{"title":"Evaluation of noise estimation techniques for single-channel speech in low SNR noise environment","authors":"Sachin Singh, M. Tripathy, R. Anand","doi":"10.1109/ICRAIE.2014.6909222","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909222","url":null,"abstract":"This paper investigates the performance capability of noise estimation techniques for single-channel speech. These techniques are evaluated in presence of low SNR noises (i. e. f16, babble, white, and pink). The noise estimation techniques have major impact on the quality and intelligibility of denoised speech pattern. The noise estimation techniques are evaluated in frequency domain in terms of quality and intelligibility measure parameters. The Perceptual Evaluation of Speech Quality (PESQ), Weighted Spectral Slop metric (WSS), Frequency Weighted Segmental SNR (fw-SNRseg), Speech Intelligibility Index (SII), and output SNR parameters are used for performance evaluation of low SNR noises mixed speech patterns. The sampling frequency used for processing is 8000 Hz and all algorithms are implemented in MATLAB 7.14.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123983646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Krishnamoorthy, S. S. Kumar, Basavaraj Neelagund
{"title":"A new approach for data cleaning process","authors":"R. Krishnamoorthy, S. S. Kumar, Basavaraj Neelagund","doi":"10.1109/ICRAIE.2014.6909249","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909249","url":null,"abstract":"In this paper, we introduced a new approach called Effective Data Cleaning (EDC) is presented. The proposed EDC technique is aimed to identify the relevant and irrelevant instance from the large data set through the degree of the missing value, and it reconstructs the missed value in relevant instance through its closest instance within the instance set. The EDC technique is consist of two methods Identify Relevant Instance (IRI) and Reconstruct Missing Value (RMV). The IRI method is identifying the relevant and irrelevant instance belongs to the large instance set through the degree of the missing value of each instance in the instance set, and the RMV method can reconstruct the missing value in the relevant instance through its closest instance based on the distance metric. Experiment result shows, that the proposed EDC technique is simple and effective for identifying the relevant and irrelevant instance, and reconstruct the missing values in the relevant instance through the closest instance with higher similarity.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121184627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IOCP: Implementation of Optimized Commit Protocol","authors":"G. Chauhan, M. K. Gupta, A. Khunteta","doi":"10.1109/ICRAIE.2014.6909141","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909141","url":null,"abstract":"Atomic Commit Protocols (ACP) are used to maintain atomicity in distributed systems. There are protocols available to minimize the overhead between the coordinator and participants, some are to minimize blocking while some to release the locks acquire by different participants. Optimized Two phase Commit (O-2PC) Protocol has been proposed to optimize the performance of 2PC based of deferred and immediately consistency constraints by overlapping the voting phase where initiation of protocol is done from participant side. But no simulator is currently available. This paper Implementation of Optimized Commit Protocol (IOCP) is an effort to allow simulating the performance of O-2PC empirically to consider the indirect costs that is not possible to calculate analytically. The simulator is developed using Java Network Programming. This simulation tool also provides facility to compare different commit protocols based on some performance parameters.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"166 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114612771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Embedding ECG and patient information in medical image","authors":"C. Nagaraju, S. Parthasarathy","doi":"10.1109/ICRAIE.2014.6909299","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909299","url":null,"abstract":"For the transmission, storage or telemedicine applications patient information is embedded inside the medical images. The purpose of data hiding in medical image is to embed the patient information in the host medical image without perceptually distorting it. This paper proposes a novel approach in embedding Patient information and Electrocardiogram (Patient Data) which is encrypted to ensure greater security in spatial domain. Statistical parameters such as Normalized Root Mean Square Error and Peak Signal to Noise Ratio are used to measure the quality of the medical image with patient data. Experimental results strongly indicate that the present technique is found to be robust and embedded patient data is recoverable without any distortion even in the case of attack like Gaussian noise.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127616175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved blom key management scheme for wireless sensor network","authors":"Ankit Gupta, Priyanka Ahlawat","doi":"10.1109/ICRAIE.2014.6909146","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909146","url":null,"abstract":"Wireless sensor network(WSN) are mobile adhoc networks in which sensors have limited resources and communication capabilities.Creating pair-wise secure links between resources constrained sensor nodes is a major challenge. In this paper we point out three serious weaknesses namely, lack of scalability, high memory requirementsand computational overhead for designing pair-wise key agreement between any pair of sensor nodes in a WSN proposed by Chien et al. [1]. We develop a new scheme based on Blom's key agreement protocol [2] which is free from the weaknesses mentioned above. Compared to [1],our scheme requires less memory ,less computational overheads and more secure accesses to the network. Furthermore we have simulated the our scheme and chien et al. scheme in matlab and draw the graph on various factors.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127670391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of TDPC sleep scheduling algorithm for energy efficient networks","authors":"Rewa Sharma, C. K. Jha, Meha Sharma","doi":"10.1109/ICRAIE.2014.6909273","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909273","url":null,"abstract":"The key point for successful operation of routing based sensor networks is to save power consumption and thus utilize the energy efficiently. Researchers have been working on the same by following standard Type I, II and III sleep scheduling algorithms. In this paper we have proposed a new approach Traffic Dependent Power Conservation, which proactively measures and models the traffic of the network and the sleep window size is estimated by considering the entire traffic of network as a cumulative flow instead of individual patterns. Authors are successful in modeling the proposed approach TDPC (Traffic Dependent Power Conservation) to provide enhanced capability to achieve power conservation.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127710702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Gain enhancement in a novel square microstrip patch antenna using metallic rings","authors":"Arvind Kumar, Mithilesh Kumar","doi":"10.1109/ICRAIE.2014.6909168","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909168","url":null,"abstract":"This paper presents gain enhancement in square microstrip patch with U-slot using metallic rings. The proposed antenna design includes a metallic rings around the metal patch, initially at a distance of the one-quarter of the free space wavelength from the edges of patch and width of metallic ring is three times of one-sixteen of the free space wavelength. Using CST Microwave studio, the results of the patch antenna without metallic rings and patch surrounded by metallic rings are simulated and compared. The proposed microstrip patch antenna resonates at the 5.8 GHz frequency suitable for wireless local area network applications. By this metallic rings approach there is enhancement in the gain of microstrip patch antenna about 4.3 dB as compared to conventional one (without metallic rings) and also about 2 percent improvement in impedance bandwidth of proposed antenna as compare to antenna without metallic ring.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126549726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Query maintenance with hierarchical updates","authors":"A. Gosain, Heena Madaan","doi":"10.1109/ICRAIE.2014.6909169","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909169","url":null,"abstract":"Data warehouse must evolve with changes in the schema, software components, user requirements or organization's business rules. Various authors have proposed different schema evolution operators for various level updates but none of them handled the syntactic and semantic adaptation of queries automatically. Few authors discussed this problem considering few changes in data sources schema and data warehouse structure schema. But they did not deal with the problem due to changes in the hierarchy and its levels in a dimension of the schema. In this paper, we perform what-if analysis for change in the hierarchy and its levels in the data warehouse schema. Queries, views and relations are modeled in a graph annotated with policies to manage the change event. Framework detects the affected part of graph due to change in hierarchical levels and readjusts according to the specified action without making the queries invalid.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125734368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Highly randomized image steganography using secret keys","authors":"Sunny Dagar","doi":"10.1109/ICRAIE.2014.6909116","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909116","url":null,"abstract":"Steganography is an art and specially a science of hiding secret information inside a carrier like image, audio, video. This paper proposes a new approach of image steganography which uses two secret keys to randomize the bit hiding process. Use of two secret keys enhances the security of secret information. This approach uses red, green and blue values of a pixel and performs some calculation. Based on this calculation, secret information bits will be placed at the random position of the pixels. This approach maintains high data hiding capacity like LSB substitution but maintains a much better security level, which is not present in LSB substitution as LSB substitution technique is predictable. As the hidden information is highly randomized, so it is difficult for attacker to retrieve the secret information from stego image. I used PSNR value to determine the quality of stego image and also compare it with other efficient image steganography techniques. The obtained result showed that this algorithm is highly efficient as compared to many other techniques.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121759707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interlaminar short circuits in slots of turbine generators: Detection and analysis","authors":"P. S. Kumar","doi":"10.1109/ICRAIE.2014.6909140","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909140","url":null,"abstract":"Short circuits occur in between steel leaves of magnetic core of turbine generators in service due to slot wall imperfections, inter laminar insulation damage and winding faults. Undetected defects for long time, results into hot spots, core fusion and fretting. EL CID - ELectromagnetic Core Imperfection Detector, a Condition Assessment Diagnosis (CAD) digital tool is engaged by machine diagnosticians to look at core damages. Power plant customers prefer this low induction precision identification method to high flux ring test for laminar shorts due to energy efficiency and safety provisions. This paper focuses on analysis of fault current signals of EL CID to locate core damages in the vicinity of slots. EL CID principles are briefed which works on Ampere's law and Faraday's law. Modern EL CID equipment features are highlighted. Fault classification with respect to induced current pattern is presented. Case studies of various waveform reports of EL CID before and after repair of core defects are presented.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132086570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}