2011 3rd International Conference on Electronics Computer Technology最新文献

筛选
英文 中文
A new architecture for the generation of picture based CAPTCHA 一种新的基于图片的验证码生成体系结构
2011 3rd International Conference on Electronics Computer Technology Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_66
Benson Raj, Deepa Devassy, Jiji Jagannivas
{"title":"A new architecture for the generation of picture based CAPTCHA","authors":"Benson Raj, Deepa Devassy, Jiji Jagannivas","doi":"10.1007/978-3-642-29280-4_66","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_66","url":null,"abstract":"","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132245865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
A functional taxonomy of SMSblR systems SMSblR系统的功能分类
2011 3rd International Conference on Electronics Computer Technology Pub Date : 2011-07-07 DOI: 10.1109/ICECTECH.2011.5942074
M. Joshi, Varsha M. Pathak
{"title":"A functional taxonomy of SMSblR systems","authors":"M. Joshi, Varsha M. Pathak","doi":"10.1109/ICECTECH.2011.5942074","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5942074","url":null,"abstract":"Short Short Message Service (SMS) based Information Systems (SMSblR) provide an excellent alternative to a traditional approach of obtaining specific information by direct (through phone) or indirect (IVRS, Web, Email) probing. Number of key players in search industry including Microsoft and Google are attracted by the expected increase in volume of use of such applications. Several SMSblR systems are available and each one supports a typical class of features. In this review paper, we present functional taxonomy of SMSblR systems. We explicitly identify and describe 18 distinct functional features of SMSblR systems, which are further grouped into five categories. These five functional categories are then used to establish a taxonomy under which the analyzed systems are classified. We present a tabular classification for each functional category, with the aim of providing a starting point for researchers to construct their own SMSblR system.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130957731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Relevance of wavelet transform for taxonomy of EEG signals 小波变换在脑电信号分类中的应用
2011 3rd International Conference on Electronics Computer Technology Pub Date : 2011-07-07 DOI: 10.1109/ICECTECH.2011.5941838
P. Ramaraju
{"title":"Relevance of wavelet transform for taxonomy of EEG signals","authors":"P. Ramaraju","doi":"10.1109/ICECTECH.2011.5941838","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941838","url":null,"abstract":"Electroencephalograms (EEGs) are becoming increasingly important measurements of brain activity and they have great potential for the diagnosis and treatment of mental and brain diseases and abnormalities (7). The frequency range of EEG signal is 0 to 64 Hz (8). These non-stationary signals are may contain indicators of current disease, or even warnings about impending diseases. An original investigative move toward for data mining of EEG signal based on continuous wavelet transformation (CWT) investigation is introduced and applied. This paper describes the relevance of wavelet transform (WT) model for categorization of electroencephalogram (EEG) signals which provides a system oriented scientific conclusion. Decision making was performed in two steps: development of a data bank for dissimilar EEG signals using the wavelet transform (WT) and identification of different EEG signals there in the data bank to wrap up a judgment making [14–16]. Two types of EEG signals were used as input patterns and illustrated as easel and case2. Within this practice the applied signal has been compared in a chronological order with divergent cases in existence in the database [17]. The signal under consideration was evaluated and distinguished the holder 100% truthfully","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125129380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Enhanced 3-way handshake protocol for key exchange in IEEE 802. 11i IEEE 802中用于密钥交换的增强的3路握手协议。11我
2011 3rd International Conference on Electronics Computer Technology Pub Date : 2011-07-07 DOI: 10.1109/ICECTECH.2011.5942066
Dinesh M. Yadav, A. Sardana
{"title":"Enhanced 3-way handshake protocol for key exchange in IEEE 802. 11i","authors":"Dinesh M. Yadav, A. Sardana","doi":"10.1109/ICECTECH.2011.5942066","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5942066","url":null,"abstract":"Authentication and key exchange is a challenging area in wireless networks. The authentication process of IEEE 802.1U is using the standards of IEEE 802.1X for authentication; and for key management and distribution, 4-way handshake protocol is used. Due to various design flaws, 4-way handshake is incapable in providing the security and performance. In this paper, we propose a new technique for key exchange which is able to provide an enhance security in comparison with 4-way handshake protocol. This enhanced technique called, 3-way handshake, is able to provide security against DoS attacks, dictionary attacks, replay attacks and passive attacks. In this technique 3 messages are exchanged for generating the pairwise transient key (PTK). Those messages are encrypted using two keys. The proposed model has been verified analytically and shows that not only security but also better performance can be achieved using this model. Moreover, this technique can reduce the communication, computation and memory overheads.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129078260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analysis of quality of object oriented systems using object oriented metrics 使用面向对象度量分析面向对象系统的质量
2011 3rd International Conference on Electronics Computer Technology Pub Date : 2011-07-07 DOI: 10.1109/ICECTECH.2011.5941986
N. Kayarvizhy, S. Kanmani
{"title":"Analysis of quality of object oriented systems using object oriented metrics","authors":"N. Kayarvizhy, S. Kanmani","doi":"10.1109/ICECTECH.2011.5941986","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941986","url":null,"abstract":"Measurement is fundamental to any engineering discipline. There is considerable evidence that object-oriented design metrics can be used to make quality management decisions. This leads to substantial cost savings in allocation of resources for testing or estimation of maintenance effort for a project. C++ has always been the most preferred language of choice for many object oriented systems and many object oriented metrics have been proposed for it. This paper focuses on an empirical evaluation of object oriented metrics in C++. Two projects have been considered as inputs for the study — the first project is a Library management system for a college and the second is a graphical editor which can be used to describe and create a scene. The metric values have been calculated using a semi automated tool. The resulting values have been analyzed to provide significant insight about the object oriented characteristics of the projects.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123632458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Designing Cassegrainian reflector and feed system for a cloud radar: The Minimum Blockage Condition 云雷达卡塞格雷恩反射和馈电系统的设计:最小阻塞条件
2011 3rd International Conference on Electronics Computer Technology Pub Date : 2011-07-07 DOI: 10.1109/ICECTECH.2011.5941715
K. Patel
{"title":"Designing Cassegrainian reflector and feed system for a cloud radar: The Minimum Blockage Condition","authors":"K. Patel","doi":"10.1109/ICECTECH.2011.5941715","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941715","url":null,"abstract":"Dual-reflector antennas are considered as pencil beam antennas that can produce radiation identical to searchlight beams. As compared with front-fed configuration, design of dual — reflector geometry is complicated since the parameters like feed location, subreflector size, required taper on subreflector, selection of focal length to diameter ratio of the main reflector, amplitude distribution provided by feed etc. are to be adjusted as per the given specifications. Also the sidelobe suppression effort requires the antenna to be designed for minimum subreflector blockage. In this paper, design of such a Cassegrainian reflector is considered for the Minimum Blockage Condition. Along with the parameters like high gain and low cross-polarization; low VSWR is also one of the prenominal parameter that can be achieved by designing the conical corrugated horn antenna with throat section. The design of Scalar Feed is also discussed. This type of design is easier than the former. For obtaining the radiation diagram, ‘Induced Current Analysis of Reflector Antenna’ software is used.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124877178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A proficient vocal training system with pitch detection using SHR 一个熟练的声音训练系统与音高检测使用SHR
2011 3rd International Conference on Electronics Computer Technology Pub Date : 2011-07-07 DOI: 10.1109/ICECTECH.2011.5941760
S. Pandiaraj, L. Gloria, Nisha Rachael Keziah, Synthia Vynothini, K. R. S. Kumar
{"title":"A proficient vocal training system with pitch detection using SHR","authors":"S. Pandiaraj, L. Gloria, Nisha Rachael Keziah, Synthia Vynothini, K. R. S. Kumar","doi":"10.1109/ICECTECH.2011.5941760","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941760","url":null,"abstract":"This paper insinuates a vocal training system that helps in proficient vocal training. There are two foremost objectives involved. The crucial objective is to estimate and detect pitch from a vocal. The secondary objective is to create an efficient vocal training system that perceives error in pitch. The purpose of this paper is to develop an adept vocal training system that perceives and appraises the pitches of both the amateur vocalist and the professional vocalist and displays inaccuracy of the amateur's voice.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126197001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Lossless Segment Based DNA Compression 基于无损片段的DNA压缩
2011 3rd International Conference on Electronics Computer Technology Pub Date : 2011-07-07 DOI: 10.1109/ICECTECH.2011.5941705
Mridula T, P. Samuel
{"title":"Lossless Segment Based DNA Compression","authors":"Mridula T, P. Samuel","doi":"10.1109/ICECTECH.2011.5941705","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941705","url":null,"abstract":"This paper introduces a new Lossless Segment Based DNA Compression (LSBD) method for compressing the DNA sequences. It stores the individual gene position in a compressed file. Since LSBD method performs a gene wise compression, further processing of compressed data reduces memory usage. The biggest advantage of this algorithm is that it enables part by part decompression and can work on any sized data. Here the method identifies individual gene location and then constructs triplets that are mapped to an eight bit number. The individual gene information is stored in a pointer table and a pointer is provided to corresponding location in the compressed file. The LSBD technique appropriately compresses the non-base characters and performs well on repeating sequences.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128742991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Antispoofing information lost and regained 反欺骗信息丢失和恢复
2011 3rd International Conference on Electronics Computer Technology Pub Date : 2011-04-08 DOI: 10.1109/ICECTECH.2011.5941957
B. Joshi, D. Rao, Pavan Kurapati
{"title":"Antispoofing information lost and regained","authors":"B. Joshi, D. Rao, Pavan Kurapati","doi":"10.1109/ICECTECH.2011.5941957","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941957","url":null,"abstract":"Though spoofing based attacks have severe consequences and are wide-spread, much of the present day Internet is ill-prepared to defend against them. For effective defense against spoofing, devices at the edge of the Internet have a major role to play. Broadband access concentrators (BAC) are one such set of devices that can help in mitigating the IP spoofing attacks. With the growing use of dynamic assignment of IP addresses to subscribers (e.g., using DHCP), BACs are dependent on dynamically acquired information to do antispoofing. An important and pressing problem is dealing with loss of this information (e.g., because of BAC reboots). The current solution to deal with this problem for DHCP is found to be inefficient and ineffective. We propose a new solution that is efficient and effective.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115119670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Decorator Pattern with XML in web application web应用中带有XML的装饰器模式
2011 3rd International Conference on Electronics Computer Technology Pub Date : 2011-04-08 DOI: 10.1109/ICECTECH.2011.5942008
Vijay K Kerji
{"title":"Decorator Pattern with XML in web application","authors":"Vijay K Kerji","doi":"10.1109/ICECTECH.2011.5942008","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5942008","url":null,"abstract":"Reusability and adapting to the changing software requirements are some of the challenges faced by software engineering community. In order to achieve these goals, application of Deign Patterns in software design is a proven practice. Choosing a Design Pattern and applying it to the correct software requirements needs experience and better understanding of each of the patterns In this paper, we proposed and applied Decorator Design Pattern to web application to simplify the implementation of certain software requirements which has different implementation for different user, keeping some of the features remain constant. Decorator pattern adds additional responsibility to the existing user page thereby reducing the total efforts needed to implement the corresponding requirement. Based on the type of user logged into the application, necessary XHTML code will be generated and rendered to the browser. Extensible Markup Language (XML) is used to increase the adaptability of the web application to changing requirements. Use of XML will make the application flexible to the changes in the requirement which makes the code maintenance easier. This proposed design is implemented using .NET frame work, C# and ASP.NET. Resulting application showed improvement in performance, increasing reusability and its ease of maintenance.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"252 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115625926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信