2008 First International Conference on Emerging Trends in Engineering and Technology最新文献

筛选
英文 中文
Traffic Analysis of MPLS and Non MPLS Network including MPLS Signaling Protocols and Traffic Distribution in OSPF and MPLS MPLS和非MPLS网络流量分析,包括MPLS信令协议、OSPF和MPLS中的流量分布
Mahesh Kumar Porwal, A. Yadav, S. Charhate
{"title":"Traffic Analysis of MPLS and Non MPLS Network including MPLS Signaling Protocols and Traffic Distribution in OSPF and MPLS","authors":"Mahesh Kumar Porwal, A. Yadav, S. Charhate","doi":"10.1109/ICETET.2008.58","DOIUrl":"https://doi.org/10.1109/ICETET.2008.58","url":null,"abstract":"Multi-protocol label switching (MPLS) is rapidly emerging technology, which plays a key role in next generation networks by delivering QoS and traffic engineering features. MPLS is helpful in managing traffic when some links or paths are under and/or over utilized. In MPLS a look - up in switching table is certainly less complex and time consuming than a corresponding routing table look - up in an IP router. This paper present a analysis of MPLS signaling protocols for traffic engineering, shows the capability of providing traffic engineering in MPLS compared to the conventional routing protocol, and explains the MPLS LSR operations based on the basic LSR functionality of classification, queue, and scheduling. The comparisons of CR-LDP, RSVP, and RSVP-TE are conducted based on the aspects of LSP reliability and LSP adaptability. In addition, this paper also presents a comparative analysis of MPLS and non-MPLS network and shows that MPLS provides improved network performance for heavy traffic environments.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134022497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 61
Protection of Mobile Agent Platform through Attack Identification Scanner (AIS) by Malicious Identification Police (MIP) 恶意识别警察(MIP)攻击识别扫描器(AIS)对移动代理平台的保护
S. Venkatesan, C. Chellappan
{"title":"Protection of Mobile Agent Platform through Attack Identification Scanner (AIS) by Malicious Identification Police (MIP)","authors":"S. Venkatesan, C. Chellappan","doi":"10.1109/ICETET.2008.89","DOIUrl":"https://doi.org/10.1109/ICETET.2008.89","url":null,"abstract":"Information retrieval by the mobile agent is more flexible than the traditional communication paradigm but it is very vulnerable to a variety of attacks. Various attacks in the mobile agent environment are identified and protected. Agent platform protection is the major concern in the environment. Existing models to protect platform have the drawbacks. So, we proposed the attack identification scanner (AIS) to scan and kill the malicious agent from the malicious host in the distributed environment using MIP.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116780537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Performance Evaluation of 4x4 DCT Algorithms for Low Power Wireless Applications 低功耗无线应用中4x4 DCT算法的性能评估
Muhammed Yusuf Khan, E. Khan, M. S. Beg
{"title":"Performance Evaluation of 4x4 DCT Algorithms for Low Power Wireless Applications","authors":"Muhammed Yusuf Khan, E. Khan, M. S. Beg","doi":"10.1109/ICETET.2008.149","DOIUrl":"https://doi.org/10.1109/ICETET.2008.149","url":null,"abstract":"The paper compares the performance of 4 x 4 block based discrete cosine transforms(DCT) with conventional 8 x 8 DCT .The small size DCT is suitable for mobile applications using low power devices as fast computation speed is required for real time applications. The comparison is done on the basis of computation time and objective quality, based on PSNR (peak signal to noise ratio).","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117058419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Efficient Morphological Reversible Contour/Edge Representation Using Overlapping Line Components 基于重叠线分量的有效形态可逆轮廓/边缘表示
J. Varghese, S. Saudia, K. Nallaperumal, S. P. Mathew, S. Arumugaperumal, Julie Joy
{"title":"An Efficient Morphological Reversible Contour/Edge Representation Using Overlapping Line Components","authors":"J. Varghese, S. Saudia, K. Nallaperumal, S. P. Mathew, S. Arumugaperumal, Julie Joy","doi":"10.1109/ICETET.2008.43","DOIUrl":"https://doi.org/10.1109/ICETET.2008.43","url":null,"abstract":"The paper proposes a new morphological reversible contour/edge representation algorithm for the representation of 2D binary shapes of digital images. The concise representation algorithm uses representative lines of different sizes and types to cover all the significant features of the binary contour/edge image. These well-characterized representative line segments, which may overlap among different types, take minimum representative points than that of most other prominent shape representation algorithms including MST and MSD. The new algorithm is computationally efficient than most other algorithms in the literature and is also capable of approximating edge images. The approximated outputs produced by the proposed algorithm by using minimal number of representative points are more natural to the original shapes than that of MST and MSD.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127298123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Comprehensible Approach to Develop Fuzzy Decision Trees 一种可理解的模糊决策树开发方法
G. Suma, M. Shashi, G. L. Devi
{"title":"A Comprehensible Approach to Develop Fuzzy Decision Trees","authors":"G. Suma, M. Shashi, G. L. Devi","doi":"10.1109/ICETET.2008.173","DOIUrl":"https://doi.org/10.1109/ICETET.2008.173","url":null,"abstract":"With the immense increase of the data in various fields, interpreting the data into useful information has become a tedious job. Design of models to handle the problem is essential. This paper discusses the methods that handle uncertain information with continuous data and deliver comprehensible classification model. We investigate fuzzy decision tree as a method for classification problems and axiomatic fuzzy set for building fuzzy sets (membership functions) . To select the best available test attributes of fuzzy decision trees we use a generalized Shannon Entropy. The problems connected with this generalization arised from fuzzy domain are discussed and some alternatives are proposed.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124848592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Shape and Morphological Transformation Based Features for Language Identification in Indian Document Images 基于形状和形态变换特征的印度文档图像语言识别
M. Hangarge, B. V. Dhandra
{"title":"Shape and Morphological Transformation Based Features for Language Identification in Indian Document Images","authors":"M. Hangarge, B. V. Dhandra","doi":"10.1109/ICETET.2008.177","DOIUrl":"https://doi.org/10.1109/ICETET.2008.177","url":null,"abstract":"In this paper, a technique of language identification in document images is described to discriminate five major Indian languages: Hindi, Marathi, Sanskrit, Assamese and Bengali belong to Devnagari and Bangla scripts. A text block of each language containing at least two text lines is selected and characterized by employing global and local features. Morphological transformations are used to decompose a text block in two directions at three levels, to capture fine texture primitives. Shape features of connected components are used to retain the local properties of the text block. Further, combination of these features is used to classify 500 text blocks of proposed languages based on Binary decision tree and KNN classifier. Proposed method is quite different from reported method on non-Indian languages, which are based on shape coding of characters, words and document vectorization. This method directly captures word shapes without segmentation and it is tolerant to variations in font style and size. The language identification results are encouraging.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124891397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Method to Deal with the Type of Lexical Ambiguity in a Software Requirement Specification Document 一种处理软件需求说明文档中词汇歧义类型的方法
Md. Rizwan Beg, Qamar Abbas, Alok Joshi
{"title":"A Method to Deal with the Type of Lexical Ambiguity in a Software Requirement Specification Document","authors":"Md. Rizwan Beg, Qamar Abbas, Alok Joshi","doi":"10.1109/ICETET.2008.160","DOIUrl":"https://doi.org/10.1109/ICETET.2008.160","url":null,"abstract":"SRS is the agreement between the client and the developer, it is a document which specifies the clientpsilas requirement and also validates the final product. In various surveys it was found that approximately 20-25% of the project time is allocated for the requirements definition and major part of its time is wasted in making the requirement specification unambiguous, to avoid the conflict in future. Conflict arises because of more than one interpretation of a requirement, this lead to misinterpretation of design constraints, functionality, and external interfaces or in any further enhancements. In our proposed system requirements are documented in natural language. The system checks whether the written requirements are valid requirements or not and also checks for the lexical type of ambiguities, especially the ambiguity related to homonyms, heteronyms and homographs.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124904912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
BIST Based Performance Evaluation of  Field Programmable Analog Arrays 基于BIST的现场可编程模拟阵列性能评估
S. Charhate, D. Mishra
{"title":"BIST Based Performance Evaluation of  Field Programmable Analog Arrays","authors":"S. Charhate, D. Mishra","doi":"10.1109/ICETET.2008.169","DOIUrl":"https://doi.org/10.1109/ICETET.2008.169","url":null,"abstract":"A typical field programmable analog array consists of configurable analog arrays (CABs), I/O blocks, an interconnection network and memory registers for device programming. For testing purposes, this FPAA partitioning also applies. Taking advantage of the inherent programmability of the FPAAs, BIST (built-in-self-testing) based scheme is used to obtain an error signal representing the difference between fault free and faulty circuits. A comparison between the various testing methodologies is done in terms of area overhead, circuit performance degradation, fault coverage etc.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125907895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Approach to Improve the Productivity of Dumper by Preventive Maintenance 通过预防性维修提高翻车机生产率的途径
R. .. Himte, A. Kedar, P. Washimkar, M. Wakhare, P. Belkhode
{"title":"An Approach to Improve the Productivity of Dumper by Preventive Maintenance","authors":"R. .. Himte, A. Kedar, P. Washimkar, M. Wakhare, P. Belkhode","doi":"10.1109/ICETET.2008.206","DOIUrl":"https://doi.org/10.1109/ICETET.2008.206","url":null,"abstract":"In the coal mining industry there are various types of Earth moving vehicles and Equipments being used for different purposes. The major material Handling equipments in an open cast mine is Dumper. The dumper carries coal from quallary to the bunker for storage and transportation. The output of any quallary is greatly influenced on the effective conveying of the coal. In this paper an open cast coal mine is selected. The working at the quallary is of continuous type and availability of dumper is critical factor considering the functional significance and the cost of the equipment. Detailed analysis needs to be carried out toward the utilization and availability of these dumpers. The company has a central workshop, which caters the maintenance needs of all the equipments. A maintenance schedule is followed by the workshop. Inspire of the preventive maintenance schedule the frequency of breakdown is substantial. Hence efforts are essential to analyze the failures and suggest remedial measures to reduce the downtime.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122417464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ANN Modeling for Prediction of Velocity in Channel Bends 河道弯道速度预测的人工神经网络建模
P. Durge, P. Nagarnaik
{"title":"ANN Modeling for Prediction of Velocity in Channel Bends","authors":"P. Durge, P. Nagarnaik","doi":"10.1109/ICETET.2008.219","DOIUrl":"https://doi.org/10.1109/ICETET.2008.219","url":null,"abstract":"The flow in a channel bend is spiral or helical. It is a movement of water particles in the flow direction. Many researchers have stated mathematical equations to predict velocity in the flow direction in the channel bend. These equations are based on simplified assumptions. The ANN is a viable alternative to predict longitudinal velocity in channel bend. It builds the model by estimating suitable approximating function of the available input/output samples. Once such relationship is established & validated, it can be used for the prediction of the future system behavior. The paper aims at developing Artificial Neural Network model, namely Multilayer Perceptron (MLP). It is found that MLP model is capable to predict velocity in the channel bend with accuracy.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117079361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信