{"title":"Wavelet packet analysis for reducing the effect of spectral masking to improve auditory perception","authors":"P. Dhulekar, S. Nalbalwar, J. Chopade","doi":"10.1109/ICECTECH.2011.5941728","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941728","url":null,"abstract":"Sensorineural hearing impaired person experiences degraded frequency selectivity of the ear, due to increase in spectral masking along the cochlear partition, results in degraded speech perception. Splitting the speech signal by means of filtering and down sampling at each decomposition level, using wavelet packets with different wavelet functions, helps to reduce the effect of spectral masking, through which it improve speech intelligibility. This experiment was carried out with vowel-consonant-vowel syllables for fifteen English consonants; they are decomposed in eight frequency bands with desired band selection. Dichotic presentation of the processed speech signal showed improvement in speech quality, recognition scores and less response time in the reception of speech feature of voicing, place, and manner, indicating usefulness of the scheme for better reception of spectral characteristics.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128520684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Finite element simulation of retrofitting of RCC beam using sisal fibre composite (natural fibre)","authors":"T. Sen, H. J. Reddy","doi":"10.1109/ICECTECH.2011.5942044","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5942044","url":null,"abstract":"Many of the existing reinforced concrete structures throughout the world are in urgent need of rehabilitation, repair or reconstruction because of deterioration due to various factors like corrosion, lack of detailing, failure of bonding between beam-column joints, increase in service loads, etc., leading to cracking, spalling, loss of strength, deflection, etc. The recent developments in the application of the advanced composites in the construction industry for concrete rehabilitation and strengthening are increasing on the basis of specific requirements, national needs and industry participation. The need for efficient rehabilitation and strengthening techniques of existing concrete structures has resulted in research and development of composite strengthening systems. Fiber Reinforced Polymer (FRP) composite has been accepted in the construction industry as a promising substitute for repairing and in incrementing the strength of RCC structures. FRP composites possess some outstanding properties such as: resistance to corrosion, good fatigue and damping resistance, high strength to weight ratio, and electromagnetic transparency. During the last decade there has been a renewed interest in the natural fibre as a substitute for conventional FRP materials such as glass fibres and carbon fibres, motivated by potential advantages of weight saving, lower raw material price, and ‘thermal recycling’ or the ecological advantages of using resources which are renewable, also natural fibres are sustainable materials. On the other hand natural fibres have their shortcomings, and these have to be solved in order to be competitive with glass and carbon. Natural fibres have lower durability and lower strength than glass fibres. However, recently developed fibre treatments have improved these properties considerably. We have enough natural resources and we must keep on researching on these natural resources. Among the various natural fibres, sisal fibre reinforced composite is of particular interest as these composites have high impact strength besides having moderate tensile and flexural properties compared to other lignocellulosic fibres. Hence encouragement should be given for the use of natural fibres, Here a nonlinear finite element analysis is carried out in order to evaluate the performance of sisal fibres in structural retrofitting by retrofitting a Plain Concrete Block by using sisal fibre reinforced polymer. It is seen that the strengthened specimens exhibit significant increase in strength, stiffness, and stability as compared to controlled specimens. It appears that the proposed simulation technique will have a significant impact in engineering practice in the near future.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128173507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new ultra-wideband parallel coupled line microstrip bandpass filter","authors":"K. Thirumalaivasan, R. Nakkeeran","doi":"10.1109/ICECTECH.2011.5941935","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941935","url":null,"abstract":"Bandpass filter is presented based on parallel coupled line microstrip structure suitable for wireless communication applications. Chebyshev filter of order 4 and 0.2 dB passband ripple with fractional bandwidth of 52.17 % is designed using insertion loss method. The proposed filter demonstrated excellent ultra-wide bandwidth from 6 GHz to 16 GHz. The analysis of the filter is performed by using MoM based electromagnetic solver, IE3D. With the above structural features the overall dimension of the filter is 23 mm (height) × 4 mm (length) × 1.6 mm (breadth). It is not only compact but also delivers excellent scattering parameters with the magnitude of insertion loss, |S21| lower than −1.2 dB and return loss better than −19.42 dB. In the passband the measured group delay varies in between 0 ns and 0.15 ns, showing stability with minimum variation of only 0.15 ns.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"207 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127324315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vision-based authenticated robotic control using face and hand gesture recognition","authors":"Ankit A. Bhurane, S. Talbar","doi":"10.1109/ICECTECH.2011.5941561","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941561","url":null,"abstract":"In this paper, a simple, yet effective system for authenticated robot control applications is presented. The system is based on face and hand gesture recognition. First, the user is verified using real dual-tree discrete wavelet transform (R-DT-DWT) based face recognition. The authenticated user is further allowed to have control over the required robot application using hand gesture recognition. Later, the hand gestures are accordingly interpreted for the required operation. Here, a limited set of hand gestures are used for controlling different operation of a robot. Simulation results show that the proposed method is simple and efficient.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127216804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applications of wireless sensor network in Intelligent Traffic System: A review","authors":"Abhijit Sharma, R. Chaki, U. Bhattacharya","doi":"10.1109/ICECTECH.2011.5941955","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941955","url":null,"abstract":"An Intelligent Traffic System (ITS) involves a much closer interaction between all of its components: drivers, pedestrians, public transportation and traffic management systems. Adaptive signal systems, driver advisory and route planning and automated vehicles are some of the goals set up to increase the efficiency of actual systems. Vehicular network became one of the most active and emerging fields of research during last decade. Its use in diversified applications (for example safe driving, congestion avoidance, parking assist system and even entertainment) will soon bring revolutionary changes in transportation system. In this paper we have reviewed applications of wireless sensor network towards developing an efficient system to control and manage smooth traffic flow.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127356018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of insulation degradation in Insulators using Partial Discharge analysis","authors":"V. Padma, V. Raghavan","doi":"10.1109/ICECTECH.2011.5941868","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941868","url":null,"abstract":"In Power system, the reliable power supply plays a vital role in Generation, Transmission and Distribution. It is necessary to facilitate uninterrupted Power supply by continuous monitoring of Power apparatus. In this regard, the monitoring and prevention of insulation failure becomes essential for uninterrupted functioning of power equipments. In this paper the deterioration of Insulation in Insulators is determined from the analysis of Partial Discharge signals. The Partial Discharge signals are produced by the localized ionization within electrical field. Hence the numerical analysis of Electric field can provide information about the Partial Discharges which is determined by using the Finite Element method.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131028690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recommender system in ubiquitous commerce","authors":"S. Manvi, N. Nalini, L. B. Bhajantri","doi":"10.1109/ICECTECH.2011.5941937","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941937","url":null,"abstract":"Commerce is a rapidly emerging application area of ubiquitous computing. Electronic commerce (e-commerce), mobile commerce (m-commerce) and ubiquitous commerce (u-commerce) are based not only on developments pertaining to the Internet compound, but also on prior technological and organizational innovations arising from the combination of telecommunications and organizational computing. A ubiquitous commerce is a service requested according to the customer's personal profile, which typically include individual preferences, keeping the technical constraints of mobile device in use and the context of operating environment using recommender system. In ubiquitous environment, a recommender system is an important key role that is used to provide suitable recommendation solutions to the customers. Recommender system addresses a variety of ubiquitous commerce needs. In ubiquitous commerce, contextual information must be incorporated into the recommendation process for offering quicker and relevant services. This paper attempts to present basic concepts like methods of recommender system, issues and challenges of recommender system in u-commerce, context aware recommender system and finally, discusses a sample scenario of recommender system in u-commerce.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125683043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simple calculator compiler using Lex and YACC","authors":"Mohit Upadhyaya","doi":"10.1109/ICECTECH.2011.5942077","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5942077","url":null,"abstract":"This paper contains the details of how one can develop the simple compiler for procedural lanaguage using Lex (Lexical Analyzer Generator) and YACC (Yet Another Compiler-Compiler). Lex tool helps write programs whose control flow is directed by instances of regular expressions in the input stream. It is well suited for editor-scripts type transformations and for segmenting input in preparation for a parsing routine. Lex tool source is the table of regular expressions and corresponding program fragments. The table is translated to a program which reads an input stream, copying it to an output stream and partitioning the input into strings which match the given expressions. On the other hand YACC tool receives input of the user grammar. Starting from this grammar it generates the C source code for the parser. YACC invokes Lex to scan the source code and uses the tokens returned by Lex to build a syntax tree. With the help of YACC and Lex tool one can write their own compiler.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132892452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Constructing inter-domain packet filters to control IP Forging","authors":"Srinivas Aluvala, P. Rao","doi":"10.1109/ICECTECH.2011.5942005","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5942005","url":null,"abstract":"IP spoofing is almost always used in what is currently one of the most difficult attacks to defend against-denial of service attacks, or DoS. Since crackers are concerned only with consuming bandwidth and resources, they need not worry about properly completing handshakes and transactions. Rather, they wish to flood the victim with as many packets as possible in a short amount of time. In order to prolong the effectiveness of the attack, they spoof source IP addresses to make tracing and stopping the DoS as difficult as possible. When multiple compromised hosts are participating in the attack, all sending spoofed traffic; it is very challenging to quickly block traffic. While some of the attacks described above are a bit outdated, Such as session hijacking for host-based authentication services, IP spoofing is still prevalent in network scanning and probes, as well as denial of service floods. However, the technique does not allow for anonymous Internet access, which is a common misconception for those unfamiliar with the practice. Any sort of spoofing beyond simple floods is relatively advanced and used in very specific instances such as evasion and connection hijacking.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"36 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132973231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Novel block matching algorithm using predictive motion vector for video object tracking based on color histogram","authors":"N. Chitaliya, A. Trivedi","doi":"10.1109/ICECTECH.2011.5941961","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941961","url":null,"abstract":"Block matching motion estimation plays significant role for video processing and Computer Vision. Various methods based on mean shift and particle trackers are used to track the object on video sequence. Block matching algorithm is normally used for video compression technique. A novel, simple and fast block matching algorithm has been proposed using predictive motion vector for object tracking. Color histogram is used for matching criteria for the motion tracking. The proposed algorithm is considered with a flexible size of block as well as pixel displacement. Also early termination of the object as well as object out of boundary is considered. Experiments were conducted on different types of real world movie sequences.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125381366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}