The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
IEEE Students' Technology Symposium is an annual event conceptualized by IEEE Kharagpur Section and Student Branch, IIT Kharagpur. 2011 IEEE Students' Technology Symposium (IEEE TechSym 2011) is the second version of this event and is being held at the lush green and youthful campus of IIT Kharagpur, India. Conceptualized as an event for nurturing the talent of students' and young professionals, it...
This paper evaluates the development of a Low-cost security system using small PIR (Pyroelectric Infrared) sensor built around a microcontroller. The low-power PIR detectors take advantage of pyroelectricity to detect a human body that is a constant source of Passive Infrared (radiation in the infrared region). The system senses the signal generated by PIR sensor detecting the presence of individuals...
Software engineering course plays an important role for overall development of new hires in corporate training. During last few years, both academia and industry turned their attention towards integrating soft-skills in learning, while efforts are being made to bridge the knowledge, skill gap between industry requirements and what academic institutes churn out. Learners appreciate the concepts when...
The approach of constructivism is based on the philosophy that knowledge is actively constructed by the learners by using their prior knowledge. The outcome based curricula and pedagogies aligned with Bloom's cognitive levels play vital role in improving meta-cognitive thinking of the learners. Constructivism approach is being explored for the training of new hires at Mahindra Satyam. In this work,...
Packet filtering is the one of the major contemporary firewall design techniques. An important design goal is to arrive at the decision at the packet only. Implementation of such packet filter using Binary Decision Diagram (BDD) gives more advantages in terms of memory usage and look up time. In the case of the list-based packet filter firewall where rules are checked one by one for each incoming...
Debugging denotes the process of detecting root causes of unexpected observable behaviors in programs, such as a program crash, an unexpected output value being produced or an assertion violation. Debugging of program errors is a difficult task and often takes a significant amount of time in the software development life cycle. In the context of embedded software, the probability of bugs is quite...
A novel simulation technique for realistic pencil-drawn sketches is proposed. The novelty of the proposed technique lies in incorporation of a randomization factor while sketching a figure out of a set S of (irreducible) digital curve segments. The set S corresponds to a real-world object, which is actually the object to be sketched in an artistic way. The fact that an artist often uses irregular...
In recent years, there is a rapid advancement in Information and Communication Technology (ICT). However, the explosive growth of ICT and its many applications in education, health, agriculture etc. are confined to a limited number of privileged people who have both language and digital literacy. At present the repositories in Internet are mainly in English, as a consequence users unfamiliar to English...
An identity-based signature scheme allows any pair of users to communicate securely and to verify each other's signatures without exchanging public key certificates. For achieving both confidentiality and authenticity simultaneously, signcryption schemes are used. This paper puts forward a new efficient construction for signcryption scheme which is based on inverse bilinear Diffie Hellman problem...
In this paper we overview the different types of DoS attacks, present recent DoS defense methods as published in technical papers, and propose a novel approach to counter DoS. Based on common defense principles and taking into account the different types of DoS attacks, we survey defense methods and propose a simple-to-integrate DoS victim based defense method which aims at mitigating an attack's...
In this work, low-cost, portable microcontroller based electronic queue control (EQC) systems have been developed for the purpose of controlling queue in banking, hotel reservation counter, ticket counter, insurance company, customer service center etc. The aim of the designed systems is to maintain a queue with order and efficiency. Two different queue control systems have been implemented with slightly...
A closed-form model for experiment based stopping distance is developed to calculate accurately conductor loss of CPW. The present improved Holloway and Kuester model has average accuracy of 3.7% against the experimental results from different sources in the frequency range 1 GHz - 60 GHz with conductor thickness 0.25 μm - 1.58 μm. The original Holloway and Kuester model has average accuracy of 13...
A compact slow-wave microstrip rat-race coupler is presented. The present asymmetrical T-structure slow-wave loading achieves size reduction more than that obtained using traditional symmetrical T-structure along with wide range harmonic suppression performance. Lossless transmission line model is used to derive the design equations. A compact RRC occupying only 34% of the conventional RRC at 1.0...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.