As amounts of publicly available multimedia data is growing, the need to query this data efficiently becomes significant. This paper proposes a spatio-temporal query engine which responds to queries that are based on specific characteristics of multimedia layouts. This query engine would facilitate interactive usage of multimedia layouts both in the spatial and temporal domain. The system accepts queries in the form of simple English like statements, eliminating the need to use any query language. In timeline based paradigm the layout is represented using temporal synchronization points and can be effectively used for non-iterative presentations. In this system graph based paradigm uses dynamic Petri nets, which are best suitable for iterative and interactive presentations. Query processor is the decision maker that decides whether to retrieve the data from the timeline based or graph based database. In the proposed system efficient algorithms have been designed and used to perform data retrieval effectively.
{"title":"Design of a Spatio-Temporal Query Engine for Multimedia Presentations","authors":"Sailaja Polaki, Susan Elias","doi":"10.1109/ICETET.2008.244","DOIUrl":"https://doi.org/10.1109/ICETET.2008.244","url":null,"abstract":"As amounts of publicly available multimedia data is growing, the need to query this data efficiently becomes significant. This paper proposes a spatio-temporal query engine which responds to queries that are based on specific characteristics of multimedia layouts. This query engine would facilitate interactive usage of multimedia layouts both in the spatial and temporal domain. The system accepts queries in the form of simple English like statements, eliminating the need to use any query language. In timeline based paradigm the layout is represented using temporal synchronization points and can be effectively used for non-iterative presentations. In this system graph based paradigm uses dynamic Petri nets, which are best suitable for iterative and interactive presentations. Query processor is the decision maker that decides whether to retrieve the data from the timeline based or graph based database. In the proposed system efficient algorithms have been designed and used to perform data retrieval effectively.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124732351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jayashree Padmanabhan, K. S. Easwarakumar, V. Anandharaman, K. Aswin, S. Vijay
A distributed denial of service attack is coordinated and synchronized set of comprehensive attacks on a sophisticated network and its services that hampers the network infrastructure thereby bringing down its performance. Its effects are characterized by the uninformed delays and interruptions accompanied by undue losses. Since no optimal methodology exists, the internet continues to remain susceptible to DDoS attacks. The PacketScore scheme is a practical DDoS defense mechanism, which approximates the authenticity of the packets concerning its attribute values and discards selective attack packets. This paper extends the PacketScore scheme and implements a new two-level filtering mechanism using leaky bucket that can lessen the losses created by the attacks. The proposed scheme validates the data signatures of the packets complementing the check performed on the packet header. This two-level scrutiny enhances the correctness of detection of DDoS attacks. A standard model to review the efficiency of the two-level filtering has been proposed and the scheme has been deployed and tested in ANTS active network tool kit. The implementation of the proposed scheme is easy let alone efficient and effective in DDoS attack detection with an accurate response to varying DDoS attacks.
{"title":"A Proactive Statistical Defense Solution for DDOS Attacks in Active Networks","authors":"Jayashree Padmanabhan, K. S. Easwarakumar, V. Anandharaman, K. Aswin, S. Vijay","doi":"10.1109/ICETET.2008.184","DOIUrl":"https://doi.org/10.1109/ICETET.2008.184","url":null,"abstract":"A distributed denial of service attack is coordinated and synchronized set of comprehensive attacks on a sophisticated network and its services that hampers the network infrastructure thereby bringing down its performance. Its effects are characterized by the uninformed delays and interruptions accompanied by undue losses. Since no optimal methodology exists, the internet continues to remain susceptible to DDoS attacks. The PacketScore scheme is a practical DDoS defense mechanism, which approximates the authenticity of the packets concerning its attribute values and discards selective attack packets. This paper extends the PacketScore scheme and implements a new two-level filtering mechanism using leaky bucket that can lessen the losses created by the attacks. The proposed scheme validates the data signatures of the packets complementing the check performed on the packet header. This two-level scrutiny enhances the correctness of detection of DDoS attacks. A standard model to review the efficiency of the two-level filtering has been proposed and the scheme has been deployed and tested in ANTS active network tool kit. The implementation of the proposed scheme is easy let alone efficient and effective in DDoS attack detection with an accurate response to varying DDoS attacks.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128630436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mobile ad hoc networks remove the dependence on a fixed network infrastructure by treating every available mobile node as an intermediate switch, thereby extending the range of mobile nodes well beyond their base transceivers. Since routing is the backbone of any mobile ad hoc communication, thus if there occur any flaws in the routing, the whole of the communication would come down to a stand still. The black hole is one of the most severe threats which has engulfed the routing, practically causing no useful communication to take place. The black hole can be easily deployed against the MANETs.
{"title":"Defending Wireless Ad Hoc Network from Single and Cooperative Black Holes","authors":"S. Sharma, Manpreet Singh","doi":"10.1109/ICETET.2008.56","DOIUrl":"https://doi.org/10.1109/ICETET.2008.56","url":null,"abstract":"Mobile ad hoc networks remove the dependence on a fixed network infrastructure by treating every available mobile node as an intermediate switch, thereby extending the range of mobile nodes well beyond their base transceivers. Since routing is the backbone of any mobile ad hoc communication, thus if there occur any flaws in the routing, the whole of the communication would come down to a stand still. The black hole is one of the most severe threats which has engulfed the routing, practically causing no useful communication to take place. The black hole can be easily deployed against the MANETs.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127502139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kshitija Pol, Nita Patil, Shreya N. Patankar, Chhaya Das
With the research in information retrieval and phenomenal growth of the Web, todaypsilas Websites have become a key communication and information medium for various organizations. It also offers an unprecedented opportunity and challenges to data mining. Various techniques are available to extract useful data from the web. It is very important for the users to utilize this information effectively which helps them to understand the structure of information on the Web more deeply and precisely. This paper conducts a survey of how Web content mining plays an efficient tool in extracting structured and semi structured data and mining them into useful knowledge.
{"title":"A Survey on Web Content Mining and Extraction of Structured and Semistructured Data","authors":"Kshitija Pol, Nita Patil, Shreya N. Patankar, Chhaya Das","doi":"10.1109/ICETET.2008.251","DOIUrl":"https://doi.org/10.1109/ICETET.2008.251","url":null,"abstract":"With the research in information retrieval and phenomenal growth of the Web, todaypsilas Websites have become a key communication and information medium for various organizations. It also offers an unprecedented opportunity and challenges to data mining. Various techniques are available to extract useful data from the web. It is very important for the users to utilize this information effectively which helps them to understand the structure of information on the Web more deeply and precisely. This paper conducts a survey of how Web content mining plays an efficient tool in extracting structured and semi structured data and mining them into useful knowledge.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130136416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lean production starts from the premise that adding value and reducing waste are the primary goals of any business. Lean production is a philosophy with a series of tools to get to the top and to stay there. But for many still, the teething pains of change and a steep climb are too much to bear and sustain. There are a number of weak points in a company that makes it difficult if not impossible to achieve the promised gains for the efforts they put in. To implement lean requires careful planning. This paper discusses some of the basic issues that companies should consider and follow when going the transition of change to lean production system.
{"title":"Some Issues to Consider in Lean Production","authors":"R. Narang","doi":"10.1109/ICETET.2008.113","DOIUrl":"https://doi.org/10.1109/ICETET.2008.113","url":null,"abstract":"Lean production starts from the premise that adding value and reducing waste are the primary goals of any business. Lean production is a philosophy with a series of tools to get to the top and to stay there. But for many still, the teething pains of change and a steep climb are too much to bear and sustain. There are a number of weak points in a company that makes it difficult if not impossible to achieve the promised gains for the efforts they put in. To implement lean requires careful planning. This paper discusses some of the basic issues that companies should consider and follow when going the transition of change to lean production system.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126943749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Photovoltaic (PV) water pumping systems have been increasingly popular in remote areas where grid is not accessible or is too costly to install. These systems are mostly used for agriculture and household purposes. Generally, such systems use permanent magnet dc motors because of their simple circuit configuration and control strategy. However these systems require frequent maintenance. On the other hand, the conventional PV water pumping systems driven by ac motors employ a dc-dc converter followed by an inverter. The conventional systems use more number of power semiconductor switches (increases the system cost) and suffer from reduced overall efficiency as two power converters are connected in series. In this paper, a PV water pumping system using a single stage inverter fed induction motor driving a centrifugal pump is considered. The inverter simultaneously performs two functions, viz., (i) converts dc power into ac power and (ii) forces the induction motor to operate at maximum efficiency. The system considered has a simple control strategy and the viability of the control strategy is demonstrated through steady state and dynamic simulation results.
{"title":"Maximum Efficiency Operation of a Single Stage Inverter Fed Induction Motor PV Water Pumping System","authors":"A. Raju, S. R. Kanik, Rohini Jyoti","doi":"10.1109/ICETET.2008.64","DOIUrl":"https://doi.org/10.1109/ICETET.2008.64","url":null,"abstract":"Photovoltaic (PV) water pumping systems have been increasingly popular in remote areas where grid is not accessible or is too costly to install. These systems are mostly used for agriculture and household purposes. Generally, such systems use permanent magnet dc motors because of their simple circuit configuration and control strategy. However these systems require frequent maintenance. On the other hand, the conventional PV water pumping systems driven by ac motors employ a dc-dc converter followed by an inverter. The conventional systems use more number of power semiconductor switches (increases the system cost) and suffer from reduced overall efficiency as two power converters are connected in series. In this paper, a PV water pumping system using a single stage inverter fed induction motor driving a centrifugal pump is considered. The inverter simultaneously performs two functions, viz., (i) converts dc power into ac power and (ii) forces the induction motor to operate at maximum efficiency. The system considered has a simple control strategy and the viability of the control strategy is demonstrated through steady state and dynamic simulation results.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130239124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Heuristic approach is preferred as a solution to optimization of Non-Deterministic Polynomial hard (NP-hard) problems of sizes that are nontrivial because of speed limitations of exact optimization methods. This paper, therefore, proposes to investigate recent heuristic techniques for solving the standard cell placement problems at physical design stage of VLSI design cycle. The techniques considered are Simulated Annealing (SA), Hopfield Neural Network and Genetic Algorithm (GA). In addition to individual studies of the methods, we compare them in terms of solution quality and computing speed in connection with the standard cell placement problems. Finally we shall suggest a method to enhance them using Memetic Algorithms (MA).
{"title":"Performance Evaluation and Comparison and Improvement of Standard Cell Placement Techniques in VLSI Design","authors":"A. Bunglowala, B. M. Singhi","doi":"10.1109/ICETET.2008.73","DOIUrl":"https://doi.org/10.1109/ICETET.2008.73","url":null,"abstract":"Heuristic approach is preferred as a solution to optimization of Non-Deterministic Polynomial hard (NP-hard) problems of sizes that are nontrivial because of speed limitations of exact optimization methods. This paper, therefore, proposes to investigate recent heuristic techniques for solving the standard cell placement problems at physical design stage of VLSI design cycle. The techniques considered are Simulated Annealing (SA), Hopfield Neural Network and Genetic Algorithm (GA). In addition to individual studies of the methods, we compare them in terms of solution quality and computing speed in connection with the standard cell placement problems. Finally we shall suggest a method to enhance them using Memetic Algorithms (MA).","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130439785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rajashri S. Mundewadikar, S. Dorle, A. Keskar, M. Chakole
In recent years, the number of vehicles has increased dramatically. This causes a high traffic density and makes new security features a crucial point in order to keep the traffic safe. Developing automotive collision warning and avoidance systems will be very effective for reducing fatalities, injuries and associated costs. In order to develop an automotive collision warning and avoidance system, it will be necessary that the vehicles should be able to exchange (in real time) their dynamic information such as speed, acceleration, direction, relative position etc. The only way to exchange the vehiclespsila dynamic information will be through wireless communications. This paper presents a collision detection and warning protocol in intersection traffic controller (ITC) to improve the intelligent transportation systems (ITS) using a wireless communication technology. An intersection has a wireless unit called the Intersection Traffic Controller (ITC). This ITC keeps broadcasting a message all the time. Each vehicle communicates with the ITC in real time to let the ITC know about its current location. The ITC then includes this information in its message and warn the driver about the condition of the vehicle and the signal to avoid the collision. The current technology will allow us to build such a collision detection and warning protocol in a cost effective manner.
{"title":"Intersection Collision Detection and Warning Protocol: Design Approach","authors":"Rajashri S. Mundewadikar, S. Dorle, A. Keskar, M. Chakole","doi":"10.1109/ICETET.2008.50","DOIUrl":"https://doi.org/10.1109/ICETET.2008.50","url":null,"abstract":"In recent years, the number of vehicles has increased dramatically. This causes a high traffic density and makes new security features a crucial point in order to keep the traffic safe. Developing automotive collision warning and avoidance systems will be very effective for reducing fatalities, injuries and associated costs. In order to develop an automotive collision warning and avoidance system, it will be necessary that the vehicles should be able to exchange (in real time) their dynamic information such as speed, acceleration, direction, relative position etc. The only way to exchange the vehiclespsila dynamic information will be through wireless communications. This paper presents a collision detection and warning protocol in intersection traffic controller (ITC) to improve the intelligent transportation systems (ITS) using a wireless communication technology. An intersection has a wireless unit called the Intersection Traffic Controller (ITC). This ITC keeps broadcasting a message all the time. Each vehicle communicates with the ITC in real time to let the ITC know about its current location. The ITC then includes this information in its message and warn the driver about the condition of the vehicle and the signal to avoid the collision. The current technology will allow us to build such a collision detection and warning protocol in a cost effective manner.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128829164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we describe the ECG PQRST key features detector based on dyadic wavelet transform (DyWT) which is robust to time varying & noise. This method analyses ECG waveform. It includes noise purification, sample design of digital ECG. This method can implement ECG report in real time and provide exact explanation for diagnostic decision obtained. We exemplify the performance of the DyWT based PQRST detector by considering problematic ECG signal from MIT-BIH data base. From the results we observed that DyWT based detector exhibited superior performance compared to standard techniques.
{"title":"Feature Extraction via Multiresolution Analysis for ECG Signal","authors":"D. Ingole, K. Kulat, M. D. Ingole","doi":"10.1109/ICETET.2008.14","DOIUrl":"https://doi.org/10.1109/ICETET.2008.14","url":null,"abstract":"In this paper, we describe the ECG PQRST key features detector based on dyadic wavelet transform (DyWT) which is robust to time varying & noise. This method analyses ECG waveform. It includes noise purification, sample design of digital ECG. This method can implement ECG report in real time and provide exact explanation for diagnostic decision obtained. We exemplify the performance of the DyWT based PQRST detector by considering problematic ECG signal from MIT-BIH data base. From the results we observed that DyWT based detector exhibited superior performance compared to standard techniques.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126765667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Reduction of World Wide Web user perceived latency has assumed importance in the wake of the fast development of Internet services and a huge amount of network traffic and hence adaptation of Web pages to the needs of a specific user is today's trend of Web technologies. Although Web performance can be improved by caching, the benefit of using it is rather limited owing to filling the cache with documents without any prior knowledge. Web prefetching becomes an attractive solution wherein forthcoming page accesses of a client are predicted, based on access log information. This paper proposes a Zipfpsilas Law based novel approach for the determination of next page likely to be accessed by specific client.
{"title":"A Novel Approach for Determining Next Page Access","authors":"P. Gulati, A. Sharma, A. Goel, J. Pandey","doi":"10.1109/ICETET.2008.57","DOIUrl":"https://doi.org/10.1109/ICETET.2008.57","url":null,"abstract":"Reduction of World Wide Web user perceived latency has assumed importance in the wake of the fast development of Internet services and a huge amount of network traffic and hence adaptation of Web pages to the needs of a specific user is today's trend of Web technologies. Although Web performance can be improved by caching, the benefit of using it is rather limited owing to filling the cache with documents without any prior knowledge. Web prefetching becomes an attractive solution wherein forthcoming page accesses of a client are predicted, based on access log information. This paper proposes a Zipfpsilas Law based novel approach for the determination of next page likely to be accessed by specific client.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126083577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}