2015 International Conference on Smart Technologies and Management  for Computing, Communication, Controls, Energy and Materials (ICSTM)

Conference Information
Name: 2015 International Conference on Smart Technologies and Management  for Computing, Communication, Controls, Energy and Materials (ICSTM)
Location: Chennai, India
Date: 2015-5-6 - 2015-5-8

Latest articles from this conference

Chandesh Sayaji Ghule, M.S. Panse, Ghule Chandesh Sayaji
2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM) pp 521-525; doi:10.1109/icstm.2015.7225472

Abstract:
Automation in industries seeks measurement methods to be fast and accurate. Machine Vision makes measurements incredibly fast but accuracy is always argued upon. So, here is a novel and most simple approach for subpixel measurements; which will suffice the need for accuracy within defined limits by using local edge pixel intensities. Subpixel order of 20th was easily achieved i.e. measurements up to 20 times that of a pixel could be made. We achieved measurements up to 30 microns.
Sanjivi Muttena, R. Shiva, S. Sriram, S. Murugavalli
2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM) pp 192-197; doi:10.1109/icstm.2015.7225412

Abstract:
A reliable system which identifies the gestures of sign language is currently non-existent. Most common alternative for these speech and hearing impaired people is the utilization of an interpreter who voices out their opinions as these underprivileged people make gestures. Although there are devices such as Text to Speech Converters and Speech Generating Devices, they are restricted by their absence of speed which mostly results in prerecorded speeches being simulated rather than real time speeches. With the need for a system that processes gestures in real time for deployment in environments like auditoriums and classrooms being justified, the system under proposal hopes to achieve the same. To bring about such a system with an acceptable level of accuracy, the current proposal advocates the utilization of Microsoft Kinect, a depth sensor, introduced initially for entertainment purposes like gaming but now being deployed in large various industrial and medical applications after its game changing potential has been spotted. For identifying gestures in real time, the proposed system utilizes context specific and trigger based mapping for identifying dynamic gestures in real time.
Ravi Narkhede, Sapana Korde, Avinash Darda, Saurabh Sharma, Narkhede Ravi
2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM) pp 466-471; doi:10.1109/icstm.2015.7225462

Abstract:
Every software in modern world consists of Graphic user interface (GUI) through which it interacts with the user. The GUI is one of the most important aspects of software because it gives flexibility to software and provides ease to communicate with it. As most of the modern day's software uses GUI as its front end to communicate with the user, GUI testing [1] is considered as a critical part in any software industry. GUI testing not only has to do in software build, but it has to be done rigorously after each revision or after adding/removing any features to it [2]. This type of testing cannot be performed thoroughly as it is very time consuming and tedious work which affects cost and time for any industry. And even it is done one cannot simply depend upon result as most of the time developers are different than testers so the results are unreliable and may contain human errors. So the GUI automation testing techniques came into existence. Automated scripts are developed using GUI automation tools like UFT (QTP), TestComplete, Ranorex etc. to check GUI functionality so after creating scripts manual work is avoided. GUI testing software has developed lots of technique to test software functionality which are based on java, oracle, Delphi, WPF, Web etc., but software which is detected as windows based by the automation tool doesnt have much of methods and techniques to test as they may base on VC++ platform. This paper gives techniques to generate automated test script for windows based applications. These techniques include moving text recognition, Vertical text recognition, Import/Export in excel, simplified result techniques, SQL with datatable etc. These techniques will make very easy to automate windows based application as well as other platform application as some of the technique can use for all types of platforms. In this paper different automation tools are used to developed techniques, but major work is shown in Unified Functional Testing (UFT) previously known as Quick Test Professional (QTP). Two softwares are use for testing purpose which are based on VC++ and wpf respectively.
Abhay M. Morey, Sheetal Bhujade, Tapas Bhuiya, Samruddha Thakur, Twisha Pandey, Morey Abhay M.
2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM) pp 280-284; doi:10.1109/icstm.2015.7225428

Abstract:
MRI scanner is the most important diagnostic tool that aids in the diagnosis of diseases and offers most sensitive and non-invasive way of Imaging. The sophisticated tool helps clinician to understand the cause of patient's particular health issue. RF Surface coils are used in MRI for better signal reception as they are more sensitive to signal close to the coil, thus detecting signals from organ of interest more efficiently. Hence attempts are made in order to improve the performance of the coil with respect to its signal to noise ratio, penetration depth, Specific Absorption Rate, etc. In this paper, we have designed, simulated and fabricated the MRI surface coil for 1.5 Tesla scanner. A balun is designed to feed the unbalanced coaxial signal to a balanced coil. Return loss achieved is 21 dB and the bandwidth of the coil is 7.6 MHz. Simulation and experimental results have been compared to validate the proposed design.
Nikhil M. Mathpati, S.N. Kore, Mathpati Nikhil M.
2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM) pp 102-106; doi:10.1109/icstm.2015.7225397

Abstract:
Reversible digital watermarking is used to successfully recover the cover image as well as hidden information with minimum distortion. Reversible watermarking techniques have very sensitive application domains such medical and military fields where integrity of cover image is very important. In this paper, we are using median based predictor to predict the cover image which does not have any effect of watermark insertion. Instead of expanding prediction errors, we are using Dynamic prediction error histogram shifting to embed information. Our algorithm provides high embedding capacity with minimum distortion.
Shubhangi P. Bhat, Sunil. R. Hirekhan, Bhat Shubhangi P.
2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM) pp 392-395; doi:10.1109/icstm.2015.7225448

Abstract:
Canal automation plays an important role in water conveyance system. It provides rapid transfer of water with frequent changes, while incorporating flexibility in operation. This paper proposes a local automatic, downstream, demand-oriented canal automation system using LabVIEW. It deals with the hardware devices which sense the available water quantity, computes the amount of water discharge and operates actuators through LabVIEW based software control system for regulating the water flow. The LabVIEW software module is used which automates process control, provides better accuracy, and reduces the cost.
G. Tamilmani, K. Rajathi, P. Ponnaruvi, Tamilmani G.
2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM) pp 212-215; doi:10.1109/icstm.2015.7225416

Abstract:
The unbelievable growth and amount of information spread of social media helps the discovering of the new age result oriented recommender systems. Unfortunately the orthodoxies in the current system and the previous generation systems are structure oriented. For example rely mostly on the relativity of the network and the social demography. The investigative points discussed in this paper are generally based on the relative side of the communal factors. So the exploration leads naturally to the collaboration of the real time single directional social media dataset like twitter and the natural calamity events like cyclone, typhoons, earthquakes, Tsunami etc. The need for an interactive message application is higher than any other time because most of the countries are located at the geographically vulnerable point for earthquake invoked tsunami. So to probe such unfortunate event, there we require a vector backed machine of tweets which is based on the keyword, total no of words, etc. The location is estimated based on spatio-temporal pattern of events filtering. It will identify every user as a sensor and calculates. Whenever an earthquake occurs the report will be generated and forwarded to the user and the team of rescuers at the same time. So we can consider this as the fastest way when compared to the traditional JMA broadcast.
Sarode Harshal Vasudeo, Pravin R Patil, R. Vinoth Kumar
2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM) pp 96-101; doi:10.1109/icstm.2015.7225396

Abstract:
Computer security has become a major problem in our society. Specifically, computer network security is concerned with preventing the intrusion of an unauthorized person into a network of computers. An intrusion detection system (IDS) is a tool to monitor the network traffic and users activity with the aim of distinguishing between hostile and non-hostile traffic. Most of current networks implement Misuse detection or Anomaly detection techniques for Intrusion detection. By deploying misuse based IDS it cannot detect unknown intrusions and anomaly based IDS have high false positive rate for detection. To overcome this, proposed system uses combination of both network based and host based IDPS as Hybrid Intrusion Detection and Prevention System which will be helpful for detecting maximum attacks on networks.
Jyothi Shetty, Demian Antony D'mello, Shetty Jyothi
2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM) pp 119-125; doi:10.1109/icstm.2015.7225400

Abstract:
Cloud is a set of services and these services are provided to the users on demand. Different providers provide their services to the users through the cloud. With the exponential growth of the cloud services, it has become very difficult for the user to search a required service. Searching becomes still more difficult when user wishes to search a service using its functional properties. The cloud service discovery methods enable users to discover the cloud services based on the user demand. Cloud service discovery is considered as one of the important research areas because of different types and features of cloud providers, their own naming conventions and descriptions. The results of the discovery process can be improved by using a well defined repository. To improve the effectiveness of the discovery, cloud repository requires a good structure to represent the information regarding a cloud service. Information stored in the repository can also be used for selecting the services. In this paper we propose a representational model to store the description of infrastructure services using XML. The proposed data representational model also includes the semantic information.
Aditi Tadas, , Tadas Aditi
2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM) pp 317-320; doi:10.1109/icstm.2015.7225434

Abstract:
Vedic maths with metric number system hasbeen the source of inspiration for many centuries in the field of computation. In the current binary world of high speed processing, it is necessary to have time and space efficient methods for performing arithmetic operations. The performance of any processor solely depends upon its power, area and delay. In order to get an effective processor, its power, area and delay should be less. Hence it is necessary to develop algorithm which are suitable for binary environment of processor. All work on division methods, based on Vedic maths, is developed for number system with base of 10. The logic which may suit base 10 (decimal) number system is not suitable for base 2 (binary) number system. Very little or no light has been thrown on this aspect in many papers published on Vedic maths. Here in this paper, I am trying to compare the performance of different sutras and throw some light on how some principles can be incorporated in developing completely new division logic for base 2 number system. The logic will be much better on count of power consumption, hardware requirements, execution time and space management.
Back to Top Top