Free Essay

Research Paper Format Ieee

In: Science

Submitted By Jindal3107
Words 1776
Pages 8
Research Paper Template for A4 Page Size

J.Q. Author
M.Tech. Student
Centre for Computer Science & Technology
Central University of Punjab, Bathinda (Punjab).

Abstract— This document gives formatting instructions for authors preparing papers for publication in the proceedings of CAMA. The authors must follow the instructions given in the document for the papers to be published. You can use this document as both an instruction set and as a template into which you can type your own text.

Keywords— Include at least 5 keywords or phrases

I. Introduction This document is a template. An electronic copy can be downloaded from the conference website. For questions on paper guidelines, please contact the conference publications committee as indicated on the conference website. Information about final paper submission is available from the conference website.

II. Page Layout An easy way to comply with the conference paper formatting requirements is to use this document as a template and simply type your text into it.

A. Page Layout Your paper must use a page size corresponding to A4 which is 210mm (8.27") wide and 297mm (11.69") long. The margins must be set as follows: • Top = 19mm (0.75") • Bottom = 43mm (1.69") • Left = Right = 14.32mm (0.56") Your paper must be in two column format with a space of 4.22mm (0.17") between columns.

III. Page Style All paragraphs must be indented. All paragraphs must be justified, i.e. both left-justified and right-justified.

A. Text Font of Entire Document The entire document should be in Times New Roman or Times font. Type 3 fonts must not be used. Other font types may be used if needed for special purposes. Recommended font sizes are shown in Table 1.

B. Title and Author Details Title must be in 24 pt Regular font. Author name must be in 11 pt Regular font. Author affiliation must be in 10 pt Italic. Email address must be in 9 pt Courier Regular font.

Font Sizes for Papers

|Font |Appearance (in Time New Roman or Times) |
|Size | |
| |Regular |Bold |Italic |
|8 |Table caption (in Small | |Reference item |
| |Caps), | |(partial) |
| |Figure caption, | | |
| |Reference item | | |
|9 |Author email address (in |Abstract body |Abstract heading (also |
| |Courier), | |in Bold) |
| |Cell in a table | | |
|10 |Level-1 heading (in Small| |Level-2 heading, |
| |Caps), | |Level-3 heading, |
| |Paragraph | |Author affiliation |
|12 |Author name | | |
|24 |Title | | |

All title and author details must be in single-column format and must be centered. Every word in a title must be capitalized except for short minor words such as “a”, “an”, “and”, “as”, “at”, “by”, “for”, “from”, “if”, “in”, “into”, “on”, “or”, “of”, “the”, “to”, “with”. Author details must not show any professional title (e.g. Managing Director), any academic title (e.g. Dr.) or any membership of any professional organization (e.g. Senior Member IEEE). To avoid confusion, the family name must be written as the last part of each author name (e.g. John A.K. Smith). Each affiliation must include, at the very least, the name of the company and the name of the country where the author is based (e.g. Causal Productions Pty Ltd, Australia). Email address is compulsory for the corresponding author.

C. Section Headings No more than 3 levels of headings should be used. All headings must be in 10pt font. Every word in a heading must be capitalized except for short minor words as listed in Section III-B.

Level-1 Heading: A level-1 heading must be in Small Caps, centered and numbered using uppercase Roman numerals. For example, see heading “III. Page Style” of this document. The two level-1 headings which must not be numbered are “Acknowledgment” and “References”.

Level-2 Heading: A level-2 heading must be in Italic, left-justified and numbered using an uppercase alphabetic letter followed by a period. For example, see heading “C. Section Headings” above.

Level-3 Heading: A level-3 heading must be indented, in Italic and numbered with an Arabic numeral followed by a right parenthesis. The level-3 heading must end with a colon. The body of the level-3 section immediately follows the level-3 heading in the same paragraph. For example, this paragraph begins with a level-3 heading.

B. Figures and Tables Figures and tables must be centered in the column. Large figures and tables may span across both columns. Any table or figure that takes up more than 1 column width must be positioned either at the top or at the bottom of the page. Graphics may be full color. All colors will be retained on the CDROM. Graphics must not use stipple fill patterns because they may not be reproduced properly. Please use only SOLID FILL colors which contrast well both on screen and on a black-and-white hardcopy, as shown in Fig. 1.


Fig. 1 A sample line graph using colors which contrast well both on screen and on a black-and-white hardcopy

Fig. 2 shows an example of a low-resolution image which would not be acceptable, whereas Fig. 3 shows an example of an image with adequate resolution. Check that the resolution is adequate to reveal the important detail in the figure. Please check all figures in your paper both on screen and on a black-and-white hardcopy. When you check your paper on a black-and-white hardcopy, please ensure that: • the colors used in each figure contrast well, • the image used in each figure is clear, • all text labels in each figure are legible.

A. Figure Captions Figures must be numbered using Arabic numerals. Figure captions must be in 8 pt Regular font. Captions of a single line (e.g. Fig. 2) must be centered whereas multi-line captions must be justified (e.g. Fig. 1). Captions with figure numbers must be placed after their associated figures, as shown in Fig. 1.

Fig. 2 Example of an unacceptable low-resolution image


Fig. 3 Example of an image with acceptable resolution

B. Table Captions Tables must be numbered using uppercase Roman numerals. Table captions must be centred and in 8 pt Regular font with Small Caps. Every word in a table caption must be capitalized except for short minor words as listed in Section III-B. Captions with table numbers must be placed before their associated tables, as shown in Table 1.

C. Page Numbers, Headers and Footers Page numbers, headers and footers must not be used.

D. Links and Bookmarks All hypertext links and section bookmarks will be removed from papers during the processing of papers for publication. If you need to refer to an Internet email address or URL in your paper, you must type out the address or URL fully in Regular font.

E. References The heading of the References section must not be numbered. All reference items must be in 8 pt font. Please use Regular and Italic styles to distinguish different fields as shown in the References section. Number the reference items consecutively in square brackets (e.g. [1]). When referring to a reference item, please simply use the reference number, as in [2]. Do not use “Ref. [3]” or “Reference [3]” except at the beginning of a sentence, e.g. “Reference [3] shows …”. Multiple references are each numbered with separate brackets (e.g. [2], [3], [4]–[6]). Examples of reference items of different categories shown in the References section include: • example of a book in [1] • example of a book in a series in [2] • example of a journal article in [3] • example of a conference paper in [4] • example of a patent in [5] • example of a website in [6] • example of a web page in [7] • example of a databook as a manual in [8] • example of a datasheet in [9] • example of a master’s thesis in [10] • example of a technical report in [11] • example of a standard in [12]

IV. Conclusions The version of this template is V2. Most of the formatting instructions in this document have been compiled by Causal Productions from the IEEE LaTeX style files. Causal Productions offers both A4 templates and US Letter templates for LaTeX and Microsoft Word. The LaTeX templates depend on the official IEEEtran.cls and IEEEtran.bst files, whereas the Microsoft Word templates are self-contained. Causal Productions has used its best efforts to ensure that the templates have the same appearance. Causal Productions permits the distribution and revision of these templates on the condition that Causal Productions is credited in the revised template as follows: “original version of this template was provided by courtesy of Causal Productions (”.

Acknowledgment The heading of the Acknowledgment section and the References section must not be numbered. Causal Productions wishes to acknowledge Michael Shell and other contributors for developing and maintaining the IEEE LaTeX style files which have been used in the preparation of this template. To see the list of contributors, please refer to the top of file IEEETran.cls in the IEEE LaTeX distribution.

1] S. M. Metev and V. P. Veiko, Laser Assisted Microtechnology, 2nd ed., R. M. Osgood, Jr., Ed. Berlin, Germany: Springer-Verlag, 1998.
2] J. Breckling, Ed., The Analysis of Directional Time Series: Applications to Wind Speed and Direction, ser. Lecture Notes in Statistics. Berlin, Germany: Springer, 1989, vol. 61.
3] S. Zhang, C. Zhu, J. K. O. Sin, and P. K. T. Mok, “A novel ultrathin elevated channel low-temperature poly-Si TFT,” IEEE Electron Device Lett., vol. 20, pp. 569–571, Nov. 1999.
4] M. Wegmuller, J. P. von der Weid, P. Oberson, and N. Gisin, “High resolution fiber distributed measurements with coherent OFDR,” in Proc. ECOC’00, 2000, paper 11.3.4, p. 109.
5] R. E. Sorace, V. S. Reinhardt, and S. A. Vaughn, “High-speed digital-to-RF converter,” U.S. Patent 5 668 842, Sept. 16, 1997.
6] (2002) The IEEE website. [Online]. Available:
7] M. Shell. (2002) IEEEtran homepage on CTAN. [Online]. Available:
8] FLEXChip Signal Processor (MC68175/D), Motorola, 1996.
9] “PDCA12-70 data sheet,” Opto Speed SA, Mezzovico, Switzerland.
10] A. Karnik, “Performance of TCP congestion control with rate feedback: TCP/ABR and rate adaptive TCP/IP,” M. Eng. thesis, Indian Institute of Science, Bangalore, India, Jan. 1999.
11] J. Padhye, V. Firoiu, and D. Towsley, “A stochastic model of TCP Reno congestion avoidance and control,” Univ. of Massachusetts, Amherst, MA, CMPSCI Tech. Rep. 99-02, 1999.
12] Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification, IEEE Std. 802.11, 1997.

Similar Documents

Premium Essay


...DATABASE DESIGN Research Paper You are to write a research paper about an approved topic in the field of Information Technology (IT) Management, preferably in the area of Database Systems. The topic must be of current interest to the IT professionals. The deadline for the topic approval is September 20. You must turn into me one page (single-spaced) ‘Abstract’ of your paper by that date. A partial list of journals which publish articles pertaining to the IT area is attached. These publications are some of the source for your research work. Your paper must be between 12 and 15 pages of typed, doubled-spaced text, not including your references and any appendices or attachment. Plagiarism will result in a grade of zero. Your research paper is due on November 29. It will be graded according to the criteria on the attached page Suggested Structure of Research Paper Abstract: Half-page (single spaced) summary of the paper I. Introduction: - Problem Background -Problem Importance - Purpose and contents of this paper i. Target audience of the paper ii. Overall objective iii. Within the overall objective, the specific issues or question addressed in the paper iv. A precise statement of the content of the paper v. Scope and limitation of the paper vi. Usefulness of the paper - How would the target......

Words: 1103 - Pages: 5

Free Essay


...same definition) within the body of text. 2. Table of Contents: The table of contents should not be numbered and the contents must start from page number 1. Any page(s) before table of contents should be numbered in Roman. The page numbers should match correctly to the actual contents in the final version of the report. Heading up to third level may be included in the table of contents. 3. List of Figures: All the figures used in report are mentioned here according to their page numbers 4. List of Tables: All the tables used in report are mentioned here according to their page numbers 5. List of acronyms: All the abbreviations and acronyms used in the report are listed here. 6. Introduction: 7. Research work: 8. Conclusion: 9. References: In‐Text Citations References to other sources should be numbered sequentially by order of mention in the text, with the number placed in brackets and the end of the sentence and printed on line (not as a superscript) like [1]. In‐text citations should appear at end of the clause/sentence. Multiple in‐text citations should appear as [1], [2] or [1]–[3] and should appear in chronological order as [4], [17], [34], [35]. Direct quotes that will occupy less than 3 lines when typeset should be inside double quotation marks, with page number of quoted material listed after source number (like [1, p. 321]). Direct quotes occupying more than 3 lines (4 and plus) should be......

Words: 1637 - Pages: 7

Premium Essay

Motion Vector

...International Journal of Engineering Trends and Technology- Volume3Issue3- 2012 Hiding Messages Using Motion Vector Technique In Video Steganography P.Paulpandi1, Dr.T.Meyyappan,,M.Phil.,M.BA.,Ph.D2 Research Scholar1, Associate professor2 Department of Computer Science & Engineering, Alagappa University,Karaikudi. Tamil Nadu,India. Abstract- Steganography is the art of hiding information in ways that avert the revealing of hiding messages.Video files are generally a collection of images. so most of the presented techniques on images and audio can be applied to video files too. The great advantages of video are the large amount of data that can be hidden inside and the fact that it is a moving stream of image. In this paper, we proposed a new technique using the motion vector, to hide the data in the moving objects. Moreover, to enhance the security of the data, the data is encrypted by using the AES algorithm and then hided. The data is hided in the horizontal and the vertical components of the moving objects. The PSNR value is calculated so that the quality of the video after the data hiding is evaluated. Keywords- Data hiding, Video Steganography,PSNR, Moving objects, AES Algorithm. I. INTRODUCTION Since the rise of the Internet one of the most important factors of information technology and communication has been the security of information. Steganography is a technology that hides a user defined information within an object, a text...

Words: 2564 - Pages: 11

Free Essay

Cloud Computing

...UNIVERSITY OF SUNderland Department OF COMPUTING, Engineering AND TECHNOLOGY |MODULE CODE: |CITM03 | |MODULE TITLE: |Electronic Commerce | |MODULE ASSESSOR: |Albert Bokma | |ASSESSMENT: |1 of 2 | |TITLE OF ASSESSMENT: |The Challenges of Cloud Computing for Enterprises | |MODERATED: |February 2011 | | |(pending) | PLEASE READ ALL INSTRUCTIONS AND INFORMATION CAREFULLY. This assignment contributes 50% to your final module mark. Please ensure that you retain a duplicate of your assignment. We are required to send samples of student work to the external examiners for moderation purposes. It will also safeguard in the unlikely event of your work going astray. THE FOLLOWING LEARNING OUTCOMES WILL BE ASSESSED: | |Knowledge of: ...

Words: 1656 - Pages: 7

Free Essay

Spech Recog

...important distinguishable features of speech signal for recognition task. In this paper Linear predictive coding (LPC), Mel-frequency cepstral coefficients (MFCC), Perceptual linear prediction coefficients (PLP) along with a hybrid feature Bark Frequency Cepstral Coefficients (BFCC) is used for language Identification. Bark Frequency Cepstral Coefficients (BFCC) and Revised Perceptual Linear Prediction Coefficients (RPLP) were obtained from combination of MFCC and PLP. Two different classifiers, Vector Quantization (VQ) with Dynamic Time Warping (DTW) and Gaussian Mixture Model (GMM) were used for classification. The experiment shows better identification rate using hybrid feature extraction techniques compared to conventional feature extraction methods. BFCC has shown better performance than MFCC with both classifiers. RPLP along with GMM has shown best identification performance among all feature extraction techniques. Key words—Linear Predictive Coding(LPC), Perceptual Linear Prediction(PLP), Revised Perceptual Linear Prediction(RPLP), Bark Frequency Cepstral Coefficient (BFCC), Mel Frequency Cepstral Coefficient(MFCC), Vector Quantization(VQ), Gaussian Mixture Model(GMM), Dynamic Time Warping (DTW), Hidden Markov Model(HMM). Introduction:- Speech is the predominant mode of human communication. Though much of the knowledge that is passed from generation to generation is in written format, still speech is the preferred mode for everyday interaction. It is natural to......

Words: 1009 - Pages: 5

Free Essay

Overview in Phasor Measurement Units

.........................................3 1.0 Introduction .............................................................................................................................4 2.0 History…………………….................................................................................................................5 3.0 Measurement Techniques .......................................................................................................6 4.0. Phasor Measurement Units.....................................................................................................8 4.1. Standards……………………………………………………............................................................10 4.1.1. COMTRADE Standard - IEEE C37.111……………………………………………………….11 4.1.2. Synchrophasor Standard -IEEE C37.118…………………………………………………..11 5.0. Optimization - Spreading and Placements.............................................................................12 5.1. Applications - State Estimation .................................................................................13 5.2 Applications - Control and Protection.........................................................................14 6.0. Conclusions............................................................................................................................16 References……………………………………………………………………………………………………………………………….17 ABSTRACT Phasor Measurement Unit (PMU) is an emerging technology in Electric Power Systems which has many...

Words: 3042 - Pages: 13

Premium Essay

Virtual Lan ABSTRACT IEEE 802.17 Resilient Packet Ring (RPR) is a promising new technology that was standardized to meet the needs of telecommunications network providers and enterprise data networks. RPR allows substantial reuse of the valuable existing telecommunications infrastructure, while also allowing a greatly simplified means of aggregating packetized data from many customers into the provider’s access and metro networks. The RPR fairness protocol and algorithm insures fair medium access among an RPR’s users. RPR also provides the high reliability that has become increasingly important for enterprise network users. This paper reviews the key aspects of RPR, including medium access control and its fairness mechanism, physical layer options, protection/restoration options, and bridging and routing within and across an RPR. INTRODUCTION The increasing importance and bandwidth demands of enterprise networks in the 1990s generated the desire for a new metropolitan area network (MAN) and wide area network (WAN) protocol. From a data network perspective, the existing protocols lacked a fast, simple Layer 1 mechanism to recover from network faults. From a telecommunications network perspective, it was critical to have a network access technique that would allow maximum re-use of the existing SONET/SDH network infrastructure. These needs were the primary drivers behind the development of the Resilient Packet Ring (RPR) protocol in IEEE 802.17, which......

Words: 7303 - Pages: 30

Premium Essay

Vidoe Mining

...University of Texas at Arlington, USA JeongKyu Lee University of Texas at Arlington, USA Sae Hwang University of Texas at Arlington, USA 8 INTRODUCTION Data mining, which is defined as the process of extracting previously unknown knowledge and detecting interesting patterns from a massive set of data, has been an active research area. As a result, several commercial products and research prototypes are available nowadays. However, most of these studies have focused on corporate data — typically in an alpha-numeric database, and relatively less work has been pursued for the mining of multimedia data (Zaïane, Han, & Zhu, 2000). Digital multimedia differs from previous forms of combined media in that the bits representing texts, images, audios, and videos can be treated as data by computer programs (Simoff, Djeraba, & Zaïane, 2002). One facet of these diverse data in terms of underlying models and formats is that they are synchronized and integrated hence, can be treated as integrated data records. The collection of such integral data records constitutes a multimedia data set. The challenge of extracting meaningful patterns from such data sets has lead to research and development in the area of multimedia data mining. This is a challenging field due to the non-structured nature of multimedia data. Such ubiquitous data is required in many applications such as financial, medical, advertising and Command, Control, Communications and Intelligence (C3I) (Thuraisingham,......

Words: 3477 - Pages: 14

Premium Essay


...Name, City, Country, Abstract These short guidelines illustrate the formatting of the DELTA Symposium paper and provide a template for each of the components. Included are layout information (margins etc), font and paragraphs, etc. Styles are supplied in the Word version of the template. Keywords: format, layout, fonts, tables, figures, references Introduction Authors are responsible for the quality of their paper and are kindly requested to strictly observe the following guidelines for the preparation and delivery of their camera-ready manuscripts. This will ensure that the proceedings has a consistent look from one paper to the next. We would ask you to assist us by following this template. Papers that do not adhere to these instructions may not be published. All submissions should be made electronically through the DELTA website In submitting an abstract the authors agree that, upon acceptance, they will prepare the final manuscript in time for the inclusion into the formal IEEE Computer Society published proceedings, and will present the paper at the Workshop. Final manuscripts will not be published without advance registration. Manuscripts will be peer-reviewed by the Program Committee. While the paper may contain colour illustrations and images, it should be noted that the printed proceedings will be in black and white. It is the authors’ responsibility to......

Words: 2724 - Pages: 11

Free Essay

Optical Character Recognition

...and challenging research areas in the field of Image processing. English character recognition has been extensively studied in the last half century. Nowadays different methodologies are in widespread use for character recognition. Document verification, digital library, reading bank deposit slips, reading postal addresses, extracting information from cheques, data entry, applications for credit cards, health insurance, loans, tax forms etc. are application areas of digital document processing. This paper gives an overview of research work carried out for recognition of hand written English letters. In Hand written text there is no constraint on the writing style. Hand written letters are difficult to recognize due to diverse human handwriting style, variation in angle, size and shape of letters. Various approaches of hand written character recognition are discussed here along with their performance. Fig 1.Major Steps of an OCR System Index Terms— Offline Hand written Character Recognition, Pre-Processing, Feature Extraction, Classification, Post Processing. I. INTRODUCTION Optical Character Recognition (OCR) is one of the most fascinating and challenging areas of pattern recognition with various practical applications. It can contribute immensely to the advancement of an automation process and can improve the interface between man and machine. It is the mechanism to convert machine printed, hand printed or hand written document file into editable text format. Typically,......

Words: 2982 - Pages: 12

Free Essay

Steganography: a Review of Information Security Research and Development in Muslim World

...Steganography: A Review of Information Security Research and Development in Muslim World Abstract Conveying secret information and establishing hidden relationship has been a great interest since long time ago. Therefore, there are a lot of methods that have been widely used since long past. This paper reviewed one of the methods for establishing hidden communication in information security and has gained attraction in recent years that is Steganography. Steganography is the art and science of hiding a secret message in a cover media such as image, text, signals or sound in such a way that no one, except the intended recipient knows the existence of the data. In this paper, the research and development of steganography from three years back starting from 2010 until recently, 2013 in Muslim world are reviewed. The future research in the field of Steganography is briefly discussed. Keywords Cover Image, Stego Image, Cryptography, Steganography, Information Hiding, Information Security, Muslim World 1 Introduction In today’s information technology era, the internet has played a vital part in the communication and information sharing. Due to the rapid development in Information Technology and Communication and the Internet, the security of the data and the information has raised concerned. Every day, confidential data has been compromised and unauthorized access of data has crossed the limits. Great measures should be taken to protect the data and information [5,...

Words: 3746 - Pages: 15

Free Essay

A Comparative Study of Cognitive Radio Platforms

...Scientific and Industrial Research (CSIR) Pretoria 0001, South Africa ABSTRACT Cognitive radio (CR) technology has become one of the buzzwords within the wireless communications community over the past 12 years. Its ability to learn, decide and adapt to the external environment made CR attractive to regulators, researchers, academia, politicians and the industry. CR promises to bring a paradigm shift in spectrum management policies from command-and-control regime to dynamic and opportunistic spectrum access. Despite more than a decade of research in the CR area, there are too little CR systems ready for the market. This lack of ready CR systems may reflect an overemphasis in the CR literature on theory and simulations with less work done in experimental-basedresearch and publications. In order to fast-track the real-life deployments of CR systems, the research community is now focusing on the development of CR platforms. With different software defined radio (SDR) packages and hardware available, it is confusing to decide which one to build or use. The objective of this paper is to study the design of CR platforms making use available SDR software packages and hardware. Our conclusion is that CR research should now focus on experimental-based results using real-life CR platforms in order to realize market-ready CR systems. Cognitive radio (CR) technology has become one of the hot research topics in wireless......

Words: 4120 - Pages: 17

Premium Essay

Work Life Balance

...of Computer Science ___________________________________ , Dean, College of Arts and Sciences TABLE OF CONTENTS LIST OF FIGURES II LIST OF TABLES II DEDICATION II ACKNOWLEDGEMENTS II CHAPTER 1 INTRODUCTION ERROR! BOOKMARK NOT DEFINED. 1.1 Problem Description and Motivation Error! Bookmark not defined. 1.2 Research Hypothesis and Questions Error! Bookmark not defined. 1.3 Research Contributions Error! Bookmark not defined. 1.4 Organization of the Dissertation Error! Bookmark not defined. 1.5 Bibliographical Notes Error! Bookmark not defined. CHAPTER 2 COLLEGE STYLE GUIDE 2 2.1 Style Guide and Instructions for Thesis and Dissertation 2 2.1.1 Reasons for Regulations 2 2.1.2 Responsibilities 2 2.1.3 Approval 2 2.1.4 Paper 2 2.1.5 Copies and Binding 2 2.1.6 Font Styles 2 2.1.7 Margins 2 2.1.8 Spacing 2 2.1.9 Pagination 2 2.1.10 Front Matter 2 2.1.11 Figures 2 2.1.12 Tables 2 2.1.13 Footnotes 2 2.1.14 Appendices 2 2.1.15 Bibliographies/References 2 2.1.16 Abstracts 2 2.1.17 Publication Requirement for Doctoral Dissertation 2 2.2 Some Examples of tables and figures. Error! Bookmark not defined. CHAPTER 3 CONCLUSIONS AND FUTURE RESEARCH 2 3.1 Main Results Error! Bookmark...

Words: 4363 - Pages: 18

Free Essay

Techical Writing

...Technical Vs Casual Writing Technical writing includes essays, papers, M.A. and Ph.D. theses, and report writing for grants and research. It is highly structured with suggestions for margin lengths, paragraph headings, research and above all a research study with experimental data, and a particular format. Whereas Casual writing has no specific rules to follow except to communicate with another person or group of people. Examples of casual writing would class notes, memos, friendly letters, diaries, and post-it notes, chatting and messaging etc. The finished paper has to be re-read in order to eliminate grammatical or typing errors, as these form part of the grading process in technical writing whereas the casual writer is free write its imagination and write as he or she would speak, without having to stick to a particular format. Sentences are mostly short and direct, with no further explanation needed. We frequently use emoticons, slang words etc while casual writing which sometimes can annoy reader or the message is not clear. Technical writing has advantage over it that the message is concise, understandable, and time saving. In casual writing there may be grammatical mistakes which lead to misunderstanding as compared to technical writing. But in my opinion writing casually is more easy and fun. You can write whatever you want to without tension of maintaining the structure and format of writing. An example of both is: Technical writing: This is to inform you that...

Words: 947 - Pages: 4

Premium Essay

Various Accident Detection Technologies and Recovery Systems with Victim Analysis Ieee

...VARIOUS ACCIDENT DETECTION TECHNOLOGIES AND RECOVERY SYSTEMS WITH VICTIM ANALYSIS Presented By Ch. Ramya Keerthi1, G. Shanmukh 2, Dr. R. Sivaram 3 1. B.Tech Student ,Dept. of ECE, St. Mary’s Women’s Engineering College 2. B.Tech Student, Dept. of ECE, Acharya Nagarjuna University 3. Principal, St. Mary’s Women’s Engineering College Paper ID: ICCSIE202013 The World Academy of Research in Science and Engineering International Conference on Computer Science and Information Engineering (ICCSIE 2013) May 24, 2013, Venue: Solitaire Hotel, Bangalore, India CONTENTS MOTIVATION CONCLUSION OUR ADD-ON OUTLINE OF APPROACH INTRODUCTION LETS SOLVE THE PROBLEM APPROACH TO PROBLEM MOTIVATION Increase in Death Ratio due to Accidents Unable to Know the Victims Condition Unable to provide assistance in unpopulated areas INTRODUCTION Cont.. INTRODUCTION Indian roads alone accounted for approximately 105,000 accidental fatalities in 2010. Almost 15 % of the global road fatalities when India has just 1 percent of the total global vehicles. Increasing trend during the decade of 2000-2010 with an increase of 50 percent in the year 2010 as compared to the year 2000. INTRODUCTION This survey shows number of deaths due to accidents according to 2010 15409 15337 15099 14063 TAMIL NADU ANDHRA PRADESH UTTAR......

Words: 1530 - Pages: 7