{"title":"A soft-computing approach for software project selection","authors":"T. Bakshi, S. Sanyal","doi":"10.1109/ReTIS.2011.6146833","DOIUrl":"https://doi.org/10.1109/ReTIS.2011.6146833","url":null,"abstract":"Every software manufacturing company wants to gain higher market share with the development of their products. Evolving high quality software products will decrease the cost of R&D and increase productivity. In this aspect, proper project selection in consideration with multiple factors is very vital step. There are many mutually inclusive and exclusive factors-in combinations with vagueness. The authors have tried to depict one of such situation from analytical point of view. The main objective of this paper is to explain how quality function deployment (QFD) model is used in combining with AHP under fuzziness. The authors have proposed an integrated model determines project selection system from a economic point of view also. The proposed integrated approach identifies technical requirements followed by customer requirements.","PeriodicalId":137916,"journal":{"name":"2011 International Conference on Recent Trends in Information Systems","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114336299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Sarma, Soubhagya Sutar, V. Sharma, K. Mahapatra
{"title":"An ASIP for image enhancement applications in spatial domain using LISA","authors":"A. Sarma, Soubhagya Sutar, V. Sharma, K. Mahapatra","doi":"10.1109/ReTIS.2011.6146863","DOIUrl":"https://doi.org/10.1109/ReTIS.2011.6146863","url":null,"abstract":"Application-specific instruction-set processor (ASIP) has programming flexibility and performance as compared to application specific integrated circuits (ASICs). This makes it attractive choice for the future embedded processor on system-on-chip (SOC) design. We have designed an ASIP using language for instruction-set architecture (LISA). The designed processor has optimized instructions (a total of 8) for the image enhancement applications in spatial domain. The processor architecture is tested by writing soft codes for four different image enhancement algorithms. Good qualities of enhanced images have been obtained by the simulations. Finally, the processor architecture is prototyped in FPGA and implemented using TSMC 0.18 µm CMOS standard cell technology library. The architecture uses 21.72 K gate counts and consumes total power of 2.489 mW at 50MHz clock frequency and supply voltage of 1.8 V.","PeriodicalId":137916,"journal":{"name":"2011 International Conference on Recent Trends in Information Systems","volume":"36 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133677721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Weighted fractional Fourier Transform based image Steganography","authors":"Sudhir Keshari, S. G. Modani","doi":"10.1109/ReTIS.2011.6146870","DOIUrl":"https://doi.org/10.1109/ReTIS.2011.6146870","url":null,"abstract":"In this paper an innovative technique for image Steganography has been proposed based on Weighted fractional Fourier Transformation (WFRFT). The secret image is embedded in the intermediate domain of the cover image. Window size of 2 × 2 is selected from the cover image and converted into its intermediate domain between spatial and frequency by using WFRFT. Now, bits of the secret image, which are formed by converting them into binary form, are embedded within the two LSB positions of the real part of the transformed image. Finally, inverse WFRFT is performed to convert back from intermediate domain into spatial domain to generate the stego image. Secret image is received at recipient side through the reverse procedure of adopted at transmitter. The experimental results has demonstrated and discussed through histogram analysis for verifying the proposed technique.","PeriodicalId":137916,"journal":{"name":"2011 International Conference on Recent Trends in Information Systems","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132292940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Back Propagation Network for face identification and localization","authors":"G. Sarker","doi":"10.1109/ReTIS.2011.6146834","DOIUrl":"https://doi.org/10.1109/ReTIS.2011.6146834","url":null,"abstract":"The entire process of face detection, identification and localization of faces should preferably be almost orientation or rotation invariant. The present paper aims to design one optimal Back Propagation (BP) Network model to perform these face identification tasks. The task is partially independent of orientation or rotation of the faces in the image. Also the identification rate of the faces is quiet moderate.","PeriodicalId":137916,"journal":{"name":"2011 International Conference on Recent Trends in Information Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130095789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image binarization using iterative partitioning: A global thresholding approach","authors":"S. Shaikh, Asis Kumar Maiti, N. Chaki","doi":"10.1109/ReTIS.2011.6146882","DOIUrl":"https://doi.org/10.1109/ReTIS.2011.6146882","url":null,"abstract":"This paper proposes a new method for image binarization. This is a modified and improved version of the iterative partition based algorithm proposed in [1]. The proposed method has been compared with other five representative binarization methods including the algorithm proposed in [1]. The USC-SIPI image database has been used for experimental verification purposes. The results of implementation of the algorithms unearth the superiority of the proposed method compared to the other five methods in terms of two quantitative measures, namely, misclassification error and the relative foreground area error.","PeriodicalId":137916,"journal":{"name":"2011 International Conference on Recent Trends in Information Systems","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133931612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bacteria Foraging Optimization based synthesis of Concentric Circular Antenna Array","authors":"D. Mandal, R. Kar, S. Ghoshal","doi":"10.1109/ReTIS.2011.6146848","DOIUrl":"https://doi.org/10.1109/ReTIS.2011.6146848","url":null,"abstract":"In this paper, optimal designs of three-ring Concentric Circular Antenna Arrays (CCAA) without and with central element feeding are reported. For each optimal design, optimal current excitation weights and optimal radii are determined having the objective of maximum Sidelobe Level (SLL) reduction. The optimization technique adopted is Bacteria Foraging Optimization (BFO). The extensive computational results show that the CCAA having central element feeding yield much more reduction in SLL as compared to the same not having central element feeding. Moreover, the particular CCAA containing 4, 6 and 8 number of elements in three successive rings along with central element feeding yields grand minimum SLL (-36.14 dB).","PeriodicalId":137916,"journal":{"name":"2011 International Conference on Recent Trends in Information Systems","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131411563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Mobile-PKI for using mobile phones in various applications","authors":"Sangram Ray, G. P. Biswas","doi":"10.1109/ReTIS.2011.6146885","DOIUrl":"https://doi.org/10.1109/ReTIS.2011.6146885","url":null,"abstract":"Today's era witnesses the increasing demand of mobile phones and its applications. In Mobile PKI, it is difficult to apply the WAP (Wireless Application Protocol) in mobile environment since wireless internet has lower transmission bandwidth and mobile phone has fundamental limitations like small screen size, low computing power, low memory capacity, etc. To eradicate these problems, development of Mobile-PKI is needed. This paper presents a Mobile Home Agent based Mobile-PKI supporting mobile phones to provide similar security level as the wired PKI. A Mobile Home Agent and Registration Authority have been considered to minimize the work load of mobile phone and CA (Certificate Authority) respectively. Discussion regarding how the proposed Mobile-PKI provides similar security level as the wired PKI and comparisons with existing schemes have been provided.","PeriodicalId":137916,"journal":{"name":"2011 International Conference on Recent Trends in Information Systems","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116321131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of knowledge based decision technique to predict student enrollment decision","authors":"D. B. Malaya, Rajni Jindal, D. Gupta, G. Deka","doi":"10.1109/ReTIS.2011.6146864","DOIUrl":"https://doi.org/10.1109/ReTIS.2011.6146864","url":null,"abstract":"In this paper we are proposing a new Attribute Selection Measure Function (heuristic) on existing C4.5 algorithm. The advantage of heuristic is that the split information never approaches zero, hence produces stable Rule set and Decision Tree. In ideal situation, in admission process in engineering colleges in India, a student takes admission based on AIEEE rank and family pressure. If the student does not get admission in the desired branch of engineering, then they find it difficult to take decision which will be the suitable branch. The proposed knowledge based decision technique will guide the student for admission in proper branch of engineering. Another approach is also made to analyze the accuracy rate for decision tree algorithm (C5.0) and back propagation algorithm (ANN) to find out which one is more accurate for decision making. In this research work we have used the AIEEE2007 Database.","PeriodicalId":137916,"journal":{"name":"2011 International Conference on Recent Trends in Information Systems","volume":"55 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124010129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Revolution in authentication process by using biometrics","authors":"Arundhuti Chowdhury","doi":"10.1109/ReTIS.2011.6146836","DOIUrl":"https://doi.org/10.1109/ReTIS.2011.6146836","url":null,"abstract":"Terrorist attacks and natural disasters like Tsunami made us realize the need for rapid and precise personal identification. Biometrics systems and mainly multi-biometric systems provide tools to enforce reliable logs of system transactions and protect an individual's right to privacy. Passwords and user ids are often passed, written down for convenience or reused multiple times in different networks. Biometric logins would make it unfeasible for anyone, other than the intended person to login to the network or system but at the same time no need to remember passwords and user ids. Governments, law enforcement agencies, military and industrial companies are already making partial use of this technology. Researchers and practitioners are integrating identifying technologies into robotics, human computer interfaces, gaming systems, mobile devices, door locks, automobiles, and so on. Government of India is introducing biometric based authentication system for all Indian citizens. This paper describes different types of biometric practices, recent trend of using biometrics, biometric fusion and its uses in India.","PeriodicalId":137916,"journal":{"name":"2011 International Conference on Recent Trends in Information Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128638542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hamidreza Keshavarz, A. Bagheri, Kamran Layeghi, Seyed Iman Mahdavi
{"title":"A Simulated Annealing Approach for the Freeze-Tag Problem","authors":"Hamidreza Keshavarz, A. Bagheri, Kamran Layeghi, Seyed Iman Mahdavi","doi":"10.1109/ReTIS.2011.6146847","DOIUrl":"https://doi.org/10.1109/ReTIS.2011.6146847","url":null,"abstract":"The Freeze-Tag Problem is a scenario in which there is “n” number of robots; n-1 ones are “asleep” and one is “awake”. Any awake robot can move and awaken another robot by touching it. The woken up robot can wake up other robots. The optimal goal is to minimize the required time to awaken all the sleeping robots. We present a simulated annealing approximation which improves an existing solution and runs in a short period of time.","PeriodicalId":137916,"journal":{"name":"2011 International Conference on Recent Trends in Information Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128751081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}