Vehicular Adhoc Network (VANET) is a well known communication which includes communication between moving vehicles on the roads. VANET can be formed either using using existing infractructure or without preexisting infrastructure. With the VANET we can provide various kind of information to the vehicles for their safety and need. Routing protocols in VANET plays a very important role since many challenges like high speed, mobility, etc occurs within it. In this paper, an attempt is made to create realistic environment for the performance analysis of multipath, Unipath and hybrid routing protocol in city scenarios. The protocols evaluated are Ad hoc On demand Distance Vector (AODV), Ad-hoc On-demand Multipath Distance Vector Routing (AOMDV) and Destination Sequence Distance Vector (DSDV). All the three protocols are having their own specifications. In simulation, maps are used to model topology using traffic simulator and then vehicles with different parameter like length, maximum speed and acceleration etc. run on these topologies. The performance parameters evaluated in this paper are packet delivery ratio and end to end delay for the above said prototcols.
{"title":"Evaluation of Multipath, Unipath and Hybrid Routing Protocols for Vehicular Ad Hoc Networks","authors":"S. Dorle, Bhushan Vidhale, M. Chakole","doi":"10.1109/ICETET.2011.66","DOIUrl":"https://doi.org/10.1109/ICETET.2011.66","url":null,"abstract":"Vehicular Adhoc Network (VANET) is a well known communication which includes communication between moving vehicles on the roads. VANET can be formed either using using existing infractructure or without preexisting infrastructure. With the VANET we can provide various kind of information to the vehicles for their safety and need. Routing protocols in VANET plays a very important role since many challenges like high speed, mobility, etc occurs within it. In this paper, an attempt is made to create realistic environment for the performance analysis of multipath, Unipath and hybrid routing protocol in city scenarios. The protocols evaluated are Ad hoc On demand Distance Vector (AODV), Ad-hoc On-demand Multipath Distance Vector Routing (AOMDV) and Destination Sequence Distance Vector (DSDV). All the three protocols are having their own specifications. In simulation, maps are used to model topology using traffic simulator and then vehicles with different parameter like length, maximum speed and acceleration etc. run on these topologies. The performance parameters evaluated in this paper are packet delivery ratio and end to end delay for the above said prototcols.","PeriodicalId":443239,"journal":{"name":"2011 Fourth International Conference on Emerging Trends in Engineering & Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125914620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
JPEG image compressions standard finds itself in most of the digital imaging or photography applications. With the technology moving towards high quality imaging and also the need for faster response times between multiple image compressions and decompressions, it poses the challenge on design of hardware compression and decompression engines. Performance of these hardware JPEG engines is of at most importance when they are used in either handheld devices like high end digital cameras or even in case of smart phones and tablets. In this paper we present the need for such analysis, the setup required for the same and real time scenarios which could affect the throughput of the JPEG engine. We also present our detailed real-time performance analysis of the JPEG engine in terms of throughput measurement, correlation to number of frames of image that can be processed per second and also the experimental results captured for various image formats like grayscale, RGB and YCbCr.
{"title":"Early Performance Analysis of Fully Pipelined JPEG Engine in the Simulation Environment","authors":"B. Rani, Harish Yagain, Srinivas Donapati","doi":"10.1109/ICETET.2011.10","DOIUrl":"https://doi.org/10.1109/ICETET.2011.10","url":null,"abstract":"JPEG image compressions standard finds itself in most of the digital imaging or photography applications. With the technology moving towards high quality imaging and also the need for faster response times between multiple image compressions and decompressions, it poses the challenge on design of hardware compression and decompression engines. Performance of these hardware JPEG engines is of at most importance when they are used in either handheld devices like high end digital cameras or even in case of smart phones and tablets. In this paper we present the need for such analysis, the setup required for the same and real time scenarios which could affect the throughput of the JPEG engine. We also present our detailed real-time performance analysis of the JPEG engine in terms of throughput measurement, correlation to number of frames of image that can be processed per second and also the experimental results captured for various image formats like grayscale, RGB and YCbCr.","PeriodicalId":443239,"journal":{"name":"2011 Fourth International Conference on Emerging Trends in Engineering & Technology","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129497886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years, there has been a surge of interest in object oriented analysis and design methodology. Considering the advantages and limitations of both the approaches of system analysis and design (SAD), this paper suggests few methodologies. The proposed approach helps to smoothen the up gradation of existing system that has been designed using structured approach to more flexible and reusable object oriented environment.
{"title":"Suggested Methodologies for Enhancing SAD","authors":"Neha Sharma, Deepali Sawai","doi":"10.1109/ICETET.2011.49","DOIUrl":"https://doi.org/10.1109/ICETET.2011.49","url":null,"abstract":"In recent years, there has been a surge of interest in object oriented analysis and design methodology. Considering the advantages and limitations of both the approaches of system analysis and design (SAD), this paper suggests few methodologies. The proposed approach helps to smoothen the up gradation of existing system that has been designed using structured approach to more flexible and reusable object oriented environment.","PeriodicalId":443239,"journal":{"name":"2011 Fourth International Conference on Emerging Trends in Engineering & Technology","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115573859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Nii, Kazuki Nakai, Yutaka Takahashi, K. Higuchi, K. Maenaka
When we use a MEMS based monitoring system for monitoring human behavior, several kinds of numerical data can be measured. In order to develop an intelligent monitoring system with small size, we need to minimize the power consumption. Therefore, we need to develop a simple intelligent system. We have proposed a behavior estimation method which consists of a fuzzy rule based system to estimate the subject $B!G (Bs behavior. In the proposed method, two steps of abstraction for numerical data extract some human behaviors from numerical data. The proposed method can estimate only human behavior such as $B!H (Bwalking $B!I (B or $B!H (Bsitting $B!I (B etc. In this paper, we propose an estimation method that can estimate both human state and behavior. Our proposed method can estimate human state using both heart rate from ECG and human behavior obtained from acceleration sensors. From the results of our proposed method, we show the effectiveness of our proposed method.
{"title":"A Human State Estimation Method Using Fuzzy Based System","authors":"M. Nii, Kazuki Nakai, Yutaka Takahashi, K. Higuchi, K. Maenaka","doi":"10.1109/ICETET.2011.50","DOIUrl":"https://doi.org/10.1109/ICETET.2011.50","url":null,"abstract":"When we use a MEMS based monitoring system for monitoring human behavior, several kinds of numerical data can be measured. In order to develop an intelligent monitoring system with small size, we need to minimize the power consumption. Therefore, we need to develop a simple intelligent system. We have proposed a behavior estimation method which consists of a fuzzy rule based system to estimate the subject $B!G (Bs behavior. In the proposed method, two steps of abstraction for numerical data extract some human behaviors from numerical data. The proposed method can estimate only human behavior such as $B!H (Bwalking $B!I (B or $B!H (Bsitting $B!I (B etc. In this paper, we propose an estimation method that can estimate both human state and behavior. Our proposed method can estimate human state using both heart rate from ECG and human behavior obtained from acceleration sensors. From the results of our proposed method, we show the effectiveness of our proposed method.","PeriodicalId":443239,"journal":{"name":"2011 Fourth International Conference on Emerging Trends in Engineering & Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116391250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a Real Time Monitoring System for Driver Vigilance. The main components of the system consist of a web cam for real - time image acquisition and an alarm system which characterize a Driver's level of vigilance. The three conditions in which the facial expressions of the driver taken are vehicle light, sunlight and noise. The effect of these three conditions is reflected in the behaviour of, for example eyes being open, close or blinking. When the lights of the other vehicles coming from the opposite direction falls on the face of driver then the colour of that part will get changed. The images are segmented into red, white, blue, and yellow colours using YCbCr colour space technique. The effect of noise that is the sound of the other vehicles creates some changes on the upper part of the face. It results in the appearance of the lines on the forehead. In this paper, we will develop a system which will monitor the facial expressions and alert the driver. In this paper, we concentrate only on the vehicle light effects.
{"title":"A Design Approach for Driver's Vigilance and Monitoring System","authors":"Rushikesh T. Bankar, P. Bajaj, Rahul M. Deshpande","doi":"10.1109/ICETET.2011.33","DOIUrl":"https://doi.org/10.1109/ICETET.2011.33","url":null,"abstract":"This paper presents a Real Time Monitoring System for Driver Vigilance. The main components of the system consist of a web cam for real - time image acquisition and an alarm system which characterize a Driver's level of vigilance. The three conditions in which the facial expressions of the driver taken are vehicle light, sunlight and noise. The effect of these three conditions is reflected in the behaviour of, for example eyes being open, close or blinking. When the lights of the other vehicles coming from the opposite direction falls on the face of driver then the colour of that part will get changed. The images are segmented into red, white, blue, and yellow colours using YCbCr colour space technique. The effect of noise that is the sound of the other vehicles creates some changes on the upper part of the face. It results in the appearance of the lines on the forehead. In this paper, we will develop a system which will monitor the facial expressions and alert the driver. In this paper, we concentrate only on the vehicle light effects.","PeriodicalId":443239,"journal":{"name":"2011 Fourth International Conference on Emerging Trends in Engineering & Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128659829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The flow in channel bend is spiral or helical. It is a movement of water particles in the flow direction. Many researchers have stated mathematical equations to predict velocity in the flow direction in the channel bend. These equations are based on simplified assumptions. The Artificial Neural Network is a viable alternative to predict longitudinal velocity in channel bend. It builds the model by estimating suitable approximating function of available input/output samples. Once such relationship is established, it can be used for prediction of the future behavior. The paper aims at developing ANN model namely Fuzzy logy. It is found that Fuzzy logy model is capable to predict velocity in the channel bend with reasonable accuracy.
{"title":"Fuzzy Logy for Prediction of Velocity in Channel Bend","authors":"P. Durge, P. Nagarnaik","doi":"10.1109/ICETET.2011.47","DOIUrl":"https://doi.org/10.1109/ICETET.2011.47","url":null,"abstract":"The flow in channel bend is spiral or helical. It is a movement of water particles in the flow direction. Many researchers have stated mathematical equations to predict velocity in the flow direction in the channel bend. These equations are based on simplified assumptions. The Artificial Neural Network is a viable alternative to predict longitudinal velocity in channel bend. It builds the model by estimating suitable approximating function of available input/output samples. Once such relationship is established, it can be used for prediction of the future behavior. The paper aims at developing ANN model namely Fuzzy logy. It is found that Fuzzy logy model is capable to predict velocity in the channel bend with reasonable accuracy.","PeriodicalId":443239,"journal":{"name":"2011 Fourth International Conference on Emerging Trends in Engineering & Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122178370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tractor as the most important agricultural machinery has main share in planting, retaining and harvesting operations and then in mechanization sector. Hence in order to reach sustainable agricultural machinery and also its quantity must be reached to optimum level. Very few cases of fracture failure analysis of agricultural vehicles have been reported till date. In the present study, failure of exhaust manifold stud of tractor, fatigue and longetivity of the manifold stud will be carried out in the FE code Analysis ANSYS. Therefore the simulation for cyclic stress/strain evolution and redistributions are critical for predicting fatigue/ fracture, improving the accuracy of fracture life prediction of mechanical components. For carrying out the fracture analysis it is necessary to determine the maximum load, and for calculating the maximum load various physical parameters would be taken in consideration: FE mesh of the component and Numerical analysis & Validation
{"title":"Failure Analysis of Exhaust Manifold Stud of Mahindra Tractor Using Finite Element Analysis","authors":"Mahesh M. Sonekar, S. Jaju","doi":"10.1109/ICETET.2011.72","DOIUrl":"https://doi.org/10.1109/ICETET.2011.72","url":null,"abstract":"Tractor as the most important agricultural machinery has main share in planting, retaining and harvesting operations and then in mechanization sector. Hence in order to reach sustainable agricultural machinery and also its quantity must be reached to optimum level. Very few cases of fracture failure analysis of agricultural vehicles have been reported till date. In the present study, failure of exhaust manifold stud of tractor, fatigue and longetivity of the manifold stud will be carried out in the FE code Analysis ANSYS. Therefore the simulation for cyclic stress/strain evolution and redistributions are critical for predicting fatigue/ fracture, improving the accuracy of fracture life prediction of mechanical components. For carrying out the fracture analysis it is necessary to determine the maximum load, and for calculating the maximum load various physical parameters would be taken in consideration: FE mesh of the component and Numerical analysis & Validation","PeriodicalId":443239,"journal":{"name":"2011 Fourth International Conference on Emerging Trends in Engineering & Technology","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116495539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper applies embedding knowledge into model based design method, an efficient and cost-effective way to develop embedded systems. The approach is based on a single design description in the graphical Matlab/Simulink environment that is used for FPGA emulation, ASIC design, verification and chip testing. This simulation-based approach gives a better understanding of design alternatives and tradeoffs than traditional prototype-based design methodologies. It enables to optimize design to meet predefined performance criteria. The methodology is tested for designing VCO and the simulation results confirm the efficiency of presented methodology.
{"title":"A New Approch to Design and Implement Oscillator for Soc Application","authors":"B. K. Mishra, Sandhya Save, Rupali Mane","doi":"10.1109/ICETET.2011.54","DOIUrl":"https://doi.org/10.1109/ICETET.2011.54","url":null,"abstract":"This paper applies embedding knowledge into model based design method, an efficient and cost-effective way to develop embedded systems. The approach is based on a single design description in the graphical Matlab/Simulink environment that is used for FPGA emulation, ASIC design, verification and chip testing. This simulation-based approach gives a better understanding of design alternatives and tradeoffs than traditional prototype-based design methodologies. It enables to optimize design to meet predefined performance criteria. The methodology is tested for designing VCO and the simulation results confirm the efficiency of presented methodology.","PeriodicalId":443239,"journal":{"name":"2011 Fourth International Conference on Emerging Trends in Engineering & Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115157112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Node capture attack is one of the most dreadful security attack exist in wireless sensor networks. An adversary steals mostly all key informations from a captured node. Therefore, the impact of node capture attack can be lessened by renew the keys through a authenticated channel in a periodic or reactive manner. Existing key renewal techniques are mostly based on the statistic or behavior of attacks. In this paper we proposed a key renewal model in wireless sensor networks using age replacement policy. We use this model to find the expected time interval between two successive key renewals to mitigate the impact of node capture attack on the network. We have also deduced the relationship between expected time interval between successive key renewals and the strength of the attacker.
{"title":"A Key Renewal Model for Wireless Sensor Network Under Node Capture Attack","authors":"Alekha Kumar Mishra, A. K. Turuk","doi":"10.1109/ICETET.2011.18","DOIUrl":"https://doi.org/10.1109/ICETET.2011.18","url":null,"abstract":"Node capture attack is one of the most dreadful security attack exist in wireless sensor networks. An adversary steals mostly all key informations from a captured node. Therefore, the impact of node capture attack can be lessened by renew the keys through a authenticated channel in a periodic or reactive manner. Existing key renewal techniques are mostly based on the statistic or behavior of attacks. In this paper we proposed a key renewal model in wireless sensor networks using age replacement policy. We use this model to find the expected time interval between two successive key renewals to mitigate the impact of node capture attack on the network. We have also deduced the relationship between expected time interval between successive key renewals and the strength of the attacker.","PeriodicalId":443239,"journal":{"name":"2011 Fourth International Conference on Emerging Trends in Engineering & Technology","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114344986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sanoj Kumar, N. Sukavanam, B. Raman, Sanjeev Kumar
In this paper, three new simple and efficient disparity estimation algorithms are proposed which are based on wavelet transform and human visual system. The core idea behind the proposed algorithms is to create a set of different left and right images followed by the disparity estimation from the different set. The obtained disparity from different left and right images are merged into a single more accurate disparity using human visual system model. Experiments with test and real stereo image pairs show the validity of the proposed method.
{"title":"Human Visual System and Wavelet Transform Based Disparity Estimation","authors":"Sanoj Kumar, N. Sukavanam, B. Raman, Sanjeev Kumar","doi":"10.1109/ICETET.2011.19","DOIUrl":"https://doi.org/10.1109/ICETET.2011.19","url":null,"abstract":"In this paper, three new simple and efficient disparity estimation algorithms are proposed which are based on wavelet transform and human visual system. The core idea behind the proposed algorithms is to create a set of different left and right images followed by the disparity estimation from the different set. The obtained disparity from different left and right images are merged into a single more accurate disparity using human visual system model. Experiments with test and real stereo image pairs show the validity of the proposed method.","PeriodicalId":443239,"journal":{"name":"2011 Fourth International Conference on Emerging Trends in Engineering & Technology","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114516290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}