International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)最新文献

筛选
英文 中文
Evaluation of noise estimation techniques for single-channel speech in low SNR noise environment 低信噪比环境下单通道语音噪声估计技术评价
Sachin Singh, M. Tripathy, R. Anand
{"title":"Evaluation of noise estimation techniques for single-channel speech in low SNR noise environment","authors":"Sachin Singh, M. Tripathy, R. Anand","doi":"10.1109/ICRAIE.2014.6909222","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909222","url":null,"abstract":"This paper investigates the performance capability of noise estimation techniques for single-channel speech. These techniques are evaluated in presence of low SNR noises (i. e. f16, babble, white, and pink). The noise estimation techniques have major impact on the quality and intelligibility of denoised speech pattern. The noise estimation techniques are evaluated in frequency domain in terms of quality and intelligibility measure parameters. The Perceptual Evaluation of Speech Quality (PESQ), Weighted Spectral Slop metric (WSS), Frequency Weighted Segmental SNR (fw-SNRseg), Speech Intelligibility Index (SII), and output SNR parameters are used for performance evaluation of low SNR noises mixed speech patterns. The sampling frequency used for processing is 8000 Hz and all algorithms are implemented in MATLAB 7.14.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123983646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A new approach for data cleaning process 一种新的数据清理方法
R. Krishnamoorthy, S. S. Kumar, Basavaraj Neelagund
{"title":"A new approach for data cleaning process","authors":"R. Krishnamoorthy, S. S. Kumar, Basavaraj Neelagund","doi":"10.1109/ICRAIE.2014.6909249","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909249","url":null,"abstract":"In this paper, we introduced a new approach called Effective Data Cleaning (EDC) is presented. The proposed EDC technique is aimed to identify the relevant and irrelevant instance from the large data set through the degree of the missing value, and it reconstructs the missed value in relevant instance through its closest instance within the instance set. The EDC technique is consist of two methods Identify Relevant Instance (IRI) and Reconstruct Missing Value (RMV). The IRI method is identifying the relevant and irrelevant instance belongs to the large instance set through the degree of the missing value of each instance in the instance set, and the RMV method can reconstruct the missing value in the relevant instance through its closest instance based on the distance metric. Experiment result shows, that the proposed EDC technique is simple and effective for identifying the relevant and irrelevant instance, and reconstruct the missing values in the relevant instance through the closest instance with higher similarity.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121184627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
IOCP: Implementation of Optimized Commit Protocol IOCP:优化提交协议的实现
G. Chauhan, M. K. Gupta, A. Khunteta
{"title":"IOCP: Implementation of Optimized Commit Protocol","authors":"G. Chauhan, M. K. Gupta, A. Khunteta","doi":"10.1109/ICRAIE.2014.6909141","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909141","url":null,"abstract":"Atomic Commit Protocols (ACP) are used to maintain atomicity in distributed systems. There are protocols available to minimize the overhead between the coordinator and participants, some are to minimize blocking while some to release the locks acquire by different participants. Optimized Two phase Commit (O-2PC) Protocol has been proposed to optimize the performance of 2PC based of deferred and immediately consistency constraints by overlapping the voting phase where initiation of protocol is done from participant side. But no simulator is currently available. This paper Implementation of Optimized Commit Protocol (IOCP) is an effort to allow simulating the performance of O-2PC empirically to consider the indirect costs that is not possible to calculate analytically. The simulator is developed using Java Network Programming. This simulation tool also provides facility to compare different commit protocols based on some performance parameters.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"166 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114612771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Embedding ECG and patient information in medical image 在医学图像中嵌入心电和患者信息
C. Nagaraju, S. Parthasarathy
{"title":"Embedding ECG and patient information in medical image","authors":"C. Nagaraju, S. Parthasarathy","doi":"10.1109/ICRAIE.2014.6909299","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909299","url":null,"abstract":"For the transmission, storage or telemedicine applications patient information is embedded inside the medical images. The purpose of data hiding in medical image is to embed the patient information in the host medical image without perceptually distorting it. This paper proposes a novel approach in embedding Patient information and Electrocardiogram (Patient Data) which is encrypted to ensure greater security in spatial domain. Statistical parameters such as Normalized Root Mean Square Error and Peak Signal to Noise Ratio are used to measure the quality of the medical image with patient data. Experimental results strongly indicate that the present technique is found to be robust and embedded patient data is recoverable without any distortion even in the case of attack like Gaussian noise.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127616175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Improved blom key management scheme for wireless sensor network 改进的无线传感器网络blom密钥管理方案
Ankit Gupta, Priyanka Ahlawat
{"title":"Improved blom key management scheme for wireless sensor network","authors":"Ankit Gupta, Priyanka Ahlawat","doi":"10.1109/ICRAIE.2014.6909146","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909146","url":null,"abstract":"Wireless sensor network(WSN) are mobile adhoc networks in which sensors have limited resources and communication capabilities.Creating pair-wise secure links between resources constrained sensor nodes is a major challenge. In this paper we point out three serious weaknesses namely, lack of scalability, high memory requirementsand computational overhead for designing pair-wise key agreement between any pair of sensor nodes in a WSN proposed by Chien et al. [1]. We develop a new scheme based on Blom's key agreement protocol [2] which is free from the weaknesses mentioned above. Compared to [1],our scheme requires less memory ,less computational overheads and more secure accesses to the network. Furthermore we have simulated the our scheme and chien et al. scheme in matlab and draw the graph on various factors.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127670391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design and implementation of TDPC sleep scheduling algorithm for energy efficient networks 节能网络中TDPC睡眠调度算法的设计与实现
Rewa Sharma, C. K. Jha, Meha Sharma
{"title":"Design and implementation of TDPC sleep scheduling algorithm for energy efficient networks","authors":"Rewa Sharma, C. K. Jha, Meha Sharma","doi":"10.1109/ICRAIE.2014.6909273","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909273","url":null,"abstract":"The key point for successful operation of routing based sensor networks is to save power consumption and thus utilize the energy efficiently. Researchers have been working on the same by following standard Type I, II and III sleep scheduling algorithms. In this paper we have proposed a new approach Traffic Dependent Power Conservation, which proactively measures and models the traffic of the network and the sleep window size is estimated by considering the entire traffic of network as a cumulative flow instead of individual patterns. Authors are successful in modeling the proposed approach TDPC (Traffic Dependent Power Conservation) to provide enhanced capability to achieve power conservation.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127710702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Gain enhancement in a novel square microstrip patch antenna using metallic rings 新型金属环方形微带贴片天线的增益增强
Arvind Kumar, Mithilesh Kumar
{"title":"Gain enhancement in a novel square microstrip patch antenna using metallic rings","authors":"Arvind Kumar, Mithilesh Kumar","doi":"10.1109/ICRAIE.2014.6909168","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909168","url":null,"abstract":"This paper presents gain enhancement in square microstrip patch with U-slot using metallic rings. The proposed antenna design includes a metallic rings around the metal patch, initially at a distance of the one-quarter of the free space wavelength from the edges of patch and width of metallic ring is three times of one-sixteen of the free space wavelength. Using CST Microwave studio, the results of the patch antenna without metallic rings and patch surrounded by metallic rings are simulated and compared. The proposed microstrip patch antenna resonates at the 5.8 GHz frequency suitable for wireless local area network applications. By this metallic rings approach there is enhancement in the gain of microstrip patch antenna about 4.3 dB as compared to conventional one (without metallic rings) and also about 2 percent improvement in impedance bandwidth of proposed antenna as compare to antenna without metallic ring.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126549726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Query maintenance with hierarchical updates 使用分层更新进行查询维护
A. Gosain, Heena Madaan
{"title":"Query maintenance with hierarchical updates","authors":"A. Gosain, Heena Madaan","doi":"10.1109/ICRAIE.2014.6909169","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909169","url":null,"abstract":"Data warehouse must evolve with changes in the schema, software components, user requirements or organization's business rules. Various authors have proposed different schema evolution operators for various level updates but none of them handled the syntactic and semantic adaptation of queries automatically. Few authors discussed this problem considering few changes in data sources schema and data warehouse structure schema. But they did not deal with the problem due to changes in the hierarchy and its levels in a dimension of the schema. In this paper, we perform what-if analysis for change in the hierarchy and its levels in the data warehouse schema. Queries, views and relations are modeled in a graph annotated with policies to manage the change event. Framework detects the affected part of graph due to change in hierarchical levels and readjusts according to the specified action without making the queries invalid.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125734368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Highly randomized image steganography using secret keys 使用密钥的高度随机图像隐写
Sunny Dagar
{"title":"Highly randomized image steganography using secret keys","authors":"Sunny Dagar","doi":"10.1109/ICRAIE.2014.6909116","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909116","url":null,"abstract":"Steganography is an art and specially a science of hiding secret information inside a carrier like image, audio, video. This paper proposes a new approach of image steganography which uses two secret keys to randomize the bit hiding process. Use of two secret keys enhances the security of secret information. This approach uses red, green and blue values of a pixel and performs some calculation. Based on this calculation, secret information bits will be placed at the random position of the pixels. This approach maintains high data hiding capacity like LSB substitution but maintains a much better security level, which is not present in LSB substitution as LSB substitution technique is predictable. As the hidden information is highly randomized, so it is difficult for attacker to retrieve the secret information from stego image. I used PSNR value to determine the quality of stego image and also compare it with other efficient image steganography techniques. The obtained result showed that this algorithm is highly efficient as compared to many other techniques.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121759707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Interlaminar short circuits in slots of turbine generators: Detection and analysis 汽轮发电机槽层间短路的检测与分析
P. S. Kumar
{"title":"Interlaminar short circuits in slots of turbine generators: Detection and analysis","authors":"P. S. Kumar","doi":"10.1109/ICRAIE.2014.6909140","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909140","url":null,"abstract":"Short circuits occur in between steel leaves of magnetic core of turbine generators in service due to slot wall imperfections, inter laminar insulation damage and winding faults. Undetected defects for long time, results into hot spots, core fusion and fretting. EL CID - ELectromagnetic Core Imperfection Detector, a Condition Assessment Diagnosis (CAD) digital tool is engaged by machine diagnosticians to look at core damages. Power plant customers prefer this low induction precision identification method to high flux ring test for laminar shorts due to energy efficiency and safety provisions. This paper focuses on analysis of fault current signals of EL CID to locate core damages in the vicinity of slots. EL CID principles are briefed which works on Ampere's law and Faraday's law. Modern EL CID equipment features are highlighted. Fault classification with respect to induced current pattern is presented. Case studies of various waveform reports of EL CID before and after repair of core defects are presented.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132086570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信