{"title":"Intelligent Gesture Recognition to Design more Efficient & Intelligent Multimodal System","authors":"S. Chhabria, R. Dharaskar, V. Thakare","doi":"10.1109/ICETET.2013.70","DOIUrl":"https://doi.org/10.1109/ICETET.2013.70","url":null,"abstract":"Technologies used in multimodal interfaces include conventional direct-manipulation devices like the keyboard, mouse, and pen and touch screen, as well as progressively more advanced recognition technologies such as speech recognition, 2D and 3D gesture recognition, and lip movement and gaze tracking. Usability studies, exploring and evaluating the human factors involved in multimodal input, provide useful insight and guidance toward the design and implementation of multimodal interfaces. The primary goal in the design of any user interface is to facilitate the interaction between user and machine. This user-centered goal is the guiding force behind choices made in the design process. There are, of course, many system engineering issues that influence interface design decisions such as schedules, proper functionality, reliability, etc. However, addressing these issues ideally serves the purpose of creating a better user experience with the system. One purpose of researching multimodal interfaces from an HCI perspective is to evaluate how to take advantage of the benefits they provide over unimodal recognition-based interfaces and conventional keyboard and mouse interfaces. Such advantages include flexibility, availability, adaptability, efficiency, lower error rate, and a more intuitive and natural interaction [1, 2]. Technology is one way to remove the hindrances and benefit the people. It is found that all the recent techniques for Multimodal System are based on computer tools, techniques and technologies like: Artificial Intelligence; Expert System; Graph Matching; Soft Computing; Natural Language Processing (NLP); Multi-Modal and HCI. Several researchers have explored their possibilities and have achieved results to certain extent, but progress in Speech Recognition & Language Understanding using gestures, & optimization as a whole has been limited which gives us future scope to go ahead in this domain.","PeriodicalId":440967,"journal":{"name":"2013 6th International Conference on Emerging Trends in Engineering and Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128627826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling Cost of Quality in Advanced Manufacturing Environment","authors":"S. Mantri, S. Jaju","doi":"10.1109/ICETET.2013.40","DOIUrl":"https://doi.org/10.1109/ICETET.2013.40","url":null,"abstract":"Cost of quality practices, an important element of quality management is getting increasing attention, recently, across the broad spectrum of organizations globally. The research work undertaken aims at the study of present methods adopted for Cost of Quality (COQ) analysis in Indian enterprises working in advanced and computer integrated manufacturing environment and to develop and validate quality cost management focusing on maximizing the economic benefit to the enterprise. Paper focuses on emergence of new trends in cost of quality practices in tandem with advancement in technology by reviewing the published literature. In addition, a general framework for quality cost management system (QCMS) is proposed.","PeriodicalId":440967,"journal":{"name":"2013 6th International Conference on Emerging Trends in Engineering and Technology","volume":"37 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130749446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of RMDMTS Protocol for Efficient Scheduled Co-operative Buffer Management and Streaming in Ad Hoc Network","authors":"B. Mahajan, A. Mahajan","doi":"10.1109/ICETET.2013.55","DOIUrl":"https://doi.org/10.1109/ICETET.2013.55","url":null,"abstract":"The Transmission of multimedia content typically has bandwidth, delay and loss issues. Video compression, layer, media distribution services, streams servers, synchronization technique and synchronization protocols for streaming are major areas of research. It require scheduling protocol to sequence the events. Various useful applications for streaming in internet world are available and their implementation in ad hoc network needs improvement in architecture. To achieve efficiency and flexibility, a new streaming and compression along with scheduling technique is required which can uses the buffer for encoding, compression. Design of RMDMTS (Reliable Multimedia Data Management & Transport protocol) is prepared in such a way that it deals with proper schedule management and managing buffer and playback rate. In RMDMTS, torrent kind of technique is used for cooperative relay and multiple participants' buffer management. It is designed for efficient streaming as well as buffer management at receiver side. Overhead of processing can be also minimized at node level using RMDMTS.","PeriodicalId":440967,"journal":{"name":"2013 6th International Conference on Emerging Trends in Engineering and Technology","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131071833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jannat Talwar, Shree Ranjani, Anwaya Aras, Dr Mangesh Bedekar
{"title":"Intelligent Classroom System for Qualitative Analysis of Students' Conceptual Understanding","authors":"Jannat Talwar, Shree Ranjani, Anwaya Aras, Dr Mangesh Bedekar","doi":"10.1109/ICETET.2013.6","DOIUrl":"https://doi.org/10.1109/ICETET.2013.6","url":null,"abstract":"With the increase of ubiquitous data all over the internet, intelligent classroom systems that integrate traditional learning techniques with modern e-learning tools have become quite popular and necessary today. Although a substantial amount of work has been done in the field of e-learning, specifically in automation of objective question and answer evaluation, personalized learning, adaptive evaluation systems, the field of qualitative analysis of a student's subjective paragraph answers remains unexplored to a large extent. The traditional board, chalk, talk based classroom scenario involves a teacher setting question papers based on the concepts taught, checks the answers written by students manually and thus evaluates the students' performance. However, setting question papers remains a time consuming process with the teacher having to bother about question quality, level of difficulty and redundancy. In addition the process of manually correcting students' answers is a cumbersome and tedious task. In this paper, we put forth the design, analysis and implementation details along with some preliminary results to build a system that integrates all the above mentioned tasks with minimal teacher involvement that not only automates the traditional classroom scenario but also overcomes its inherent shortcomings and fallacies.","PeriodicalId":440967,"journal":{"name":"2013 6th International Conference on Emerging Trends in Engineering and Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130973290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shamla Mantri, Pankaj Agrawal, S. Dorle, Dipti D. Patil, V. Wadhai
{"title":"Clinical Depression Analysis Using Speech Features","authors":"Shamla Mantri, Pankaj Agrawal, S. Dorle, Dipti D. Patil, V. Wadhai","doi":"10.1109/ICETET.2013.32","DOIUrl":"https://doi.org/10.1109/ICETET.2013.32","url":null,"abstract":"Depression is a most common severe mental disturbance health disorder causing high societal costs. In clinical practice rating for depression depends almost on self questionnaires and clinical patient history report opinion. In recent years, the awareness has generated for automatic detection of depression from the speech signal. Some queries are raised that which features are more responsible for depression from speech and which classifiers gives good results. By identifying proper features from speech signal system even one can save the life of a patient. In this paper, a survey of speech signal features which relates for depression analysis is presented. Specially focused on adolescence speech. After surveying it is hypothesized that many speech features are there which are responsible for depression like linear features Prosodic, cepstral, spectral and glottal features and non-linear feature Teager energy operator (TEO). Some classification methods for depression analysis from previous studies are summarized.","PeriodicalId":440967,"journal":{"name":"2013 6th International Conference on Emerging Trends in Engineering and Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122950677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"VANET: Challenges, Issues and Solutions","authors":"Komal P. Mehta, L. Malik, P. Bajaj","doi":"10.1109/ICETET.2013.18","DOIUrl":"https://doi.org/10.1109/ICETET.2013.18","url":null,"abstract":"The current paper includes review of worldwide research work on various issues related to VANET; challenges, stability, performance parameters and solutions to them. VANET target the design and deployment of the QoS-assured, secure and high-speed communication connectivity on mobile platforms such as buses, trains, cars, ships, marine squad of battlefields, where dispersed portable devices are enabled to establish on-demand pervasive communications in decentralized manners. Although amount of research has been devoted to the various routing issues in VANET but still there are some areas that need more attention.","PeriodicalId":440967,"journal":{"name":"2013 6th International Conference on Emerging Trends in Engineering and Technology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121291508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network Performance Evaluation of Jumbo Frames on a Network","authors":"S. Narayan, Paula Raymond Lutui","doi":"10.1109/ICETET.2013.16","DOIUrl":"https://doi.org/10.1109/ICETET.2013.16","url":null,"abstract":"Enhancing network performance has been studied by a number of researchers. The need to provide greater throughput on network infrastructure has been the key driver for these studies. The use of jumbo frames is considered one of the methodologies that can be employed to increase data throughput on networks. It can carry data payloads ranging from 1500Bytes to 9000Bytes which can be supported by Gigabit network hardware. In this research undertaking, a test-bed network is implemented on which jumbo frames are configured on two commonly used operating systems. Performance related metrics like throughput, jitter, delay and drop rates are empirically measured for both IPv4 and IPv6 implementations. The results obtained in this empirical study show that performance metrics values are different in various scenarios.","PeriodicalId":440967,"journal":{"name":"2013 6th International Conference on Emerging Trends in Engineering and Technology","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116794704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploration of Schemes for Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptosystem","authors":"Dr.Sonali Nimbhorkar(Ridhorkar), L. Malik","doi":"10.1109/ICETET.2013.42","DOIUrl":"https://doi.org/10.1109/ICETET.2013.42","url":null,"abstract":"Wireless technology has become more persistent with wide demand of mobile devices such as personal digital assistance, smart phones and laptops. The elliptic curve cryptography(ECC) techniques provide greater security using fewer bits resulting in a protocol which requires low computational and communication overhead, therefore suitable for wireless communication system as well as wireless communication devices smart cards, PDAs and other handheld devices. These systems are prone to eavesdropping due to easy access to free space medium. In such cases, appropriate authenticity and cryptographic procedures need to be adopted for reliable and secure communication. Key agreement protocol based on elliptic curve cryptography suited for wireless network. This paper describes various schemes used for implementation of authenticated key agreement protocol in wireless network.","PeriodicalId":440967,"journal":{"name":"2013 6th International Conference on Emerging Trends in Engineering and Technology","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126850212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Genetic Algorithm Approach to Achieve Steady State Power Flow Solution","authors":"Shilpa S. Shrawane Kapse, M. Diagavane, N. Bawane","doi":"10.1109/ICETET.2013.53","DOIUrl":"https://doi.org/10.1109/ICETET.2013.53","url":null,"abstract":"Power flow is nothing but the flow of active and reactive power. To achieve the steady state operating condition of a power system, power flow analysis (PFA) is used. In short, it is to find the approximate values of P, Q, V and δ at various buses, lines flows, generators and loads under steady state condition. Heuristic methods are generally referred as experience based techniques for solving problem, learning and discovery. Heuristics are simple and efficient rules coded by evolutionary processes. In this paper, GA, genetic algorithm, one of such heuristic algorithms have been used to do the power flow analysis in a simple three bus system.","PeriodicalId":440967,"journal":{"name":"2013 6th International Conference on Emerging Trends in Engineering and Technology","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127663136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computer Independent USB to USB Data Transfer Bridge","authors":"T. Sawant, Bhagya Parekh, Naineel Shah","doi":"10.1109/ICETET.2013.8","DOIUrl":"https://doi.org/10.1109/ICETET.2013.8","url":null,"abstract":"In this modern era data is omnipresent, be it for business, medicine, entertainment or even education. Thus even the need for data sharing is at its pinnacle. It is even more vital to make sure that data is transferred at high speeds. If the data transfer is faster and safer it will revolutionize the way we live and work. The USB to USB Bridge concept will make it viable to carry out mass data transfer anywhere, anytime which will be secure and will be at high speeds. It consists of just four connecting wires between the device and the Host (Computer), regulated by a set of protocols. The aim of this project is to achieve computer independent data transfer, from one USB flash drive to another. Being portable and battery operated is an added advantage of this system. It is an embedded solution to a practical problem. Also, we can send the data over the internet by connecting our USB Bridge to the internet.","PeriodicalId":440967,"journal":{"name":"2013 6th International Conference on Emerging Trends in Engineering and Technology","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127722902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}