Pub Date : 2015-04-30DOI: 10.1109/ICTSD.2015.7095849
Nikunj Khelurkar, Sunay Shah, H. Jeswani
Radioactive waste is the waste that is left out after the use of radioactive materials in nuclear reactors or during the production of nuclear weapons. Since, exploitation of radioactive materials was done on a large scale in the past few decades which resulted in production of tremendous amount of radioactive waste, radioactive waste management is a necessary step to deal with it. If not properly disposed, irradiation from radioactive waste will cause serious problems to humans and to the environment. While preparing this paper sincere effort was taken to give a succinct account of: (1) radioactive waste generation in different parts of the world. (2) Classification. (3) Processing. (4) Storage & (5) Treatment of radioactive waste.
{"title":"A review of radioactive waste management","authors":"Nikunj Khelurkar, Sunay Shah, H. Jeswani","doi":"10.1109/ICTSD.2015.7095849","DOIUrl":"https://doi.org/10.1109/ICTSD.2015.7095849","url":null,"abstract":"Radioactive waste is the waste that is left out after the use of radioactive materials in nuclear reactors or during the production of nuclear weapons. Since, exploitation of radioactive materials was done on a large scale in the past few decades which resulted in production of tremendous amount of radioactive waste, radioactive waste management is a necessary step to deal with it. If not properly disposed, irradiation from radioactive waste will cause serious problems to humans and to the environment. While preparing this paper sincere effort was taken to give a succinct account of: (1) radioactive waste generation in different parts of the world. (2) Classification. (3) Processing. (4) Storage & (5) Treatment of radioactive waste.","PeriodicalId":270099,"journal":{"name":"2015 International Conference on Technologies for Sustainable Development (ICTSD)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116735186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-04-30DOI: 10.1109/ICTSD.2015.7095846
A. Tripathy, D. Jadhav, Steffi A. Barreto, Daphne Rasquinha, S. S. Mathew
Many ways of communications are used between human and computer, one of them includes using gesture which is considered to be one of the most natural ways in a virtual reality system. Because of its intuitiveness and its capability of helping the hearing impaired and speaking impaired. Hand gestures enable deaf people to communication during their daily lives rather than by speaking. A sign language is a language which, instead of using sound, uses visually transmitted gesture signs which simultaneously combine hand shapes, orientation and movement of the hands, arms, lip-patterns, body movements and facial expressions to express the speaker's thoughts. in order to bridge this gap of sign to speech, Voice fOr the Mute (VOM) aims to develop a system that will take real time images and convert them to speech with text as an intermediate taking into considerations all the limitations observed by a 2D system we will be considering only fingering spelling in our system i.e. Take input in the form of finger-spelling of alphabetic signs and providing the resultant voice output. The system will be using a webcam for the input and processing of the signs will be done using Microsoft Visual Studio as an IDE and OpenCv modules. With this proposed system we aims to help the speech impaired community.
人与计算机之间的通信方式有很多,其中之一就是使用手势,这被认为是虚拟现实系统中最自然的方式之一。因为它的直观性和帮助听障人士和语言障碍者的能力。手势使聋哑人在日常生活中能够代替说话进行交流。手语是一种不使用声音,而是使用视觉传递的手势符号的语言,这些手势符号同时结合了手的形状,手的方向和运动,手臂,嘴唇图案,身体动作和面部表情来表达说话者的思想。为了弥合手语到语音的差距,Voice fOr the Mute (VOM)旨在开发一种系统,该系统将实时图像转换为语音,并将文本作为中间介质,考虑到2D系统所观察到的所有限制,我们将只考虑在我们的系统中使用指法拼写,即以手指拼写字母符号的形式输入,并提供最终的语音输出。该系统将使用网络摄像头进行输入,标识的处理将使用Microsoft Visual Studio作为IDE和OpenCv模块完成。我们提出这个系统的目的是帮助语言障碍人士。
{"title":"Voice for the mute","authors":"A. Tripathy, D. Jadhav, Steffi A. Barreto, Daphne Rasquinha, S. S. Mathew","doi":"10.1109/ICTSD.2015.7095846","DOIUrl":"https://doi.org/10.1109/ICTSD.2015.7095846","url":null,"abstract":"Many ways of communications are used between human and computer, one of them includes using gesture which is considered to be one of the most natural ways in a virtual reality system. Because of its intuitiveness and its capability of helping the hearing impaired and speaking impaired. Hand gestures enable deaf people to communication during their daily lives rather than by speaking. A sign language is a language which, instead of using sound, uses visually transmitted gesture signs which simultaneously combine hand shapes, orientation and movement of the hands, arms, lip-patterns, body movements and facial expressions to express the speaker's thoughts. in order to bridge this gap of sign to speech, Voice fOr the Mute (VOM) aims to develop a system that will take real time images and convert them to speech with text as an intermediate taking into considerations all the limitations observed by a 2D system we will be considering only fingering spelling in our system i.e. Take input in the form of finger-spelling of alphabetic signs and providing the resultant voice output. The system will be using a webcam for the input and processing of the signs will be done using Microsoft Visual Studio as an IDE and OpenCv modules. With this proposed system we aims to help the speech impaired community.","PeriodicalId":270099,"journal":{"name":"2015 International Conference on Technologies for Sustainable Development (ICTSD)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117069920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-04-30DOI: 10.1109/ICTSD.2015.7095902
Abhishek Pokharankar, G. Narawade, J. Rodrigues, Omkar Koyande, R. Sarangi
This paper explores the possibility and the feasibility for using heat pipes to dehumidify the recirculated air of an air conditioning test rig. We have incorporated a circular design of heat pipes heat exchangers that is illustrated and explained in the design concept.
{"title":"Dehumidification of air in recirculated air test rig using heat pipes","authors":"Abhishek Pokharankar, G. Narawade, J. Rodrigues, Omkar Koyande, R. Sarangi","doi":"10.1109/ICTSD.2015.7095902","DOIUrl":"https://doi.org/10.1109/ICTSD.2015.7095902","url":null,"abstract":"This paper explores the possibility and the feasibility for using heat pipes to dehumidify the recirculated air of an air conditioning test rig. We have incorporated a circular design of heat pipes heat exchangers that is illustrated and explained in the design concept.","PeriodicalId":270099,"journal":{"name":"2015 International Conference on Technologies for Sustainable Development (ICTSD)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123530440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-04-30DOI: 10.1109/ICTSD.2015.7095896
S. Shitole, Y. S. Rao, B. K. Mohan
The aim of this paper is to study the effect of speckle on wide frequency components in synthetic aperture radar (SAR) images. In this study, the presence of speckle in SAR images is analysed using frequency domain techniques. SAR images consists of many features such as lines, edges, point targets, structural boundaries, homogeneous areas. In frequency domain analysis we observe these features occupy wide band of frequency spectra. In formulating the effective speckle reduction techniques, exact knowledge of noise like phenomenon on wide band of frequency spectra in SAR images is necessary. Qualitative and quantitative analysis using fourier transform helps to conclude this study.
{"title":"Effect of speckle on wide band of frequency components of an image","authors":"S. Shitole, Y. S. Rao, B. K. Mohan","doi":"10.1109/ICTSD.2015.7095896","DOIUrl":"https://doi.org/10.1109/ICTSD.2015.7095896","url":null,"abstract":"The aim of this paper is to study the effect of speckle on wide frequency components in synthetic aperture radar (SAR) images. In this study, the presence of speckle in SAR images is analysed using frequency domain techniques. SAR images consists of many features such as lines, edges, point targets, structural boundaries, homogeneous areas. In frequency domain analysis we observe these features occupy wide band of frequency spectra. In formulating the effective speckle reduction techniques, exact knowledge of noise like phenomenon on wide band of frequency spectra in SAR images is necessary. Qualitative and quantitative analysis using fourier transform helps to conclude this study.","PeriodicalId":270099,"journal":{"name":"2015 International Conference on Technologies for Sustainable Development (ICTSD)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121477478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-04-30DOI: 10.1109/ICTSD.2015.7095841
S. More, M. Pawar
This paper discusses the implementation of quality management systems (Six Sigma) along with ISO in the textile industry of India. The literature indicates that Indian companies are falling far behind in comparison to their international competitors in the area of competitiveness like timely delivery, consistency, reliability, innovation and quality. Adoption of quality management systems with ISO can help the organisations to improve competitiveness and performance. In this study data is collected from twenty six textile companies which are member of The Textile Association India (TAI), located in Solapur district, Maharashtra. The findings indicate that only ISO 9000 Quality Management System is widely adopted by the sample companies whereas the other model like Six Sigma is not given importance.
{"title":"Implementation of Six Sigma with ISO in the Indian textile industry for improvement in performance","authors":"S. More, M. Pawar","doi":"10.1109/ICTSD.2015.7095841","DOIUrl":"https://doi.org/10.1109/ICTSD.2015.7095841","url":null,"abstract":"This paper discusses the implementation of quality management systems (Six Sigma) along with ISO in the textile industry of India. The literature indicates that Indian companies are falling far behind in comparison to their international competitors in the area of competitiveness like timely delivery, consistency, reliability, innovation and quality. Adoption of quality management systems with ISO can help the organisations to improve competitiveness and performance. In this study data is collected from twenty six textile companies which are member of The Textile Association India (TAI), located in Solapur district, Maharashtra. The findings indicate that only ISO 9000 Quality Management System is widely adopted by the sample companies whereas the other model like Six Sigma is not given importance.","PeriodicalId":270099,"journal":{"name":"2015 International Conference on Technologies for Sustainable Development (ICTSD)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125687828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-04-30DOI: 10.1109/ICTSD.2015.7095847
Sana Shaikh, Prashant S. Sonawane, Rajesh Patil, Rohit Neeraj
To achieve success in any teaching program it is very important to have adequate communication between teachers and students. Feedback given by student helps teachers to improve on performance and behavior. Semantic web (SW) technology is a promising approach for data selection and retrieval. Different web mining techniques are used for extracting useful information from web data. In this paper the main focus is to extract knowledge from the feedback given by the students and this can be done by firing Sparql Query in Ontology. This knowledge can be represented in meaningful form.
{"title":"Knowledge extraction from online feedback system using ontology","authors":"Sana Shaikh, Prashant S. Sonawane, Rajesh Patil, Rohit Neeraj","doi":"10.1109/ICTSD.2015.7095847","DOIUrl":"https://doi.org/10.1109/ICTSD.2015.7095847","url":null,"abstract":"To achieve success in any teaching program it is very important to have adequate communication between teachers and students. Feedback given by student helps teachers to improve on performance and behavior. Semantic web (SW) technology is a promising approach for data selection and retrieval. Different web mining techniques are used for extracting useful information from web data. In this paper the main focus is to extract knowledge from the feedback given by the students and this can be done by firing Sparql Query in Ontology. This knowledge can be represented in meaningful form.","PeriodicalId":270099,"journal":{"name":"2015 International Conference on Technologies for Sustainable Development (ICTSD)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133929793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-04-30DOI: 10.1109/ICTSD.2015.7095842
Ashutosh Tripathi, N. Yadav, R. Dadhich
Routing Algorithms are driving the growth of the data transmission in wireless sensor networks. Contextually, many algorithms considered the data gathering and data aggregation. Scenario like battle field, it is important and critical task in data transmission. Therefore through this paper handles the event generated by sensor nodes and provide the guaranteed transmission to sink using clustering process and node density with SPIN. Proposed scheme having better data gathering, stability period and lifetime than the LECH scheme. The proposed scheme is implemented using TCL/C++ programming language and evaluated using Ns2.34 simulator with LEACH. Simulation shows proposed protocol exhibits significant performance gains over the LEACH for lifetime of network and guaranteed data transmission.
{"title":"Selection of node density with cluster in SPIN for data centric wireless sensor network","authors":"Ashutosh Tripathi, N. Yadav, R. Dadhich","doi":"10.1109/ICTSD.2015.7095842","DOIUrl":"https://doi.org/10.1109/ICTSD.2015.7095842","url":null,"abstract":"Routing Algorithms are driving the growth of the data transmission in wireless sensor networks. Contextually, many algorithms considered the data gathering and data aggregation. Scenario like battle field, it is important and critical task in data transmission. Therefore through this paper handles the event generated by sensor nodes and provide the guaranteed transmission to sink using clustering process and node density with SPIN. Proposed scheme having better data gathering, stability period and lifetime than the LECH scheme. The proposed scheme is implemented using TCL/C++ programming language and evaluated using Ns2.34 simulator with LEACH. Simulation shows proposed protocol exhibits significant performance gains over the LEACH for lifetime of network and guaranteed data transmission.","PeriodicalId":270099,"journal":{"name":"2015 International Conference on Technologies for Sustainable Development (ICTSD)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131092976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-04-30DOI: 10.1109/ICTSD.2015.7095873
M. Sridhar, S. Vaidya, P. Yawalkar
If the password is compromised, either due it being weak or someone getting to know it through other means, the system cannot detect it. To overcome this problem, we propose a system whereby the system can detect whether the current user is the authorized user, a substitute user or an intruder pretending to be a valid user. Therefore the system checks the identity of the user by their behaviour pattern using keystrokes dynamics to authenticate user. A number of samples of login and password attempts of each user is gathered and stored in a database. From the samples collected, keystroke patterns are derived called feature sets and signatures are formed for each user using Fuzzy Logic algorithms. Once signatures are formed, users are authenticated by comparing their typing pattern to the respective signatures formed. We study the performance of such a system based on features like False Acceptance Rate (FAR) and False Rejection Rate (FRR), thus evaluating the efficiency of the system.
{"title":"Intrusion detection using keystroke dynamics & fuzzy logic membership functions","authors":"M. Sridhar, S. Vaidya, P. Yawalkar","doi":"10.1109/ICTSD.2015.7095873","DOIUrl":"https://doi.org/10.1109/ICTSD.2015.7095873","url":null,"abstract":"If the password is compromised, either due it being weak or someone getting to know it through other means, the system cannot detect it. To overcome this problem, we propose a system whereby the system can detect whether the current user is the authorized user, a substitute user or an intruder pretending to be a valid user. Therefore the system checks the identity of the user by their behaviour pattern using keystrokes dynamics to authenticate user. A number of samples of login and password attempts of each user is gathered and stored in a database. From the samples collected, keystroke patterns are derived called feature sets and signatures are formed for each user using Fuzzy Logic algorithms. Once signatures are formed, users are authenticated by comparing their typing pattern to the respective signatures formed. We study the performance of such a system based on features like False Acceptance Rate (FAR) and False Rejection Rate (FRR), thus evaluating the efficiency of the system.","PeriodicalId":270099,"journal":{"name":"2015 International Conference on Technologies for Sustainable Development (ICTSD)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129327741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-04-30DOI: 10.1109/ICTSD.2015.7095913
P. Kulkarni, S. Sabnis, R. Sarangi
This work provides the report on the design developments and investigations carried out in the past few years for upgrading solar collectors, which are used for effectively converting heat in the form of solar radiation into useful (Thermal) energy. It focuses on modifications in construction materials, geometry and other miscellaneous things that have been done for improvements in the collector. The details given in the paper presents recent trends, which could encourage further research in this area and will act as a guide in constructing the collector with good performance.
{"title":"Recent investigations in solar flat plate collectors","authors":"P. Kulkarni, S. Sabnis, R. Sarangi","doi":"10.1109/ICTSD.2015.7095913","DOIUrl":"https://doi.org/10.1109/ICTSD.2015.7095913","url":null,"abstract":"This work provides the report on the design developments and investigations carried out in the past few years for upgrading solar collectors, which are used for effectively converting heat in the form of solar radiation into useful (Thermal) energy. It focuses on modifications in construction materials, geometry and other miscellaneous things that have been done for improvements in the collector. The details given in the paper presents recent trends, which could encourage further research in this area and will act as a guide in constructing the collector with good performance.","PeriodicalId":270099,"journal":{"name":"2015 International Conference on Technologies for Sustainable Development (ICTSD)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127269680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-04-30DOI: 10.1109/ICTSD.2015.7095852
A. Mayabadi, H. Pathan, S. Jadkar
In present work, one dimensional rutile-TiO2 nanoarrays were grown directly on transparent conductive Fluorine-doped SnO2-coated (FTO) glass substrates by chemical bath deposition (CBD) method using Titanium (III) chloride as the precursor, followed by calcination. The heat treatment leads to the considerable changes in structural, optical and electrical properties of nanostructure synthesized materials. The simplicity of deposition of rutile-TiO2 nanoarrays at low temperature provides a new insight for potential applications in solar cells, sensors, catalysis and separation technology.
{"title":"Structural, electrical and photoelectrochemical properties of calcined SnO2/TiO2 nanocomposite films for solar cell applications","authors":"A. Mayabadi, H. Pathan, S. Jadkar","doi":"10.1109/ICTSD.2015.7095852","DOIUrl":"https://doi.org/10.1109/ICTSD.2015.7095852","url":null,"abstract":"In present work, one dimensional rutile-TiO2 nanoarrays were grown directly on transparent conductive Fluorine-doped SnO2-coated (FTO) glass substrates by chemical bath deposition (CBD) method using Titanium (III) chloride as the precursor, followed by calcination. The heat treatment leads to the considerable changes in structural, optical and electrical properties of nanostructure synthesized materials. The simplicity of deposition of rutile-TiO2 nanoarrays at low temperature provides a new insight for potential applications in solar cells, sensors, catalysis and separation technology.","PeriodicalId":270099,"journal":{"name":"2015 International Conference on Technologies for Sustainable Development (ICTSD)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121770130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}