{"title":"A new architecture for the generation of picture based CAPTCHA","authors":"Benson Raj, Deepa Devassy, Jiji Jagannivas","doi":"10.1007/978-3-642-29280-4_66","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_66","url":null,"abstract":"","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132245865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A functional taxonomy of SMSblR systems","authors":"M. Joshi, Varsha M. Pathak","doi":"10.1109/ICECTECH.2011.5942074","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5942074","url":null,"abstract":"Short Short Message Service (SMS) based Information Systems (SMSblR) provide an excellent alternative to a traditional approach of obtaining specific information by direct (through phone) or indirect (IVRS, Web, Email) probing. Number of key players in search industry including Microsoft and Google are attracted by the expected increase in volume of use of such applications. Several SMSblR systems are available and each one supports a typical class of features. In this review paper, we present functional taxonomy of SMSblR systems. We explicitly identify and describe 18 distinct functional features of SMSblR systems, which are further grouped into five categories. These five functional categories are then used to establish a taxonomy under which the analyzed systems are classified. We present a tabular classification for each functional category, with the aim of providing a starting point for researchers to construct their own SMSblR system.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130957731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Relevance of wavelet transform for taxonomy of EEG signals","authors":"P. Ramaraju","doi":"10.1109/ICECTECH.2011.5941838","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941838","url":null,"abstract":"Electroencephalograms (EEGs) are becoming increasingly important measurements of brain activity and they have great potential for the diagnosis and treatment of mental and brain diseases and abnormalities (7). The frequency range of EEG signal is 0 to 64 Hz (8). These non-stationary signals are may contain indicators of current disease, or even warnings about impending diseases. An original investigative move toward for data mining of EEG signal based on continuous wavelet transformation (CWT) investigation is introduced and applied. This paper describes the relevance of wavelet transform (WT) model for categorization of electroencephalogram (EEG) signals which provides a system oriented scientific conclusion. Decision making was performed in two steps: development of a data bank for dissimilar EEG signals using the wavelet transform (WT) and identification of different EEG signals there in the data bank to wrap up a judgment making [14–16]. Two types of EEG signals were used as input patterns and illustrated as easel and case2. Within this practice the applied signal has been compared in a chronological order with divergent cases in existence in the database [17]. The signal under consideration was evaluated and distinguished the holder 100% truthfully","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125129380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced 3-way handshake protocol for key exchange in IEEE 802. 11i","authors":"Dinesh M. Yadav, A. Sardana","doi":"10.1109/ICECTECH.2011.5942066","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5942066","url":null,"abstract":"Authentication and key exchange is a challenging area in wireless networks. The authentication process of IEEE 802.1U is using the standards of IEEE 802.1X for authentication; and for key management and distribution, 4-way handshake protocol is used. Due to various design flaws, 4-way handshake is incapable in providing the security and performance. In this paper, we propose a new technique for key exchange which is able to provide an enhance security in comparison with 4-way handshake protocol. This enhanced technique called, 3-way handshake, is able to provide security against DoS attacks, dictionary attacks, replay attacks and passive attacks. In this technique 3 messages are exchanged for generating the pairwise transient key (PTK). Those messages are encrypted using two keys. The proposed model has been verified analytically and shows that not only security but also better performance can be achieved using this model. Moreover, this technique can reduce the communication, computation and memory overheads.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129078260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of quality of object oriented systems using object oriented metrics","authors":"N. Kayarvizhy, S. Kanmani","doi":"10.1109/ICECTECH.2011.5941986","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941986","url":null,"abstract":"Measurement is fundamental to any engineering discipline. There is considerable evidence that object-oriented design metrics can be used to make quality management decisions. This leads to substantial cost savings in allocation of resources for testing or estimation of maintenance effort for a project. C++ has always been the most preferred language of choice for many object oriented systems and many object oriented metrics have been proposed for it. This paper focuses on an empirical evaluation of object oriented metrics in C++. Two projects have been considered as inputs for the study — the first project is a Library management system for a college and the second is a graphical editor which can be used to describe and create a scene. The metric values have been calculated using a semi automated tool. The resulting values have been analyzed to provide significant insight about the object oriented characteristics of the projects.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123632458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing Cassegrainian reflector and feed system for a cloud radar: The Minimum Blockage Condition","authors":"K. Patel","doi":"10.1109/ICECTECH.2011.5941715","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941715","url":null,"abstract":"Dual-reflector antennas are considered as pencil beam antennas that can produce radiation identical to searchlight beams. As compared with front-fed configuration, design of dual — reflector geometry is complicated since the parameters like feed location, subreflector size, required taper on subreflector, selection of focal length to diameter ratio of the main reflector, amplitude distribution provided by feed etc. are to be adjusted as per the given specifications. Also the sidelobe suppression effort requires the antenna to be designed for minimum subreflector blockage. In this paper, design of such a Cassegrainian reflector is considered for the Minimum Blockage Condition. Along with the parameters like high gain and low cross-polarization; low VSWR is also one of the prenominal parameter that can be achieved by designing the conical corrugated horn antenna with throat section. The design of Scalar Feed is also discussed. This type of design is easier than the former. For obtaining the radiation diagram, ‘Induced Current Analysis of Reflector Antenna’ software is used.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124877178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Pandiaraj, L. Gloria, Nisha Rachael Keziah, Synthia Vynothini, K. R. S. Kumar
{"title":"A proficient vocal training system with pitch detection using SHR","authors":"S. Pandiaraj, L. Gloria, Nisha Rachael Keziah, Synthia Vynothini, K. R. S. Kumar","doi":"10.1109/ICECTECH.2011.5941760","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941760","url":null,"abstract":"This paper insinuates a vocal training system that helps in proficient vocal training. There are two foremost objectives involved. The crucial objective is to estimate and detect pitch from a vocal. The secondary objective is to create an efficient vocal training system that perceives error in pitch. The purpose of this paper is to develop an adept vocal training system that perceives and appraises the pitches of both the amateur vocalist and the professional vocalist and displays inaccuracy of the amateur's voice.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126197001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lossless Segment Based DNA Compression","authors":"Mridula T, P. Samuel","doi":"10.1109/ICECTECH.2011.5941705","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941705","url":null,"abstract":"This paper introduces a new Lossless Segment Based DNA Compression (LSBD) method for compressing the DNA sequences. It stores the individual gene position in a compressed file. Since LSBD method performs a gene wise compression, further processing of compressed data reduces memory usage. The biggest advantage of this algorithm is that it enables part by part decompression and can work on any sized data. Here the method identifies individual gene location and then constructs triplets that are mapped to an eight bit number. The individual gene information is stored in a pointer table and a pointer is provided to corresponding location in the compressed file. The LSBD technique appropriately compresses the non-base characters and performs well on repeating sequences.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128742991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Antispoofing information lost and regained","authors":"B. Joshi, D. Rao, Pavan Kurapati","doi":"10.1109/ICECTECH.2011.5941957","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941957","url":null,"abstract":"Though spoofing based attacks have severe consequences and are wide-spread, much of the present day Internet is ill-prepared to defend against them. For effective defense against spoofing, devices at the edge of the Internet have a major role to play. Broadband access concentrators (BAC) are one such set of devices that can help in mitigating the IP spoofing attacks. With the growing use of dynamic assignment of IP addresses to subscribers (e.g., using DHCP), BACs are dependent on dynamically acquired information to do antispoofing. An important and pressing problem is dealing with loss of this information (e.g., because of BAC reboots). The current solution to deal with this problem for DHCP is found to be inefficient and ineffective. We propose a new solution that is efficient and effective.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115119670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decorator Pattern with XML in web application","authors":"Vijay K Kerji","doi":"10.1109/ICECTECH.2011.5942008","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5942008","url":null,"abstract":"Reusability and adapting to the changing software requirements are some of the challenges faced by software engineering community. In order to achieve these goals, application of Deign Patterns in software design is a proven practice. Choosing a Design Pattern and applying it to the correct software requirements needs experience and better understanding of each of the patterns In this paper, we proposed and applied Decorator Design Pattern to web application to simplify the implementation of certain software requirements which has different implementation for different user, keeping some of the features remain constant. Decorator pattern adds additional responsibility to the existing user page thereby reducing the total efforts needed to implement the corresponding requirement. Based on the type of user logged into the application, necessary XHTML code will be generated and rendered to the browser. Extensible Markup Language (XML) is used to increase the adaptability of the web application to changing requirements. Use of XML will make the application flexible to the changes in the requirement which makes the code maintenance easier. This proposed design is implemented using .NET frame work, C# and ASP.NET. Resulting application showed improvement in performance, increasing reusability and its ease of maintenance.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"252 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115625926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}