2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)最新文献

筛选
英文 中文
AWGN and impulsive noise removal by turbo audio enhancement technique AWGN与脉冲噪声的turbo音频增强技术
Rohini S. Hallikar, Shweta Kulkarni, M. Uttarakumari, K. Padmaraju
{"title":"AWGN and impulsive noise removal by turbo audio enhancement technique","authors":"Rohini S. Hallikar, Shweta Kulkarni, M. Uttarakumari, K. Padmaraju","doi":"10.1109/ICCICCT.2014.6993153","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993153","url":null,"abstract":"This paper gives a performance comparison of turbo method of audio signal enhancement with Dual Resonance Non Linear (DRNL) and Signal Dependent Rank Order Mean(SD-ROM). The salient feature of the work is to explore the usage of turbo method for enhancement of signals like vowels and consonants which was not done earlier for this method. Vowels and consonants being the basics of any language, give a different dimension to this work. From the comparison it can be decided which audio signal enhancement technique can be most useful for the signal processing part of the cochlear implant. Due to the iterative nature of turbo method, it gives better signal enhancement. The results have been compiled for sounds corrupted by different noises namely AWGN and impulsive noise. Enhancement is evaluated based on the correlation coefficient, Log Spectral Distortion (LSD), Segmental Signal to Noise Ratio (SSNR) and Mean Square Error (MSE) between the clean signal and the processed signal. Simulation results confirm that, turbo helps in better enhancement for signals corrupted by AWGN. Turbo method provides signal enhancement for impulsive noise but SD-ROM performs better for impulsive noise. DRNL contributes in signal enhancement not as a standalone filter but when used in combination to form turbo.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"45 1","pages":"1254-1259"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88101209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design, conceptual analysis and implementation of coordinated multipurpose robotic system with smart sensors 具有智能传感器的协调多用途机器人系统的设计、概念分析与实现
I. Rohit, M. Dev Anand, D. Jackson
{"title":"Design, conceptual analysis and implementation of coordinated multipurpose robotic system with smart sensors","authors":"I. Rohit, M. Dev Anand, D. Jackson","doi":"10.1109/ICCICCT.2014.6992956","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992956","url":null,"abstract":"This paper attempts to the overview of design, conceptual analysis and implementation of coordinated multipurpose robot system with smart sensors. The aim of this paper is to show how to design and integrate various sensors in a single module and create a data retrieval system which can be used as a black box and an investigation device.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"8 1","pages":"195-201"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82887419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A learning based approach to self modeling robots 基于学习的机器人自建模方法
Michael J. Mathew, Rachit Sapra, S. Majumder
{"title":"A learning based approach to self modeling robots","authors":"Michael J. Mathew, Rachit Sapra, S. Majumder","doi":"10.1109/ICCICCT.2014.6993060","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993060","url":null,"abstract":"Performance of a robotic system depends o n the mathematical model that is programmed within the software of the robot. Usually the mathematical model of a robot is calculated by the designer and is re-calibrated during the time of operation. Model of the robot is essential for its software to take intelligent actions. Equipping the robot with the capability to self model will help itself to re-correct the model and recover itself in case of minor damages during operation. This also avoids the need of re-calibration since the model gets refined with more number of iterations. This work tries to make a robotic system, where the robot attempts to model itself by making use of some basic prior information and deriving the rest of the required information by visually observing the result of its actions on the environment. The approach discussed in this paper is for robotic manipulators and is validated through an experiment using an Invenscience ARM 2.0 using a Point Grey stereo camera.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"2016 1","pages":"758-762"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86633030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Self congestion prediction algorithm for efficient routing in Mobile Ad-Hoc Network 移动Ad-Hoc网络中有效路由的自拥塞预测算法
G. Kamatam, P. Srinivas, K. C. Sekharaiah
{"title":"Self congestion prediction algorithm for efficient routing in Mobile Ad-Hoc Network","authors":"G. Kamatam, P. Srinivas, K. C. Sekharaiah","doi":"10.1109/ICCICCT.2014.6993058","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993058","url":null,"abstract":"Congestion control in Mobile Ad-Hoc Network (MANET) is relatively different from that of traditional networks. The standard TCP congestion control approach is not adapted properly in the dynamic properties of MANET, which creates lot of challenges in routing, due to resources and bandwidth limits. In this paper, we proposed a self congestion prediction (SCP) algorithm for congestion prediction and modified AODV with SCP to propose a novel A-SCP protocol for alleviating congestion and efficient routing. The objective of the algorithm is to minimize network overhead and improvise the throughput without deteriorating the network. To evaluate the proposal we simulate in different random mobility and scalable network environment which shows an improvisation in packet delivery and decline in control overhead and end-to-end delay.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"141 1","pages":"745-750"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86742860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Design of a low power, high speed and energy efficient 3 transistor XOR gate in 45nm technology using the conception of MVT methodology 利用MVT方法的概念,设计了一种低功耗、高速度和节能的45纳米3晶体管异或门
Krishnendu Dhar
{"title":"Design of a low power, high speed and energy efficient 3 transistor XOR gate in 45nm technology using the conception of MVT methodology","authors":"Krishnendu Dhar","doi":"10.1109/ICCICCT.2014.6992931","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992931","url":null,"abstract":"This paper puts forward the design of a low power, high speed and energy efficient XOR gate comprising only 3 transistors in 45nm technology using the conception of Mixed Threshold Voltage (MVT) methodology. On comparison with the conventional CMOS transistors, transmission gates and Complementary Pass-Transistor Logic (CPL), the proposed design showed a substantial amount of depreciation in Average Power consumption (Pavg), Peak Power consumption (Ppeak), delay time, Power Delay Product (PDP) and Energy Delay Product (EDP), respectively. It has been found that Pavg is as small as 6.72×10-11 W while Ppeak is as small as 1.11×10-6 W. On further computation, it has been found that delay time is as low as 1.05pico second and hence PDP is as small as 7.07×10-23 Joule whereas EDP is as less as 7.45×10-35 Js for 0.9 volt power supply. In addition to this, due to reduced transistor count, surface area is also remarkably reduced. The simulation for the proposed design has been carried out in Tanner S PICE and the layout has been concocted in Microwind.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"48 1","pages":"66-70"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80704769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A survey of vision and speech stimulation for cerebral palsy rehabilitation 脑性麻痹康复中视觉言语刺激的研究
G. Sumathy, A. Renjith
{"title":"A survey of vision and speech stimulation for cerebral palsy rehabilitation","authors":"G. Sumathy, A. Renjith","doi":"10.1109/ICCICCT.2014.6993164","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993164","url":null,"abstract":"This survey summarizes many theories and methods applied for vision and speech improvement for cerebral palsy babies. Some research team focus on vision and speech stimulation for cerebral palsy with different techniques using computer aided system and electrical devices. Electrical electrode devices are complexity to use and reliability are inadequate for providing vision and speech stimulation which lead to recover partial output. The material of the survey is divided into four section. 1) Overview of vision development 2) vision stimulation techniques. 3) low vision 4) overview of speech stimulation and techniques. The survey taken from the research field of computer science, neural networks, electrical engineering and psychology. It contains useful guidelines for the construction of new vision and speech stimulation tool which support for young and visually inattentive children.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"21 1","pages":"1315-1319"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80594569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Implementation of a FIR filter model using reversible Fredkin Gate 利用可逆弗雷德金门实现FIR滤波器模型
K. Joy, B. Mathew
{"title":"Implementation of a FIR filter model using reversible Fredkin Gate","authors":"K. Joy, B. Mathew","doi":"10.1109/ICCICCT.2014.6993048","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993048","url":null,"abstract":"Man has achieved wonders in his race from the stone age to the supersonic age. These wonders can be understood from the modern technologies. Technological advancements are becoming a part and parcel of this world. More and more technologies with lot of features and advantages are arising. Reversible logic is one such emerging concept. One of the main characteristics of reversible circuits is their less power consumption. As the technology improves, the number of components and hence the number of transistors packed on to the chip also increases. This causes increase in power consumption. Hence reduced power consumption argued by the reversible logic concept has adequate importance in the present scenario. Reversible logic has a wide application in low power VLSI circuits. This paper aims at promoting the concept of reversible logic by implementing a model of a FIR filter using the reversible Fredkin gate.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"2 1","pages":"690-694"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89946678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A model to secure e-commerce transaction using hybrid encryption 一个使用混合加密保护电子商务交易的模型
D. S. Solanki, S. Shiwani
{"title":"A model to secure e-commerce transaction using hybrid encryption","authors":"D. S. Solanki, S. Shiwani","doi":"10.1109/ICCICCT.2014.6993040","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993040","url":null,"abstract":"The essential part of e-commerce is its data in the database. The issues associated with the security in the database of traditional e-commerce on the basis of analysis on the process of users registration and retrieving password are explained. Security of e-commerce system by single encryption technique is difficult to ensure. The technologies like asymmetrical encryption and symmetrical encryption were introduced to forward the combining thought to produce a hybrid encryption. The method so developed is used to modify the e-commerce process by which the e-commerce database security is enhanced.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"1 1","pages":"642-645"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89962290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Design and development of multi-parameter patient monitoring system with wireless communication to PC 无线通信多参数病人监护系统的设计与开发
Abhishek Ekhare, U. Chaskar
{"title":"Design and development of multi-parameter patient monitoring system with wireless communication to PC","authors":"Abhishek Ekhare, U. Chaskar","doi":"10.1109/ICCICCT.2014.6992923","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992923","url":null,"abstract":"The fusion of biomedical technology and wireless communication has imparted enormous comfort to both doctor and patient. Using wireless technology, vital patient parameters can be transmitted at remote locations. Also, the alternative to regular home check-ups of patients is remote patient monitoring. This paper presents the design and development of a wireless multiple vital-parameter patient monitoring system. The patient monitoring module transmits the acquired vital signs through a wireless communication module to multiple personal computers. The patient monitoring module incorporates a reconfigurable hardware, and a few selected parameters like electrocardiogram (ECG), heart rate (HR), blood oxygen saturation level (SpO2), non-invasive blood pressure (NIBP) and body temperature are transmitted using wireless technology for remote patient monitoring. The system has been evaluated by technical verification, clinical test, and user survey. The system was tested in the R&D laboratory of Medion Healthcare Pvt. Ltd. The results obtained from these tests are presented in this paper.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"1 1","pages":"21-25"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89728131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A honeypots based anti-phishing framework 一个基于蜜罐的反网络钓鱼框架
Shubhika Chauhan, S. Shiwani
{"title":"A honeypots based anti-phishing framework","authors":"Shubhika Chauhan, S. Shiwani","doi":"10.1109/ICCICCT.2014.6993036","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993036","url":null,"abstract":"Honeypots have been extensively used, as a very powerful anti-phishing tool, by IT security experts and financial institutions to gather spurious mails of phishing kind. This has helped the security service providers to detect new phishing sites and quickly shut them down. Honeypots are also deployed to collect critical information about activities of people involved in phishing, helping in generation of statistical data to later aid in security research and forensic investigations. More recently, active feeding of phishers with honeytokens is also proposed as a proactive security mechanism, in line with the “taking the war to their home” approach. In this research paper, we elaborate certain problems of anti-phishing solutions based on honeypots being used currently. We propose to minimize or overcome these limitations/problems by performing the makeover of real online banking system into a large honeypot armed with honeytokens. This large honeypot will be supported by some additional honeypots, to make it more powerful. A phishing attempt detection algorithm, called PhishDetekt, is used to automatically sense dubious phishers' bids of stealing money from victims' bank accounts. The system asks for the potential victim's reconfirmation for the transaction under suspicion. This results in development of a new honeypot-based anti-phishing framework. As a vital component of the proposed framework, we also propose to use virtual honeypots-emulating agents to mimic behavior of real users to access the Online banking system regularly. The main objective of such agents will be to submit honeytokens to phishing malware and to take the fight against phishers to their own territory.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"32 1","pages":"618-625"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87185877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信