2011 International Conference on Recent Trends in Information Systems最新文献

筛选
英文 中文
A soft-computing approach for software project selection 软件项目选择的软计算方法
2011 International Conference on Recent Trends in Information Systems Pub Date : 2011-12-01 DOI: 10.1109/ReTIS.2011.6146833
T. Bakshi, S. Sanyal
{"title":"A soft-computing approach for software project selection","authors":"T. Bakshi, S. Sanyal","doi":"10.1109/ReTIS.2011.6146833","DOIUrl":"https://doi.org/10.1109/ReTIS.2011.6146833","url":null,"abstract":"Every software manufacturing company wants to gain higher market share with the development of their products. Evolving high quality software products will decrease the cost of R&D and increase productivity. In this aspect, proper project selection in consideration with multiple factors is very vital step. There are many mutually inclusive and exclusive factors-in combinations with vagueness. The authors have tried to depict one of such situation from analytical point of view. The main objective of this paper is to explain how quality function deployment (QFD) model is used in combining with AHP under fuzziness. The authors have proposed an integrated model determines project selection system from a economic point of view also. The proposed integrated approach identifies technical requirements followed by customer requirements.","PeriodicalId":137916,"journal":{"name":"2011 International Conference on Recent Trends in Information Systems","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114336299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An ASIP for image enhancement applications in spatial domain using LISA 基于LISA的空间域图像增强应用的ASIP
2011 International Conference on Recent Trends in Information Systems Pub Date : 2011-12-01 DOI: 10.1109/ReTIS.2011.6146863
A. Sarma, Soubhagya Sutar, V. Sharma, K. Mahapatra
{"title":"An ASIP for image enhancement applications in spatial domain using LISA","authors":"A. Sarma, Soubhagya Sutar, V. Sharma, K. Mahapatra","doi":"10.1109/ReTIS.2011.6146863","DOIUrl":"https://doi.org/10.1109/ReTIS.2011.6146863","url":null,"abstract":"Application-specific instruction-set processor (ASIP) has programming flexibility and performance as compared to application specific integrated circuits (ASICs). This makes it attractive choice for the future embedded processor on system-on-chip (SOC) design. We have designed an ASIP using language for instruction-set architecture (LISA). The designed processor has optimized instructions (a total of 8) for the image enhancement applications in spatial domain. The processor architecture is tested by writing soft codes for four different image enhancement algorithms. Good qualities of enhanced images have been obtained by the simulations. Finally, the processor architecture is prototyped in FPGA and implemented using TSMC 0.18 µm CMOS standard cell technology library. The architecture uses 21.72 K gate counts and consumes total power of 2.489 mW at 50MHz clock frequency and supply voltage of 1.8 V.","PeriodicalId":137916,"journal":{"name":"2011 International Conference on Recent Trends in Information Systems","volume":"36 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133677721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Weighted fractional Fourier Transform based image Steganography 基于加权分数傅里叶变换的图像隐写
2011 International Conference on Recent Trends in Information Systems Pub Date : 2011-12-01 DOI: 10.1109/ReTIS.2011.6146870
Sudhir Keshari, S. G. Modani
{"title":"Weighted fractional Fourier Transform based image Steganography","authors":"Sudhir Keshari, S. G. Modani","doi":"10.1109/ReTIS.2011.6146870","DOIUrl":"https://doi.org/10.1109/ReTIS.2011.6146870","url":null,"abstract":"In this paper an innovative technique for image Steganography has been proposed based on Weighted fractional Fourier Transformation (WFRFT). The secret image is embedded in the intermediate domain of the cover image. Window size of 2 × 2 is selected from the cover image and converted into its intermediate domain between spatial and frequency by using WFRFT. Now, bits of the secret image, which are formed by converting them into binary form, are embedded within the two LSB positions of the real part of the transformed image. Finally, inverse WFRFT is performed to convert back from intermediate domain into spatial domain to generate the stego image. Secret image is received at recipient side through the reverse procedure of adopted at transmitter. The experimental results has demonstrated and discussed through histogram analysis for verifying the proposed technique.","PeriodicalId":137916,"journal":{"name":"2011 International Conference on Recent Trends in Information Systems","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132292940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A Back Propagation Network for face identification and localization 人脸识别与定位的反向传播网络
2011 International Conference on Recent Trends in Information Systems Pub Date : 2011-12-01 DOI: 10.1109/ReTIS.2011.6146834
G. Sarker
{"title":"A Back Propagation Network for face identification and localization","authors":"G. Sarker","doi":"10.1109/ReTIS.2011.6146834","DOIUrl":"https://doi.org/10.1109/ReTIS.2011.6146834","url":null,"abstract":"The entire process of face detection, identification and localization of faces should preferably be almost orientation or rotation invariant. The present paper aims to design one optimal Back Propagation (BP) Network model to perform these face identification tasks. The task is partially independent of orientation or rotation of the faces in the image. Also the identification rate of the faces is quiet moderate.","PeriodicalId":137916,"journal":{"name":"2011 International Conference on Recent Trends in Information Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130095789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Image binarization using iterative partitioning: A global thresholding approach 使用迭代分割的图像二值化:一种全局阈值方法
2011 International Conference on Recent Trends in Information Systems Pub Date : 2011-12-01 DOI: 10.1109/ReTIS.2011.6146882
S. Shaikh, Asis Kumar Maiti, N. Chaki
{"title":"Image binarization using iterative partitioning: A global thresholding approach","authors":"S. Shaikh, Asis Kumar Maiti, N. Chaki","doi":"10.1109/ReTIS.2011.6146882","DOIUrl":"https://doi.org/10.1109/ReTIS.2011.6146882","url":null,"abstract":"This paper proposes a new method for image binarization. This is a modified and improved version of the iterative partition based algorithm proposed in [1]. The proposed method has been compared with other five representative binarization methods including the algorithm proposed in [1]. The USC-SIPI image database has been used for experimental verification purposes. The results of implementation of the algorithms unearth the superiority of the proposed method compared to the other five methods in terms of two quantitative measures, namely, misclassification error and the relative foreground area error.","PeriodicalId":137916,"journal":{"name":"2011 International Conference on Recent Trends in Information Systems","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133931612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Bacteria Foraging Optimization based synthesis of Concentric Circular Antenna Array 基于细菌觅食优化的同心圆形天线阵合成
2011 International Conference on Recent Trends in Information Systems Pub Date : 2011-12-01 DOI: 10.1109/ReTIS.2011.6146848
D. Mandal, R. Kar, S. Ghoshal
{"title":"Bacteria Foraging Optimization based synthesis of Concentric Circular Antenna Array","authors":"D. Mandal, R. Kar, S. Ghoshal","doi":"10.1109/ReTIS.2011.6146848","DOIUrl":"https://doi.org/10.1109/ReTIS.2011.6146848","url":null,"abstract":"In this paper, optimal designs of three-ring Concentric Circular Antenna Arrays (CCAA) without and with central element feeding are reported. For each optimal design, optimal current excitation weights and optimal radii are determined having the objective of maximum Sidelobe Level (SLL) reduction. The optimization technique adopted is Bacteria Foraging Optimization (BFO). The extensive computational results show that the CCAA having central element feeding yield much more reduction in SLL as compared to the same not having central element feeding. Moreover, the particular CCAA containing 4, 6 and 8 number of elements in three successive rings along with central element feeding yields grand minimum SLL (-36.14 dB).","PeriodicalId":137916,"journal":{"name":"2011 International Conference on Recent Trends in Information Systems","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131411563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design of Mobile-PKI for using mobile phones in various applications 针对手机各种应用的移动pki设计
2011 International Conference on Recent Trends in Information Systems Pub Date : 2011-12-01 DOI: 10.1109/ReTIS.2011.6146885
Sangram Ray, G. P. Biswas
{"title":"Design of Mobile-PKI for using mobile phones in various applications","authors":"Sangram Ray, G. P. Biswas","doi":"10.1109/ReTIS.2011.6146885","DOIUrl":"https://doi.org/10.1109/ReTIS.2011.6146885","url":null,"abstract":"Today's era witnesses the increasing demand of mobile phones and its applications. In Mobile PKI, it is difficult to apply the WAP (Wireless Application Protocol) in mobile environment since wireless internet has lower transmission bandwidth and mobile phone has fundamental limitations like small screen size, low computing power, low memory capacity, etc. To eradicate these problems, development of Mobile-PKI is needed. This paper presents a Mobile Home Agent based Mobile-PKI supporting mobile phones to provide similar security level as the wired PKI. A Mobile Home Agent and Registration Authority have been considered to minimize the work load of mobile phone and CA (Certificate Authority) respectively. Discussion regarding how the proposed Mobile-PKI provides similar security level as the wired PKI and comparisons with existing schemes have been provided.","PeriodicalId":137916,"journal":{"name":"2011 International Conference on Recent Trends in Information Systems","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116321131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Application of knowledge based decision technique to predict student enrollment decision 基于知识的决策技术在学生入学决策预测中的应用
2011 International Conference on Recent Trends in Information Systems Pub Date : 2011-12-01 DOI: 10.1109/ReTIS.2011.6146864
D. B. Malaya, Rajni Jindal, D. Gupta, G. Deka
{"title":"Application of knowledge based decision technique to predict student enrollment decision","authors":"D. B. Malaya, Rajni Jindal, D. Gupta, G. Deka","doi":"10.1109/ReTIS.2011.6146864","DOIUrl":"https://doi.org/10.1109/ReTIS.2011.6146864","url":null,"abstract":"In this paper we are proposing a new Attribute Selection Measure Function (heuristic) on existing C4.5 algorithm. The advantage of heuristic is that the split information never approaches zero, hence produces stable Rule set and Decision Tree. In ideal situation, in admission process in engineering colleges in India, a student takes admission based on AIEEE rank and family pressure. If the student does not get admission in the desired branch of engineering, then they find it difficult to take decision which will be the suitable branch. The proposed knowledge based decision technique will guide the student for admission in proper branch of engineering. Another approach is also made to analyze the accuracy rate for decision tree algorithm (C5.0) and back propagation algorithm (ANN) to find out which one is more accurate for decision making. In this research work we have used the AIEEE2007 Database.","PeriodicalId":137916,"journal":{"name":"2011 International Conference on Recent Trends in Information Systems","volume":"55 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124010129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Revolution in authentication process by using biometrics 使用生物识别技术革新身份验证过程
2011 International Conference on Recent Trends in Information Systems Pub Date : 2011-12-01 DOI: 10.1109/ReTIS.2011.6146836
Arundhuti Chowdhury
{"title":"Revolution in authentication process by using biometrics","authors":"Arundhuti Chowdhury","doi":"10.1109/ReTIS.2011.6146836","DOIUrl":"https://doi.org/10.1109/ReTIS.2011.6146836","url":null,"abstract":"Terrorist attacks and natural disasters like Tsunami made us realize the need for rapid and precise personal identification. Biometrics systems and mainly multi-biometric systems provide tools to enforce reliable logs of system transactions and protect an individual's right to privacy. Passwords and user ids are often passed, written down for convenience or reused multiple times in different networks. Biometric logins would make it unfeasible for anyone, other than the intended person to login to the network or system but at the same time no need to remember passwords and user ids. Governments, law enforcement agencies, military and industrial companies are already making partial use of this technology. Researchers and practitioners are integrating identifying technologies into robotics, human computer interfaces, gaming systems, mobile devices, door locks, automobiles, and so on. Government of India is introducing biometric based authentication system for all Indian citizens. This paper describes different types of biometric practices, recent trend of using biometrics, biometric fusion and its uses in India.","PeriodicalId":137916,"journal":{"name":"2011 International Conference on Recent Trends in Information Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128638542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Simulated Annealing Approach for the Freeze-Tag Problem 冻结标签问题的模拟退火方法
2011 International Conference on Recent Trends in Information Systems Pub Date : 2011-12-01 DOI: 10.1109/ReTIS.2011.6146847
Hamidreza Keshavarz, A. Bagheri, Kamran Layeghi, Seyed Iman Mahdavi
{"title":"A Simulated Annealing Approach for the Freeze-Tag Problem","authors":"Hamidreza Keshavarz, A. Bagheri, Kamran Layeghi, Seyed Iman Mahdavi","doi":"10.1109/ReTIS.2011.6146847","DOIUrl":"https://doi.org/10.1109/ReTIS.2011.6146847","url":null,"abstract":"The Freeze-Tag Problem is a scenario in which there is “n” number of robots; n-1 ones are “asleep” and one is “awake”. Any awake robot can move and awaken another robot by touching it. The woken up robot can wake up other robots. The optimal goal is to minimize the required time to awaken all the sleeping robots. We present a simulated annealing approximation which improves an existing solution and runs in a short period of time.","PeriodicalId":137916,"journal":{"name":"2011 International Conference on Recent Trends in Information Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128751081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信