Pub Date : 2014-05-02DOI: 10.1109/ICAET.2014.7105221
Ganesh Arora, Manish Modi, Aivy Kalita, P. Sinha, A. Priya, Shohil Sethia, S. Bhattacharya
System of safe driving (SOSD) will reduce the risk of vehicle accidents and strike off the corruption, from one fold. Corruption will be stroked off through Eagle-eyed traffic monitoring accomplished by Subscriber Identity Module (SIM) operated vehicles and a decrease in the speed will be achieved through the control on periodicity of spark, in restricted area. SOSD will also enhance the sixth sense of commutators at sharp turns. Likewise SOSD will change the environment of driving.
{"title":"Advancements in the system of safe driving","authors":"Ganesh Arora, Manish Modi, Aivy Kalita, P. Sinha, A. Priya, Shohil Sethia, S. Bhattacharya","doi":"10.1109/ICAET.2014.7105221","DOIUrl":"https://doi.org/10.1109/ICAET.2014.7105221","url":null,"abstract":"System of safe driving (SOSD) will reduce the risk of vehicle accidents and strike off the corruption, from one fold. Corruption will be stroked off through Eagle-eyed traffic monitoring accomplished by Subscriber Identity Module (SIM) operated vehicles and a decrease in the speed will be achieved through the control on periodicity of spark, in restricted area. SOSD will also enhance the sixth sense of commutators at sharp turns. Likewise SOSD will change the environment of driving.","PeriodicalId":120881,"journal":{"name":"2014 International Conference on Advances in Engineering and Technology (ICAET)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127267705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-02DOI: 10.1109/ICAET.2014.7105293
A. Najim, A. Acharya, A. Pise, S. Gajghate
In this paper, bubble dynamics in pool boiling heat transfer using saturated water and aqueous Ammonium Chloride (anionic surfactant) solution has been studied experimentally. The concentration of surfactant was taken 2600 ppm (Parts per Million). Single bubble is generated using right angle needle tip of a hypodermic needle as a nucleation site. The bubble dynamics was studied using SONY Cyber-shot DSC-H100 camera operating at 30 frames per second at atmospheric pressure. Bubble growth in saturated water is compared surfactant solution. The result shows that, at low heat flux (q= 235 KW/m2), the bubble diameter, bubble height and bubble volume in surfactant solution approximately similar to that of water. At high heat flux (q= 738 kW/m2), the departure diameter of water bubbles was approximately same. But, in surfactant solution, the departure diameter decreases with increasing heat flux and thereby enhances pool boiling heat transfer coefficient. The enhancement is observed due to surface tension of the aqueous solution. The effect of surfactant on bubble release frequency is also discussed.
{"title":"Experimental study of bubble dynamics in pool boiling heat transfer using saturated water and surfactant solution","authors":"A. Najim, A. Acharya, A. Pise, S. Gajghate","doi":"10.1109/ICAET.2014.7105293","DOIUrl":"https://doi.org/10.1109/ICAET.2014.7105293","url":null,"abstract":"In this paper, bubble dynamics in pool boiling heat transfer using saturated water and aqueous Ammonium Chloride (anionic surfactant) solution has been studied experimentally. The concentration of surfactant was taken 2600 ppm (Parts per Million). Single bubble is generated using right angle needle tip of a hypodermic needle as a nucleation site. The bubble dynamics was studied using SONY Cyber-shot DSC-H100 camera operating at 30 frames per second at atmospheric pressure. Bubble growth in saturated water is compared surfactant solution. The result shows that, at low heat flux (q= 235 KW/m2), the bubble diameter, bubble height and bubble volume in surfactant solution approximately similar to that of water. At high heat flux (q= 738 kW/m2), the departure diameter of water bubbles was approximately same. But, in surfactant solution, the departure diameter decreases with increasing heat flux and thereby enhances pool boiling heat transfer coefficient. The enhancement is observed due to surface tension of the aqueous solution. The effect of surfactant on bubble release frequency is also discussed.","PeriodicalId":120881,"journal":{"name":"2014 International Conference on Advances in Engineering and Technology (ICAET)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126768811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-02DOI: 10.1109/ICAET.2014.7105240
M. Suman, Sandeep Kumar, Brinda Bhowmic
In this paper we try to optimize the Gate leakage current of ultra-thin SOI Double-Gate n-channel MOSFET by varying device parameters such as Si film thickness, Gate length, channel doping, Gate oxide thickness and buried oxide thickness. The ultimate size scaling limits of MOSFET is explored owing to scaling down of critical feature dimension size below 10nm. In this paper, we use a non-equilibrium Green's function (NEGF) approach. The two-dimensional self-consistent Schrodinger-Poisson solver with open boundaries is used to capture the quantum mechanical nature of carrier transport.
{"title":"Experiment to optimize gate leakage by variation in device parameters in SOI DG nMOS","authors":"M. Suman, Sandeep Kumar, Brinda Bhowmic","doi":"10.1109/ICAET.2014.7105240","DOIUrl":"https://doi.org/10.1109/ICAET.2014.7105240","url":null,"abstract":"In this paper we try to optimize the Gate leakage current of ultra-thin SOI Double-Gate n-channel MOSFET by varying device parameters such as Si film thickness, Gate length, channel doping, Gate oxide thickness and buried oxide thickness. The ultimate size scaling limits of MOSFET is explored owing to scaling down of critical feature dimension size below 10nm. In this paper, we use a non-equilibrium Green's function (NEGF) approach. The two-dimensional self-consistent Schrodinger-Poisson solver with open boundaries is used to capture the quantum mechanical nature of carrier transport.","PeriodicalId":120881,"journal":{"name":"2014 International Conference on Advances in Engineering and Technology (ICAET)","volume":"37 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132351820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-02DOI: 10.1109/ICAET.2014.7105239
Radheshyam Gupta, Rajdeep Dhar, K. L. Baishnab, J. Mehedi
This paper proposes the design of high speed Vedic Multiplier using the compressor which is based on ancient Indian Vedic mathematics that has improved the performance of multiplier. As the technology advent the Multiplier require high speed, low power and small area. Vedic mathematics, a system of ancient Indian mathematics, which has a unique technique of solutions based on only 16 sutras. In this paper we introduce a new architecture of Vedic multiplier by using 4:2 compressors and 7:2 compressors for addition that increase the speed of Multiplier and reduce the area 2% than Urdhwa-Tiryakbhyam Multiplier. The 7:2 compressors are made of 5:2 compressors and two full adders. The design was performed on a Xilinx Spartan 3 series of FPGA and the timing and area of the design, on the same have been calculated.
{"title":"Design of high performance 8 bit Vedic Multiplier using compressor","authors":"Radheshyam Gupta, Rajdeep Dhar, K. L. Baishnab, J. Mehedi","doi":"10.1109/ICAET.2014.7105239","DOIUrl":"https://doi.org/10.1109/ICAET.2014.7105239","url":null,"abstract":"This paper proposes the design of high speed Vedic Multiplier using the compressor which is based on ancient Indian Vedic mathematics that has improved the performance of multiplier. As the technology advent the Multiplier require high speed, low power and small area. Vedic mathematics, a system of ancient Indian mathematics, which has a unique technique of solutions based on only 16 sutras. In this paper we introduce a new architecture of Vedic multiplier by using 4:2 compressors and 7:2 compressors for addition that increase the speed of Multiplier and reduce the area 2% than Urdhwa-Tiryakbhyam Multiplier. The 7:2 compressors are made of 5:2 compressors and two full adders. The design was performed on a Xilinx Spartan 3 series of FPGA and the timing and area of the design, on the same have been calculated.","PeriodicalId":120881,"journal":{"name":"2014 International Conference on Advances in Engineering and Technology (ICAET)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115508938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-02DOI: 10.1109/ICAET.2014.7105237
Vikas, Ranjan Sharma
This paper present different methods of diagnosis of Parkinson's disease through voice in early stages. The aim of this study is to provide a simple, fast, cheaper method of detection of Parkinson's disease for the patients as there is no cure for this disease and the available therapies which provide some relief to them are too much costlier for this disease. Voice has different parameters that tell meaningful variations between normal people and Parkinson's patient like pitch, jitter, formant, shimmer, Mel-frequency Cepstral Coefficient (MFCC) and glottal pulse were founded out and analyzed.
{"title":"Early detection of Parkinson's disease through Voice","authors":"Vikas, Ranjan Sharma","doi":"10.1109/ICAET.2014.7105237","DOIUrl":"https://doi.org/10.1109/ICAET.2014.7105237","url":null,"abstract":"This paper present different methods of diagnosis of Parkinson's disease through voice in early stages. The aim of this study is to provide a simple, fast, cheaper method of detection of Parkinson's disease for the patients as there is no cure for this disease and the available therapies which provide some relief to them are too much costlier for this disease. Voice has different parameters that tell meaningful variations between normal people and Parkinson's patient like pitch, jitter, formant, shimmer, Mel-frequency Cepstral Coefficient (MFCC) and glottal pulse were founded out and analyzed.","PeriodicalId":120881,"journal":{"name":"2014 International Conference on Advances in Engineering and Technology (ICAET)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121488574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-02DOI: 10.1109/ICAET.2014.7105254
K. Nama, S. Paul
The transmittance and absorbance data of nickel oxide films are crucial in determining it's optical properties. Selection of substrate is important for a greater understanding of optical constants and properties of a material. In view of this Nickel oxide films were deposited on Quartz substrates and it's properties are compared with Nickel oxide films deposited on glass. We show the difference in optical constants measured for Nickel oxide thin film deposited on glass and quartz substrates.
{"title":"Substrate selection for the optical analysis of nickel oxide thin films","authors":"K. Nama, S. Paul","doi":"10.1109/ICAET.2014.7105254","DOIUrl":"https://doi.org/10.1109/ICAET.2014.7105254","url":null,"abstract":"The transmittance and absorbance data of nickel oxide films are crucial in determining it's optical properties. Selection of substrate is important for a greater understanding of optical constants and properties of a material. In view of this Nickel oxide films were deposited on Quartz substrates and it's properties are compared with Nickel oxide films deposited on glass. We show the difference in optical constants measured for Nickel oxide thin film deposited on glass and quartz substrates.","PeriodicalId":120881,"journal":{"name":"2014 International Conference on Advances in Engineering and Technology (ICAET)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115767345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-02DOI: 10.1109/ICAET.2014.7105213
Gaurav A. Patel, A. Priya
Ambiguity is a critical problem in the software requirement specifications. Requirements are typically expressed in a natural language. However, expressions in natural languages are likely to suffer from ambiguities. Hence, it is essential that when the requirements are analyzed, the ambiguities are resolved to the extent possible, so that the software specifications are free of any potential misinterpretations. One of the attractive alternatives in resolving ambiguities is to convert the informal natural language requirements into their formal or semi-formal counterpart that ensures precision and orthogonality. Towards meeting this goal, the Unified Modeling Language notations can be exploited to an advantage. Being graphical in nature, the UML notations can be easily comprehended by the user and at the same time, being driven by orthogonal syntactic/semantic conventions, the notations help reduce ambiguities greatly. The proposed work is aimed to support the text based information as the requirement specification. It resolves the uncertainty and find the UML components and the relationship among them to generate the accurate the UML Diagram.
{"title":"Resolve the uncertainity in requirement specification to generate the UML diagram","authors":"Gaurav A. Patel, A. Priya","doi":"10.1109/ICAET.2014.7105213","DOIUrl":"https://doi.org/10.1109/ICAET.2014.7105213","url":null,"abstract":"Ambiguity is a critical problem in the software requirement specifications. Requirements are typically expressed in a natural language. However, expressions in natural languages are likely to suffer from ambiguities. Hence, it is essential that when the requirements are analyzed, the ambiguities are resolved to the extent possible, so that the software specifications are free of any potential misinterpretations. One of the attractive alternatives in resolving ambiguities is to convert the informal natural language requirements into their formal or semi-formal counterpart that ensures precision and orthogonality. Towards meeting this goal, the Unified Modeling Language notations can be exploited to an advantage. Being graphical in nature, the UML notations can be easily comprehended by the user and at the same time, being driven by orthogonal syntactic/semantic conventions, the notations help reduce ambiguities greatly. The proposed work is aimed to support the text based information as the requirement specification. It resolves the uncertainty and find the UML components and the relationship among them to generate the accurate the UML Diagram.","PeriodicalId":120881,"journal":{"name":"2014 International Conference on Advances in Engineering and Technology (ICAET)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126880372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-02DOI: 10.1109/ICAET.2014.7105226
K. S. Banu, Dr. V. Santhi, Dr. B. K. Tripathy
Ensuring privacy to sensitive data is becoming an important criterion in the data access policies of governments and corporations. Providing security to data using non-cryptographic based techniques has been in use for a long time. They are used to provide security to Health data, finance data and the like. Data are distorted using various approaches to hide sensitive information and provide privacy. A whole line of methods from statistical disclosure control to distortion based techniques are in use. This paper discusses the strengths and drawbacks of a particular type of distortion approach, Data Anonymization.
{"title":"Non-cryptographic security to data: Distortion based anonymization techniques","authors":"K. S. Banu, Dr. V. Santhi, Dr. B. K. Tripathy","doi":"10.1109/ICAET.2014.7105226","DOIUrl":"https://doi.org/10.1109/ICAET.2014.7105226","url":null,"abstract":"Ensuring privacy to sensitive data is becoming an important criterion in the data access policies of governments and corporations. Providing security to data using non-cryptographic based techniques has been in use for a long time. They are used to provide security to Health data, finance data and the like. Data are distorted using various approaches to hide sensitive information and provide privacy. A whole line of methods from statistical disclosure control to distortion based techniques are in use. This paper discusses the strengths and drawbacks of a particular type of distortion approach, Data Anonymization.","PeriodicalId":120881,"journal":{"name":"2014 International Conference on Advances in Engineering and Technology (ICAET)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114986238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-02DOI: 10.1109/ICAET.2014.7105281
R. Lakshmi, K. Vivekanandan
The Performance of GA is mainly dependent on two factors are chromosome representation and the selection of relevant genetic operators such as selection, crossover and mutation. Many GA crossover operators have been invented by researchers because the performance of GA depends on an ability of these operators. Though there are several crossover techniques available, these are randomly removes the duplicate genes in a chromosome lead to more computation time to converge with optimal solution. Since most of them do not have stable model. Removing duplicate genes in a chromosome is a hectic process in GA. To overcome these difficulties, this paper uses a novel crossover called Fast Order Mapped Crossover (FOMX) which does not perform randomness and gene level comparison to find duplicate genes in individuals. To prove this technique, travelling salesperson problem (tsp) has chosen in order to find the optimal path of a tour. This technique is applied on different tsp instances and the obtained results are compared with the existing crossover techniques.
{"title":"Performance analysis of a novel crossover technique on permutation encoded genetic algorithms","authors":"R. Lakshmi, K. Vivekanandan","doi":"10.1109/ICAET.2014.7105281","DOIUrl":"https://doi.org/10.1109/ICAET.2014.7105281","url":null,"abstract":"The Performance of GA is mainly dependent on two factors are chromosome representation and the selection of relevant genetic operators such as selection, crossover and mutation. Many GA crossover operators have been invented by researchers because the performance of GA depends on an ability of these operators. Though there are several crossover techniques available, these are randomly removes the duplicate genes in a chromosome lead to more computation time to converge with optimal solution. Since most of them do not have stable model. Removing duplicate genes in a chromosome is a hectic process in GA. To overcome these difficulties, this paper uses a novel crossover called Fast Order Mapped Crossover (FOMX) which does not perform randomness and gene level comparison to find duplicate genes in individuals. To prove this technique, travelling salesperson problem (tsp) has chosen in order to find the optimal path of a tour. This technique is applied on different tsp instances and the obtained results are compared with the existing crossover techniques.","PeriodicalId":120881,"journal":{"name":"2014 International Conference on Advances in Engineering and Technology (ICAET)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130259001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-02DOI: 10.1109/ICAET.2014.7105222
V. Ramya, G. Gopinath
This paper discusses about the detailed study of Quick Response (QR) codes, their Structures and the current state-of-the-art, in which how the Quick Response Codes are used in the field of Information security. Our Study also examines the various imperceptibility characteristics such as Peak Signal to Noise Ratio, Mean Square Error, Average Difference, Maximum Difference, Normalized Absolute Error based on pixel value based data hiding technique and the findings are presented. This approach gives the best image quality measures between the Cover QR and the Stego QR, as the secret data has been embedded to its best matching pixel value of the cover QR code.
{"title":"Review on quick response codes in the field of information security (Analysis of various imperceptibility characteristics on grayscale and binary QR code","authors":"V. Ramya, G. Gopinath","doi":"10.1109/ICAET.2014.7105222","DOIUrl":"https://doi.org/10.1109/ICAET.2014.7105222","url":null,"abstract":"This paper discusses about the detailed study of Quick Response (QR) codes, their Structures and the current state-of-the-art, in which how the Quick Response Codes are used in the field of Information security. Our Study also examines the various imperceptibility characteristics such as Peak Signal to Noise Ratio, Mean Square Error, Average Difference, Maximum Difference, Normalized Absolute Error based on pixel value based data hiding technique and the findings are presented. This approach gives the best image quality measures between the Cover QR and the Stego QR, as the secret data has been embedded to its best matching pixel value of the cover QR code.","PeriodicalId":120881,"journal":{"name":"2014 International Conference on Advances in Engineering and Technology (ICAET)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134444296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}