首页 > 最新文献

2014 International Conference on Computational Intelligence and Communication Networks最新文献

英文 中文
Video Coding Parameter Optimization Based on Module Inter-relevancy 基于模块相关性的视频编码参数优化
Leilei Meng, Zhelei Xia
Algorithm customizable modules in video encoder play important roles in coding performance, and their algorithms can be optimized by adjusting multiple coding control parameters under a certain rate distortion complexity constraint. There are inter-correlated relationships among these modules. This paper analyzes the inter-module influence mechanism among algorithm customizable modules, and gives method to quantitatively measure the influence extent. According to the correlation degree among modules, the algorithm decision priority order is dynamically determined, and then coding parameter options are configured to achieve video coding parameter determination and optimization. X264 is used as the verification platform, and intensive experimental results are given to verify the proposed idea and model. The experimental results show that there is complicate inter-influence mechanism among modules, and module algorithm variation affects the performance of multi-objective performance, and this affection is not a simple linear relationship. The proposed parameter configuration and algorithm optimization method achieves considerable encoding complexity reduction, 80% computation saving, at the cost of slightly coding performance losses, no larger than 0.1 dB PSNR degradation.
视频编码器中的算法可定制模块对编码性能起着重要的作用,在一定的码率失真复杂度约束下,可以通过调整多个编码控制参数来优化算法。这些模块之间存在着相互关联的关系。分析了算法可定制模块之间的模块间影响机制,给出了影响程度的定量度量方法。根据模块间的关联度动态确定算法决策优先级顺序,然后配置编码参数选项,实现视频编码参数的确定和优化。以X264作为验证平台,并给出了大量的实验结果来验证所提出的思想和模型。实验结果表明,模块之间存在复杂的相互影响机制,模块算法的变化会影响多目标性能的表现,而且这种影响不是简单的线性关系。所提出的参数配置和算法优化方法实现了较大幅度的编码复杂度降低,节省了80%的计算量,但代价是编码性能损失较小,PSNR下降不超过0.1 dB。
{"title":"Video Coding Parameter Optimization Based on Module Inter-relevancy","authors":"Leilei Meng, Zhelei Xia","doi":"10.1109/CICN.2014.72","DOIUrl":"https://doi.org/10.1109/CICN.2014.72","url":null,"abstract":"Algorithm customizable modules in video encoder play important roles in coding performance, and their algorithms can be optimized by adjusting multiple coding control parameters under a certain rate distortion complexity constraint. There are inter-correlated relationships among these modules. This paper analyzes the inter-module influence mechanism among algorithm customizable modules, and gives method to quantitatively measure the influence extent. According to the correlation degree among modules, the algorithm decision priority order is dynamically determined, and then coding parameter options are configured to achieve video coding parameter determination and optimization. X264 is used as the verification platform, and intensive experimental results are given to verify the proposed idea and model. The experimental results show that there is complicate inter-influence mechanism among modules, and module algorithm variation affects the performance of multi-objective performance, and this affection is not a simple linear relationship. The proposed parameter configuration and algorithm optimization method achieves considerable encoding complexity reduction, 80% computation saving, at the cost of slightly coding performance losses, no larger than 0.1 dB PSNR degradation.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"22 1","pages":"289-294"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87041036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Image Signcryption Using ECC 使用ECC进行图像签名加密
Reenu Saini, K. S. Vaisla
The demand of mobile devices is increasing day by day because of their portability and many worldwide applications, but more power consumption and high band width, becomes a problem for this and makes uneasy to use it, this problem is solved by signcryption, which provides both authenticity and privacy. Signcryption is the process that combines the functionality of encryption and digital signature in a single logical step. In the literature of signcryption only text data is signcrypted. In this paper we have extended the concept of signcryption to image data, it is so difficult task to extract information form an image, specially signcrypted image, so in this paper we use a technique named as image signcryption.
由于移动设备的便携性和在世界范围内的广泛应用,人们对移动设备的需求日益增加,但高功耗和高带宽成为一个问题,使其使用起来不方便,这一问题通过提供真实性和保密性的签名加密来解决。签名加密是在单个逻辑步骤中结合加密和数字签名功能的过程。在签名加密的文献中,只有文本数据被签名加密。本文将签名加密的概念扩展到图像数据中,由于从图像中提取信息是一项非常困难的任务,特别是从经过签名加密的图像中提取信息,因此本文采用了图像签名加密技术。
{"title":"Image Signcryption Using ECC","authors":"Reenu Saini, K. S. Vaisla","doi":"10.1109/CICN.2014.177","DOIUrl":"https://doi.org/10.1109/CICN.2014.177","url":null,"abstract":"The demand of mobile devices is increasing day by day because of their portability and many worldwide applications, but more power consumption and high band width, becomes a problem for this and makes uneasy to use it, this problem is solved by signcryption, which provides both authenticity and privacy. Signcryption is the process that combines the functionality of encryption and digital signature in a single logical step. In the literature of signcryption only text data is signcrypted. In this paper we have extended the concept of signcryption to image data, it is so difficult task to extract information form an image, specially signcrypted image, so in this paper we use a technique named as image signcryption.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"53 1","pages":"829-834"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73290857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
10-T Full Subtraction Logic Using GDI Technique 使用GDI技术的10-T全减法逻辑
Haramardeep Singh, R. Kumar
Circuit designing using CMOS logic is the promising field for VLSI engineers, but with demand of small and portable devices, new techniques for low power are emerging. This paper proposed four different 10-T subtraction logic using Gate Diffusion Index (a new technique for low power design). Simulation results are performed using 180nm technology using Cadence Virtuoso. Complete verification for performance of proposed subtraction logic is carried and circuit with least power and delay has been reported. Layout design for the best optimum ciruit is designed using Cadence Layout XL.
利用CMOS逻辑设计电路是VLSI工程师的一个有前途的领域,但随着设备小型化和便携化的需求,低功耗的新技术正在出现。本文利用门扩散指数(一种低功耗设计的新技术)提出了四种不同的10-T减法逻辑。仿真结果采用Cadence Virtuoso采用180nm技术进行。对所提出的减法逻辑的性能进行了完整的验证,并报道了功耗和延迟最小的电路。使用Cadence Layout XL设计最佳电路的布局设计。
{"title":"10-T Full Subtraction Logic Using GDI Technique","authors":"Haramardeep Singh, R. Kumar","doi":"10.1109/CICN.2014.202","DOIUrl":"https://doi.org/10.1109/CICN.2014.202","url":null,"abstract":"Circuit designing using CMOS logic is the promising field for VLSI engineers, but with demand of small and portable devices, new techniques for low power are emerging. This paper proposed four different 10-T subtraction logic using Gate Diffusion Index (a new technique for low power design). Simulation results are performed using 180nm technology using Cadence Virtuoso. Complete verification for performance of proposed subtraction logic is carried and circuit with least power and delay has been reported. Layout design for the best optimum ciruit is designed using Cadence Layout XL.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"110 1","pages":"956-960"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73411285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Code Analysis Base Regression Test Selection Technique for D Programming Language 基于代码分析的D语言回归测试选择技术
Nitesh Chouhan, M. Dutta, Mayank Singh
D is a new programming language. This is an object-oriented, imperative, multi-paradigm system programming language. Regression testing on D programming language still untouched by researchers. Our research attempts to bridge this gap by introducing a techniques to revalidate D programs. A framework is proposed which automates both the regression test selection and regression testing processes for D programming language. As part of this approach, special consideration is given to the analysis of the source code of D language. In our approach system dependence graph representation will be used for regression test selection for analyzing and comparing the code changes of original and modified program. First we construct a system dependence graph of the original program from the source code. When some modification is executed in a program, the constructed graph is updated to reflect the changes. Our approach in addition to capturing control and data dependencies represents the dependencies arising from object-relations. The test cases that exercise the affected model elements in the program model are selected for regression testing. Empirical studies carried out by us show that our technique selects on an average of 26.36. % more fault-revealing test cases compared to a UML based technique while incurring about 37.34% increase in regression test suite size.
D语言是一种新的编程语言。这是一种面向对象、命令式、多范式的系统编程语言。在D语言上的回归测试仍未被研究者接触过。我们的研究试图通过引入一种重新验证D程序的技术来弥合这一差距。提出了一种实现D语言回归测试选择和回归测试过程自动化的框架。作为该方法的一部分,特别考虑了对D语言源代码的分析。在我们的方法中,系统依赖图表示将用于回归测试选择,以分析和比较原始程序和修改程序的代码更改。首先,我们从原始程序的源代码构造一个系统依赖图。当在程序中执行某些修改时,将更新构造的图以反映更改。我们的方法除了捕获控制和数据依赖关系外,还表示对象关系产生的依赖关系。在程序模型中执行受影响的模型元素的测试用例被选择用于回归测试。我们进行的实证研究表明,我们的技术选择平均为26.36。与基于UML的技术相比,多了%的故障揭示测试用例,同时在回归测试套件大小上增加了37.34%。
{"title":"A Code Analysis Base Regression Test Selection Technique for D Programming Language","authors":"Nitesh Chouhan, M. Dutta, Mayank Singh","doi":"10.1109/CICN.2014.232","DOIUrl":"https://doi.org/10.1109/CICN.2014.232","url":null,"abstract":"D is a new programming language. This is an object-oriented, imperative, multi-paradigm system programming language. Regression testing on D programming language still untouched by researchers. Our research attempts to bridge this gap by introducing a techniques to revalidate D programs. A framework is proposed which automates both the regression test selection and regression testing processes for D programming language. As part of this approach, special consideration is given to the analysis of the source code of D language. In our approach system dependence graph representation will be used for regression test selection for analyzing and comparing the code changes of original and modified program. First we construct a system dependence graph of the original program from the source code. When some modification is executed in a program, the constructed graph is updated to reflect the changes. Our approach in addition to capturing control and data dependencies represents the dependencies arising from object-relations. The test cases that exercise the affected model elements in the program model are selected for regression testing. Empirical studies carried out by us show that our technique selects on an average of 26.36. % more fault-revealing test cases compared to a UML based technique while incurring about 37.34% increase in regression test suite size.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"4 1","pages":"1106-1112"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74321366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and Implementation for Medical Information Service Open Platform 医疗信息服务开放平台的设计与实现
Jianfeng Shan, Yu Fang
In the medical information services, there are some issues of inadequate sharing of medical service resources and the high cost of developing medical service resources. In this paper, we combines with the characteristics of medical information service industry to build medical open platform, which opens to third-party developers to develop their applications or services, thus it effectively promotes the sharing of medical information resources, reduces the cost of service development and promotes the development of medical institutions. In this paper, we focus on the key technologies of the medical information open platform, as well as how to build one.
在医疗信息服务中,存在着医疗服务资源共享不充分、医疗服务资源开发成本高等问题。本文结合医疗信息服务行业的特点,构建医疗开放平台,向第三方开发者开放其应用或服务,从而有效促进医疗信息资源的共享,降低服务开发成本,促进医疗机构的发展。本文重点研究了医疗信息开放平台的关键技术,以及如何构建医疗信息开放平台。
{"title":"Design and Implementation for Medical Information Service Open Platform","authors":"Jianfeng Shan, Yu Fang","doi":"10.1109/CICN.2014.144","DOIUrl":"https://doi.org/10.1109/CICN.2014.144","url":null,"abstract":"In the medical information services, there are some issues of inadequate sharing of medical service resources and the high cost of developing medical service resources. In this paper, we combines with the characteristics of medical information service industry to build medical open platform, which opens to third-party developers to develop their applications or services, thus it effectively promotes the sharing of medical information resources, reduces the cost of service development and promotes the development of medical institutions. In this paper, we focus on the key technologies of the medical information open platform, as well as how to build one.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"17 1","pages":"646-651"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75208686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vehicular Mechanical Condition Determination and On Road Traffic Density Estimation Using Audio Signals 基于音频信号的车辆力学状态判定与道路交通密度估计
Minal Bhandarkar, Tejashri Waykole
In this paper we are going to estimate the vehicular traffic density by using acoustic or sound signals. Here we will estimate three probable conditions of traffic that is heavy flow traffic (0-10km/h), medium flow (20-40km/h), and free flow (above 40km/h) traffic. Cumulative sound signals consist of various noises coming from various part of vehicles which includes rotational parts, vibrations in the engine, friction between the tires and the road, exhausted parts of vehicles, gears, etc. Noise signals are tire noise, engine noise, engine-idling noise, occasional honks, and air turbulence noise of multiple vehicles. These noise signals contains spectral content which are different from each other, therefore we can determine the different traffic density states and mechanical condition of vehicle. For example, under a free-flowing traffic condition, the vehicles typically move with medium to high speeds and thereby produces mainly tire noise and air turbulence noise. Here we will use SVM and ANN classifiers. In ANN, we are going to use Feed Forword Network.
在本文中,我们将使用声或声信号来估计车辆交通密度。在这里,我们将估计三种可能的交通状况,即大流量交通(0-10km/h),中等流量(20-40km/h)和自由流量(超过40km/h)交通。累积的声音信号包括来自车辆各部分的各种噪音,包括转动部件、发动机的振动、轮胎与路面的摩擦、车辆的排气部件、齿轮等。噪声信号是轮胎噪声、发动机噪声、发动机空转噪声、偶尔的喇叭声和多辆车的空气湍流噪声。这些噪声信号所包含的频谱内容各不相同,因此可以判断不同的交通密度状态和车辆的力学状况。例如,在自由流动的交通条件下,车辆通常以中高速行驶,因此主要产生轮胎噪声和空气湍流噪声。这里我们将使用支持向量机和人工神经网络分类器。在人工神经网络中,我们将使用前馈网络。
{"title":"Vehicular Mechanical Condition Determination and On Road Traffic Density Estimation Using Audio Signals","authors":"Minal Bhandarkar, Tejashri Waykole","doi":"10.1109/CICN.2014.94","DOIUrl":"https://doi.org/10.1109/CICN.2014.94","url":null,"abstract":"In this paper we are going to estimate the vehicular traffic density by using acoustic or sound signals. Here we will estimate three probable conditions of traffic that is heavy flow traffic (0-10km/h), medium flow (20-40km/h), and free flow (above 40km/h) traffic. Cumulative sound signals consist of various noises coming from various part of vehicles which includes rotational parts, vibrations in the engine, friction between the tires and the road, exhausted parts of vehicles, gears, etc. Noise signals are tire noise, engine noise, engine-idling noise, occasional honks, and air turbulence noise of multiple vehicles. These noise signals contains spectral content which are different from each other, therefore we can determine the different traffic density states and mechanical condition of vehicle. For example, under a free-flowing traffic condition, the vehicles typically move with medium to high speeds and thereby produces mainly tire noise and air turbulence noise. Here we will use SVM and ANN classifiers. In ANN, we are going to use Feed Forword Network.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"56 1","pages":"395-401"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76612167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Improved Genetic Algorithm for Intrusion Detection System 入侵检测系统的改进遗传算法
Dheeraj Pal, A. Parashar
Intrusion detection is one of the important security constraints for maintaining the integrity of information. Various approaches have been applied in past that are less effective to curb the menace of intrusion. The purpose of this paper is to provide an intrusion detection system (IDS), by modifying the genetic algorithm to network intrusion detection system. As we have applied attribute subset reduction on the basis of Information gain. So the training time and complexity reduced considerably. Moreover, we embedded a soft computing approach in rule generation makes the rule more efficient than hard computing approach used in existing genetic algorithm. Generated rule can detect attack with more efficiency. This model was verified using KDD'99 data set. Empirical result clearly shows the higher detection rates and low false positive rates.
入侵检测是维护信息完整性的重要安全约束之一。过去已经采用了各种方法,但这些方法对遏制入侵的威胁效果较差。本文的目的是提供一个入侵检测系统(IDS),通过修改遗传算法来实现网络入侵检测系统。由于我们在信息增益的基础上应用了属性子集约简。从而大大降低了训练时间和复杂度。此外,我们在规则生成中嵌入了软计算方法,使规则生成比现有遗传算法中使用的硬计算方法更高效。生成的规则可以更有效地检测攻击。利用KDD'99数据集对该模型进行了验证。实证结果清楚地显示出较高的检出率和较低的假阳性率。
{"title":"Improved Genetic Algorithm for Intrusion Detection System","authors":"Dheeraj Pal, A. Parashar","doi":"10.1109/CICN.2014.178","DOIUrl":"https://doi.org/10.1109/CICN.2014.178","url":null,"abstract":"Intrusion detection is one of the important security constraints for maintaining the integrity of information. Various approaches have been applied in past that are less effective to curb the menace of intrusion. The purpose of this paper is to provide an intrusion detection system (IDS), by modifying the genetic algorithm to network intrusion detection system. As we have applied attribute subset reduction on the basis of Information gain. So the training time and complexity reduced considerably. Moreover, we embedded a soft computing approach in rule generation makes the rule more efficient than hard computing approach used in existing genetic algorithm. Generated rule can detect attack with more efficiency. This model was verified using KDD'99 data set. Empirical result clearly shows the higher detection rates and low false positive rates.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"157 1","pages":"835-839"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77558032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Structured Signature Scheme for Efficient Dissemination of Tree Structured Data 树形结构数据有效传播的结构化签名方案
V. Waghmare, R. Thool
The web is becoming the main information dissemination means for many organizations. Web documents may have a nested or hierarchical, inter-linked structure. XML is hierarchical organization of data. It requires different confidentiality and integrity for different portions of same document. Data that a consumer is not authorized to access but belongs to complete data set is extraneous data. Flow of extraneous data to a consumer may leak information, even when data is encrypted. Therefore, data sharing among multiple parties require selective and secure dissemination data without any leakage of information. This paper proposes an approach for to solve the problem of different data representation secure and making the data available in efficient manner using structural properties of hierarchical data model and multicast topology. The multicast topology is built dynamically and asynchronously using Publish - Subscribe System.
网络正在成为许多组织的主要信息传播手段。Web文档可能具有嵌套的或分层的、相互链接的结构。XML是数据的分层组织。它要求同一文档的不同部分具有不同的机密性和完整性。消费者未被授权访问但属于完整数据集的数据是无关数据。流向消费者的无关数据可能会泄露信息,即使数据是加密的。因此,多方之间的数据共享要求有选择地、安全地传播数据,不泄露任何信息。本文提出了一种利用分层数据模型和组播拓扑的结构特性来解决不同数据表示安全问题,并使数据高效可用的方法。采用发布-订阅系统动态异步构建多播拓扑结构。
{"title":"Structured Signature Scheme for Efficient Dissemination of Tree Structured Data","authors":"V. Waghmare, R. Thool","doi":"10.1109/CICN.2014.186","DOIUrl":"https://doi.org/10.1109/CICN.2014.186","url":null,"abstract":"The web is becoming the main information dissemination means for many organizations. Web documents may have a nested or hierarchical, inter-linked structure. XML is hierarchical organization of data. It requires different confidentiality and integrity for different portions of same document. Data that a consumer is not authorized to access but belongs to complete data set is extraneous data. Flow of extraneous data to a consumer may leak information, even when data is encrypted. Therefore, data sharing among multiple parties require selective and secure dissemination data without any leakage of information. This paper proposes an approach for to solve the problem of different data representation secure and making the data available in efficient manner using structural properties of hierarchical data model and multicast topology. The multicast topology is built dynamically and asynchronously using Publish - Subscribe System.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"21 1","pages":"882-889"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80336406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Special Economic Zone - An Overview, Challenges, and Its Growth in India 经济特区——印度经济特区的概况、挑战及其发展
S. S. Sarangedevot, Vijendra Dhyani, Nandita Mishra
Special Economic Zones (SEZs) can be compared to their predecessors, Free Trade Zones and Export Processing Zones, in that they are intended at stimulating foreign direct investment (FDI) and fast, export-led, industrial growth. The essential characteristic of such schemes is that they allow the by-passing of particular social legislation or tax provisions which are perceived to be an impediment to progress or the competitiveness of an export-oriented activity. A brainchild of the Ministry of Commerce and Industry (MOCI), the SEZ Act that was passed in 2005 goes much further than previous policies as it seeks to establish a large number of private industrial townships, each covering hundreds or thousands of hectares of land. According to the MOCI, as of February 2010, formal approval has been accorded by states to 571 proposals out of which 348 SEZs have been notified. A total of 105 SEZs are already exporting. The 571 approved proposals are for SEZs sponsored by State governments and are in addition to seven Central Government SEZs and 12 State/private sector SEZs that were set up prior to the enactment of SEZ Act, 2005 (MOCI, 2010). These 571 approved SEZs represent a total of 67680 hectares. Despite the huge rate of approval and establishment of SEZs, and thus their apparent success, the development of SEZs has faced considerable opposition and is stalling in some cases. In this research paper Authors have tried to analyze the growth of SEZ in various regions of India. This paper examines some of the contentious aspects of the growth of SEZs that pose major challenges to India's public policy and governance.
经济特区(SEZs)可以与它们的前身自由贸易区和出口加工区进行比较,因为它们旨在刺激外国直接投资(FDI)和出口导向型的快速工业增长。这种计划的基本特点是,它们允许绕过被认为是阻碍进步或面向出口的活动的竞争力的特定社会立法或税收规定。2005年通过的《经济特区法案》(SEZ Act)是商工部(MOCI)的一个创意,它比以前的政策走得更远,因为它寻求建立大量的私人工业城镇,每个城镇占地数百或数千公顷。根据商务部的数据,截至2010年2月,各国已正式批准了571个提案,其中348个经济特区已得到通知。共有105个经济特区已经开始出口。批准的571个经济特区提案是针对州政府赞助的经济特区,是在2005年《经济特区法》颁布之前建立的7个中央政府经济特区和12个国家/私营部门经济特区之外的(商务部,2010年)。这571个经批准的经济特区总面积为67680公顷。尽管经济特区的批准和建立率很高,因此取得了明显的成功,但经济特区的发展面临着相当大的反对,在某些情况下甚至停滞不前。在这篇研究论文中,作者试图分析印度不同地区经济特区的增长。本文探讨了经济特区发展的一些有争议的方面,这些方面对印度的公共政策和治理构成了重大挑战。
{"title":"Special Economic Zone - An Overview, Challenges, and Its Growth in India","authors":"S. S. Sarangedevot, Vijendra Dhyani, Nandita Mishra","doi":"10.1109/CICN.2014.132","DOIUrl":"https://doi.org/10.1109/CICN.2014.132","url":null,"abstract":"Special Economic Zones (SEZs) can be compared to their predecessors, Free Trade Zones and Export Processing Zones, in that they are intended at stimulating foreign direct investment (FDI) and fast, export-led, industrial growth. The essential characteristic of such schemes is that they allow the by-passing of particular social legislation or tax provisions which are perceived to be an impediment to progress or the competitiveness of an export-oriented activity. A brainchild of the Ministry of Commerce and Industry (MOCI), the SEZ Act that was passed in 2005 goes much further than previous policies as it seeks to establish a large number of private industrial townships, each covering hundreds or thousands of hectares of land. According to the MOCI, as of February 2010, formal approval has been accorded by states to 571 proposals out of which 348 SEZs have been notified. A total of 105 SEZs are already exporting. The 571 approved proposals are for SEZs sponsored by State governments and are in addition to seven Central Government SEZs and 12 State/private sector SEZs that were set up prior to the enactment of SEZ Act, 2005 (MOCI, 2010). These 571 approved SEZs represent a total of 67680 hectares. Despite the huge rate of approval and establishment of SEZs, and thus their apparent success, the development of SEZs has faced considerable opposition and is stalling in some cases. In this research paper Authors have tried to analyze the growth of SEZ in various regions of India. This paper examines some of the contentious aspects of the growth of SEZs that pose major challenges to India's public policy and governance.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"1 1","pages":"585-588"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82903818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Proposal of Snubber Circuit to Reduce Problem of Collapsing in BJT due to Overrating 缓冲电路的提出,以减少BJT因高估而崩溃的问题
Keerti Vyas, G. Jain, V. Maurya, A. Raman
The effect on transistors when maximum collector-emitter voltage under condition base is open (vceo), maximum collector-base voltage under condition emitter is open (vcbo), maximum collector-emitter voltage under condition base is shortened (vces) and maximum collector-base voltage under condition emitter is shortened (vcbs) ratings are got exceeded in two circuits are studied by visual analysis, x-ray examination, electrical examination and microscopic examination. This study helps in increasing the reliability of transistor used in all modern electronic equipments. We have proposed here for the implementation of snubber circuit to reduce the problem mentioned above. The results of visual analysis, electrical examination and microscopic examinations is shown in the form of pictures. Our proposal can be implemented in many house appliances, as common people are generally not aware of this fact of transistor ratings so the accidents due to unawareness can be prevented.
采用目视分析、x射线检查、电学检查和显微检查等方法,研究了两种电路中基极最大开路电压(vceo)、基极最大开路电压(vcbo)、基极最大短路电压(vces)和基极最大短路电压(vcbs)超过额定值时对晶体管性能的影响。这项研究有助于提高晶体管在现代电子设备中的可靠性。我们在此建议采用缓冲电路来减少上述问题。目视分析、电学检查和显微检查的结果以图片的形式显示。我们的建议可以在许多家用电器中实施,因为普通人通常不知道晶体管额定值的这一事实,因此可以防止由于不知道而导致的事故。
{"title":"Proposal of Snubber Circuit to Reduce Problem of Collapsing in BJT due to Overrating","authors":"Keerti Vyas, G. Jain, V. Maurya, A. Raman","doi":"10.1109/CICN.2014.208","DOIUrl":"https://doi.org/10.1109/CICN.2014.208","url":null,"abstract":"The effect on transistors when maximum collector-emitter voltage under condition base is open (vceo), maximum collector-base voltage under condition emitter is open (vcbo), maximum collector-emitter voltage under condition base is shortened (vces) and maximum collector-base voltage under condition emitter is shortened (vcbs) ratings are got exceeded in two circuits are studied by visual analysis, x-ray examination, electrical examination and microscopic examination. This study helps in increasing the reliability of transistor used in all modern electronic equipments. We have proposed here for the implementation of snubber circuit to reduce the problem mentioned above. The results of visual analysis, electrical examination and microscopic examinations is shown in the form of pictures. Our proposal can be implemented in many house appliances, as common people are generally not aware of this fact of transistor ratings so the accidents due to unawareness can be prevented.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"36 1","pages":"989-993"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81344123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2014 International Conference on Computational Intelligence and Communication Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1