Pub Date : 2009-12-11DOI: 10.1109/ICET.2009.5353212
Qaiser Abbas, Ahsan Nabi Khan
Lexical Functional Grammar (LFG) is developed to understand the syntactic and semantic structure of Urdu modal verbs from a corpus. The most popular tool XLE for parsing is used to implement LFG and analyze the results. Published literature of modal verbs in Urdu is very much short and limited in nature; however, modal verbs in Urdu are identified and collected from Urdu literature and English literature by translation. A huge corpus is analyzed and sentences including modal verbs like ‘UW’, ‘UL’ etc are extracted from the corpus. Rules are extracted from these sentences and finally, lexical functional grammar for these sentences is developed which provides syntactic and semantic structure of sentences.
{"title":"Lexical functional grammar for Urdu modal verbs","authors":"Qaiser Abbas, Ahsan Nabi Khan","doi":"10.1109/ICET.2009.5353212","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353212","url":null,"abstract":"Lexical Functional Grammar (LFG) is developed to understand the syntactic and semantic structure of Urdu modal verbs from a corpus. The most popular tool XLE for parsing is used to implement LFG and analyze the results. Published literature of modal verbs in Urdu is very much short and limited in nature; however, modal verbs in Urdu are identified and collected from Urdu literature and English literature by translation. A huge corpus is analyzed and sentences including modal verbs like ‘UW’, ‘UL’ etc are extracted from the corpus. Rules are extracted from these sentences and finally, lexical functional grammar for these sentences is developed which provides syntactic and semantic structure of sentences.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114738277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-11DOI: 10.1109/ICET.2009.5353153
Muhammad Faisal Khan, M. Tufail
In this paper, the problem of bearing estimation of a single wideband source is addressed. ESPRIT is a subspace based method which was originally developed by Roy and Kailath for direction of arrival estimation of narrow-band emitter signals. To use this method for wide-band signal, the wide-band signal is first decomposed into several narrow band frequency bins using Fourier Transform, and ESPRIT is subsequently applied separately on each frequency bin. This is a computationally costly method but shows promising results. Simulations are used to describe the performance of the said algorithm, when the number of frequency bins is changed. It is also shown that the variance of estimates is increased as the angle of arrival from the broad-side of a uniform linear array is increased.
{"title":"Performance analysis of ESPRIT algorithm on a single broadband signal","authors":"Muhammad Faisal Khan, M. Tufail","doi":"10.1109/ICET.2009.5353153","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353153","url":null,"abstract":"In this paper, the problem of bearing estimation of a single wideband source is addressed. ESPRIT is a subspace based method which was originally developed by Roy and Kailath for direction of arrival estimation of narrow-band emitter signals. To use this method for wide-band signal, the wide-band signal is first decomposed into several narrow band frequency bins using Fourier Transform, and ESPRIT is subsequently applied separately on each frequency bin. This is a computationally costly method but shows promising results. Simulations are used to describe the performance of the said algorithm, when the number of frequency bins is changed. It is also shown that the variance of estimates is increased as the angle of arrival from the broad-side of a uniform linear array is increased.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125355234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-11DOI: 10.1109/ICET.2009.5353198
S. Mohsin, F. Ahsan, M. Faheem, Usman Aftab, Imtiaz Ahmed
The work done in this research attempts to improve the load balancer of OpenMosix. Interestingly trivial changes made to any load balancing algorithm can produce dramatic results. The parameters that effect the load balancing algorithm are first evaluated with the default configurations and then modifications have been made to the /proc file-system dynamically to optimize it in OM. A stronger system in the SSI is assigned most of the workload for a given process whereas relatively slower systems are not as much active; hence reducing the overall efficiency. Making the faster systems pretend to be slower, results are more optimized among the whole SSI nodes. The results show that tuning the speed and decay interval parameters from the /proc interface improves the performance of the overall SSI for the given task.
{"title":"Optimization of probabilistic & decentralized load balancer on SSI cluster","authors":"S. Mohsin, F. Ahsan, M. Faheem, Usman Aftab, Imtiaz Ahmed","doi":"10.1109/ICET.2009.5353198","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353198","url":null,"abstract":"The work done in this research attempts to improve the load balancer of OpenMosix. Interestingly trivial changes made to any load balancing algorithm can produce dramatic results. The parameters that effect the load balancing algorithm are first evaluated with the default configurations and then modifications have been made to the /proc file-system dynamically to optimize it in OM. A stronger system in the SSI is assigned most of the workload for a given process whereas relatively slower systems are not as much active; hence reducing the overall efficiency. Making the faster systems pretend to be slower, results are more optimized among the whole SSI nodes. The results show that tuning the speed and decay interval parameters from the /proc interface improves the performance of the overall SSI for the given task.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116660303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-11DOI: 10.1109/ICET.2009.5353203
M. I. Razzak, S. A. Hussain, M. Sher
Online character recognition of Urdu script based languages is one of the most difficult task due to cursive in nature. Urdu script based languages has not received much attestation even this script is used 1/6th of the population. The complexities in the script makes more complicated the recognition process. The problem in handwritten numeral recognition is the shape similarity between handwritten numerals. This paper presents a fuzzy rule base approach for the recognition of numerals both Urdu and Arabic in unconstrained environment. The proposed system is tested and provides accuracy of 96.3%.
{"title":"Numeral recognition for Urdu script in unconstrained environment","authors":"M. I. Razzak, S. A. Hussain, M. Sher","doi":"10.1109/ICET.2009.5353203","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353203","url":null,"abstract":"Online character recognition of Urdu script based languages is one of the most difficult task due to cursive in nature. Urdu script based languages has not received much attestation even this script is used 1/6th of the population. The complexities in the script makes more complicated the recognition process. The problem in handwritten numeral recognition is the shape similarity between handwritten numerals. This paper presents a fuzzy rule base approach for the recognition of numerals both Urdu and Arabic in unconstrained environment. The proposed system is tested and provides accuracy of 96.3%.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128896905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-11DOI: 10.1109/ICET.2009.5353140
M. Qureshi, M. Kashif
Seamless and continuous support for long term organizational learning needs is essential for long lasting progress of the organization. Agile process model provides an excellent opportunity to cater that specific problem and also helps in motivation, satisfaction, coordination, presentation and technical skills enhancement of agile teams. This long term learning process makes organization to sustain their current successes and lead both organization and team members to successful and dynamic market leaders.
{"title":"Seamless long term learning in agile teams for sustainable leadership","authors":"M. Qureshi, M. Kashif","doi":"10.1109/ICET.2009.5353140","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353140","url":null,"abstract":"Seamless and continuous support for long term organizational learning needs is essential for long lasting progress of the organization. Agile process model provides an excellent opportunity to cater that specific problem and also helps in motivation, satisfaction, coordination, presentation and technical skills enhancement of agile teams. This long term learning process makes organization to sustain their current successes and lead both organization and team members to successful and dynamic market leaders.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123091333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-11DOI: 10.1109/ICET.2009.5353180
Taufeeq Elahi Diju, Haseeb Aslam Butt, M. I. Baig
Fibre spinning industries need low cost, robust and effective monitoring systems on their machines. This is achieved by using a non-conventional approach for data acquisition and it's processing, using only low cost mechanical actuation system and digital components instead of costly PLCs and commercial SCADA packages. The system effectively processes thousands of inputs and produces the live status and improves efficiency and production of the plant against a very little investment. This control system is implemented at Crescent Jute Products Ltd., Jarhanwala (PAKISTAN).
{"title":"SCADA for spinning plants: A low cost/non-conventional approach","authors":"Taufeeq Elahi Diju, Haseeb Aslam Butt, M. I. Baig","doi":"10.1109/ICET.2009.5353180","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353180","url":null,"abstract":"Fibre spinning industries need low cost, robust and effective monitoring systems on their machines. This is achieved by using a non-conventional approach for data acquisition and it's processing, using only low cost mechanical actuation system and digital components instead of costly PLCs and commercial SCADA packages. The system effectively processes thousands of inputs and produces the live status and improves efficiency and production of the plant against a very little investment. This control system is implemented at Crescent Jute Products Ltd., Jarhanwala (PAKISTAN).","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128158849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-11DOI: 10.1109/ICET.2009.5353165
F. Khattak, Abdul Bais, Y. M. Khawaja
This paper focuses on two problems, authentication and copyrights protection, faced by digital media in general and digital images in particular. We discuss how two algorithms defined separately can be combined to produce a secure digital camera which provides a solution to these problems. First, a robust quantization based wavelet domain scheme is applied to embed a robust watermark in the image for the purpose of owner identification. After that, a semi-fragile scheme is used to watermark the robust watermarked image for authentication. Experimental results show that recovered robust watermark had high correlation with the embedded robust watermark after different attacks. Under perfect conditions, recovered fragile watermark also showed perfect correlation with embedded fragile watermark, but after attacks, the similarity index dropped indicating that image is not authentic.
{"title":"An invisible dual watermarking scheme for authentication and copyrights protection","authors":"F. Khattak, Abdul Bais, Y. M. Khawaja","doi":"10.1109/ICET.2009.5353165","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353165","url":null,"abstract":"This paper focuses on two problems, authentication and copyrights protection, faced by digital media in general and digital images in particular. We discuss how two algorithms defined separately can be combined to produce a secure digital camera which provides a solution to these problems. First, a robust quantization based wavelet domain scheme is applied to embed a robust watermark in the image for the purpose of owner identification. After that, a semi-fragile scheme is used to watermark the robust watermarked image for authentication. Experimental results show that recovered robust watermark had high correlation with the embedded robust watermark after different attacks. Under perfect conditions, recovered fragile watermark also showed perfect correlation with embedded fragile watermark, but after attacks, the similarity index dropped indicating that image is not authentic.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114192610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-11DOI: 10.1109/ICET.2009.5353141
U. Saeed, K. Gill, H. Ali, H. Gilani, N. Shahzad
October 2005 earthquake in Pakistan measuring at 7.6 Richter scale jolted huge area of Himalayan Mountains leaving over 75 thousands people dead; 80,000 people injured and about 3.5 million people as homeless. It not only destroyed buildings, telecommunication, roads, and power supply but also hampered the natural resources of the area. Current study aims to analyze the forest damage caused by earthquake, massive aftershocks and post land sliding in Machiara National Park. Machiara National Park (MNP) is situated in the Himalayan Highlands in Muzaffarabad District of Pakistan. It is in the Western Himalayan Broadleaf forest region and is one of the Global 200 Ecoregion. For the forest damage assessment, satellite images of 2000, 2005 and 2007 are being used. An extensive filed visit of the area was conducted to collect ground truth data. Pre and pots earthquake analysis reveal an overall decrease of 3% in conifer forest from 2000–2005 whereas 17% decrease from 2005–2007 is observed. Increased forest degradation rate due to triggered landslidings (in higher elevation and less forested/barren land) highlights the protective role of forest.
{"title":"Pre and post earthquake forest damage assessment — A case study of 2005 earthquake impact on forest of Machiara National Park, Pakistan","authors":"U. Saeed, K. Gill, H. Ali, H. Gilani, N. Shahzad","doi":"10.1109/ICET.2009.5353141","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353141","url":null,"abstract":"October 2005 earthquake in Pakistan measuring at 7.6 Richter scale jolted huge area of Himalayan Mountains leaving over 75 thousands people dead; 80,000 people injured and about 3.5 million people as homeless. It not only destroyed buildings, telecommunication, roads, and power supply but also hampered the natural resources of the area. Current study aims to analyze the forest damage caused by earthquake, massive aftershocks and post land sliding in Machiara National Park. Machiara National Park (MNP) is situated in the Himalayan Highlands in Muzaffarabad District of Pakistan. It is in the Western Himalayan Broadleaf forest region and is one of the Global 200 Ecoregion. For the forest damage assessment, satellite images of 2000, 2005 and 2007 are being used. An extensive filed visit of the area was conducted to collect ground truth data. Pre and pots earthquake analysis reveal an overall decrease of 3% in conifer forest from 2000–2005 whereas 17% decrease from 2005–2007 is observed. Increased forest degradation rate due to triggered landslidings (in higher elevation and less forested/barren land) highlights the protective role of forest.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114758994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-11DOI: 10.1109/ICET.2009.5353139
Usman Shaukat, A. Qayyum, S. Hussain
With the ever increasing demand of multimedia traffic on the internet the interest in deploying multicast has increased. One hurdle in this regard is quantifying the multicast protocol performance. Many efforts have been put into defining multicast metrics for evaluating protocol performance. In this paper we identified metrics that will provide reasonable measure of protocol's efficiency. The metric is developed keeping two perspectives in mind. First, how efficient a multicast protocol is in utilizing network resources and second, the quality of service it can provide to the end user. A simulation was done using ns-2 to evaluate the performance of multicast protocols based on the metrics we identified. The overall performance of each protocol is calculated and relative efficiency of each protocol is established based on our metrics.
{"title":"Performance evaluation of multicast protocols for multimedia traffic","authors":"Usman Shaukat, A. Qayyum, S. Hussain","doi":"10.1109/ICET.2009.5353139","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353139","url":null,"abstract":"With the ever increasing demand of multimedia traffic on the internet the interest in deploying multicast has increased. One hurdle in this regard is quantifying the multicast protocol performance. Many efforts have been put into defining multicast metrics for evaluating protocol performance. In this paper we identified metrics that will provide reasonable measure of protocol's efficiency. The metric is developed keeping two perspectives in mind. First, how efficient a multicast protocol is in utilizing network resources and second, the quality of service it can provide to the end user. A simulation was done using ns-2 to evaluate the performance of multicast protocols based on the metrics we identified. The overall performance of each protocol is calculated and relative efficiency of each protocol is established based on our metrics.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130132210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-11DOI: 10.1109/ICET.2009.5353205
Moeen Tayyab, M. F. Zafar
Human brain can detect faces from the images constructed in their eyes. The face detection is a computerize method of locating the face in the digital image. It is an important challenge to locate faces from uncontrolled and indistinguishable background of the digital image. This paper presents human face detection from the colored images. Skin color segmentation is used for localizations of skin colored components in the digital image. The features are extracted by using 2D-Discrete Cosine Transform (2D-DCT) and the Back Propagation Neural Network (BPN) is used for training and testing phases. In this research, total of 50, 100 and 180 images datasets have been used. About 60 % of the images are used for training phase and 40 % of the images are used for testing phase. The detection rate has been obtained as 84.03 % with the false rate of 5.05. These results are better than the results of existing methods of face detection using 2D-DCT
{"title":"Face detection using 2D-Discrete Cosine Transform and Back Propagation Neural Network","authors":"Moeen Tayyab, M. F. Zafar","doi":"10.1109/ICET.2009.5353205","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353205","url":null,"abstract":"Human brain can detect faces from the images constructed in their eyes. The face detection is a computerize method of locating the face in the digital image. It is an important challenge to locate faces from uncontrolled and indistinguishable background of the digital image. This paper presents human face detection from the colored images. Skin color segmentation is used for localizations of skin colored components in the digital image. The features are extracted by using 2D-Discrete Cosine Transform (2D-DCT) and the Back Propagation Neural Network (BPN) is used for training and testing phases. In this research, total of 50, 100 and 180 images datasets have been used. About 60 % of the images are used for training phase and 40 % of the images are used for testing phase. The detection rate has been obtained as 84.03 % with the false rate of 5.05. These results are better than the results of existing methods of face detection using 2D-DCT","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130551488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}