authors":"Rana Faisal Munir, N. Ahmed, Hafiz Abdul Razzaq, Ali Hur, H. F. Ahmad","doi":"10.1109/FIT.2011.21","DOIUrl":"https://doi.org/10.1109/FIT.2011.21","url":null,"abstract":"Web applications after their revolutionary advent and popularity are target of variety of attacks. Magnitude and complexity of attacks is continuously growing with every minute development in World Wide Web. There are plenty of web attack detection techniques but they cannot fully comprehend the required degree of security for complex web applications. The reasons include static nature of attack detection mechanism, lack of expressiveness in attack detection rules, and absence of reasoning capability to detect unanticipated ways an attack can be launched. To cater these issues, a formal approach is required that has more expressiveness and equipped with reasoning. These traits are fully adhered to by the Semantic techniques. This paper introduces an approach for utilizing Semantic techniques in web application security. This has never been introduced previously to the best of our knowledge. Here the HTTP Protocol ontology is presented to mitigate the communication protocol attacks. In this paper we are focusing on communication protocol attacks including abnormal HTTP messages, HTTP request smuggling and HTTP response splitting. While dealing with these attacks, the proposed technique outperforms the existing solutions with higher detection rate and low false positives as indicated by evaluation results.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125280914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Watershed transform is a commonly used image segmentation method. The main problem with this segmentation technique is that of its sensitivity to noise and other irregularities which leads to over-segmentation. In this paper the over-segmentation problem is overcome by combing pre-processing and post-processing techniques along with watershed transform. First multi-scale morphological filtering by reconstruction is used to remove noise and then h minima transform is implemented to extract markers. These markers are then superimposed on gradient image. Watershed transform is then applied on the modified gradient map. Post-processing region merging technique is used to merge the over segmented regions in the final segmented map. Experimental results show that the over-segmentation problem is reduced with the average segmentation accuracy of 0.96.
{"title":"Medical Image Segmentation Using H-minima Transform and Region Merging Technique","authors":"Kamran Ali, A. Jalil, Munazza Gull, M. Fiaz","doi":"10.1109/FIT.2011.31","DOIUrl":"https://doi.org/10.1109/FIT.2011.31","url":null,"abstract":"Watershed transform is a commonly used image segmentation method. The main problem with this segmentation technique is that of its sensitivity to noise and other irregularities which leads to over-segmentation. In this paper the over-segmentation problem is overcome by combing pre-processing and post-processing techniques along with watershed transform. First multi-scale morphological filtering by reconstruction is used to remove noise and then h minima transform is implemented to extract markers. These markers are then superimposed on gradient image. Watershed transform is then applied on the modified gradient map. Post-processing region merging technique is used to merge the over segmented regions in the final segmented map. Experimental results show that the over-segmentation problem is reduced with the average segmentation accuracy of 0.96.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131810738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cooperative relaying has recently received significant attention due to its diversity gain, higher QoS, power savings, extended coverage and improved BER as compared to conventional SISO systems. For further improvement in the system performance, Hybrid ARQ proves itself as effective transmission strategy. Exploiting the retransmission nature of Hybrid ARQ, this paper proposes Switchable Relaying Mechanism (SRM) to be used with Turbo codes in a single hop Cooperative System. According to channel conditions, SRM will let the relay to switch its relaying protocol between AAF and DAF. Moreover, retransmission mechanism at destination guarantees improvement of an overall system performance. The proposed Hybrid ARQ-SRM scheme when used with Turbo codes has shown better BER performance as compared to conventional cooperative systems.
{"title":"Turbo-Coded HARQ with Switchable Relaying Mechanism in Single Hop Cooperative Wireless System","authors":"I. Khalil, A. Khan, Zohaib-Ur-Rehman","doi":"10.1109/FIT.2011.54","DOIUrl":"https://doi.org/10.1109/FIT.2011.54","url":null,"abstract":"Cooperative relaying has recently received significant attention due to its diversity gain, higher QoS, power savings, extended coverage and improved BER as compared to conventional SISO systems. For further improvement in the system performance, Hybrid ARQ proves itself as effective transmission strategy. Exploiting the retransmission nature of Hybrid ARQ, this paper proposes Switchable Relaying Mechanism (SRM) to be used with Turbo codes in a single hop Cooperative System. According to channel conditions, SRM will let the relay to switch its relaying protocol between AAF and DAF. Moreover, retransmission mechanism at destination guarantees improvement of an overall system performance. The proposed Hybrid ARQ-SRM scheme when used with Turbo codes has shown better BER performance as compared to conventional cooperative systems.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132250392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}