Rohini S. Hallikar, Shweta Kulkarni, M. Uttarakumari, K. Padmaraju
{"title":"AWGN and impulsive noise removal by turbo audio enhancement technique","authors":"Rohini S. Hallikar, Shweta Kulkarni, M. Uttarakumari, K. Padmaraju","doi":"10.1109/ICCICCT.2014.6993153","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993153","url":null,"abstract":"This paper gives a performance comparison of turbo method of audio signal enhancement with Dual Resonance Non Linear (DRNL) and Signal Dependent Rank Order Mean(SD-ROM). The salient feature of the work is to explore the usage of turbo method for enhancement of signals like vowels and consonants which was not done earlier for this method. Vowels and consonants being the basics of any language, give a different dimension to this work. From the comparison it can be decided which audio signal enhancement technique can be most useful for the signal processing part of the cochlear implant. Due to the iterative nature of turbo method, it gives better signal enhancement. The results have been compiled for sounds corrupted by different noises namely AWGN and impulsive noise. Enhancement is evaluated based on the correlation coefficient, Log Spectral Distortion (LSD), Segmental Signal to Noise Ratio (SSNR) and Mean Square Error (MSE) between the clean signal and the processed signal. Simulation results confirm that, turbo helps in better enhancement for signals corrupted by AWGN. Turbo method provides signal enhancement for impulsive noise but SD-ROM performs better for impulsive noise. DRNL contributes in signal enhancement not as a standalone filter but when used in combination to form turbo.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"45 1","pages":"1254-1259"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88101209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design, conceptual analysis and implementation of coordinated multipurpose robotic system with smart sensors","authors":"I. Rohit, M. Dev Anand, D. Jackson","doi":"10.1109/ICCICCT.2014.6992956","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992956","url":null,"abstract":"This paper attempts to the overview of design, conceptual analysis and implementation of coordinated multipurpose robot system with smart sensors. The aim of this paper is to show how to design and integrate various sensors in a single module and create a data retrieval system which can be used as a black box and an investigation device.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"8 1","pages":"195-201"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82887419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A learning based approach to self modeling robots","authors":"Michael J. Mathew, Rachit Sapra, S. Majumder","doi":"10.1109/ICCICCT.2014.6993060","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993060","url":null,"abstract":"Performance of a robotic system depends o n the mathematical model that is programmed within the software of the robot. Usually the mathematical model of a robot is calculated by the designer and is re-calibrated during the time of operation. Model of the robot is essential for its software to take intelligent actions. Equipping the robot with the capability to self model will help itself to re-correct the model and recover itself in case of minor damages during operation. This also avoids the need of re-calibration since the model gets refined with more number of iterations. This work tries to make a robotic system, where the robot attempts to model itself by making use of some basic prior information and deriving the rest of the required information by visually observing the result of its actions on the environment. The approach discussed in this paper is for robotic manipulators and is validated through an experiment using an Invenscience ARM 2.0 using a Point Grey stereo camera.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"2016 1","pages":"758-762"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86633030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Self congestion prediction algorithm for efficient routing in Mobile Ad-Hoc Network","authors":"G. Kamatam, P. Srinivas, K. C. Sekharaiah","doi":"10.1109/ICCICCT.2014.6993058","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993058","url":null,"abstract":"Congestion control in Mobile Ad-Hoc Network (MANET) is relatively different from that of traditional networks. The standard TCP congestion control approach is not adapted properly in the dynamic properties of MANET, which creates lot of challenges in routing, due to resources and bandwidth limits. In this paper, we proposed a self congestion prediction (SCP) algorithm for congestion prediction and modified AODV with SCP to propose a novel A-SCP protocol for alleviating congestion and efficient routing. The objective of the algorithm is to minimize network overhead and improvise the throughput without deteriorating the network. To evaluate the proposal we simulate in different random mobility and scalable network environment which shows an improvisation in packet delivery and decline in control overhead and end-to-end delay.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"141 1","pages":"745-750"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86742860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of a low power, high speed and energy efficient 3 transistor XOR gate in 45nm technology using the conception of MVT methodology","authors":"Krishnendu Dhar","doi":"10.1109/ICCICCT.2014.6992931","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992931","url":null,"abstract":"This paper puts forward the design of a low power, high speed and energy efficient XOR gate comprising only 3 transistors in 45nm technology using the conception of Mixed Threshold Voltage (MVT) methodology. On comparison with the conventional CMOS transistors, transmission gates and Complementary Pass-Transistor Logic (CPL), the proposed design showed a substantial amount of depreciation in Average Power consumption (Pavg), Peak Power consumption (Ppeak), delay time, Power Delay Product (PDP) and Energy Delay Product (EDP), respectively. It has been found that Pavg is as small as 6.72×10-11 W while Ppeak is as small as 1.11×10-6 W. On further computation, it has been found that delay time is as low as 1.05pico second and hence PDP is as small as 7.07×10-23 Joule whereas EDP is as less as 7.45×10-35 Js for 0.9 volt power supply. In addition to this, due to reduced transistor count, surface area is also remarkably reduced. The simulation for the proposed design has been carried out in Tanner S PICE and the layout has been concocted in Microwind.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"48 1","pages":"66-70"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80704769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey of vision and speech stimulation for cerebral palsy rehabilitation","authors":"G. Sumathy, A. Renjith","doi":"10.1109/ICCICCT.2014.6993164","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993164","url":null,"abstract":"This survey summarizes many theories and methods applied for vision and speech improvement for cerebral palsy babies. Some research team focus on vision and speech stimulation for cerebral palsy with different techniques using computer aided system and electrical devices. Electrical electrode devices are complexity to use and reliability are inadequate for providing vision and speech stimulation which lead to recover partial output. The material of the survey is divided into four section. 1) Overview of vision development 2) vision stimulation techniques. 3) low vision 4) overview of speech stimulation and techniques. The survey taken from the research field of computer science, neural networks, electrical engineering and psychology. It contains useful guidelines for the construction of new vision and speech stimulation tool which support for young and visually inattentive children.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"21 1","pages":"1315-1319"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80594569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of a FIR filter model using reversible Fredkin Gate","authors":"K. Joy, B. Mathew","doi":"10.1109/ICCICCT.2014.6993048","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993048","url":null,"abstract":"Man has achieved wonders in his race from the stone age to the supersonic age. These wonders can be understood from the modern technologies. Technological advancements are becoming a part and parcel of this world. More and more technologies with lot of features and advantages are arising. Reversible logic is one such emerging concept. One of the main characteristics of reversible circuits is their less power consumption. As the technology improves, the number of components and hence the number of transistors packed on to the chip also increases. This causes increase in power consumption. Hence reduced power consumption argued by the reversible logic concept has adequate importance in the present scenario. Reversible logic has a wide application in low power VLSI circuits. This paper aims at promoting the concept of reversible logic by implementing a model of a FIR filter using the reversible Fredkin gate.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"2 1","pages":"690-694"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89946678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A model to secure e-commerce transaction using hybrid encryption","authors":"D. S. Solanki, S. Shiwani","doi":"10.1109/ICCICCT.2014.6993040","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993040","url":null,"abstract":"The essential part of e-commerce is its data in the database. The issues associated with the security in the database of traditional e-commerce on the basis of analysis on the process of users registration and retrieving password are explained. Security of e-commerce system by single encryption technique is difficult to ensure. The technologies like asymmetrical encryption and symmetrical encryption were introduced to forward the combining thought to produce a hybrid encryption. The method so developed is used to modify the e-commerce process by which the e-commerce database security is enhanced.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"1 1","pages":"642-645"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89962290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and development of multi-parameter patient monitoring system with wireless communication to PC","authors":"Abhishek Ekhare, U. Chaskar","doi":"10.1109/ICCICCT.2014.6992923","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992923","url":null,"abstract":"The fusion of biomedical technology and wireless communication has imparted enormous comfort to both doctor and patient. Using wireless technology, vital patient parameters can be transmitted at remote locations. Also, the alternative to regular home check-ups of patients is remote patient monitoring. This paper presents the design and development of a wireless multiple vital-parameter patient monitoring system. The patient monitoring module transmits the acquired vital signs through a wireless communication module to multiple personal computers. The patient monitoring module incorporates a reconfigurable hardware, and a few selected parameters like electrocardiogram (ECG), heart rate (HR), blood oxygen saturation level (SpO2), non-invasive blood pressure (NIBP) and body temperature are transmitted using wireless technology for remote patient monitoring. The system has been evaluated by technical verification, clinical test, and user survey. The system was tested in the R&D laboratory of Medion Healthcare Pvt. Ltd. The results obtained from these tests are presented in this paper.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"1 1","pages":"21-25"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89728131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A honeypots based anti-phishing framework","authors":"Shubhika Chauhan, S. Shiwani","doi":"10.1109/ICCICCT.2014.6993036","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993036","url":null,"abstract":"Honeypots have been extensively used, as a very powerful anti-phishing tool, by IT security experts and financial institutions to gather spurious mails of phishing kind. This has helped the security service providers to detect new phishing sites and quickly shut them down. Honeypots are also deployed to collect critical information about activities of people involved in phishing, helping in generation of statistical data to later aid in security research and forensic investigations. More recently, active feeding of phishers with honeytokens is also proposed as a proactive security mechanism, in line with the “taking the war to their home” approach. In this research paper, we elaborate certain problems of anti-phishing solutions based on honeypots being used currently. We propose to minimize or overcome these limitations/problems by performing the makeover of real online banking system into a large honeypot armed with honeytokens. This large honeypot will be supported by some additional honeypots, to make it more powerful. A phishing attempt detection algorithm, called PhishDetekt, is used to automatically sense dubious phishers' bids of stealing money from victims' bank accounts. The system asks for the potential victim's reconfirmation for the transaction under suspicion. This results in development of a new honeypot-based anti-phishing framework. As a vital component of the proposed framework, we also propose to use virtual honeypots-emulating agents to mimic behavior of real users to access the Online banking system regularly. The main objective of such agents will be to submit honeytokens to phishing malware and to take the fight against phishers to their own territory.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"32 1","pages":"618-625"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87185877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}