E-Book, Englisch, Band 20, 468 Seiten
Hussain / Rajput / Chowdhry Wireless Networks Information Processing and Systems
1. Auflage 2008
ISBN: 978-3-540-89853-5
Verlag: Springer Berlin Heidelberg
Format: PDF
Kopierschutz: 1 - PDF Watermark
First International Multi Topic Conference, IMTIC 2008 Jamshoro, Pakistan, April 11-12, 2008 Revised Papers
E-Book, Englisch, Band 20, 468 Seiten
Reihe: Communications in Computer and Information Science
ISBN: 978-3-540-89853-5
Verlag: Springer Berlin Heidelberg
Format: PDF
Kopierschutz: 1 - PDF Watermark
This book constitutes the refereed proceedings of the First International Multi Topic Conference, IMTIC 2008, held in Jamshoro, Pakistan, in April 2008. The 46 revised full papers presented were carefully reviewed and selected from a total of 135 submissions. The topics include but are not limited to wireless sensor networks, satellite communication, grid computing, tracking, remote sensing, data mining, bioinformatics as well as legal and ethical issues in IT.
Autoren/Hrsg.
Weitere Infos & Material
1;Title Page;1
2;Preface;4
3;Organization;5
5;Keynote Speech: Role of PCSIR in Industrial Development of Pakistan;12
6;Keynote Speech: Computer Vision: Object Recognition and Scene Interpretation;13
7;Electronic Automatic Gear Shifting System for a Motorcycle;14
7.1;Introduction;14
7.2;Working Principle;15
7.2.1;Hardware Operation;15
7.2.2;Program Logic for the Gear Shifting Microcontroller;18
7.2.3;Program Logic for the Clutch Controlling Microcontroller;20
7.3;Future Developments;20
7.3.1;Future Improvement;20
7.3.2;Other Uses;20
7.4;Conclusion;21
7.5;References;21
8;Segmentation of Arabic Text into Characters for Recognition;22
8.1;Introduction;22
8.2;Arabic Text and Methods for Its Segmentation into Characters;23
8.3;Proposed Segmentation Method;25
8.3.1;Connected Component Separation;25
8.3.2;Character Segmentation;27
8.4;Conclusion;28
8.5;Future Work;28
8.6;References;29
9;Improved Texture Description with Features Based on Fourier Transform;30
9.1;Introduction;30
9.2;Method;31
9.2.1;Extracting DFT Features;31
9.2.2;The Augmented Feature Set;32
9.2.3;Texture Features Based on Gabor Filters;33
9.3;Materials;34
9.4;Experiments and Results;35
9.4.1;Recognition;35
9.4.2;Retrieval;37
9.5;Conclusion;38
9.6;References;39
10;Optimization of Projections for Parallel-Ray Transmission Tomography Using Genetic Algorithm;40
10.1;Introduction;40
10.2;Mathematical Model;41
10.2.1;Initialization and Selection Procedure;43
10.2.2;Crossover;43
10.2.3;Mutation;43
10.3;Simulation Results and Discussion;43
10.4;Conclusions;48
10.5;References;49
11;Seasonal to Inter-annual Climate Prediction Using Data Mining KNN Technique;51
11.1;Introduction;51
11.2;Related Work;52
11.3;K Nearest Neighbor (KNN);53
11.4;Forecasting Using KNN;55
11.5;Experiment;58
11.6;Conclusion and Future Work;60
11.7;References;61
12;Application of a Proposed Efficient Smoothing Algorithm on Directional Vectors for Isolated Handwritten Characters;63
12.1;Introduction;63
12.2;System Overview;64
12.2.1;Data Collection;65
12.2.2;Data Filtering;65
12.2.3;Direction Vector Encoding;66
12.2.4;Smoothing;67
12.2.5;Feature Extraction;71
12.3;Experiments;71
12.3.1;Data Set and Model Parameters;71
12.3.2;Recognition Performance;71
12.3.3;Performance Analysis;72
12.4;Conclusions;72
12.5;References;73
13;Architecture Based Reliability and Testing Estimation for Mobile Applications;75
13.1;Introduction;75
13.2;Related Work;76
13.3;Architecture-Based Software Testing Techniques;77
13.3.1;Issues in Software Architecture-Based Testing;77
13.3.2;General Properties to be Analyzed and Tested at Architecture-Level;77
13.4;Architecture Based Reliability Improvement Approaches;77
13.4.1;Requirements for Architecture-Based Reliability Improvement Approach;78
13.4.2;State Based Approach;78
13.4.3;Path Based Approach;79
13.4.4;Additive Approach;79
13.5;Qualitative Research Strategy;79
13.5.1;Data Collection;80
13.5.2;Data Analysis Procedures;80
13.5.3;Validity of Qualitative Study;80
13.5.4;Expected Outcome;80
13.5.5;Description of the Two Case Studies;81
13.5.6;Our Analysis About the Case Studies;82
13.6;Proposed Framework;82
13.6.1;Proposed Framework for Architecture Based Testing;82
13.6.2;Proposed Framework for Architecture Based Reliability;83
13.7;Conclusion and Future Work;84
13.8;References;84
13.9;Appendix A;86
14;A Framework to Achieve Reverse Channel Multicast in IEEE 802.16 Based Wireless Broadband Networks for Interoperability with IP Networks;87
14.1;Introduction;87
14.2;IEEE 802.16 MAC -Architecture Overview;88
14.3;Internet Protocol Multicast and IEEE 802.16 Standard;89
14.4;Framework Design Issues;90
14.5;A Uni-cast Based Multicast Approach;92
14.6;Proposed Framework;93
14.6.1;Behavior of Various Components Proposed in Framework Design;94
14.6.2;How a Multicast Request will be Executed with Our Design;95
14.7;Evaluation of Proposed Framework;95
14.7.1;Simple Network Design;95
14.7.2;Complex Network Design;96
14.7.3;Scalability;96
14.7.4;Reliability;96
14.8;Conclusion;97
14.9;References;97
15;A Dynamical System and Neural Network Perspective of Karachi Stock Exchange;99
15.1;Introduction;99
15.2;Previous Work;100
15.3;Important Concepts;101
15.3.1;Phase-Space Reconstruction;101
15.3.2;False-Nearest Neighbors Method;101
15.3.3;Correlation Dimension;102
15.3.4;Neural Network;102
15.4;Data Analysis;103
15.5;Conclusion;107
15.6;References;108
16;A Novel Approach to Non Coherent UWB Reception;111
16.1;Introduction;111
16.2;Implementation;112
16.2.1;Antenna;113
16.2.2;Low Noise Amplifier (LNA);113
16.2.3;Band Pass Filters (BPF);114
16.2.4;Demodulator and Integrator;114
16.2.5;Synchronizer;115
16.2.6;Threshold Detector;115
16.3;Results;116
16.4;Tests;116
16.4.1;Multipath Effect;117
16.4.2;Noise Plus Multipath;117
16.4.3;Narrow Band Interference;118
16.5;Conclusion;119
16.6;References;120
17;Load Balancing in EAMC to Integrate Heterogeneous Wireless Systems;121
17.1;Introduction;121
17.2;Related Work;122
17.2.1;Previous AMC Architecture;122
17.3;Proposed Architecture – Enhanced AMC (EAMC);122
17.3.1;EAMC Architecture;122
17.3.2;Components of EAMC;123
17.4;Proposed Solution for EAMC;124
17.4.1;Inter-NIA Handoff Algorithm;126
17.4.2;Database Load Update Algorithm;126
17.5;Performance Analysis;127
17.6;Conclusions;128
17.7;References;128
18;A Speech Recognition System for Urdu Language;129
18.1;Introduction;129
18.2;Preliminaries;131
18.2.1;Overview of Discrete Fourier Transform;131
18.2.2;Overview of Neural Networks;131
18.3;Speech Data Acquisition and Processing;132
18.4;Neural Network Topology and Implementation in MATLAB;133
18.5;Conclusions and Future Work;135
18.6;References;136
19;The Future of Satellite Communications in Pakistan;138
19.1;Introduction;138
19.2;Present Scenario of Satellite Communications in Pakistan;139
19.3;Promising Future Applications Using VSAT Networks;139
19.3.1;Introduction of VSAT Networks;139
19.3.2;Emerging VSAT Services;140
19.3.3;Banking and Financial Sector;140
19.3.4;Teleconferencing;141
19.3.5;Industries;141
19.3.6;Commerce Applications;141
19.3.7;Thin Route Telephony;142
19.3.8;Disaster Management;142
19.3.9;Telemedicine;142
19.3.10;Airport Infrastructure and Air Navigation;143
19.4;Conclusion;143
19.5;References;143
20;The Small World of Web Network Graphs;144
20.1;Introduction;144
20.1.1;The Small World Networks;145
20.2;Related Work;146
20.3;Research Objectives and Methodology;146
20.3.1;Clustering Coefficient;147
20.3.2;Mean of the Shortest Distance;147
20.3.3;Degree Distribution;148
20.4;Results and Interpretations;148
20.4.1;Term-Term Matrix;148
20.4.2;Document Similarity Matrix;150
20.4.3;Hyperlink Matrix;153
20.5;Summary;155
20.6;References;156
21;Application of Color Segmentation Using Online Learning for Target Tracking;157
21.1;Introduction;157
21.2;Color-Based Tracking System;158
21.2.1;System Architecture;159
21.2.2;Adaptive Color Model;160
21.2.3;Search Region and Target Localization;161
21.2.4;Kalman Filter for Prediction;162
21.2.5;Camera Calibration for Real-Time Tracking with PTZ Camera;162
21.3;Experimental Results;163
21.4;Discussion and Conclusions;165
21.5;References;166
22;Iterative Learning Fuzzy Gain Scheduler;167
22.1;Introduction;167
22.2;Two Dimensional Learning Process;169
22.3;Proposed Approach;169
22.4;Simulations and Results;172
22.5;Experimental Setup and Results;175
22.6;Conclusions;177
22.7;References;178
23;Comparative Analysis of Mobile IP and HAWAII;180
23.1;Introduction;180
23.2;Evaluation Criteria;181
23.2.1;Power Up;181
23.2.2;Micro-mobility;181
23.2.3;Macro-mobility;181
23.2.4;Paging;182
23.3;Evaluating Mobile IP;182
23.3.1;Power Up;182
23.3.2;Mobility;183
23.3.3;Paging;184
23.4;Evaluating HAWAII;184
23.4.1;Power Up;184
23.4.2;Micro-mobility;185
23.4.3;Macro-mobility;185
23.4.4;Paging;186
23.5;Comparative Analysis;187
23.5.1;Power Up;187
23.5.2;Micro-mobility;188
23.5.3;Macro-mobility;189
23.5.4;Paging;189
23.6;Conclusion;189
23.7;References;190
24;Video Transport over Heterogeneous Networks Using SCTP and DCCP;191
24.1;Introduction;191
24.2;SCTP and DCCP;192
24.3;Simulation and Traffic Models;193
24.4;Simulation Scenarios and Results;194
24.5;Conclusions and Future Work;200
24.6;References;201
25;Implementing Constructivist Pedagogical Model in Dynamic Distance Learning Framework;202
25.1;Introduction;202
25.2;Constructivism;203
25.2.1;Learning: Individual and Social Process;204
25.2.2;Modern Style of Learning;204
25.2.3;Modern Style of Teaching;205
25.2.4;Teaching/Learning on the Web;205
25.2.5;Assessment of Students;206
25.3;Proposed Framework for E-Learning Using Adaptive Techniques;206
25.4;Implementing Framework;207
25.4.1;Web Based Implementation;208
25.4.2;Primary Server;208
25.4.3;Instructor Module;210
25.4.4;Student Module;210
25.5;Conclusion and Future Aspects;211
25.6;References;211
26;Effect of Schedule Compression on Project Effort in COCOMO II Model for Highly Compressed Schedule Ratings;213
26.1;Introduction;213
26.2;Experimental Investigation;214
26.2.1;Experiment I: SCED Rating Quality;214
26.2.2;Experiment II: Ideal Effort Multiplier (IEM) Analysis on SCED;216
26.3;Implementing Model;217
26.3.1;Ideal Effort Multiplier (IEM);220
26.4;Applying IEM (SCED) Rating in Effort Estimation;222
26.4.1;Calculating Model Accuracy with Magnitude of Relative Error (MRE);223
26.4.2;Measure Prediction Level Pred$(l)$ for Level of Accuracy $l$;224
26.5;Conclusions;224
26.6;References;225
27;The Concept of Bio-fitness in Bio-inspired Computational Metaphor Abstraction;226
27.1;Introduction;226
27.2;Immune-Inspired Metaphor Abstraction;227
27.3;Proposed Criterion for Abstraction-Strength “Bio-fitness”;229
27.3.1;Factors Affecting Abstraction Strength;229
27.4;Proposed Method for Evaluating Bio-fitness;230
27.5;Bio-fitness of DASTON;232
27.5.1;Abstraction and Validation of DASTON;232
27.5.2;Evaluating Bio-fitness;233
27.6;Significance of Evaluating Bio-fitness;234
27.6.1;Proposing Novel Immune-Inspired Computational Mechanisms;234
27.6.2;Improving Existing Metaphor;235
27.6.3;Developing Clue for Unexplored Biological Mechanism;235
27.7;Conclusions;236
27.8;References;236
28;Analysis of MANET Routing Protocols under TCP Vegas with Mobility Consideration;238
28.1;Introduction;238
28.2;Related Work;239
28.2.1;DSDV Routing Protocol;239
28.2.2;AODV Routing Protocol;240
28.2.3;TCP Vegas;241
28.3;Simulation Performance;241
28.3.1;Simulation Results;242
28.4;Conclusion and Future Work;245
28.5;References;245
29;CMMI and OPM3: Are They Compatible?;246
29.1;Introduction;246
29.2;Model Comparison;247
29.3;OPM3 Assessment of a Software House in Pakistan;249
29.3.1;Results of the Assessment;249
29.4;Conclusion;251
29.5;References;252
30;Impact of Cluster Size on Efficient LUT-FPGA Architecture for Best Area and Delay Trade-Off;254
30.1;Introduction to FPGA Architecture;254
30.1.1;Basic Logic Element;255
30.2;Logic Clustering;256
30.3;Trade-Offs in Cluster-Based FPGA;257
30.4;Determination of Best Area-Delay Trade Off;257
30.4.1;The Delay Metric;257
30.5;Conclusion;260
30.6;References;261
30.7;Appendix: Total Delay in Nano Seconds for Various Cluster Sizes;261
31;Effects of Social Status on Foetal Growth Using Obstetric Ultrasonography – A Biometric Approach;264
31.1;Introduction;264
31.2;Material and Methods;265
31.3;Findings;265
31.3.1;Equations;266
31.4;Discussion;270
31.5;Conclusion;270
31.6;References;271
32;Bioinformatics Awareness System for Skin Diseases Using Stem Cells Therapy in the Perspective of eHealth;272
32.1;Introduction;272
32.1.1;Bioinformatics;273
32.1.2;Origins and Development of Stem Cell;273
32.1.3;Role of Biomedical Engineering;274
32.1.4;eHealth and Skin Therapy;274
32.2;Issues and Solutions;275
32.2.1;Facing Issues and State of Art in Pakistan;275
32.2.2;Solutions and Planning;275
32.3;Methods;275
32.4;Research Model for Bioinformatics System;277
32.5;Conclusion;277
32.6;References;277
33;How to Build an Open Source Render Farm Based on Desktop Grid Computing;279
33.1;Introduction;279
33.2;Background;281
33.2.1;Related Work;281
33.2.2;Alternative Rendering Solutions;282
33.2.3;Why Use Condor?;282
33.3;Setting Up the Desktop Grid Computing Environment;283
33.3.1;Hardware Specification;283
33.3.2;Desktop Grid Computing Environment Render Farm Setup;283
33.3.3;The Condor Software Installation;284
33.3.4;Software Requirements for Rendering;285
33.4;3D Animation;285
33.5;Job Submission;286
33.5.1;Writing a Submission File;286
33.5.2;Submitting the Job;287
33.5.3;Rendering;287
33.6;Results;287
33.7;Conclusion and Future Work;288
33.8;References;288
34;Implementation Challenges for Nastaliq Character Recognition;290
34.1;Introduction;290
34.2;Urdu Nastaliq Character Set;291
34.2.1;Nastaliq Script Characteristics;291
34.3;Problems Pertaining to Nastaliq Script;292
34.3.1;Cursiveness;292
34.3.2;Context Sensitivity;293
34.3.3;Position/Number of Dots;293
34.3.4;Kerning;293
34.4;Nastaliq Character Recognition;293
34.5;Results and Discussion;295
34.6;Conclusion and Future Work;296
34.7;References;296
35;Enhancing Business Decisions with Neurofuzzy Technology;297
35.1;Introduction;297
35.2;Fuzzy Logic;297
35.2.1;Fuzzy System Model;299
35.3;Artificial Neural Networks;300
35.3.1;The Biological Neural Network;300
35.3.2;Modelling the Biological System;300
35.3.3;Features of Artificial Neural Networks (ANN);301
35.3.4;Learning in ANN;301
35.4;Neurofuzzy Technology;301
35.5;Modeling Customer Selection System for Target Market;302
35.5.1;System Description;302
35.5.2;System Structure;302
35.5.3;Variables;302
35.5.4;Rule Blocks;303
35.5.5;Neurofuzzy Design;303
35.5.6;Neurofuzzy Training of Fuzzy Systems;304
35.5.7;Evaluation;304
35.6;Conclusions and Recommendations;304
35.7;References;305
36;A System Design for a Telemedicine Health Care System;306
36.1;Introduction;306
36.2;Background and Motivation;306
36.3;Implemented Proposed Architecture;307
36.3.1;Design Description;309
36.3.2;Implementation of Web Services;310
36.3.3;Interoperability through Web Services;311
36.4;Evaluation of Proposed Architecture;313
36.4.1;Technologies Used in Tele-Wound$^{TM}$;313
36.5;Conclusion;316
36.6;References;316
37;Performance Analysis of PDC-OCDMA System with APD Mismatch;317
37.1;Introduction;317
37.2;System Model;318
37.3;APD Mismatch Analysis;319
37.4;Experiments and Results;322
37.5;References;324
38;Blocking Probabilities in WDM Switching Networks Using Overflow Analysis Method;325
38.1;Introduction;325
38.2;Theoretical Model;325
38.3;Results and Discussion;327
38.4;Conclusion;329
38.5;References;329
39;Design and Implementation of a Selective Harmonic Elimination SPWM Strategy-Based Inverter;330
39.1;Introduction;330
39.2;Some SPWM Strategies;330
39.3;Introduction to Selective Harmonic Elimination SPWM Strategy;331
39.4;Simulation Results;333
39.5;Firmware Implementation;338
39.6;Hardware Implementation;339
39.7;Conclusion;339
39.8;References;342
40;Case Study: Investigating the Performance of Interactive Multiple Motion Model Algorithm for a Crossing Target Scenario;343
40.1;Introduction;343
40.2;IMM Algorithm;344
40.2.1;Mode-Match Filtering;344
40.2.2;Mode Probability Update;346
40.2.3;Mixing Probability;346
40.2.4;Estimate and Covariance Combination;346
40.2.5;Interacting;347
40.3;Implementation;347
40.4;Conclusions;352
40.5;References;353
41;A Novel Approach for the Control of Dual-Active Bridge DC-DC Converter;354
41.1;Introduction;354
41.2;Critical Analysis of Existing Control System;355
41.3;Proposed Controller for the DAB Converter;357
41.3.1;Sliding Mode Control to DC-DC Converters;357
41.4;Conclusions;358
41.5;References;359
42;Importance of Data Center Philosophy, Architecture and Its Technologies;361
42.1;Background;361
42.2;Design Philosophy;362
42.3;Planning;362
42.4;Architecture;362
42.4.1;Power Efficient Unit;363
42.4.2;Precision Cooling System and HVAC;363
42.4.3;Fire Detection and Suppression System;364
42.4.4;Water Detectors and Sensors;364
42.4.5;SNMP Based Temperature and Humidity Sensors;364
42.4.6;Data Structuring Cabling;364
42.4.7;Attributes of EIA-TIA 942;364
42.4.8;Physical Security, Surveillance and Access Control;364
42.4.9;Seismic Protection;364
42.4.10;Disaster Recovery Site;365
42.4.11;Access Floors;365
42.4.12;Miscellaneous Consideration;365
42.5;Infrastructure Standard;366
42.5.1;Hot and Cold Aisles;366
42.6;New Data Center Technologies -Virtualization;367
42.7;Conclusion;367
42.8;References;367
43;Keynote Address: Is It Right and Is It Legal?;368
43.1;Introduction;368
43.2;The Manager’s Role;369
43.2.1;People;369
43.2.2;Information Technology;370
43.3;The IT as a Profession;372
43.4;Legal Environment;373
43.4.1;Defamation;373
43.4.2;Harassment;373
43.4.3;Pornography;374
43.5;Professional and Legal Issues Course;374
43.5.1;Syllabus;375
43.5.2;Case Studies;375
43.6;Conclusions;376
43.7;Future Work;376
43.8;References;376
44;Practical Optimal Caching Using Multiple Virtual Caches in Multiple Query Optimization;377
44.1;Introduction;377
44.1.1;Assumptions;378
44.1.2;Important Terms;378
44.2;Motivation;379
44.3;Related Work;379
44.3.1;Optimal Caching;380
44.3.2;Multiple Query Optimization in Mobile Databases;380
44.3.3;Demand Driven Caching;380
44.3.4;Caching Intermediate Results;381
44.4;The Method;381
44.4.1;System Architecture;381
44.4.2;Cache Manipulations;381
44.4.3;Time Based Caching of Multiple Queries Using Multiple Caches;383
44.4.4;A Concrete Example;385
44.4.5;A Special Case;386
44.5;Performance Evaluation;386
44.6;Conclusion and Future Work;387
44.7;References;387
45;A Design and Chronological Survey of Decision Feedback Equalizer for Single Carrier Transmission Compared with OFDM;389
45.1;Introduction;389
45.2;A Chronological Survey of SCT;390
45.3;SystemModel;393
45.4;Simulation Results;396
45.5;Conclusion;398
45.6;References;398
46;Speaker Verification Based on Information Theoretic Vector Quantization;402
46.1;Background;402
46.2;Preliminaries;403
46.2.1;K-Means Algorithm;403
46.2.2;LBG (Linde, Buzo and Gray) Algorithm;404
46.2.3;VQIT (Information Theoretic Vector Quantization) Algorithm;404
46.2.4;Gaussian Mixture Models;407
46.3;Results and Discussion;407
46.3.1;Experimental Setup;408
46.3.2;Experimental Results;409
46.4;Conclusion;409
46.5;References;410
47;Detecting Trojans Using Data Mining Techniques;411
47.1;Introduction;411
47.2;Related Research;412
47.3;Data Processing;414
47.3.1;Malware Analysis;414
47.3.2;File Size Analysis;415
47.3.3;Disassembly;415
47.3.4;Parsing;416
47.3.5;Feature Extraction;416
47.3.6;Primary Feature Selection;416
47.3.7;Independence Test;417
47.3.8;Secondary Feature Selection;417
47.4;Experiments;418
47.4.1;Bagging;418
47.4.2;Random Forest;418
47.4.3;Support Vector Machines;418
47.5;Results;419
47.6;Discussion;419
47.7;Conclusions;421
47.8;Future Work;421
47.9;References;421
48;Enabling MPSoC Design Space Exploration on FPGAs;423
48.1;Introduction;423
48.1.1;Synchronous Data Flow Graphs;423
48.1.2;Problem Description;424
48.2;Related Work;425
48.3;Implementation Details;426
48.4;Application Mapping;427
48.5;Conclusion;431
48.6;References;431
49;Range Based Real Time Localization in Wireless Sensor Networks;433
49.1;Introduction;433
49.2;Localization in WSNs;435
49.2.1;Range Free Localization;435
49.2.2;Range Based Localization;435
49.2.3;Time of Arrival (ToA);436
49.2.4;Two-Way Ranging Method;436
49.2.5;Trilateration;437
49.3;Localization Positions in WSNs;438
49.3.1;Relative Positions;438
49.3.2;Absolute Positions;438
49.4;Technology;439
49.4.1;IEEE 802.15.4 (Zigbee);439
49.5;System Description;440
49.5.1;Traffic Model;440
49.5.2;Performance Measures;440
49.6;Analysis;441
49.7;Conclusion and Future Work;441
49.8;References;441
50;PrISM: Automatic Detection and Prevention from Cyber Attacks;444
50.1;Introduction;444
50.2;Related Work;446
50.3;Preventive Information Security Management (PrISM) System;447
50.3.1;General Architecture;447
50.3.2;PrISM’s Operational Plan;450
50.3.3;Intrusion Detection in PrISM;450
50.3.4;Prevention Module;451
50.4;Conclusions;453
50.5;References;453
51;A Pretty Safe Strategy for Analyzing Discrete Security Assessment Framework in Wireless Sensor Networks;456
51.1;Introduction;456
51.2;Designing Assessment Strategy for D-SAFE;457
51.3;Future Work;458
51.4;References;458
52;Renewable Energy for Managing Energy Crisis in Pakistan;460
52.1;Introduction;460
52.2;Energy Supply and Demand in Pakistan;461
52.3;Potential of Renewable Energy Sources in Pakistan;463
52.3.1;Hydropower;463
52.3.2;Solar Energy;464
52.3.3;Wind Energy;464
52.3.4;Biomass Energy;464
52.4;Prospects of Renewables for Managing Energy Crisis in Pakistan;464
52.5;Conclusion;465
52.6;References;466
53;Author Index;467




