{"title":"Bridging the Gap between Disabled People and New Technology in Interactive Web Application with the Help of Voice","authors":"Dilip Kumar, A. Sachan","doi":"10.1109/ICAETR.2014.7012885","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012885","url":null,"abstract":"Major area of developments in the field of voice recognition is more natural way of interacting with web technology have been taking place. The concept that computers can comprehend our various gestures by eyes, voices, touch and our different movements to interact is called the Easy User Interface. Today, many elements are available in mobile phones, PCs and in other devices but the lack of voice to voice application on web are not efficient to the disabled people. Speech technologies particularly play a vital role in this evolving technology. Significant advancement in automatic voice recognition for well defined applications like dictation and medium vocabulary transaction processing assignments in web application is comparatively controlled environments have been made on web server. But, automatic speech recognition still has to reach a level needed for speech to become a completely pervasive user interface because even in clean acoustic surroundings in web application. Visual voice recognition, however, is a promising source of extra voice information and it has successfully exhibited to enhance noise robustness of automatic voice recognizers, so thereby promising to enhance their usability in the web application by use of voice interaction in web. In this paper, the main objective is to provide more easy interaction between user (disabled people) and web application. Today we are using web text by typing the text and in early days Google chrome enhances their functionality adding voice search. But we are trying to accessing all web text with the help of voice. We are using JSAPI components of speech recognition from the java technology, i.e., the voice and the text components along with the latest advancements made in the field of web uses. Further, the research goes beyond the recent advancements and discusses the future scope of speech recognition technology and mentions some likely future developments, evaluating each on the basis of its performance.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125283753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measurement of glucose by using modulating ultrasound with optical technique in normal and diabetic human blood serum","authors":"Anuj Srivastava, Md. Koushik Chowdhury, Shiru Sharma, Neeraj Sharma","doi":"10.1109/ICAETR.2014.7012942","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012942","url":null,"abstract":"This paper describes the effect of various glucose concentrations in normal and diabetic human blood serums mixed with intralipid phantoms. Amplitude modulated ultrasound and infrared techniques were utilized here. Modulated ultrasound causes signature specific molecular vibrations through the area of its propagation. The infrared light of specific wavelength is used here to detect the target glucose molecules. The infrared photo sensor detects the resultant signal and undergoes series of signal processing steps to yield the output value. The trend obtained from the result indicates that human diabetic blood serum occupies highest peak values in Fast Fourier Transform domain as compared to the normal human blood serum peak values. The proposed method provides a new dimension for noninvasive blood glucose measurement techniques. Noninvasive method for blood glucose detection is the need of hour. Tight control regimen with noninvasive glucometer will change the way of living of the diabetes affected population.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114588042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PNG image copyright protection and authentication using SVD hash and AES","authors":"Anushree Jain, V. Jain","doi":"10.1109/ICAETR.2014.7012950","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012950","url":null,"abstract":"There has been a rapid growth in the use of digital images due to development of modern technology. And easily available image editing tools and software's have made these images easy to distribute, manipulate, and duplicate. All these reasons are enforcing a need for copyright enforcement methods that can provide copyright to the owner. In our proposed method a PNG image is used as the cover image in which the alpha-channel value of each pixel is set to default. That is, the cover image is a totally transparent color one at the beginning of the proposed data hiding process. When we apply data hiding technique to any PNG image which has transparency, it distorts the image transparency, which causes visibility issues with PNG image. To overcome this issue proposed technique uses 3 LSB of alpha channel to embed signals in image. In proposed technique owner encrypted information and hash code using SVD is embedded in image. SVD hash can be used to cross check the image contents. Experimental result show, there is no visible defect after embedding authentication signal into the cover images using proposed technique. In this paper, the proposed technique embeds the copyright information (authentication signal) which is encrypted using 128 bit AES and Singular Value Data (SVD) by using Shamir secret sharing data hiding technique. This technique is very robust and more secure as compared to previous data hiding techniques.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115928910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtualized dynamic URL assignment web crawling model","authors":"Wani Rohit Bhaginath, S. Shingade, M. Shirole","doi":"10.1109/ICAETR.2014.7012963","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012963","url":null,"abstract":"Web search engines are software systems that help to retrieve the information from the net by accepting the input in the form of query and providing the result as files, pages, images or information. These search engines heavily rely on the web crawlers that interact with millions of the web pages given a seed URL or a list of seed URLs. However, these crawlers demand a large amount of computing resources. The efficiency of web search engines depends upon the performance of the crawling processes. Despite the continuous improvement in the crawling processes still there is a need of improvement towards more efficient and low cost crawler. Most of the crawlers existing today have a centralized coordinator that brings the disadvantage of single point failure. Taking into consideration the shortfalls of the existing crawlers, this paper proposes an architecture of a distributed web crawler. The architecture addresses two issues of the existing web crawlers: the first is to create a low cost web crawler using the concept of virtualization of cloud computing. The second issue is a balanced load distribution based on dynamic assignment of the URLs. The first issue is solved using mutli-core machines where each multi-core processor is divided into number of virtual machines (VM) that can perform different crawling task in parallel. Second issue is addressed using a clustering algorithm that assigns requests to the machines as per the availability of the clusters thereby realizing the balance among components according to their real-time condition. This paper discusses a distributed architecture and details of the implementation of the proposed algorithm.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116589569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Srivastava, A. Mishra, Bikash Upadhyay, Akhileshwar Yadav
{"title":"Survey and overview of Mobile Ad-Hoc Network routing protocols","authors":"A. Srivastava, A. Mishra, Bikash Upadhyay, Akhileshwar Yadav","doi":"10.1109/ICAETR.2014.7012959","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012959","url":null,"abstract":"In Early 1990 researchers have shown a keen interest in Mobile Ad-hoc Network. The absence of infrastructure and its dynamic, diverse principal characteristics has made it more popular as well as vibrant because of it the Internet Engineering Task Force (IETF) is established. Not only bigger company and organization, different institutes are also working on MANET. It applies the TCP/IP protocol stack with slight modification for end to end communication. In MANET Routing is the toughest task because nodes works as router and host at the same time with the changing environment, infact for this many researchers have proposed new protocols and have shown that the protocol proposed works well and is improved over different scenario, strategy and conditions. In contrast to above it is quite challenging that which protocol performs best under different scenario, strategy and condition. Therefore, in this paper we provide a survey and overview of different routing protocols even survey of complexity comparison is also performed to find out which protocol will fit for larger network or so.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123706220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiple Kernel Learning for stock price direction prediction","authors":"Amit Sirohi, P. Mahato, V. Attar","doi":"10.1109/ICAETR.2014.7012901","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012901","url":null,"abstract":"Unstable and assumptive aspects of the securities makes it hard to predict the next day stock prices. There is no absolute indicator for financial forecasting but there are many technical indicators like simple moving average, exponential moving average, stochastic fast and slow, on balance volume for better accomplishment. It is important to have a significant and well-constructed set of features to elaborate stock trends. In this paper, we have proposed a Multiple Kernel Learning Model which predicts the daily trend of stock prices such as up or down, it comprises of 2-tier framework. In first tier, we extracted some technical indicators based on five raw elements- opening price, daily high price, daily low price, closing price and trading volume. In second tier, we built different base kernels on the extracted feature set and then combined these base kernels through Multiple Kernel learning, we have trained the model through walk forward method and predicted the movement of daily stock trend such as up or down, and then evaluated its performance. Experiment results shows that our proposed solution performs well consistently than baseline methods (Support Vector Machine) in terms of prediction accuracy for two commodities in stock market.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124566434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A effective and efficient algorithm for cross level frequent pattern mining","authors":"Syed Zishan Ali, Y. Rathore","doi":"10.1109/ICAETR.2014.7012865","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012865","url":null,"abstract":"Today many data mining techniques have been implemented in order to retrieve useful patterns from the respective information. But Still there is an issue to generate the require patterns effectively. This paper shows a effective method for cross level frequent pattern mining. Data concerning Multilevel and cross level frequent patterns is attention-grabbing and helpful. The classic frequent pattern mining algorithms supported a homogenous minimum support, such as Apriori and FP-growth, either miss attention-grabbing patterns of low support or suffer from the bottleneck of itemset generation.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117100649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Tuning of PID controller by Cuckoo Search via Lévy flights","authors":"Meenakshi Kishnani, S. Pareek, Rajeev Gupta","doi":"10.1109/ICAETR.2014.7012927","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012927","url":null,"abstract":"Nature has been a main source of inspiration for many optimization algorithms. Such algorithms are increasingly becoming popular among control engineers for the optimal tuning of PID controller. In this paper, a very recent nature inspired metaheuristic technique known as Cuckoo Search Algorithm is presented for the optimal tuning of PID controller. This controller is required to achieve the desired specification of the closed loop response of the DC motor plant, that here is taken as a third order plant system. Though several conventional techniques have been proposed to sufficiently optimize linear plant systems but the desired performance indices i.e. settling time, overshoot, rise time etc. are comparatively higher than the response attained by heuristic algorithms. Here, a study is done on PID controller optimized by Cuckoo Search Algorithm for different fitness functions i.e. IAE, ISE, ITAE and ITSE and their responses are compared with one such conventional method.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121190207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A view of Artificial Neural Network","authors":"Manish Mishra, M. Srivastava","doi":"10.1109/ICAETR.2014.7012785","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012785","url":null,"abstract":"In this paper, An Artificial Neural Network or ANN, its various characteristics and business applications. In this paper also show that “what are neural networks” and “Why they are so important in today's Artificial intelligence?” Because various advances have been made in developing intelligent system, some inspired by biological neural networks. ANN provides a very exciting alternatives and other application which can play important role in today's computer science field. There are some Limitations also which are mentioned.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124132342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aditya Gupta, A. Malage, Dhiraj More, Priya M. Hemane, Prayanti P. Bhautmage, Duhita Dhandekar
{"title":"“Feature level fusion of face, palm vein and palm print modalities using Discrete Cosine Transform”","authors":"Aditya Gupta, A. Malage, Dhiraj More, Priya M. Hemane, Prayanti P. Bhautmage, Duhita Dhandekar","doi":"10.1109/ICAETR.2014.7012805","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012805","url":null,"abstract":"Due to usefulness in recognition and identification biometric systems have become a major part of research. Paper proposes a multimodal biometric system using face modality combined with palm print and palm vein modality. The proposed methodology uses Local Statistical method in which pre-defined block of DCT coefficient were used to calculate standard deviation and store them as feature vector. Matching is done using distance between feature vector of testing and training data set. Results show that the Genuine Acceptance Rate (GAR) of feature level fusion is 100% which is better than, that of uni-modal systems, hence having multimodality is advantageous. For testing and training database of 100 students of College of Engineering Pune.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124399916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}