2010 3rd International Conference on Emerging Trends in Engineering and Technology最新文献

筛选
英文 中文
Encrypting Informative Color Image Using Color Visual Cryptography 使用彩色视觉密码技术加密信息彩色图像
P. Chavan, Ramchandra S. Mangrulkar
{"title":"Encrypting Informative Color Image Using Color Visual Cryptography","authors":"P. Chavan, Ramchandra S. Mangrulkar","doi":"10.1109/ICETET.2010.94","DOIUrl":"https://doi.org/10.1109/ICETET.2010.94","url":null,"abstract":"— Color Visual Cryptography scheme implemented in this paper encrypts informative color image in such a way that result of encryption is in the form of shares. Shares do not reflect any information directly, information is scrambled instead. Each share carries some information which in unreadable by necked eyes. The decryption is done directly by the human visual system with no special cryptographic calculations. Color visual cryptography uses 2 out of two secret sharing scheme which generates two shares for every input image to be encrypted. The original image is reconstructed by printing the two output shares onto transparencies and superimposing them together. This is X-OR operation between the shares to reveal the original information. The algorithm first generates RED, GREEN, BLUE as well as the ALPHA components of each pixel of an input image and these three components are used to generate the shares using 2 out of 2 secret sharing scheme. This scheme is useful in many applications like in securing information but not useful for visually blind people.","PeriodicalId":175615,"journal":{"name":"2010 3rd International Conference on Emerging Trends in Engineering and Technology","volume":"194 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124339619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Design Approach to Traffic Flow Forecasting with Soft Computing Tools 基于软计算工具的交通流预测设计方法
Snehal Jawanjal, P. Bajaj
{"title":"A Design Approach to Traffic Flow Forecasting with Soft Computing Tools","authors":"Snehal Jawanjal, P. Bajaj","doi":"10.1109/ICETET.2010.179","DOIUrl":"https://doi.org/10.1109/ICETET.2010.179","url":null,"abstract":"This paper focuses on traffic flow forecasting approach based on soft computing tools. The soft computing tools used is Particle Swarm Optimization (PSO) with Wavelet Network Model(WNM). The forecast of short-term traffic flow in timely and accurate is one of important contents of intelligent transportation system research. The modelling of traffic characteristics and the prediction of future traffic flow are the first steps to efficient network control and management. The real traffic data is used to demonstrate that the PSO algorithm combined with WNM is effective for traffic flow forecasting. The simulation results demonstrate that the proposed model can improve prediction accuracy and outperforms other compared methods. A new hybrid model between wavelet analysis and a neural network: wavelet network model absorbs some merits of wavelet transform and artificial neural network.","PeriodicalId":175615,"journal":{"name":"2010 3rd International Conference on Emerging Trends in Engineering and Technology","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122781944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Novel Approach to Extract Salient Regions by Segmenting Color Images with Hybrid Algorithm 基于混合算法分割彩色图像提取显著区域的新方法
P. Palsodkar, P. Bajaj
{"title":"A Novel Approach to Extract Salient Regions by Segmenting Color Images with Hybrid Algorithm","authors":"P. Palsodkar, P. Bajaj","doi":"10.1109/ICETET.2010.25","DOIUrl":"https://doi.org/10.1109/ICETET.2010.25","url":null,"abstract":"Due to the advent of computer technology image-processing techniques have become increasingly important in a wide variety of applications. This is particularly true for medical imaging such as Computer Tomography (CT), magnetic resonance image (MRI), and nuclear medicine, which can be used to assist doctors in diagnosis, treatment, and research. In this paper, hybrid algorithm for segmentation of color images is presented. The segments in images are found automatically based on adaptive multilevel threshold approach and FCM algorithm. Neural network with multisigmoid function tries to label the objects with its original color even after segmentation. One of the advantages of this system is that it does not require a past knowledge about the number of objects in the image. This Fuzzy-Neuro system is tested on Berkley standard image database and also attempts have been made to compare the performance of the proposed algorithm with other currently available algorithms. From experimental results, the performance of the proposed technique is found out to yields better extraction of salient regions with high resolution as nearly same as the original image and better than the existing techniques. It can be used as a primary tool to segment unknown color images. Experimental results show that its performance is robust to different types of color images.","PeriodicalId":175615,"journal":{"name":"2010 3rd International Conference on Emerging Trends in Engineering and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126469825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FPGA Based Reconfigurable 200 MHz Transmitter and Receiver Front End for MIMO-OFDM 基于FPGA的可重构200mhz MIMO-OFDM收发前端
M. Veena, C. Raj, M. Swamy
{"title":"FPGA Based Reconfigurable 200 MHz Transmitter and Receiver Front End for MIMO-OFDM","authors":"M. Veena, C. Raj, M. Swamy","doi":"10.1109/ICETET.2010.79","DOIUrl":"https://doi.org/10.1109/ICETET.2010.79","url":null,"abstract":"This paper focuses on design, implementation and optimization of digital front end module of Multiple Input Multiple Output (MIMO)-Orthogonal Frequency Division Multiplexing (OFDM) system on FPGA employing Alamouti Technique (Space Time Block coding). MIMO-OFDM can very effectively be used to achieve higher data rates and higher reliability and this is going to be the Key for 4G Technology. MIMO-OFDM designed in this work consists of Input/Output memory, 16-QAM modulator, MIMO Encoder( Space Time Encoder), Wireless Channel Model, MIMO Decoder( Space Time Decoder) and 16-QAM Demodulator. This paper has resulted in the development of a hardware prototype of a MIMO Transmitter, Receiver and channel, which works at the speed of 200MHz on a Spartan-3 FPGA board. Test benches for individual model were developed and tested it for its correct functionality. The functional simulation was carried out for the entire design. The entire design was mapped on to FPGA.","PeriodicalId":175615,"journal":{"name":"2010 3rd International Conference on Emerging Trends in Engineering and Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116470515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Throughput Analysis of the IEEE 802.11 Distributed Coordination Function Considering Capture Effects 考虑捕获效应的IEEE 802.11分布式协调函数吞吐量分析
Ponnusamy Kumar, A. Krishnan
{"title":"Throughput Analysis of the IEEE 802.11 Distributed Coordination Function Considering Capture Effects","authors":"Ponnusamy Kumar, A. Krishnan","doi":"10.1109/ICETET.2010.77","DOIUrl":"https://doi.org/10.1109/ICETET.2010.77","url":null,"abstract":"Currently, IEEE 802.11 is the de facto standard for WLANs. It species both the medium access control and the physical layers for WLANs. The scope of IEEE 802.11 working groups (WGs) is to propose and develop MAC and PHY layer specifications for WLAN to handle mobile and portable stations. In this standard, the MAC layer operates on top of one of several possible physical layers. Medium access is performed using carrier sense multiple access with collision avoidance (CSMA/CA). In this paper, we present an analytical model to analyze the saturation performance of IEEE 802.11 MAC layer with capture effects. We extend the multidimensional Markov chain model initially proposed by Bianchi[3] to characterize the behavior of DCF considering capture effects.","PeriodicalId":175615,"journal":{"name":"2010 3rd International Conference on Emerging Trends in Engineering and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130698537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Measurement of Weather Parameters via Transmission Line Monitoring System for Load Forecasting 利用输电线路监测系统测量天气参数进行负荷预测
R. Holmukhe, P. S. Chaudhari, P. Kulkarni, Kiran Deshpande, P. Kulkarni
{"title":"Measurement of Weather Parameters via Transmission Line Monitoring System for Load Forecasting","authors":"R. Holmukhe, P. S. Chaudhari, P. Kulkarni, Kiran Deshpande, P. Kulkarni","doi":"10.1109/ICETET.2010.155","DOIUrl":"https://doi.org/10.1109/ICETET.2010.155","url":null,"abstract":"Climate has significant impact on generation, transmission and demand of electricity. There is need to manage weather and climate effects to avoid penalties due to incorrectly predicted demand. The effect of weather changes is seen through fluctuation of electricity demand. Electricity demand is influenced by temperature, wind speed, humidity, precipitation and cloud cover. This further effects practically demand for air condidtioning, space heating, refrigeration and water pumping loads. This changes the peak demand and 24 hour demand. Transmission systems are found to be sensitive through thermal constraints and faults caused by extreme weather conditions. Demand levels are also weather sensitive. Thus all these pose serious challenges to electicity supply industry. It is also true that the forecasted load by load forecasters at load dispatch center, depend on the reliability of line that weather it is conveying that much of MW share to all related areas. Transmission system should be protected from weather effects. So proper means like some type of devices should be equipped over the tower which should sense the weather factors like temperature, humidity etc in prior. This paper presents the device named transmission line monitoring system for the measurement of weather parameters.","PeriodicalId":175615,"journal":{"name":"2010 3rd International Conference on Emerging Trends in Engineering and Technology","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134033932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Effective Quality Metrics for Qualitative Cellular Services 定性蜂窝服务的有效质量度量
Aruna A. Deoskar
{"title":"Effective Quality Metrics for Qualitative Cellular Services","authors":"Aruna A. Deoskar","doi":"10.1109/ICETET.2010.32","DOIUrl":"https://doi.org/10.1109/ICETET.2010.32","url":null,"abstract":"The rapid growth of telecommunication has raised the mobility concept & demand among users. With mobile in hand user finishes its maximum work of different nature in minimum amount of time. This increases the work efficiency of users in overall aspect. This change is effective if and only if service providers provide qualitative cellular services. User is more and more demanding now a days in terms of service Quality. The need arises to study the several quality parameters related to cellular services from customer perception. This paper analyses the quality parameters & quality attributes of wireless communication, which are affecting the cellular service quality & proposes a quality metrics for improving the overall cellular service quality.","PeriodicalId":175615,"journal":{"name":"2010 3rd International Conference on Emerging Trends in Engineering and Technology","volume":"893 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132082809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Conceptual Mapping of Risk Management to Data Mining 风险管理到数据挖掘的概念映射
Terence Johnson
{"title":"Conceptual Mapping of Risk Management to Data Mining","authors":"Terence Johnson","doi":"10.1109/ICETET.2010.98","DOIUrl":"https://doi.org/10.1109/ICETET.2010.98","url":null,"abstract":"Risk Management is a logical and systematic method of identifying, analyzing, treating and monitoring the risks involved in any activity or process. The key to successful risk management lies in the ability to tailor a formal risk management process that addresses the complementary needs of the business and its customers. A formal risk management process is a continuous process for systematically addressing risk throughout the product/project life-cycle. Risks can be introduced (or latently reside) at the very earliest stages of the project life-cycle. The ability to identify risks earlier translates into earlier risk removal, at less cost, which promotes higher project success probability. Data mining refers to discovery or “mining” of knowledge from large amounts of data. Data Mining has been described as a confluence of different disciplines primarily database systems, statistics, machine learning and information science. This paper aims to study the conceptual mapping of Risk Management to Data Mining. A new paradigm has been suggested for Risk Management using the main attributes and key aspects of Data Mining.","PeriodicalId":175615,"journal":{"name":"2010 3rd International Conference on Emerging Trends in Engineering and Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114080659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Mathematical Model of Voltage and Current Distribution in Transmission Line Using DSVs and Exponential Approximation 基于dsv和指数逼近的输电线路电压电流分布数学模型
Swati Agrawal Dhanjal, P. Daigavane, J. Helonde
{"title":"Mathematical Model of Voltage and Current Distribution in Transmission Line Using DSVs and Exponential Approximation","authors":"Swati Agrawal Dhanjal, P. Daigavane, J. Helonde","doi":"10.1109/ICETET.2010.132","DOIUrl":"https://doi.org/10.1109/ICETET.2010.132","url":null,"abstract":"In this paper a mathematical model is developed for the distribution of voltage and current in the transmission line using distributed state variables .It gives the time domain solution of the terminal voltage and current as well as their line distributions. This is achieved by treating voltage and current distributions as distributed state variables (DSVs) and turning the transmission line equation into an ordinary differential equation. Overall the transmission line is treated like other lumped dynamic components, such as capacitors, inductors, etc using backward differentiation formula for time discretization, the DSV transmission line component is converted to a simple time domain companion model, from which its local truncation error can be derived. As the voltage and current distribution get more complicated with time ,a new piecewise exponential with controlled accuracy is invented. A segmentation algorithm is also devised so that the line is dynamically bisected to guarantee that the total piecewise exponential error is a small fraction of the local truncation error. Using this approach, the user can see the line voltage and current at any point and time freely without explicitly segmenting the line before starting the simulation.","PeriodicalId":175615,"journal":{"name":"2010 3rd International Conference on Emerging Trends in Engineering and Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115131796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VLSI Architecture of DWT Based Watermark Encoder for Secure Still Digital Camera Design 基于DWT水印编码器的安全静态数码相机VLSI结构设计
A. Darji, A. Chandorkar, S. Merchant, V. Mistry
{"title":"VLSI Architecture of DWT Based Watermark Encoder for Secure Still Digital Camera Design","authors":"A. Darji, A. Chandorkar, S. Merchant, V. Mistry","doi":"10.1109/ICETET.2010.41","DOIUrl":"https://doi.org/10.1109/ICETET.2010.41","url":null,"abstract":"Digital watermarking is the technique used to embed author’s credentials, logo or some other information into digital images which can be used in authentications for courtroom evidence, copyright claims and other applications. The objective of this work is to develop a feasible and invisible watermark embedding hardware for the secure digital cameras using LeGall 5/3 (Discrete Wavelet Transform) DWT. Bind watermarking tecnique is proposed here. The proposed architecture considers constraints of digital camera such as area, speed, power, robustness and invisibility. The algorithm is evaluated under the attacks like JPEG (Joint Photographic Experts Group) compression, noise, scaling and rotation to verify robustness and invisibility properties. Watermarking processor is described using Verilog HDL and synthesized using 0.18 µm technology UMC standard cell library for VLSI implementation.","PeriodicalId":175615,"journal":{"name":"2010 3rd International Conference on Emerging Trends in Engineering and Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114503091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信