Pub Date : 2014-12-01DOI: 10.1109/ICET.2014.7021030
Muhammad Bilal Khan, Muhammad Awais Hussain, K. Shahzad, Sajid Nawaz, Muhammad Umar Touseef, Raja Jawad Ali Khan
In this paper, we present the control and implementation schemes of a bi-directional prototype mobile robot for doing the repetitive tasks. The robot was built with the fundamental capabilities like autonomous navigation and autonomous decision making during the path planning stages. Different sensors were used for the acquisition of the useful data from the surroundings of the robot. Robot's mechanical structure was supporting the overall scheme of its use as a basic service transportation robot. A solid gripper was used in order to pick desired objects inside an arena. The prototype robot successfully managed to complete the tasks assigned to it with the given scenarios.
{"title":"A bi-directional prototype mobile robot to experiment light scale object-transportation schemes","authors":"Muhammad Bilal Khan, Muhammad Awais Hussain, K. Shahzad, Sajid Nawaz, Muhammad Umar Touseef, Raja Jawad Ali Khan","doi":"10.1109/ICET.2014.7021030","DOIUrl":"https://doi.org/10.1109/ICET.2014.7021030","url":null,"abstract":"In this paper, we present the control and implementation schemes of a bi-directional prototype mobile robot for doing the repetitive tasks. The robot was built with the fundamental capabilities like autonomous navigation and autonomous decision making during the path planning stages. Different sensors were used for the acquisition of the useful data from the surroundings of the robot. Robot's mechanical structure was supporting the overall scheme of its use as a basic service transportation robot. A solid gripper was used in order to pick desired objects inside an arena. The prototype robot successfully managed to complete the tasks assigned to it with the given scenarios.","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129493212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICET.2014.7021022
U. Rehman, Abdul Ghafoor Abbasi
Voice over Internet Protocol (VoIP) is an emerging technology that changes the way of communication services over IP networks. It provides flexible and low cost services to the users, which make it more popular than the existing Public Switch Telephone Network (PSTN). With the popularity of this technology, it became targeted victim of different attacks. In this paper we analyzed VoIP architecture, both theoretically and practically with more emphasizes on security of Session Initiation Protocol (SIP). In order to analyze theoretically, we performed a literature survey related to SIP security and classified it in term of existing SIP attacks and defenses. Our theoretical analysis reveals that most attacks on VoIP architecture were successful due to weaknesses of SIP, especially the authentication mechanism used in the session establishment phase. For practical analysis, we used open source Asterisk and pen-test it in different attacking scenarios using Kali Linux distribution. Our practical analysis studies revealed that open source asterisk server is still vulnerable to several attacks, which includes eavesdropping, intentional interruption, social threats, interception and modification, and unintentional interruption. We also provide a concise mitigating scheme based on Single Sign-On (SSO), which provides an efficient and reliable authentication mechanism for securing SIP.
VoIP (Voice over Internet Protocol)是一种改变IP网络通信方式的新兴技术。它为用户提供灵活和低成本的服务,使其比现有的PSTN (Public Switch Telephone Network)更受欢迎。随着这项技术的普及,它成为了各种攻击的目标。本文从理论和实践两方面分析了VoIP的体系结构,重点分析了SIP协议的安全性。为了从理论上进行分析,我们对SIP安全的相关文献进行了调查,并根据现有的SIP攻击和防御进行了分类。我们的理论分析表明,由于SIP的弱点,特别是在会话建立阶段使用的身份验证机制,大多数对VoIP架构的攻击都是成功的。为了进行实际分析,我们使用了开源的Asterisk,并使用Kali Linux发行版在不同的攻击场景中对其进行了渗透测试。我们的实际分析研究表明,开源星号服务器仍然容易受到多种攻击,包括窃听、故意中断、社会威胁、拦截和修改以及无意中断。我们还提供了一种简洁的基于单点登录(SSO)的缓解方案,该方案为保护SIP提供了一种高效可靠的身份验证机制。
{"title":"Security analysis of VoIP architecture for identifying SIP vulnerabilities","authors":"U. Rehman, Abdul Ghafoor Abbasi","doi":"10.1109/ICET.2014.7021022","DOIUrl":"https://doi.org/10.1109/ICET.2014.7021022","url":null,"abstract":"Voice over Internet Protocol (VoIP) is an emerging technology that changes the way of communication services over IP networks. It provides flexible and low cost services to the users, which make it more popular than the existing Public Switch Telephone Network (PSTN). With the popularity of this technology, it became targeted victim of different attacks. In this paper we analyzed VoIP architecture, both theoretically and practically with more emphasizes on security of Session Initiation Protocol (SIP). In order to analyze theoretically, we performed a literature survey related to SIP security and classified it in term of existing SIP attacks and defenses. Our theoretical analysis reveals that most attacks on VoIP architecture were successful due to weaknesses of SIP, especially the authentication mechanism used in the session establishment phase. For practical analysis, we used open source Asterisk and pen-test it in different attacking scenarios using Kali Linux distribution. Our practical analysis studies revealed that open source asterisk server is still vulnerable to several attacks, which includes eavesdropping, intentional interruption, social threats, interception and modification, and unintentional interruption. We also provide a concise mitigating scheme based on Single Sign-On (SSO), which provides an efficient and reliable authentication mechanism for securing SIP.","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132022171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICET.2014.7021020
Arshad Ali
This paper presents a new family of secure, small and fast stream ciphers referred to as Oppel-2. Oppel-2 uses Feedback with Carry Shift Registers in combination with an output function to produce pseudorandom keystream. Members of Oppel-2 family of ciphers can also be tailored for different applications to meet their implementation constraints while providing required level of security. The paper defines three instances of Oppel-2, which are referred to as Oppel-2 V0, Oppel-2 V1 and Oppel-2 V2. These instances of Oppel-2 provide security of 264, 280 and 2128 primitive operations, respectively. The paper also shows that Oppel-2 is immune to linearisation attacks, which are considered as most effective attacks against those ciphers whose theory depends upon properties of 2-adic numbers. In addition the paper also presents a security strength analysis of Oppel-2 against various other types of attacks. This analysis shows that Oppel-2 family of ciphers is suitable for implementation in practical applications.
{"title":"Oppel-2: A new family of FCSR-based stream ciphers","authors":"Arshad Ali","doi":"10.1109/ICET.2014.7021020","DOIUrl":"https://doi.org/10.1109/ICET.2014.7021020","url":null,"abstract":"This paper presents a new family of secure, small and fast stream ciphers referred to as Oppel-2. Oppel-2 uses Feedback with Carry Shift Registers in combination with an output function to produce pseudorandom keystream. Members of Oppel-2 family of ciphers can also be tailored for different applications to meet their implementation constraints while providing required level of security. The paper defines three instances of Oppel-2, which are referred to as Oppel-2 V0, Oppel-2 V1 and Oppel-2 V2. These instances of Oppel-2 provide security of 264, 280 and 2128 primitive operations, respectively. The paper also shows that Oppel-2 is immune to linearisation attacks, which are considered as most effective attacks against those ciphers whose theory depends upon properties of 2-adic numbers. In addition the paper also presents a security strength analysis of Oppel-2 against various other types of attacks. This analysis shows that Oppel-2 family of ciphers is suitable for implementation in practical applications.","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129475729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICET.2014.7021025
Zunnorain Amer Ali Baig, A. Malik, I. Qureshi
Electromagnetic spectrum, a natural limited resource, with the boom in applications of wireless communications, that limited resource is becoming congested more and more and the only solution for efficient spectrum utilization is Cognitive Radios, moreover spectrum sensing is the most irrefutably functionality in CRs and with spectrum sensing, throughput for secondary user's transmission plays an important role. In this paper after performing spectrum sensing using energy detection scheme, we have achieved the optimized throughput for Secondary User by ensuring the protection of Primary User's rights. For a total time in a frame, least time for sensing is desired and the residual time in that frame is used for transmission. Two parameters related to sensing are fallacious alarm probability and detection probability pertaining to secondary and primary users correspondingly, greater the probability of detection, more the licensed user's rights are protected, smaller the fallacious alarm probability, greater chance of using the underutilized band, applying the most famous technique known as energy detection scheme. In this paper we studied the problem of conniving sensing time in order to achieve maximum and optimal transmission time for secondary user keeping the restraint that licensed user is adequately bulwarked. Maximum achievable throughput was achieved with least sensing time, not achieved in previous work.
{"title":"Throughput optimization for Cognitive Radio while bulwarking Primary User","authors":"Zunnorain Amer Ali Baig, A. Malik, I. Qureshi","doi":"10.1109/ICET.2014.7021025","DOIUrl":"https://doi.org/10.1109/ICET.2014.7021025","url":null,"abstract":"Electromagnetic spectrum, a natural limited resource, with the boom in applications of wireless communications, that limited resource is becoming congested more and more and the only solution for efficient spectrum utilization is Cognitive Radios, moreover spectrum sensing is the most irrefutably functionality in CRs and with spectrum sensing, throughput for secondary user's transmission plays an important role. In this paper after performing spectrum sensing using energy detection scheme, we have achieved the optimized throughput for Secondary User by ensuring the protection of Primary User's rights. For a total time in a frame, least time for sensing is desired and the residual time in that frame is used for transmission. Two parameters related to sensing are fallacious alarm probability and detection probability pertaining to secondary and primary users correspondingly, greater the probability of detection, more the licensed user's rights are protected, smaller the fallacious alarm probability, greater chance of using the underutilized band, applying the most famous technique known as energy detection scheme. In this paper we studied the problem of conniving sensing time in order to achieve maximum and optimal transmission time for secondary user keeping the restraint that licensed user is adequately bulwarked. Maximum achievable throughput was achieved with least sensing time, not achieved in previous work.","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129786502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICET.2014.7021029
F. Khan, I. Ahmad
Fabrication and experimentation of vibration-based electromagnetic energy harvester is reported in this research paper. Energy harvester with both planar and wound coils have been developed and characterized under sinusoidal excitation. Energy harvester consists of two permanent magnets residing on a Latex membrane, two double sided PCB fabricated planar coils, Teflon spacers for providing gap between the permanent magnets and planar coils, and wound coils mounted on sides of Teflon spacers. When the harvester is subjected to vibration, due to the relative movement between the magnets and coils, the coils experience the change in magnetic flux density which causes an emf to generate at the coils terminals. Energy harvester has a dimension of 18 mm × 18 mm. Prototype has been characterized under sinusoidal excitation and are subjected to frequency sweep from 10 to 80 Hz at acceleration levels of 0.3 g, 0.5 g, 1 g, 2 g and 3 g. Single planar and wound coil of prototype generates an open circuit voltage of 15.7 mV and 11.05 mV respectively at 3 g and at resonant frequency 27 Hz. When excited at resonance and 3 g base acceleration a load power of 1.8 μW and 2.1 μW is obtained from single planar and wound coil respectively under matching impedance conditions for prototype.
{"title":"Vibration-based electromagnetic type energy harvester for bridge monitoring sensor application","authors":"F. Khan, I. Ahmad","doi":"10.1109/ICET.2014.7021029","DOIUrl":"https://doi.org/10.1109/ICET.2014.7021029","url":null,"abstract":"Fabrication and experimentation of vibration-based electromagnetic energy harvester is reported in this research paper. Energy harvester with both planar and wound coils have been developed and characterized under sinusoidal excitation. Energy harvester consists of two permanent magnets residing on a Latex membrane, two double sided PCB fabricated planar coils, Teflon spacers for providing gap between the permanent magnets and planar coils, and wound coils mounted on sides of Teflon spacers. When the harvester is subjected to vibration, due to the relative movement between the magnets and coils, the coils experience the change in magnetic flux density which causes an emf to generate at the coils terminals. Energy harvester has a dimension of 18 mm × 18 mm. Prototype has been characterized under sinusoidal excitation and are subjected to frequency sweep from 10 to 80 Hz at acceleration levels of 0.3 g, 0.5 g, 1 g, 2 g and 3 g. Single planar and wound coil of prototype generates an open circuit voltage of 15.7 mV and 11.05 mV respectively at 3 g and at resonant frequency 27 Hz. When excited at resonance and 3 g base acceleration a load power of 1.8 μW and 2.1 μW is obtained from single planar and wound coil respectively under matching impedance conditions for prototype.","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126651180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICET.2014.7021019
S. Habib, M. Kamran
This paper presents a detailed review of a vehicle-to-grid (V2G) technology, and analyzes its impacts on power distribution networks. It is shown in this study that a vehicle, equipped with the ability of a V2G application, offers various features such as regulation of active power, support for reactive power, load balancing, current harmonics filtering etc. These features can enable ancillary services including, spinning reserve and control of voltage and frequency. However, the technology of V2G also creates challenging issues, for instance, degradation of batteries, communication overhead between an EV and a grid, changes in whole infrastructure of a distribution network (DN). This paper shows the present scenarios and analyze the impact of implementation V2G & G2V modes on DNs. V2G system have an impact on major factors of electric grid like reliability, efficiency, losses, and system stability. Our study also shows that the economic benefits of a V2G technology heavily depend on the strategies of charging and vehicle aggregation.
{"title":"A novel vehicle-to-grid technology with constraint analysis-a review","authors":"S. Habib, M. Kamran","doi":"10.1109/ICET.2014.7021019","DOIUrl":"https://doi.org/10.1109/ICET.2014.7021019","url":null,"abstract":"This paper presents a detailed review of a vehicle-to-grid (V2G) technology, and analyzes its impacts on power distribution networks. It is shown in this study that a vehicle, equipped with the ability of a V2G application, offers various features such as regulation of active power, support for reactive power, load balancing, current harmonics filtering etc. These features can enable ancillary services including, spinning reserve and control of voltage and frequency. However, the technology of V2G also creates challenging issues, for instance, degradation of batteries, communication overhead between an EV and a grid, changes in whole infrastructure of a distribution network (DN). This paper shows the present scenarios and analyze the impact of implementation V2G & G2V modes on DNs. V2G system have an impact on major factors of electric grid like reliability, efficiency, losses, and system stability. Our study also shows that the economic benefits of a V2G technology heavily depend on the strategies of charging and vehicle aggregation.","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125623560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICET.2014.7021016
G. Matharu, Priyanka Upadhyay, Lalita Chaudhary
Propelled by large-scale advances in wireless technologies, sensing technologies and communication technologies, the transformation of the Internet into an integrated network of things termed as Internet of Things is rapidly unfolding. The Internet of Things enabled by Wireless Sensor Networks (WSN) and RFID sensors finds a plethora of applications in almost all the fields such as health, education, transportation and agriculture. This paper briefs the idea of Internet of Things (IoT) and the challenges to its future growth. Also, this paper describes the general layered architecture of IoT along with its constituent elements. Further, the paper provides for a secure construction of the IoT architecture, by tackling security issues at each layer of the architecture. The paper concludes by mentioning the potential applications of the IoT technologies in fields ranging from intelligent transportation to smart home to e-health care and green agriculture.
在无线技术、传感技术、通信技术大规模发展的推动下,互联网向物联网(Internet of things)的转变正在迅速展开。无线传感器网络(WSN)和RFID传感器支持的物联网在医疗、教育、交通和农业等几乎所有领域都有大量应用。本文简要介绍了物联网(IoT)的概念及其未来发展面临的挑战。此外,本文还描述了物联网的一般分层架构及其组成元素。此外,本文通过解决架构每层的安全问题,提供了物联网架构的安全构建。文章最后提到了物联网技术在智能交通、智能家居、电子医疗和绿色农业等领域的潜在应用。
{"title":"The Internet of Things: Challenges & security issues","authors":"G. Matharu, Priyanka Upadhyay, Lalita Chaudhary","doi":"10.1109/ICET.2014.7021016","DOIUrl":"https://doi.org/10.1109/ICET.2014.7021016","url":null,"abstract":"Propelled by large-scale advances in wireless technologies, sensing technologies and communication technologies, the transformation of the Internet into an integrated network of things termed as Internet of Things is rapidly unfolding. The Internet of Things enabled by Wireless Sensor Networks (WSN) and RFID sensors finds a plethora of applications in almost all the fields such as health, education, transportation and agriculture. This paper briefs the idea of Internet of Things (IoT) and the challenges to its future growth. Also, this paper describes the general layered architecture of IoT along with its constituent elements. Further, the paper provides for a secure construction of the IoT architecture, by tackling security issues at each layer of the architecture. The paper concludes by mentioning the potential applications of the IoT technologies in fields ranging from intelligent transportation to smart home to e-health care and green agriculture.","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131185111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICET.2014.7021036
Haroon, S. Ullah, J. Flint
Biodegradable polymers and plastics are environment friendly because they decrease environmental pollution, conserve resources and reduce non-recyclable waste. Poly lactic acid (PLA) is a biodegradable plant derived polymer. Their properties are improved by copolymerization, blending, plasticization, polymer alloy technology and by development of composites techniques. These polymers can be used in computers, mobile phones, housing, textiles, optical, packaging films and bags. In this paper the feasibility of 1.7 and 3 mm thicker PLA as a substrate in wearable patch antenna is investigated. For comparison patch antenna on identically thicker (1.7 and 3 mm) FR-4 substrate is also simulated under the same conditions in CST Microwave Studio. The return loss, gain, directivity and efficiency of both antennas were compared on operating frequency of 2.45GHz. The proposed antenna employing PLA substrates give return losses of -21 and -22dB, gain of 6 and 6.14 dBi, directivity of 7.58 and 7.54dBi and efficiency of 59 and 70% on 1.7and 3mm thicker substrates respectively, while reference antenna using FR4 substrates results in return losses of -19 and -19.3dB, gain of 2.7 and 3.45dBi, directivity of 7.02 and 6.92 dBi and efficiency of 35and 43% for 1.7 and 3 mm thicker FR4 substrates.
{"title":"Electro-textile based wearable patch antenna on biodegradable poly lactic acid (PLA) plastic substrate for 2.45 GHz, ISM band applications","authors":"Haroon, S. Ullah, J. Flint","doi":"10.1109/ICET.2014.7021036","DOIUrl":"https://doi.org/10.1109/ICET.2014.7021036","url":null,"abstract":"Biodegradable polymers and plastics are environment friendly because they decrease environmental pollution, conserve resources and reduce non-recyclable waste. Poly lactic acid (PLA) is a biodegradable plant derived polymer. Their properties are improved by copolymerization, blending, plasticization, polymer alloy technology and by development of composites techniques. These polymers can be used in computers, mobile phones, housing, textiles, optical, packaging films and bags. In this paper the feasibility of 1.7 and 3 mm thicker PLA as a substrate in wearable patch antenna is investigated. For comparison patch antenna on identically thicker (1.7 and 3 mm) FR-4 substrate is also simulated under the same conditions in CST Microwave Studio. The return loss, gain, directivity and efficiency of both antennas were compared on operating frequency of 2.45GHz. The proposed antenna employing PLA substrates give return losses of -21 and -22dB, gain of 6 and 6.14 dBi, directivity of 7.58 and 7.54dBi and efficiency of 59 and 70% on 1.7and 3mm thicker substrates respectively, while reference antenna using FR4 substrates results in return losses of -19 and -19.3dB, gain of 2.7 and 3.45dBi, directivity of 7.02 and 6.92 dBi and efficiency of 35and 43% for 1.7 and 3 mm thicker FR4 substrates.","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122486511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICET.2014.7021023
Irshad Faiz, H. Mukhtar, A. M. Qamar, Sharifullah Khan
Diabetes is a serious chronic disease and balance diet as well as regular exercise are leading important factors for diabetes control. Management of healthy diet and proper exercise involve many decision variables from different domains such as gender, weight, height, age, needed calories and nutrition values, preferences about food and exercise, clinical guidelines and current vital signs etc. We have implemented a semantic rules and reasoning based approach that generates diet and exercise recommendations for diabetes patients. The developed prototype application is named Semantic Healthcare Assistant for Diet and Exercise (SHADE). Individual ontologies are defined for different domains (person, disease, food and exercise) along with SWRL rules and then imported all into an integrated ontology. The integrated ontology semantically generates the recommendations as inferences based on data and rules by using Pellet reasoner. Each generated meal menu is a list of food items along with portion size such that food items are user's preferred and menu is personalized, healthy and balanced diet. Finally, SHADE recommends user's preferred activities as exercises along with duration and intensity.
{"title":"A semantic rules & reasoning based approach for Diet and Exercise management for diabetics","authors":"Irshad Faiz, H. Mukhtar, A. M. Qamar, Sharifullah Khan","doi":"10.1109/ICET.2014.7021023","DOIUrl":"https://doi.org/10.1109/ICET.2014.7021023","url":null,"abstract":"Diabetes is a serious chronic disease and balance diet as well as regular exercise are leading important factors for diabetes control. Management of healthy diet and proper exercise involve many decision variables from different domains such as gender, weight, height, age, needed calories and nutrition values, preferences about food and exercise, clinical guidelines and current vital signs etc. We have implemented a semantic rules and reasoning based approach that generates diet and exercise recommendations for diabetes patients. The developed prototype application is named Semantic Healthcare Assistant for Diet and Exercise (SHADE). Individual ontologies are defined for different domains (person, disease, food and exercise) along with SWRL rules and then imported all into an integrated ontology. The integrated ontology semantically generates the recommendations as inferences based on data and rules by using Pellet reasoner. Each generated meal menu is a list of food items along with portion size such that food items are user's preferred and menu is personalized, healthy and balanced diet. Finally, SHADE recommends user's preferred activities as exercises along with duration and intensity.","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127907064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICET.2014.7021018
Muhammad Niaz Ahmad, G. Mustafa, Abdul Qayyum Khan, M. Rehan
In this paper, controllability of a sampled-data system under nonuniform sampling is investigated. The problem is motivated with the widespread networked and embedded control systems in which sampling periods may be varying and exact sampling instants are unknown. The continuous-time system is assumed to be controllable and a condition is derived for sampling intervals under which the resulting sampled-data system will also be controllable. The proposed condition requires lesser number of samples to make sampled system controllable as compared with the existing results.
{"title":"On the controllability of a sampled-data system under nonuniform sampling","authors":"Muhammad Niaz Ahmad, G. Mustafa, Abdul Qayyum Khan, M. Rehan","doi":"10.1109/ICET.2014.7021018","DOIUrl":"https://doi.org/10.1109/ICET.2014.7021018","url":null,"abstract":"In this paper, controllability of a sampled-data system under nonuniform sampling is investigated. The problem is motivated with the widespread networked and embedded control systems in which sampling periods may be varying and exact sampling instants are unknown. The continuous-time system is assumed to be controllable and a condition is derived for sampling intervals under which the resulting sampled-data system will also be controllable. The proposed condition requires lesser number of samples to make sampled system controllable as compared with the existing results.","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"79 15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117245431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}