2013 6th International Conference on Emerging Trends in Engineering and Technology最新文献

筛选
英文 中文
Implementation of Electronic Sensor for Assessment of Explosive Performance by Velocity of Detonation Measurement 通过爆速测量来评估炸药性能的电子传感器的实现
A. Tete, A. Deshmukh, R. Yerpude
{"title":"Implementation of Electronic Sensor for Assessment of Explosive Performance by Velocity of Detonation Measurement","authors":"A. Tete, A. Deshmukh, R. Yerpude","doi":"10.1109/ICETET.2013.36","DOIUrl":"https://doi.org/10.1109/ICETET.2013.36","url":null,"abstract":"Detonation velocity is an important property to consider when rating an explosive. It is an established fact that measuring velocity of detonation gives a good indication of the strength and hence the performance of the explosive. This paper presents and discusses the design and implementation of continuous wire discrete resistance VOD measuring technique (sensor)for bulk explosives. In this technique step change in resistance is preferred to increase the system reliability as well as it reduces the system complexity. Sensor used in discrete point's method is based on resistance change in the region of several kilo ohms improving the noise immunity.","PeriodicalId":440967,"journal":{"name":"2013 6th International Conference on Emerging Trends in Engineering and Technology","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127341041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of VANET for Improvement of QoS with Different Mobility Patterns 不同移动模式下改进QoS的VANET设计
P. Dorge, S. Dorle
{"title":"Design of VANET for Improvement of QoS with Different Mobility Patterns","authors":"P. Dorge, S. Dorle","doi":"10.1109/ICETET.2013.19","DOIUrl":"https://doi.org/10.1109/ICETET.2013.19","url":null,"abstract":"VANETs (Vehicular ad-hoc network) are characterized by a very dynamic topology with partial infrastructure support, patterned mobility, and mobile nodes with sufficient amount of resources, intermittent connectivity and varied channel behavior. For this purpose, we always use the location information that vehicles share among them through repetitive messages that are transmitted in the VANET system. In addition to communication among the vehicles, VANET interface with communication access points provided by on road infrastructure. Thus in this paper we propose that the design of city environment VANET network with Wimax by using two key strategies which are multiple input & multiple output technology (MIMO) and adaptive modulation coding (AMC) which by combining gives the significantly enhanced data rate & maximum throughput with high efficiency in wireless network.","PeriodicalId":440967,"journal":{"name":"2013 6th International Conference on Emerging Trends in Engineering and Technology","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125621032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Performance Analysis of Vehicular Ad Hoc Networks Handovers with Metaheuristic Algorithms: A Review 基于元启发式算法的车载Ad Hoc网络切换性能分析综述
P. Wararkar, S. Dorle
{"title":"Performance Analysis of Vehicular Ad Hoc Networks Handovers with Metaheuristic Algorithms: A Review","authors":"P. Wararkar, S. Dorle","doi":"10.1109/ICETET.2013.20","DOIUrl":"https://doi.org/10.1109/ICETET.2013.20","url":null,"abstract":"VEHICULAR ad hoc networks (VANETs) are the self-configuring networks where the nodes are vehicles (equipped with on-board computers), elements of roadside infrastructure, sensors, and pedestrian personal devices. In the current state of the art in this field there is a need of studies on real outdoor experiments to validate the new VANETs optimizing protocols and applications. Thus exchanging up-to-date information among vehicles is the most salient feature of a VANET. In order to do so, the packets have to travel through the network from one node to the others & thus give rise to concept of inter VANET data handovers & VDTP (Vehicular data transfer Protocol). In this work, we have addressed the utility of metaheuristic algorithms (PSO,GA) for inter VANET sensor data handovers in order to study the performance analysis to maximize the throughput & reliability improvement in real VANET.","PeriodicalId":440967,"journal":{"name":"2013 6th International Conference on Emerging Trends in Engineering and Technology","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121293385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Representation of Knowledge from Software Requirements Expressed in Natural Language 用自然语言表示软件需求中的知识
R. Verma, Md. Rizwan Beg
{"title":"Representation of Knowledge from Software Requirements Expressed in Natural Language","authors":"R. Verma, Md. Rizwan Beg","doi":"10.1109/ICETET.2013.47","DOIUrl":"https://doi.org/10.1109/ICETET.2013.47","url":null,"abstract":"Software Requirements modeling is important for requirement understanding especially when they are expressed in Natural Language such as English, which is universally understood. Expressing requirement is such a way is natural and known to stakeholders. However, they are prone to ambiguity and poor understandability. This paper demonstrate how we can model software requirement expressed in natural language and represent them with a simple graph based structure using techniques of Natural Language Processing (NLP), this helps in understanding and correct interpretation of requirements. It can also represents knowledge about the requirement, which can be used to derive test case in early development phase.","PeriodicalId":440967,"journal":{"name":"2013 6th International Conference on Emerging Trends in Engineering and Technology","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122480333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Realization of Basic Gates Using Universal Logic Blocks in Quantum Dot Cellular Automata 量子点元胞自动机中通用逻辑块基本门的实现
N. Kumari, Prashant V. Joshi, K. Gurumurthy
{"title":"Realization of Basic Gates Using Universal Logic Blocks in Quantum Dot Cellular Automata","authors":"N. Kumari, Prashant V. Joshi, K. Gurumurthy","doi":"10.1109/ICETET.2013.11","DOIUrl":"https://doi.org/10.1109/ICETET.2013.11","url":null,"abstract":"CMOS based technologies fail to satisfy the Moore's law beyond Nano scale, leading to intensive research in identifying an alternative technology that can take over CMOS in the near future. Quantum Dot Cellular Automata (QCA) is one among the various technologies proposed by the International Technology Roadmap for Semiconductors (ITRS) as a viable alternative to CMOS. QCA offers the highest device density of 1014 devices/cm2 and operates at a maximum speed of T Hz. In this paper we have realized all the basic gates using multiplexers as the key element in QCA technology. Compact libraries can be designed by realizing all the basic gates using just a multiplexer.","PeriodicalId":440967,"journal":{"name":"2013 6th International Conference on Emerging Trends in Engineering and Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124754768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Semi-blind Image Watermarking Using High Frequency Band Based on DWT-SVD 基于DWT-SVD的高频半盲图像水印
R. Kaur, Sonika Jindal
{"title":"Semi-blind Image Watermarking Using High Frequency Band Based on DWT-SVD","authors":"R. Kaur, Sonika Jindal","doi":"10.1109/ICETET.2013.5","DOIUrl":"https://doi.org/10.1109/ICETET.2013.5","url":null,"abstract":"With the fast development in computer network and multimedia technology, digital data (such as image, video, audio or text) are stored, transmitted and distributed through internet without any loss or damage of content. Digital image watermarking is use for the protection of digital data from the illegal manipulations. Watermarking not only allow user to access, view and interpret the image but also protects the ownership of the content, as protection is a crucial area. In this paper, a new semi-blind composite image watermarking algorithm based on DWT-SVD that is robust against various attacks is proposed. We obtained four different frequency images using DWT and IDWT transform. Watermark is embedded in high frequency sub-band by modifying the values of Singular Value Decomposition (SVD). Scaling factor is used to improve. Various experimental results demonstrate that proposed algorithm is able to withstand under various attack.","PeriodicalId":440967,"journal":{"name":"2013 6th International Conference on Emerging Trends in Engineering and Technology","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125306501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Impact of Non-functional Requirements on Requirements Evolution 非功能需求对需求演化的影响
Kiran Khatter, A. Kalia
{"title":"Impact of Non-functional Requirements on Requirements Evolution","authors":"Kiran Khatter, A. Kalia","doi":"10.1109/ICETET.2013.15","DOIUrl":"https://doi.org/10.1109/ICETET.2013.15","url":null,"abstract":"Software impacts almost every aspect of modern society. Developers of a software system are responsible for identifying the requirements of the application, developing software that implements the requirements, and for allocating appropriate resources (processors and communication networks). Development of quality software systems has always been a great challenge for software developers. In practice, it happens that non-functional aspects are often ignored while focusing on the functionality of the system. Many systems have failed because of negligence of non-functional requirements. To study the impact of non-functional requirements on requirements evolution, this paper discusses various approaches, available in the literature, to represent non-functional requirements during software development. To study the impact of non-functional requirements on requirements evolution, this paper is focused on three issues: Different views on non-functional requirements, Representation of non-functional requirements and Dealing with non-functional requirements.","PeriodicalId":440967,"journal":{"name":"2013 6th International Conference on Emerging Trends in Engineering and Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131191238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Generation of Test Cases from Software Requirements Using Natural Language Processing 使用自然语言处理从软件需求生成测试用例
R. Verma, Md. Rizwan Beg
{"title":"Generation of Test Cases from Software Requirements Using Natural Language Processing","authors":"R. Verma, Md. Rizwan Beg","doi":"10.1109/ICETET.2013.45","DOIUrl":"https://doi.org/10.1109/ICETET.2013.45","url":null,"abstract":"Software testing plays an important role in early verification of software systems and it enforces quality in the system under development. One of the challenging tasks in the software testing is generation of software test cases. There are many existing approaches to generate test cases like using uses case, activity diagrams and sequence diagrams; they have their own limitations such as inability to capture test cases for non functional requirements and etc. Thus these techniques have restricted use in acceptance testing and are not effective for verification & acceptance of large software system. If software requirements are stated using semi-formal or formal methods then it is difficult for the testers and other third party domain experts to test the system. It also requires much expertise in interpreting requirements and only limited number of persons can understand them. This paper proposes an approach to generate test case from software requirements expressed in natural language using natural language processing technique.","PeriodicalId":440967,"journal":{"name":"2013 6th International Conference on Emerging Trends in Engineering and Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133607955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Development of Methodology for Collecting Quality Cost in Rubber Processing Industry 橡胶加工业质量成本收集方法的发展
V. Kale, S. Jaju
{"title":"Development of Methodology for Collecting Quality Cost in Rubber Processing Industry","authors":"V. Kale, S. Jaju","doi":"10.1109/ICETET.2013.39","DOIUrl":"https://doi.org/10.1109/ICETET.2013.39","url":null,"abstract":"Quality Cost is considered as the sum of conformance plus non-conformance costs, where cost of conformance is the price paid for prevention of poor quality and cost of non-conformance is the cost of poor quality caused by product and service failure. Cost of Quality in rubber processing industry has not received as much attention from the research community as other economic aspects of quality development in rubber processing industry. After reviewing to the literature it was notice that a simplified methodology for data collection of quality cost in rubber processing industry was required. Also in the light of research carried out so far it is felt necessary to standardize cost elements in each of the prevention, appraisal, internal failure and external failure cost. Here an attempt is made to standardize the various cost elements and develop methodology for collecting quality cost applicable to rubber processing industry.","PeriodicalId":440967,"journal":{"name":"2013 6th International Conference on Emerging Trends in Engineering and Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127765420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Phishing Detection Using PSOAANN Based One-Class Classifier 基于PSOAANN的单类分类器的网络钓鱼检测
M. Pandey, V. Ravi
{"title":"Phishing Detection Using PSOAANN Based One-Class Classifier","authors":"M. Pandey, V. Ravi","doi":"10.1109/ICETET.2013.46","DOIUrl":"https://doi.org/10.1109/ICETET.2013.46","url":null,"abstract":"We propose to detect phishing emails and websites using particle swarm optimization (PSO) trained auto associative neural network (PSOAANN), which is employed as one class classifier. PSOAANN achieved better results when compared to previous efforts. In the study, we also developed a new feature selection method based on the weights from input to hidden layers of the PSOAANN. We compared its performance with other methods.","PeriodicalId":440967,"journal":{"name":"2013 6th International Conference on Emerging Trends in Engineering and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130337904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信