Quality Cost is considered as the sum of conformance plus non-conformance costs, where cost of conformance is the price paid for prevention of poor quality and cost of non-conformance is the cost of poor quality caused by product and service failure. Cost of Quality in rubber processing industry has not received as much attention from the research community as other economic aspects of quality development in rubber processing industry. After reviewing to the literature it was notice that a simplified methodology for data collection of quality cost in rubber processing industry was required. Also in the light of research carried out so far it is felt necessary to standardize cost elements in each of the prevention, appraisal, internal failure and external failure cost. Here an attempt is made to standardize the various cost elements and develop methodology for collecting quality cost applicable to rubber processing industry.
{"title":"Development of Methodology for Collecting Quality Cost in Rubber Processing Industry","authors":"V. Kale, S. Jaju","doi":"10.1109/ICETET.2013.39","DOIUrl":"https://doi.org/10.1109/ICETET.2013.39","url":null,"abstract":"Quality Cost is considered as the sum of conformance plus non-conformance costs, where cost of conformance is the price paid for prevention of poor quality and cost of non-conformance is the cost of poor quality caused by product and service failure. Cost of Quality in rubber processing industry has not received as much attention from the research community as other economic aspects of quality development in rubber processing industry. After reviewing to the literature it was notice that a simplified methodology for data collection of quality cost in rubber processing industry was required. Also in the light of research carried out so far it is felt necessary to standardize cost elements in each of the prevention, appraisal, internal failure and external failure cost. Here an attempt is made to standardize the various cost elements and develop methodology for collecting quality cost applicable to rubber processing industry.","PeriodicalId":440967,"journal":{"name":"2013 6th International Conference on Emerging Trends in Engineering and Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127765420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Transmission of multimedia content typically has bandwidth, delay and loss issues. Video compression, layer, media distribution services, streams servers, synchronization technique and synchronization protocols for streaming are major areas of research. It require scheduling protocol to sequence the events. Various useful applications for streaming in internet world are available and their implementation in ad hoc network needs improvement in architecture. To achieve efficiency and flexibility, a new streaming and compression along with scheduling technique is required which can uses the buffer for encoding, compression. Design of RMDMTS (Reliable Multimedia Data Management & Transport protocol) is prepared in such a way that it deals with proper schedule management and managing buffer and playback rate. In RMDMTS, torrent kind of technique is used for cooperative relay and multiple participants' buffer management. It is designed for efficient streaming as well as buffer management at receiver side. Overhead of processing can be also minimized at node level using RMDMTS.
{"title":"Design of RMDMTS Protocol for Efficient Scheduled Co-operative Buffer Management and Streaming in Ad Hoc Network","authors":"B. Mahajan, A. Mahajan","doi":"10.1109/ICETET.2013.55","DOIUrl":"https://doi.org/10.1109/ICETET.2013.55","url":null,"abstract":"The Transmission of multimedia content typically has bandwidth, delay and loss issues. Video compression, layer, media distribution services, streams servers, synchronization technique and synchronization protocols for streaming are major areas of research. It require scheduling protocol to sequence the events. Various useful applications for streaming in internet world are available and their implementation in ad hoc network needs improvement in architecture. To achieve efficiency and flexibility, a new streaming and compression along with scheduling technique is required which can uses the buffer for encoding, compression. Design of RMDMTS (Reliable Multimedia Data Management & Transport protocol) is prepared in such a way that it deals with proper schedule management and managing buffer and playback rate. In RMDMTS, torrent kind of technique is used for cooperative relay and multiple participants' buffer management. It is designed for efficient streaming as well as buffer management at receiver side. Overhead of processing can be also minimized at node level using RMDMTS.","PeriodicalId":440967,"journal":{"name":"2013 6th International Conference on Emerging Trends in Engineering and Technology","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131071833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jannat Talwar, Shree Ranjani, Anwaya Aras, Dr Mangesh Bedekar
With the increase of ubiquitous data all over the internet, intelligent classroom systems that integrate traditional learning techniques with modern e-learning tools have become quite popular and necessary today. Although a substantial amount of work has been done in the field of e-learning, specifically in automation of objective question and answer evaluation, personalized learning, adaptive evaluation systems, the field of qualitative analysis of a student's subjective paragraph answers remains unexplored to a large extent. The traditional board, chalk, talk based classroom scenario involves a teacher setting question papers based on the concepts taught, checks the answers written by students manually and thus evaluates the students' performance. However, setting question papers remains a time consuming process with the teacher having to bother about question quality, level of difficulty and redundancy. In addition the process of manually correcting students' answers is a cumbersome and tedious task. In this paper, we put forth the design, analysis and implementation details along with some preliminary results to build a system that integrates all the above mentioned tasks with minimal teacher involvement that not only automates the traditional classroom scenario but also overcomes its inherent shortcomings and fallacies.
{"title":"Intelligent Classroom System for Qualitative Analysis of Students' Conceptual Understanding","authors":"Jannat Talwar, Shree Ranjani, Anwaya Aras, Dr Mangesh Bedekar","doi":"10.1109/ICETET.2013.6","DOIUrl":"https://doi.org/10.1109/ICETET.2013.6","url":null,"abstract":"With the increase of ubiquitous data all over the internet, intelligent classroom systems that integrate traditional learning techniques with modern e-learning tools have become quite popular and necessary today. Although a substantial amount of work has been done in the field of e-learning, specifically in automation of objective question and answer evaluation, personalized learning, adaptive evaluation systems, the field of qualitative analysis of a student's subjective paragraph answers remains unexplored to a large extent. The traditional board, chalk, talk based classroom scenario involves a teacher setting question papers based on the concepts taught, checks the answers written by students manually and thus evaluates the students' performance. However, setting question papers remains a time consuming process with the teacher having to bother about question quality, level of difficulty and redundancy. In addition the process of manually correcting students' answers is a cumbersome and tedious task. In this paper, we put forth the design, analysis and implementation details along with some preliminary results to build a system that integrates all the above mentioned tasks with minimal teacher involvement that not only automates the traditional classroom scenario but also overcomes its inherent shortcomings and fallacies.","PeriodicalId":440967,"journal":{"name":"2013 6th International Conference on Emerging Trends in Engineering and Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130973290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We propose to detect phishing emails and websites using particle swarm optimization (PSO) trained auto associative neural network (PSOAANN), which is employed as one class classifier. PSOAANN achieved better results when compared to previous efforts. In the study, we also developed a new feature selection method based on the weights from input to hidden layers of the PSOAANN. We compared its performance with other methods.
{"title":"Phishing Detection Using PSOAANN Based One-Class Classifier","authors":"M. Pandey, V. Ravi","doi":"10.1109/ICETET.2013.46","DOIUrl":"https://doi.org/10.1109/ICETET.2013.46","url":null,"abstract":"We propose to detect phishing emails and websites using particle swarm optimization (PSO) trained auto associative neural network (PSOAANN), which is employed as one class classifier. PSOAANN achieved better results when compared to previous efforts. In the study, we also developed a new feature selection method based on the weights from input to hidden layers of the PSOAANN. We compared its performance with other methods.","PeriodicalId":440967,"journal":{"name":"2013 6th International Conference on Emerging Trends in Engineering and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130337904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cost of quality practices, an important element of quality management is getting increasing attention, recently, across the broad spectrum of organizations globally. The research work undertaken aims at the study of present methods adopted for Cost of Quality (COQ) analysis in Indian enterprises working in advanced and computer integrated manufacturing environment and to develop and validate quality cost management focusing on maximizing the economic benefit to the enterprise. Paper focuses on emergence of new trends in cost of quality practices in tandem with advancement in technology by reviewing the published literature. In addition, a general framework for quality cost management system (QCMS) is proposed.
{"title":"Modeling Cost of Quality in Advanced Manufacturing Environment","authors":"S. Mantri, S. Jaju","doi":"10.1109/ICETET.2013.40","DOIUrl":"https://doi.org/10.1109/ICETET.2013.40","url":null,"abstract":"Cost of quality practices, an important element of quality management is getting increasing attention, recently, across the broad spectrum of organizations globally. The research work undertaken aims at the study of present methods adopted for Cost of Quality (COQ) analysis in Indian enterprises working in advanced and computer integrated manufacturing environment and to develop and validate quality cost management focusing on maximizing the economic benefit to the enterprise. Paper focuses on emergence of new trends in cost of quality practices in tandem with advancement in technology by reviewing the published literature. In addition, a general framework for quality cost management system (QCMS) is proposed.","PeriodicalId":440967,"journal":{"name":"2013 6th International Conference on Emerging Trends in Engineering and Technology","volume":"37 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130749446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Enhancing network performance has been studied by a number of researchers. The need to provide greater throughput on network infrastructure has been the key driver for these studies. The use of jumbo frames is considered one of the methodologies that can be employed to increase data throughput on networks. It can carry data payloads ranging from 1500Bytes to 9000Bytes which can be supported by Gigabit network hardware. In this research undertaking, a test-bed network is implemented on which jumbo frames are configured on two commonly used operating systems. Performance related metrics like throughput, jitter, delay and drop rates are empirically measured for both IPv4 and IPv6 implementations. The results obtained in this empirical study show that performance metrics values are different in various scenarios.
{"title":"Network Performance Evaluation of Jumbo Frames on a Network","authors":"S. Narayan, Paula Raymond Lutui","doi":"10.1109/ICETET.2013.16","DOIUrl":"https://doi.org/10.1109/ICETET.2013.16","url":null,"abstract":"Enhancing network performance has been studied by a number of researchers. The need to provide greater throughput on network infrastructure has been the key driver for these studies. The use of jumbo frames is considered one of the methodologies that can be employed to increase data throughput on networks. It can carry data payloads ranging from 1500Bytes to 9000Bytes which can be supported by Gigabit network hardware. In this research undertaking, a test-bed network is implemented on which jumbo frames are configured on two commonly used operating systems. Performance related metrics like throughput, jitter, delay and drop rates are empirically measured for both IPv4 and IPv6 implementations. The results obtained in this empirical study show that performance metrics values are different in various scenarios.","PeriodicalId":440967,"journal":{"name":"2013 6th International Conference on Emerging Trends in Engineering and Technology","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116794704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this modern era data is omnipresent, be it for business, medicine, entertainment or even education. Thus even the need for data sharing is at its pinnacle. It is even more vital to make sure that data is transferred at high speeds. If the data transfer is faster and safer it will revolutionize the way we live and work. The USB to USB Bridge concept will make it viable to carry out mass data transfer anywhere, anytime which will be secure and will be at high speeds. It consists of just four connecting wires between the device and the Host (Computer), regulated by a set of protocols. The aim of this project is to achieve computer independent data transfer, from one USB flash drive to another. Being portable and battery operated is an added advantage of this system. It is an embedded solution to a practical problem. Also, we can send the data over the internet by connecting our USB Bridge to the internet.
{"title":"Computer Independent USB to USB Data Transfer Bridge","authors":"T. Sawant, Bhagya Parekh, Naineel Shah","doi":"10.1109/ICETET.2013.8","DOIUrl":"https://doi.org/10.1109/ICETET.2013.8","url":null,"abstract":"In this modern era data is omnipresent, be it for business, medicine, entertainment or even education. Thus even the need for data sharing is at its pinnacle. It is even more vital to make sure that data is transferred at high speeds. If the data transfer is faster and safer it will revolutionize the way we live and work. The USB to USB Bridge concept will make it viable to carry out mass data transfer anywhere, anytime which will be secure and will be at high speeds. It consists of just four connecting wires between the device and the Host (Computer), regulated by a set of protocols. The aim of this project is to achieve computer independent data transfer, from one USB flash drive to another. Being portable and battery operated is an added advantage of this system. It is an embedded solution to a practical problem. Also, we can send the data over the internet by connecting our USB Bridge to the internet.","PeriodicalId":440967,"journal":{"name":"2013 6th International Conference on Emerging Trends in Engineering and Technology","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127722902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Power flow is nothing but the flow of active and reactive power. To achieve the steady state operating condition of a power system, power flow analysis (PFA) is used. In short, it is to find the approximate values of P, Q, V and δ at various buses, lines flows, generators and loads under steady state condition. Heuristic methods are generally referred as experience based techniques for solving problem, learning and discovery. Heuristics are simple and efficient rules coded by evolutionary processes. In this paper, GA, genetic algorithm, one of such heuristic algorithms have been used to do the power flow analysis in a simple three bus system.
{"title":"A Novel Genetic Algorithm Approach to Achieve Steady State Power Flow Solution","authors":"Shilpa S. Shrawane Kapse, M. Diagavane, N. Bawane","doi":"10.1109/ICETET.2013.53","DOIUrl":"https://doi.org/10.1109/ICETET.2013.53","url":null,"abstract":"Power flow is nothing but the flow of active and reactive power. To achieve the steady state operating condition of a power system, power flow analysis (PFA) is used. In short, it is to find the approximate values of P, Q, V and δ at various buses, lines flows, generators and loads under steady state condition. Heuristic methods are generally referred as experience based techniques for solving problem, learning and discovery. Heuristics are simple and efficient rules coded by evolutionary processes. In this paper, GA, genetic algorithm, one of such heuristic algorithms have been used to do the power flow analysis in a simple three bus system.","PeriodicalId":440967,"journal":{"name":"2013 6th International Conference on Emerging Trends in Engineering and Technology","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127663136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wireless technology has become more persistent with wide demand of mobile devices such as personal digital assistance, smart phones and laptops. The elliptic curve cryptography(ECC) techniques provide greater security using fewer bits resulting in a protocol which requires low computational and communication overhead, therefore suitable for wireless communication system as well as wireless communication devices smart cards, PDAs and other handheld devices. These systems are prone to eavesdropping due to easy access to free space medium. In such cases, appropriate authenticity and cryptographic procedures need to be adopted for reliable and secure communication. Key agreement protocol based on elliptic curve cryptography suited for wireless network. This paper describes various schemes used for implementation of authenticated key agreement protocol in wireless network.
{"title":"Exploration of Schemes for Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptosystem","authors":"Dr.Sonali Nimbhorkar(Ridhorkar), L. Malik","doi":"10.1109/ICETET.2013.42","DOIUrl":"https://doi.org/10.1109/ICETET.2013.42","url":null,"abstract":"Wireless technology has become more persistent with wide demand of mobile devices such as personal digital assistance, smart phones and laptops. The elliptic curve cryptography(ECC) techniques provide greater security using fewer bits resulting in a protocol which requires low computational and communication overhead, therefore suitable for wireless communication system as well as wireless communication devices smart cards, PDAs and other handheld devices. These systems are prone to eavesdropping due to easy access to free space medium. In such cases, appropriate authenticity and cryptographic procedures need to be adopted for reliable and secure communication. Key agreement protocol based on elliptic curve cryptography suited for wireless network. This paper describes various schemes used for implementation of authenticated key agreement protocol in wireless network.","PeriodicalId":440967,"journal":{"name":"2013 6th International Conference on Emerging Trends in Engineering and Technology","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126850212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wireless Mesh Networks (WMNs) have received attention in wireless network users. Low cost, easy deploy ability, access to the Internet, are few of the several reasons for it. It is also capturing major share of attention amongst researchers as it is in its evolutionary stage. The performance of WMN is still under observation. In this paper, we have tried to analyze the performance of wireless mesh network where each individual cluster of client nodes is associated with cluster head which serves as default Gateway for Internet access. The performance is evaluated on the basis of throughput with varying transmission rate. Also end to end to delay with different transmission rates is analyzed. Performance of a cluster with one Gateway is compared with four clusters scenario. Number of nodes in the cluster is kept same as in the first case. Network Simulator NS-2 is used for evaluation. The results show that Multiple Gateway scenarios provide better results as compared to Single Gateway as the density of nodes goes on reducing per cluster.
{"title":"Analyzing Gateway Association in Wireless Mesh Network","authors":"Geeta J. Tripathi, A. Mahajan","doi":"10.1109/ICETET.2013.23","DOIUrl":"https://doi.org/10.1109/ICETET.2013.23","url":null,"abstract":"Wireless Mesh Networks (WMNs) have received attention in wireless network users. Low cost, easy deploy ability, access to the Internet, are few of the several reasons for it. It is also capturing major share of attention amongst researchers as it is in its evolutionary stage. The performance of WMN is still under observation. In this paper, we have tried to analyze the performance of wireless mesh network where each individual cluster of client nodes is associated with cluster head which serves as default Gateway for Internet access. The performance is evaluated on the basis of throughput with varying transmission rate. Also end to end to delay with different transmission rates is analyzed. Performance of a cluster with one Gateway is compared with four clusters scenario. Number of nodes in the cluster is kept same as in the first case. Network Simulator NS-2 is used for evaluation. The results show that Multiple Gateway scenarios provide better results as compared to Single Gateway as the density of nodes goes on reducing per cluster.","PeriodicalId":440967,"journal":{"name":"2013 6th International Conference on Emerging Trends in Engineering and Technology","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133192344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}