Scheduled System Maintenance
On Tuesday, May 22, IEEE Xplore will undergo scheduled maintenance. Single article sales and account management will be unavailable
from 6:00am–5:00pm ET. There may be intermittent impact on performance from noon–6:00pm ET.
We apologize for the inconvenience.

2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)

20-21 May 2016

Filter Results

Displaying Results 1 - 25 of 458
  • [Front cover]

    Publication Year: 2016, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1521 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (209 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (269 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2016, Page(s):i - x
    Request permission for commercial reuse | PDF file iconPDF (1249 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2016, Page(s):1 - 18
    Request permission for commercial reuse | PDF file iconPDF (1045 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2016, Page(s):2148 - 2161
    Request permission for commercial reuse | PDF file iconPDF (1102 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2016, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (689 KB)
    Freely Available from IEEE
  • On converting discrete logarithm calculation to long division

    Publication Year: 2016, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (803 KB) | HTML iconHTML

    In this paper we define an abstract group action on the repetend integer which was obtained from the repetend of a certain fraction. The group action can explain the principle of cyclic numbers. Moreover, we propose a new method to calculate discrete logarithm based on this principle. The primary goal of this research is to establish the connection between the discrete logarithm and long division. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient technique for automated diagnosis of cardiac rhythms using electrocardiogram

    Publication Year: 2016, Page(s):5 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (870 KB) | HTML iconHTML

    Electrocardiogram (ECG) is the most reliable and low-cost diagnostic tool to evaluate the patients with cardiac arrhythmias. Manual diagnosis of arrhythmia beats is very tedious due to the nonlinear and complex nature of ECG. The current paper, describes pattern recognition and machine learning-based approach for computer-aided detection of five classes of ECG arrhythmia beats using Discrete Cosin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rules based event extraction from natural language text

    Publication Year: 2016, Page(s):9 - 13
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1139 KB) | HTML iconHTML

    The notion of events plays a crucial role in narrative texts. Events are the situations that happen or occur at a particular place and time. Extraction and representation of event has a significant role in many of the natural language text and applications like text summarization, question answering systems etc. Several methods were developed so far but they addressed the problem in domain aspect ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reduction of mutual coupling in antenna arrays using periodic structures

    Publication Year: 2016, Page(s):14 - 16
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1192 KB)

    Mutual coupling is a critical issue in antenna elements is placed in the form of array between the antenna elements. In the present work Jerusalem cross periodic structure is proposed as an effective solution for reducing mutual coupling in a micro strip array antenna with more than one element. This structures have been Applied between the patches have been Simulated and verified with practical r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient deconvolution technique by identification and estimation of blur

    Publication Year: 2016, Page(s):17 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1240 KB) | HTML iconHTML

    Distortion in images is a biggest challenge now-a-days. This affects in many areas ranging from photography to medical imaging, astronomy, remote sensing and microscopy. Images get obscured due to many reasons like vibration due to hand movement as well as launch of vehicle (Satellite), Noise in image, Adverse Image/Environment condition, and Quick movement of objects. A technique is required whic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A review paper on awareness statistics on plagiarism among research scholars

    Publication Year: 2016, Page(s):24 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (595 KB) | HTML iconHTML

    In Academia, plagiarism is considered as an academic dishonesty (crime) or violation of copyright law. Like any other crime, this academic offense should also be payable by a specific penalty. For this purpose, A self-made questionnaires have been designed and data have been collected through an online survey between 11th Sep 2015 and 24th September 2015 via the Google forms.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cloud computing based e-commerce model

    Publication Year: 2016, Page(s):27 - 30
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (927 KB)

    In recent times the role of information technology in the business enterprises has emerged with new levels of services, storage requirements, resource management and availability. As the amount of data that is available now a days is too huge for a single organization to control and manage so here putting the data on cloud can act as a savior. In this paper the advantages, various service and depl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assessment of seismic energy obtained from blast induced ground vibrations using signal processing computation techniques

    Publication Year: 2016, Page(s):31 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1715 KB) | HTML iconHTML

    Enhanced demand for coal and minerals in the country has developed an interest on the environmental problems, which may have potential harm and cause disturbance. Ground vibrations generated due to blasting operations in mines and quarries are very important environmental aspect to be looked into by the researchers. It is clear that a small amount of total explosive energy is being utilized in bla... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation and analysis of non-linear effect in WDM optical network

    Publication Year: 2016, Page(s):36 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1481 KB)

    Non-Linear effects in Optical networks are occurred due to the refractive index of the optical transmitting medium depending on the intensity of light. One of the most commonly occurred non-linear effect in optical network is the Self phase modulation (SPM) phenomenon. The impact of self-phase modulation instigates distortions to the optical signal transmission over desired configuration of spectr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of duo-binary modulation scheme in single channel on the basis of BER

    Publication Year: 2016, Page(s):40 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1365 KB) | HTML iconHTML

    The demand for high speed data transmission is increasing so as to fulfil the demand of high speed the Duo-binary modulation Format is used. Hence this paper deals with the duo binary modulation technique in the optical single channel system at different fibres lengths and data bit rate. While increasing the length and data rate of the transmitter the bit error rate changes simultaneously. The dem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NRZ vs RZ: Performance analysis of SMF with different laser sources at 10 Gbps

    Publication Year: 2016, Page(s):43 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2134 KB) | HTML iconHTML

    For the high capacity data transmission, the optical network is emerging towards the Non-Return-Zero (NRZ) and Return-Zero (RZ) modulation formats as both the techniques are cost effective. In this paper RZ and NRZ schemes are considered to analyze the fiber optic communication system at 10 Gbps with different types of lasers at different fiber length. The performance is estimated on the basis of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A trust model in cloud computing based on fuzzy logic

    Publication Year: 2016, Page(s):47 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (951 KB) | HTML iconHTML

    Trust is a vital factor, especially for service oriented systems in the area of Information Technology and Security. Several issues have been raised by enterprises and individuals concerning the reliability of the cloud resources. In cloud computing, trust helps the consumer to choose the service of a cloud provider for storing and processing their sensitive information. In this paper, a trust mod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ECG denoising using weiner filter and adaptive least mean square algorithm

    Publication Year: 2016, Page(s):53 - 57
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1192 KB)

    Electrocardiogram (ECG) is needed for health issues related to heart disease. But sometimes due to mismatches in electrodes signal becomes noisy hence, removal of these interference like noise artifacts, baseline wandering and power line interference different filter approaches has been proposed. Various filter approaches are available for removal of noise artifacts from Electrocardiogram (ECG) si... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of 4-bit ripple carry adder using SETMOS architecture

    Publication Year: 2016, Page(s):58 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1185 KB)

    Adder circuit is one of the basic building block of digital data processing circuits. Performance of a digital processing system can be improved by designing high performance adder circuit. Replacing the conventional Metal Oxide Semiconductor Field Effect Transistor (MOSFET) technology by hybrid approach of Single Electron Transistor (SET) and MOSFET technology will enhance the overall performance... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of amplify and forward technique to improve secrecy rate in multi-hop relaying system

    Publication Year: 2016, Page(s):62 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (682 KB)

    In this paper, Two cooperative techniques Amplify and Forward (AF) and Decode and Forward (DF) have been analyzed in multi-hop relay network with full duplex (FDRs) and half duplex relays (HDRs). The performance analysis has been done in terms of secrecy rate for both AF and DF. Numerical results show that AF with FDRs and HDRs improves the secrecy rate over the DF. AF technique outperforms DF by ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Haar features based handwritten character recognition system for Tulu script

    Publication Year: 2016, Page(s):65 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (837 KB) | HTML iconHTML

    Automatic recognition of handwritten characters from scanned images helps to convert characters in an image into convenient editable and readable form. Tulu is a south Indian Dravidian language with rich set of handwritten patterns. This paper presents an approach to recognize the Tulu script using automatic character recognition mechanism. The recognition of handwritten Tulu characters is based o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data mining and machine learning approaches on engineering materials — A review

    Publication Year: 2016, Page(s):69 - 73
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (845 KB) | HTML iconHTML

    This review paper explores the attempts made by the numerous authors in the field of material selection. There are ample amounts of works were carried out in the field of materials engineering with data mining approaches. From the literature it is revealed that not much of the work is explored on the classification of advanced composite materials using machine learning approaches. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Random node deployment and route establishment in receiver based routing protocol for WSNs

    Publication Year: 2016, Page(s):74 - 78
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (589 KB)

    The Wireless sensor networks (WSN) is functional in various environments namely surveillance of forest, earth quake monitoring, medical applications etc. This paper tackles with the problem of WSNs with detection of the target with dynamic considerations and random deployment of node. The proposed work explains initial environments of Energy Efficient Distributed Receiver Based Routing Protocol (E... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.