{"title":"Encrypting Informative Color Image Using Color Visual Cryptography","authors":"P. Chavan, Ramchandra S. Mangrulkar","doi":"10.1109/ICETET.2010.94","DOIUrl":"https://doi.org/10.1109/ICETET.2010.94","url":null,"abstract":"— Color Visual Cryptography scheme implemented in this paper encrypts informative color image in such a way that result of encryption is in the form of shares. Shares do not reflect any information directly, information is scrambled instead. Each share carries some information which in unreadable by necked eyes. The decryption is done directly by the human visual system with no special cryptographic calculations. Color visual cryptography uses 2 out of two secret sharing scheme which generates two shares for every input image to be encrypted. The original image is reconstructed by printing the two output shares onto transparencies and superimposing them together. This is X-OR operation between the shares to reveal the original information. The algorithm first generates RED, GREEN, BLUE as well as the ALPHA components of each pixel of an input image and these three components are used to generate the shares using 2 out of 2 secret sharing scheme. This scheme is useful in many applications like in securing information but not useful for visually blind people.","PeriodicalId":175615,"journal":{"name":"2010 3rd International Conference on Emerging Trends in Engineering and Technology","volume":"194 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124339619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Design Approach to Traffic Flow Forecasting with Soft Computing Tools","authors":"Snehal Jawanjal, P. Bajaj","doi":"10.1109/ICETET.2010.179","DOIUrl":"https://doi.org/10.1109/ICETET.2010.179","url":null,"abstract":"This paper focuses on traffic flow forecasting approach based on soft computing tools. The soft computing tools used is Particle Swarm Optimization (PSO) with Wavelet Network Model(WNM). The forecast of short-term traffic flow in timely and accurate is one of important contents of intelligent transportation system research. The modelling of traffic characteristics and the prediction of future traffic flow are the first steps to efficient network control and management. The real traffic data is used to demonstrate that the PSO algorithm combined with WNM is effective for traffic flow forecasting. The simulation results demonstrate that the proposed model can improve prediction accuracy and outperforms other compared methods. A new hybrid model between wavelet analysis and a neural network: wavelet network model absorbs some merits of wavelet transform and artificial neural network.","PeriodicalId":175615,"journal":{"name":"2010 3rd International Conference on Emerging Trends in Engineering and Technology","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122781944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Approach to Extract Salient Regions by Segmenting Color Images with Hybrid Algorithm","authors":"P. Palsodkar, P. Bajaj","doi":"10.1109/ICETET.2010.25","DOIUrl":"https://doi.org/10.1109/ICETET.2010.25","url":null,"abstract":"Due to the advent of computer technology image-processing techniques have become increasingly important in a wide variety of applications. This is particularly true for medical imaging such as Computer Tomography (CT), magnetic resonance image (MRI), and nuclear medicine, which can be used to assist doctors in diagnosis, treatment, and research. In this paper, hybrid algorithm for segmentation of color images is presented. The segments in images are found automatically based on adaptive multilevel threshold approach and FCM algorithm. Neural network with multisigmoid function tries to label the objects with its original color even after segmentation. One of the advantages of this system is that it does not require a past knowledge about the number of objects in the image. This Fuzzy-Neuro system is tested on Berkley standard image database and also attempts have been made to compare the performance of the proposed algorithm with other currently available algorithms. From experimental results, the performance of the proposed technique is found out to yields better extraction of salient regions with high resolution as nearly same as the original image and better than the existing techniques. It can be used as a primary tool to segment unknown color images. Experimental results show that its performance is robust to different types of color images.","PeriodicalId":175615,"journal":{"name":"2010 3rd International Conference on Emerging Trends in Engineering and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126469825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FPGA Based Reconfigurable 200 MHz Transmitter and Receiver Front End for MIMO-OFDM","authors":"M. Veena, C. Raj, M. Swamy","doi":"10.1109/ICETET.2010.79","DOIUrl":"https://doi.org/10.1109/ICETET.2010.79","url":null,"abstract":"This paper focuses on design, implementation and optimization of digital front end module of Multiple Input Multiple Output (MIMO)-Orthogonal Frequency Division Multiplexing (OFDM) system on FPGA employing Alamouti Technique (Space Time Block coding). MIMO-OFDM can very effectively be used to achieve higher data rates and higher reliability and this is going to be the Key for 4G Technology. MIMO-OFDM designed in this work consists of Input/Output memory, 16-QAM modulator, MIMO Encoder( Space Time Encoder), Wireless Channel Model, MIMO Decoder( Space Time Decoder) and 16-QAM Demodulator. This paper has resulted in the development of a hardware prototype of a MIMO Transmitter, Receiver and channel, which works at the speed of 200MHz on a Spartan-3 FPGA board. Test benches for individual model were developed and tested it for its correct functionality. The functional simulation was carried out for the entire design. The entire design was mapped on to FPGA.","PeriodicalId":175615,"journal":{"name":"2010 3rd International Conference on Emerging Trends in Engineering and Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116470515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Throughput Analysis of the IEEE 802.11 Distributed Coordination Function Considering Capture Effects","authors":"Ponnusamy Kumar, A. Krishnan","doi":"10.1109/ICETET.2010.77","DOIUrl":"https://doi.org/10.1109/ICETET.2010.77","url":null,"abstract":"Currently, IEEE 802.11 is the de facto standard for WLANs. It species both the medium access control and the physical layers for WLANs. The scope of IEEE 802.11 working groups (WGs) is to propose and develop MAC and PHY layer specifications for WLAN to handle mobile and portable stations. In this standard, the MAC layer operates on top of one of several possible physical layers. Medium access is performed using carrier sense multiple access with collision avoidance (CSMA/CA). In this paper, we present an analytical model to analyze the saturation performance of IEEE 802.11 MAC layer with capture effects. We extend the multidimensional Markov chain model initially proposed by Bianchi[3] to characterize the behavior of DCF considering capture effects.","PeriodicalId":175615,"journal":{"name":"2010 3rd International Conference on Emerging Trends in Engineering and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130698537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Holmukhe, P. S. Chaudhari, P. Kulkarni, Kiran Deshpande, P. Kulkarni
{"title":"Measurement of Weather Parameters via Transmission Line Monitoring System for Load Forecasting","authors":"R. Holmukhe, P. S. Chaudhari, P. Kulkarni, Kiran Deshpande, P. Kulkarni","doi":"10.1109/ICETET.2010.155","DOIUrl":"https://doi.org/10.1109/ICETET.2010.155","url":null,"abstract":"Climate has significant impact on generation, transmission and demand of electricity. There is need to manage weather and climate effects to avoid penalties due to incorrectly predicted demand. The effect of weather changes is seen through fluctuation of electricity demand. Electricity demand is influenced by temperature, wind speed, humidity, precipitation and cloud cover. This further effects practically demand for air condidtioning, space heating, refrigeration and water pumping loads. This changes the peak demand and 24 hour demand. Transmission systems are found to be sensitive through thermal constraints and faults caused by extreme weather conditions. Demand levels are also weather sensitive. Thus all these pose serious challenges to electicity supply industry. It is also true that the forecasted load by load forecasters at load dispatch center, depend on the reliability of line that weather it is conveying that much of MW share to all related areas. Transmission system should be protected from weather effects. So proper means like some type of devices should be equipped over the tower which should sense the weather factors like temperature, humidity etc in prior. This paper presents the device named transmission line monitoring system for the measurement of weather parameters.","PeriodicalId":175615,"journal":{"name":"2010 3rd International Conference on Emerging Trends in Engineering and Technology","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134033932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effective Quality Metrics for Qualitative Cellular Services","authors":"Aruna A. Deoskar","doi":"10.1109/ICETET.2010.32","DOIUrl":"https://doi.org/10.1109/ICETET.2010.32","url":null,"abstract":"The rapid growth of telecommunication has raised the mobility concept & demand among users. With mobile in hand user finishes its maximum work of different nature in minimum amount of time. This increases the work efficiency of users in overall aspect. This change is effective if and only if service providers provide qualitative cellular services. User is more and more demanding now a days in terms of service Quality. The need arises to study the several quality parameters related to cellular services from customer perception. This paper analyses the quality parameters & quality attributes of wireless communication, which are affecting the cellular service quality & proposes a quality metrics for improving the overall cellular service quality.","PeriodicalId":175615,"journal":{"name":"2010 3rd International Conference on Emerging Trends in Engineering and Technology","volume":"893 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132082809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Conceptual Mapping of Risk Management to Data Mining","authors":"Terence Johnson","doi":"10.1109/ICETET.2010.98","DOIUrl":"https://doi.org/10.1109/ICETET.2010.98","url":null,"abstract":"Risk Management is a logical and systematic method of identifying, analyzing, treating and monitoring the risks involved in any activity or process. The key to successful risk management lies in the ability to tailor a formal risk management process that addresses the complementary needs of the business and its customers. A formal risk management process is a continuous process for systematically addressing risk throughout the product/project life-cycle. Risks can be introduced (or latently reside) at the very earliest stages of the project life-cycle. The ability to identify risks earlier translates into earlier risk removal, at less cost, which promotes higher project success probability. Data mining refers to discovery or “mining” of knowledge from large amounts of data. Data Mining has been described as a confluence of different disciplines primarily database systems, statistics, machine learning and information science. This paper aims to study the conceptual mapping of Risk Management to Data Mining. A new paradigm has been suggested for Risk Management using the main attributes and key aspects of Data Mining.","PeriodicalId":175615,"journal":{"name":"2010 3rd International Conference on Emerging Trends in Engineering and Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114080659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mathematical Model of Voltage and Current Distribution in Transmission Line Using DSVs and Exponential Approximation","authors":"Swati Agrawal Dhanjal, P. Daigavane, J. Helonde","doi":"10.1109/ICETET.2010.132","DOIUrl":"https://doi.org/10.1109/ICETET.2010.132","url":null,"abstract":"In this paper a mathematical model is developed for the distribution of voltage and current in the transmission line using distributed state variables .It gives the time domain solution of the terminal voltage and current as well as their line distributions. This is achieved by treating voltage and current distributions as distributed state variables (DSVs) and turning the transmission line equation into an ordinary differential equation. Overall the transmission line is treated like other lumped dynamic components, such as capacitors, inductors, etc using backward differentiation formula for time discretization, the DSV transmission line component is converted to a simple time domain companion model, from which its local truncation error can be derived. As the voltage and current distribution get more complicated with time ,a new piecewise exponential with controlled accuracy is invented. A segmentation algorithm is also devised so that the line is dynamically bisected to guarantee that the total piecewise exponential error is a small fraction of the local truncation error. Using this approach, the user can see the line voltage and current at any point and time freely without explicitly segmenting the line before starting the simulation.","PeriodicalId":175615,"journal":{"name":"2010 3rd International Conference on Emerging Trends in Engineering and Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115131796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"VLSI Architecture of DWT Based Watermark Encoder for Secure Still Digital Camera Design","authors":"A. Darji, A. Chandorkar, S. Merchant, V. Mistry","doi":"10.1109/ICETET.2010.41","DOIUrl":"https://doi.org/10.1109/ICETET.2010.41","url":null,"abstract":"Digital watermarking is the technique used to embed author’s credentials, logo or some other information into digital images which can be used in authentications for courtroom evidence, copyright claims and other applications. The objective of this work is to develop a feasible and invisible watermark embedding hardware for the secure digital cameras using LeGall 5/3 (Discrete Wavelet Transform) DWT. Bind watermarking tecnique is proposed here. The proposed architecture considers constraints of digital camera such as area, speed, power, robustness and invisibility. The algorithm is evaluated under the attacks like JPEG (Joint Photographic Experts Group) compression, noise, scaling and rotation to verify robustness and invisibility properties. Watermarking processor is described using Verilog HDL and synthesized using 0.18 µm technology UMC standard cell library for VLSI implementation.","PeriodicalId":175615,"journal":{"name":"2010 3rd International Conference on Emerging Trends in Engineering and Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114503091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}