B. Neogi, Rajkumar Darbar, S. Ghosal, Achintya Das, D. Tibarewala
{"title":"Simulation approach towards eye prosthesis with clinical comparisons of original human vision capture procedure","authors":"B. Neogi, Rajkumar Darbar, S. Ghosal, Achintya Das, D. Tibarewala","doi":"10.1109/ReTIS.2011.6146865","DOIUrl":"https://doi.org/10.1109/ReTIS.2011.6146865","url":null,"abstract":"This paper is based on the glimpse of modeling of a prosthetic eye by incorporating clinical study of a human eye and by attempting a proper interfacing technique between a prosthetic or artificial eye and human brain intelligence via integrated control approaches and with the help of simulation aspects. Specific result analysis has been carried out by generating an appropriate transfer function of linear concept. After the generation of transfer function model, the simulation approach is incorporated via stability analysis for designing of the prosthetic eye. Moreover, an attempt is taken on furnishing the hardware implementation of producing an ideal prosthetic eye which tends to be a pre-innovative work in the varied field of prosthesis and artificial intelligence.","PeriodicalId":137916,"journal":{"name":"2011 International Conference on Recent Trends in Information Systems","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121737445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Banerjee, Pritthi Chattopadhyay, Rashmi Rani, B. Tudu, R. Bandyopadhyay, N. Bhattacharyya
{"title":"Discrimination of black tea using electronic nose and electronic tongue: A Bayesian classifier approach","authors":"R. Banerjee, Pritthi Chattopadhyay, Rashmi Rani, B. Tudu, R. Bandyopadhyay, N. Bhattacharyya","doi":"10.1109/ReTIS.2011.6146832","DOIUrl":"https://doi.org/10.1109/ReTIS.2011.6146832","url":null,"abstract":"Electronic nose and electronic tongue is highly acceptable in the field of food quality research as well as in different food industry which are capable of analyzing food quality like human panel taster in a more accurate way. Just like human sensing system electronic nose can discriminate food samples based on aroma and electronic tongue classifies samples based on their taste. As per human perception process to perceive the taste of food the sense of smell is equally responsible to its taste. Considering this issue, we propose a multi sensor data fusion based on Bayesian theorem which is applied to the data obtained from electronic nose and electronic tongue for classification of black tea. Numerical results show that the error in classification is reduced considerably in multivariate data fusion compared to univariate case.","PeriodicalId":137916,"journal":{"name":"2011 International Conference on Recent Trends in Information Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123430570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Grayscale digital halftoning using binary PSO","authors":"Arpitam Chatterjee, K. C. Paul, B. Tudu","doi":"10.1109/ReTIS.2011.6146871","DOIUrl":"https://doi.org/10.1109/ReTIS.2011.6146871","url":null,"abstract":"Grayscale digital halftoning is an important research area for electronic display system. This technique represents the multi-level continuous tone images with fewer available levels. Considering 0 and 1 as black and white, respectively, this can be shaped as binary image generation for grayscale reproduction. This paper presents application of binary particle swarm optimization (BPSO) towards generating eye-pleasant binary patterns. The BPSO is employed to minimize the visual cost function that addresses local tonal and structural characteristics of original multi-level image. Apart from tonal and structural match, the homogeneity in binary pixel distribution is also addressed through cost function. The results are shown pictorially and evaluated objectively against popular image quality evaluation metrics. The evaluation results show the potential of BPSO to generate high-quality halftone images.","PeriodicalId":137916,"journal":{"name":"2011 International Conference on Recent Trends in Information Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129519362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sankalp Bagaria, Shashi Prabhakar, Zia U H. Saquib
{"title":"Flexi-DNP3: Flexible distributed network protocol version 3 (DNP3) for SCADA security","authors":"Sankalp Bagaria, Shashi Prabhakar, Zia U H. Saquib","doi":"10.1109/ReTIS.2011.6146884","DOIUrl":"https://doi.org/10.1109/ReTIS.2011.6146884","url":null,"abstract":"Legacy SCADA systems are inherently insecure. They were built using specialized and proprietary protocols and used serial link, radio or leased line for communication. As these protocols were little known and specific to the industry they catered to, security was not important for them. But, recently because of increased terrorist attacks and migration of these protocols to TCP/IP, they have become susceptible to foreign attacks. We propose a mechanism to secure existing and future DNP3 networks. We built a BITW (bump - in - the - wire) prototype which exchanges keys and uses those keys to encrypt the data flowing on the network. We used DNPSec as our framework for BITW.","PeriodicalId":137916,"journal":{"name":"2011 International Conference on Recent Trends in Information Systems","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126278071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of MPI and hybrid MPI+OpenMP programming paradigms on multi-core processors cluster","authors":"Rajkumar Sharma, P. Kanungo","doi":"10.1109/ReTIS.2011.6146855","DOIUrl":"https://doi.org/10.1109/ReTIS.2011.6146855","url":null,"abstract":"Processors design is now switched to multi-core architecture in a direction that minimizes energy consumption. A decade ago CPUs speed could not accelerate without extra ordinary cooling and consequently hit a clock speed barrier. The multi-core architecture is introduced to improve computing performance by providing hardware parallelism through more CPU cores, each having restrained clock speed. This has been a break through in High Performance Computing (HPC). While more processor cores rendered effective execution results, multi-core technology inaugurated an extra layer of complexity for programming issues. To exploit each core in a multi-core environment, application software should be optimized by using multithreading. Multi-core processors can even degrade the performance for single threaded application due to reduction in clock speed. In this paper we compare performance of multithreading fine-grained and course-grained computational problems further flavored as computation-intensive and data-intensive problems by using MPI and hybrid MPI+OpenMP approach and evaluate suitability of multi-core cluster depending on the nature of the problems.","PeriodicalId":137916,"journal":{"name":"2011 International Conference on Recent Trends in Information Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132627037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Autonomic computing: A revolutionary paradigm for implementing self-managing systems","authors":"P. Singh, Arun Sharma, Amit Kumar, Ayush Saxena","doi":"10.1109/ReTIS.2011.6146831","DOIUrl":"https://doi.org/10.1109/ReTIS.2011.6146831","url":null,"abstract":"Recent developments in the field of Information & Communication Technology (ICT) have led to a large scale installation of computing devices connected to each other via different networking technologies. But the scale, complexity, dynamism and heterogeneity of these devices have rendered networks, systems & applications insecure, unmanageable & brittle. Soon the number of these devices will outnumber the humans using them, which makes managing them a cumbersome task. The level of expertise needed to handle these complex systems will also raise. Hence there is a need of alternate system and application design paradigm based on strategies used by biological systems, especially Autonomic Nervous System (ANS). Based on ANS, self-managing computer systems and software tools are being realized. Various subsystems of ANS such as immune system may also motivate growth in developing self-protecting systems. This paper presents a study on autonomic computing along with its architecture, metrics, design issues and some applications.","PeriodicalId":137916,"journal":{"name":"2011 International Conference on Recent Trends in Information Systems","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122169713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Sing, D. K. Basu, M. Nasipuri, Chandan Biswas, P. Saha
{"title":"Gaussian surface ensemble-based intensity inhomogeneity correction in MR images","authors":"J. Sing, D. K. Basu, M. Nasipuri, Chandan Biswas, P. Saha","doi":"10.1109/ReTIS.2011.6146881","DOIUrl":"https://doi.org/10.1109/ReTIS.2011.6146881","url":null,"abstract":"Intensity inhomogeneity or intensity non-uniformity (INU) is an undesired phenomenon that affects performance of methods both for MR image segmentation and registration. Various techniques have been proposed to eliminate or compensate the INU, most of which are surface fitting algorithms over the entire region. This paper proposes an ensemble of multiple Gaussian surfaces for estimation of INU and subsequently correction in MR images. The individual Gaussian surface is estimated independently over the different homogeneous regions by considering its centre as the centre of mass of the respective homogeneous region. The INU is modeled as a slowly varying multiplicative noise along with the actual tissue signals. Image histogram is considered to extract potential homogeneous regions and then for each of these regions a Gaussian surface is fitted based on the pixel gradients to estimate its INU field or bias field. These bias fields are then ensembled to obtain entire INU field within the MR image. The INU field or bias field is then iteratively removed to obtain the INU-corrected image. The experiments using 2-D synthetic phantoms and real MR images show, that the proposed method performs quite satisfactorily.","PeriodicalId":137916,"journal":{"name":"2011 International Conference on Recent Trends in Information Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117145983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An indexing method for efficient querying of an attack graph","authors":"Atin Ruia, Vishal Parekh, A. Chakrabarti","doi":"10.1109/ReTIS.2011.6146845","DOIUrl":"https://doi.org/10.1109/ReTIS.2011.6146845","url":null,"abstract":"Attack graphs are a novel way of examining how safe a network is from attacks and analysing the shortcomings of these networks. The analysis of the attack graph may help in assessing network security. However, an attack graph can be very large in size - containing a million nodes and a million edges. Thus analysing such a large graph becomes problematic and time consuming. We have proposed an indexing scheme for fast data retrieval. Using this indexing scheme we can identify the vulnerable machines in a network corresponding to an attack pattern.","PeriodicalId":137916,"journal":{"name":"2011 International Conference on Recent Trends in Information Systems","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116413383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computing approximate value of the pbm index for counting number of clusters using genetic algorithm","authors":"M. K. Pakhira, Amrita Dutta","doi":"10.1109/ReTIS.2011.6146875","DOIUrl":"https://doi.org/10.1109/ReTIS.2011.6146875","url":null,"abstract":"Determining number of clusters present in a data set is an important problem in clustering. There exist very few techniques that can solve this problem satisfactorily. Most of these techniques are expensive with regard to computation time. Recently VAT (Visual Assessment of Tendency for clustering) images of data sets are used for this purpose along with GA and a validity index. A series of diagonal dark blocks in the VAT image represents possible clusters present in the data set. We shall show an efficient way to compute an approximate value of PBM index directly from the VAT image. It is shown that the present approach is able to suitable index values for finding appropriate number of dark blocks (clusters), under a GA framework.","PeriodicalId":137916,"journal":{"name":"2011 International Conference on Recent Trends in Information Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125887664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved Particle Swarm Optimization based synthesis of Concentric Circular Antenna Array with non-isotropic elements","authors":"D. Mandal, R. Kar, S. Ghoshal","doi":"10.1109/ReTIS.2011.6146849","DOIUrl":"https://doi.org/10.1109/ReTIS.2011.6146849","url":null,"abstract":"In this paper, an evolutionary optimization technique, Improved Particle Swarm Optimization (IPSO) is adopted for the complex synthesis of three-ring Concentric Circular Antenna Arrays (CCAA) with non-isotropic elements and without and with central element feeding. It is shown that by selection of a fitness function which controls more than one parameter of the array pattern, and also by proper setting of weight factors in fitness function, one can achieve very good results. For each optimal design, optimal current excitation weights and optimal radii are determined having the objective of maximum Sidelobe Level (SLL) reduction. The extensive computational results show that the CCAA designs having central element feeding with non-isotropic elements yield much more reduction in SLL as compared to the same not having central element feeding. Moreover, the particular CCAA containing 4, 6 and 8 number of elements in three successive rings along with central element feeding yields grand minimum SLL (−49.29 dB). Standard Particle Swarm Optimization (PSO) is adopted to compare the results of the IPSO algorithm.","PeriodicalId":137916,"journal":{"name":"2011 International Conference on Recent Trends in Information Systems","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125491897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}