Multi-protocol label switching (MPLS) is rapidly emerging technology, which plays a key role in next generation networks by delivering QoS and traffic engineering features. MPLS is helpful in managing traffic when some links or paths are under and/or over utilized. In MPLS a look - up in switching table is certainly less complex and time consuming than a corresponding routing table look - up in an IP router. This paper present a analysis of MPLS signaling protocols for traffic engineering, shows the capability of providing traffic engineering in MPLS compared to the conventional routing protocol, and explains the MPLS LSR operations based on the basic LSR functionality of classification, queue, and scheduling. The comparisons of CR-LDP, RSVP, and RSVP-TE are conducted based on the aspects of LSP reliability and LSP adaptability. In addition, this paper also presents a comparative analysis of MPLS and non-MPLS network and shows that MPLS provides improved network performance for heavy traffic environments.
{"title":"Traffic Analysis of MPLS and Non MPLS Network including MPLS Signaling Protocols and Traffic Distribution in OSPF and MPLS","authors":"Mahesh Kumar Porwal, A. Yadav, S. Charhate","doi":"10.1109/ICETET.2008.58","DOIUrl":"https://doi.org/10.1109/ICETET.2008.58","url":null,"abstract":"Multi-protocol label switching (MPLS) is rapidly emerging technology, which plays a key role in next generation networks by delivering QoS and traffic engineering features. MPLS is helpful in managing traffic when some links or paths are under and/or over utilized. In MPLS a look - up in switching table is certainly less complex and time consuming than a corresponding routing table look - up in an IP router. This paper present a analysis of MPLS signaling protocols for traffic engineering, shows the capability of providing traffic engineering in MPLS compared to the conventional routing protocol, and explains the MPLS LSR operations based on the basic LSR functionality of classification, queue, and scheduling. The comparisons of CR-LDP, RSVP, and RSVP-TE are conducted based on the aspects of LSP reliability and LSP adaptability. In addition, this paper also presents a comparative analysis of MPLS and non-MPLS network and shows that MPLS provides improved network performance for heavy traffic environments.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134022497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Information retrieval by the mobile agent is more flexible than the traditional communication paradigm but it is very vulnerable to a variety of attacks. Various attacks in the mobile agent environment are identified and protected. Agent platform protection is the major concern in the environment. Existing models to protect platform have the drawbacks. So, we proposed the attack identification scanner (AIS) to scan and kill the malicious agent from the malicious host in the distributed environment using MIP.
{"title":"Protection of Mobile Agent Platform through Attack Identification Scanner (AIS) by Malicious Identification Police (MIP)","authors":"S. Venkatesan, C. Chellappan","doi":"10.1109/ICETET.2008.89","DOIUrl":"https://doi.org/10.1109/ICETET.2008.89","url":null,"abstract":"Information retrieval by the mobile agent is more flexible than the traditional communication paradigm but it is very vulnerable to a variety of attacks. Various attacks in the mobile agent environment are identified and protected. Agent platform protection is the major concern in the environment. Existing models to protect platform have the drawbacks. So, we proposed the attack identification scanner (AIS) to scan and kill the malicious agent from the malicious host in the distributed environment using MIP.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116780537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper compares the performance of 4 x 4 block based discrete cosine transforms(DCT) with conventional 8 x 8 DCT .The small size DCT is suitable for mobile applications using low power devices as fast computation speed is required for real time applications. The comparison is done on the basis of computation time and objective quality, based on PSNR (peak signal to noise ratio).
{"title":"Performance Evaluation of 4x4 DCT Algorithms for Low Power Wireless Applications","authors":"Muhammed Yusuf Khan, E. Khan, M. S. Beg","doi":"10.1109/ICETET.2008.149","DOIUrl":"https://doi.org/10.1109/ICETET.2008.149","url":null,"abstract":"The paper compares the performance of 4 x 4 block based discrete cosine transforms(DCT) with conventional 8 x 8 DCT .The small size DCT is suitable for mobile applications using low power devices as fast computation speed is required for real time applications. The comparison is done on the basis of computation time and objective quality, based on PSNR (peak signal to noise ratio).","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117058419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Varghese, S. Saudia, K. Nallaperumal, S. P. Mathew, S. Arumugaperumal, Julie Joy
The paper proposes a new morphological reversible contour/edge representation algorithm for the representation of 2D binary shapes of digital images. The concise representation algorithm uses representative lines of different sizes and types to cover all the significant features of the binary contour/edge image. These well-characterized representative line segments, which may overlap among different types, take minimum representative points than that of most other prominent shape representation algorithms including MST and MSD. The new algorithm is computationally efficient than most other algorithms in the literature and is also capable of approximating edge images. The approximated outputs produced by the proposed algorithm by using minimal number of representative points are more natural to the original shapes than that of MST and MSD.
{"title":"An Efficient Morphological Reversible Contour/Edge Representation Using Overlapping Line Components","authors":"J. Varghese, S. Saudia, K. Nallaperumal, S. P. Mathew, S. Arumugaperumal, Julie Joy","doi":"10.1109/ICETET.2008.43","DOIUrl":"https://doi.org/10.1109/ICETET.2008.43","url":null,"abstract":"The paper proposes a new morphological reversible contour/edge representation algorithm for the representation of 2D binary shapes of digital images. The concise representation algorithm uses representative lines of different sizes and types to cover all the significant features of the binary contour/edge image. These well-characterized representative line segments, which may overlap among different types, take minimum representative points than that of most other prominent shape representation algorithms including MST and MSD. The new algorithm is computationally efficient than most other algorithms in the literature and is also capable of approximating edge images. The approximated outputs produced by the proposed algorithm by using minimal number of representative points are more natural to the original shapes than that of MST and MSD.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127298123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the immense increase of the data in various fields, interpreting the data into useful information has become a tedious job. Design of models to handle the problem is essential. This paper discusses the methods that handle uncertain information with continuous data and deliver comprehensible classification model. We investigate fuzzy decision tree as a method for classification problems and axiomatic fuzzy set for building fuzzy sets (membership functions) . To select the best available test attributes of fuzzy decision trees we use a generalized Shannon Entropy. The problems connected with this generalization arised from fuzzy domain are discussed and some alternatives are proposed.
{"title":"A Comprehensible Approach to Develop Fuzzy Decision Trees","authors":"G. Suma, M. Shashi, G. L. Devi","doi":"10.1109/ICETET.2008.173","DOIUrl":"https://doi.org/10.1109/ICETET.2008.173","url":null,"abstract":"With the immense increase of the data in various fields, interpreting the data into useful information has become a tedious job. Design of models to handle the problem is essential. This paper discusses the methods that handle uncertain information with continuous data and deliver comprehensible classification model. We investigate fuzzy decision tree as a method for classification problems and axiomatic fuzzy set for building fuzzy sets (membership functions) . To select the best available test attributes of fuzzy decision trees we use a generalized Shannon Entropy. The problems connected with this generalization arised from fuzzy domain are discussed and some alternatives are proposed.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124848592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, a technique of language identification in document images is described to discriminate five major Indian languages: Hindi, Marathi, Sanskrit, Assamese and Bengali belong to Devnagari and Bangla scripts. A text block of each language containing at least two text lines is selected and characterized by employing global and local features. Morphological transformations are used to decompose a text block in two directions at three levels, to capture fine texture primitives. Shape features of connected components are used to retain the local properties of the text block. Further, combination of these features is used to classify 500 text blocks of proposed languages based on Binary decision tree and KNN classifier. Proposed method is quite different from reported method on non-Indian languages, which are based on shape coding of characters, words and document vectorization. This method directly captures word shapes without segmentation and it is tolerant to variations in font style and size. The language identification results are encouraging.
{"title":"Shape and Morphological Transformation Based Features for Language Identification in Indian Document Images","authors":"M. Hangarge, B. V. Dhandra","doi":"10.1109/ICETET.2008.177","DOIUrl":"https://doi.org/10.1109/ICETET.2008.177","url":null,"abstract":"In this paper, a technique of language identification in document images is described to discriminate five major Indian languages: Hindi, Marathi, Sanskrit, Assamese and Bengali belong to Devnagari and Bangla scripts. A text block of each language containing at least two text lines is selected and characterized by employing global and local features. Morphological transformations are used to decompose a text block in two directions at three levels, to capture fine texture primitives. Shape features of connected components are used to retain the local properties of the text block. Further, combination of these features is used to classify 500 text blocks of proposed languages based on Binary decision tree and KNN classifier. Proposed method is quite different from reported method on non-Indian languages, which are based on shape coding of characters, words and document vectorization. This method directly captures word shapes without segmentation and it is tolerant to variations in font style and size. The language identification results are encouraging.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124891397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
SRS is the agreement between the client and the developer, it is a document which specifies the clientpsilas requirement and also validates the final product. In various surveys it was found that approximately 20-25% of the project time is allocated for the requirements definition and major part of its time is wasted in making the requirement specification unambiguous, to avoid the conflict in future. Conflict arises because of more than one interpretation of a requirement, this lead to misinterpretation of design constraints, functionality, and external interfaces or in any further enhancements. In our proposed system requirements are documented in natural language. The system checks whether the written requirements are valid requirements or not and also checks for the lexical type of ambiguities, especially the ambiguity related to homonyms, heteronyms and homographs.
{"title":"A Method to Deal with the Type of Lexical Ambiguity in a Software Requirement Specification Document","authors":"Md. Rizwan Beg, Qamar Abbas, Alok Joshi","doi":"10.1109/ICETET.2008.160","DOIUrl":"https://doi.org/10.1109/ICETET.2008.160","url":null,"abstract":"SRS is the agreement between the client and the developer, it is a document which specifies the clientpsilas requirement and also validates the final product. In various surveys it was found that approximately 20-25% of the project time is allocated for the requirements definition and major part of its time is wasted in making the requirement specification unambiguous, to avoid the conflict in future. Conflict arises because of more than one interpretation of a requirement, this lead to misinterpretation of design constraints, functionality, and external interfaces or in any further enhancements. In our proposed system requirements are documented in natural language. The system checks whether the written requirements are valid requirements or not and also checks for the lexical type of ambiguities, especially the ambiguity related to homonyms, heteronyms and homographs.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124904912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A typical field programmable analog array consists of configurable analog arrays (CABs), I/O blocks, an interconnection network and memory registers for device programming. For testing purposes, this FPAA partitioning also applies. Taking advantage of the inherent programmability of the FPAAs, BIST (built-in-self-testing) based scheme is used to obtain an error signal representing the difference between fault free and faulty circuits. A comparison between the various testing methodologies is done in terms of area overhead, circuit performance degradation, fault coverage etc.
{"title":"BIST Based Performance Evaluation of Field Programmable Analog Arrays","authors":"S. Charhate, D. Mishra","doi":"10.1109/ICETET.2008.169","DOIUrl":"https://doi.org/10.1109/ICETET.2008.169","url":null,"abstract":"A typical field programmable analog array consists of configurable analog arrays (CABs), I/O blocks, an interconnection network and memory registers for device programming. For testing purposes, this FPAA partitioning also applies. Taking advantage of the inherent programmability of the FPAAs, BIST (built-in-self-testing) based scheme is used to obtain an error signal representing the difference between fault free and faulty circuits. A comparison between the various testing methodologies is done in terms of area overhead, circuit performance degradation, fault coverage etc.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125907895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. .. Himte, A. Kedar, P. Washimkar, M. Wakhare, P. Belkhode
In the coal mining industry there are various types of Earth moving vehicles and Equipments being used for different purposes. The major material Handling equipments in an open cast mine is Dumper. The dumper carries coal from quallary to the bunker for storage and transportation. The output of any quallary is greatly influenced on the effective conveying of the coal. In this paper an open cast coal mine is selected. The working at the quallary is of continuous type and availability of dumper is critical factor considering the functional significance and the cost of the equipment. Detailed analysis needs to be carried out toward the utilization and availability of these dumpers. The company has a central workshop, which caters the maintenance needs of all the equipments. A maintenance schedule is followed by the workshop. Inspire of the preventive maintenance schedule the frequency of breakdown is substantial. Hence efforts are essential to analyze the failures and suggest remedial measures to reduce the downtime.
{"title":"An Approach to Improve the Productivity of Dumper by Preventive Maintenance","authors":"R. .. Himte, A. Kedar, P. Washimkar, M. Wakhare, P. Belkhode","doi":"10.1109/ICETET.2008.206","DOIUrl":"https://doi.org/10.1109/ICETET.2008.206","url":null,"abstract":"In the coal mining industry there are various types of Earth moving vehicles and Equipments being used for different purposes. The major material Handling equipments in an open cast mine is Dumper. The dumper carries coal from quallary to the bunker for storage and transportation. The output of any quallary is greatly influenced on the effective conveying of the coal. In this paper an open cast coal mine is selected. The working at the quallary is of continuous type and availability of dumper is critical factor considering the functional significance and the cost of the equipment. Detailed analysis needs to be carried out toward the utilization and availability of these dumpers. The company has a central workshop, which caters the maintenance needs of all the equipments. A maintenance schedule is followed by the workshop. Inspire of the preventive maintenance schedule the frequency of breakdown is substantial. Hence efforts are essential to analyze the failures and suggest remedial measures to reduce the downtime.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122417464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The flow in a channel bend is spiral or helical. It is a movement of water particles in the flow direction. Many researchers have stated mathematical equations to predict velocity in the flow direction in the channel bend. These equations are based on simplified assumptions. The ANN is a viable alternative to predict longitudinal velocity in channel bend. It builds the model by estimating suitable approximating function of the available input/output samples. Once such relationship is established & validated, it can be used for the prediction of the future system behavior. The paper aims at developing Artificial Neural Network model, namely Multilayer Perceptron (MLP). It is found that MLP model is capable to predict velocity in the channel bend with accuracy.
{"title":"ANN Modeling for Prediction of Velocity in Channel Bends","authors":"P. Durge, P. Nagarnaik","doi":"10.1109/ICETET.2008.219","DOIUrl":"https://doi.org/10.1109/ICETET.2008.219","url":null,"abstract":"The flow in a channel bend is spiral or helical. It is a movement of water particles in the flow direction. Many researchers have stated mathematical equations to predict velocity in the flow direction in the channel bend. These equations are based on simplified assumptions. The ANN is a viable alternative to predict longitudinal velocity in channel bend. It builds the model by estimating suitable approximating function of the available input/output samples. Once such relationship is established & validated, it can be used for the prediction of the future system behavior. The paper aims at developing Artificial Neural Network model, namely Multilayer Perceptron (MLP). It is found that MLP model is capable to predict velocity in the channel bend with accuracy.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117079361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}