2014 International Conference on Computer Communication and Informatics最新文献

筛选
英文 中文
Recognition of American sign language using LBG vector quantization 基于LBG矢量量化的美国手语识别
2014 International Conference on Computer Communication and Informatics Pub Date : 2014-10-16 DOI: 10.1109/ICCCI.2014.6921745
Krupali Suresh Raut, S. Mali, Sudeep D. Thepade, S. Sanas
{"title":"Recognition of American sign language using LBG vector quantization","authors":"Krupali Suresh Raut, S. Mali, Sudeep D. Thepade, S. Sanas","doi":"10.1109/ICCCI.2014.6921745","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921745","url":null,"abstract":"Sign language is a widely used and accepted standard for communication by people with hearing and speaking impairments. A sign language is a language which uses visually transmitted sign patterns, instead of acoustically conveyed sound patterns, to deliver the meaning. Several ways to generalize the American sign language recognition have been proposed in the past [14] [15]. In this paper, novel method of American sign language recognition with Shape and Texture features has been proposed. Many of the existing systems require the person gesticulating to use special data acquisition devices like data gloves which are expensive and difficult to handle. We proposes a more flexible vision based approach where the person is free from additional equipment. The Shape features and Texture feature are more unique, so a novel technique based on combination of these is derived and proposed here. For extracting shape features standard gradient operator such as Robert, Prewitt, Sobel, Canny, Freichein, Kirsh and Laplace are used and for texture feature vector quantization techniques are used. The gradient mask images of the character images are obtained and then LBG vector quantization algorithm is applied on these gradient images to get the codebooks of various sizes. These obtained LBG codebooks are considered as shape texture feature vectors for American sign language recognition. The database includes 26 for American sign language alphabets taken by 12 different people. The images are saved in a jpeg file format and stored in separate folder. Thus there are total 312 images were use for our project and 8 code book sizes (from 4 to 512). The nearest neighbour (KNN) algorithm is considered as performance comparison criteria for proposed character recognition techniques. The best performance is observed in LBG for codebook size 8 of Canny operator and the next best is seen for codebook sizes 4 of freichein gradient mask for feature extraction. The LBG VQ [11] design algorithm is an iterative algorithm which requires an initial codebook C. This initial codebook is obtained by the splitting method. In this method, an initial code vector is set as the average of the entire training sequence. This code vector is then split into two. The iterative algorithm is run with these two vectors as the initial codebook. The final two code vectors are splitted into four and the process is repeated until the desired number of code vectors is obtained.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126850556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Language learning for visual and auditory learners using scratch toolkit 语言学习的视觉和听觉学习者使用scratch工具包
2014 International Conference on Computer Communication and Informatics Pub Date : 2014-10-16 DOI: 10.1109/ICCCI.2014.6921765
P. Sanjanaashree, Anand Kumar, Soman K
{"title":"Language learning for visual and auditory learners using scratch toolkit","authors":"P. Sanjanaashree, Anand Kumar, Soman K","doi":"10.1109/ICCCI.2014.6921765","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921765","url":null,"abstract":"In recent years, with the development of technology, life has become very easy. Computers have become the life line of today's high-tech world. There is no work in our whole day without the use of computers. When we focus particularly in the field of education, people started preferring to e-books than carrying textbooks. In the phase of learning, visualization plays a major role. When the visualization tool and auditory learning comes together, it brings the in-depth understanding of data and their phoneme sequence through animation and with proper pronunciation of the words, which is far better than the people learning from the textbooks and imagining in their perspective and have their own pronunciation. Scratch with its visual, block-based programming platform is widely used among high school kids to learn programming basics. We investigated that in many schools around the world uses this scratch for students to learn programming basics. Literature review shows that students find it interesting and are very curious about it. This made us anxious towards natural language learning using scratch because of its interesting visual platform. This paper is based on the concept of visual and auditory learning. Here, we described how we make use of this scratch toolkit for learning the secondary language. We also claim that this visual learning will help people remember easily than to read as texts in books and the auditory learning helps in proper pronunciation of words rather than expecting someone's help. We have developed a scratch based tool for learning simple sentence construction of secondary language through primary language. In this paper, languages used are English (secondary language) and Tamil (primary language). This is an enterprise for language learning tool in scratch. This is applicable for other language specific exercises and can be adopted easily for other languages too.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123676705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Secure cloud storage of data 安全的云数据存储
2014 International Conference on Computer Communication and Informatics Pub Date : 2014-10-16 DOI: 10.1109/ICCCI.2014.6921741
K. Dongre, R. Thakur, Allan Abraham
{"title":"Secure cloud storage of data","authors":"K. Dongre, R. Thakur, Allan Abraham","doi":"10.1109/ICCCI.2014.6921741","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921741","url":null,"abstract":"Cloud computing is one of the upcoming technologies that will upgrade generation of Internet. The data stored in the smart phones is increased as more applications are deployed and executed. If the phone is damaged or lost then the information stored in it gets lost. If the cloud storage can be integrated for regular data backup of a mobile user so that the risk of data lost can be minimized. The user can stored data in the server and retrieve them at anytime and from anywhere. The data might be uncovered by attack during the retrieval or transmission of data using wireless cloud storage without proper authentication and protection. So to avoid this in this paper we design a mechanism that provides a security requirement for data storage of mobile phones.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123688778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Adiabatic logic based low power multiplexer and demultiplexer 基于绝热逻辑的低功耗多路复用器和解路复用器
2014 International Conference on Computer Communication and Informatics Pub Date : 2014-10-16 DOI: 10.1109/ICCCI.2014.6921808
Shruti Konwar, Thockchom Birjit Singha, Soumik Roy, Reginald H. Vanlalchaka
{"title":"Adiabatic logic based low power multiplexer and demultiplexer","authors":"Shruti Konwar, Thockchom Birjit Singha, Soumik Roy, Reginald H. Vanlalchaka","doi":"10.1109/ICCCI.2014.6921808","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921808","url":null,"abstract":"Minimizing power of digital circuits is always the first priority for VLSI designers. Following this trend, this paper presents a CMOS-based new design approach for a low power adiabatic 8:1 Multiplexer and 1:8 Demultiplexer. Some standard adiabatic logic styles like PFAL, ECRL, 2n2n2p are investigated, which are bettered by the proposed logic. The simulation is carried out in NI-Multisim software at 0.5 μm CMOS technology for frequency range 200MHz - 800MHz.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125752968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Automated car parking system commanded by Android application 由Android应用程序指挥的自动泊车系统
2014 International Conference on Computer Communication and Informatics Pub Date : 2014-10-16 DOI: 10.1109/ICCCI.2014.6921729
Mrs D J Bonde, R. Shende, A. Kedari, Ketan Gaikwad, Amol Uday Bhokre
{"title":"Automated car parking system commanded by Android application","authors":"Mrs D J Bonde, R. Shende, A. Kedari, Ketan Gaikwad, Amol Uday Bhokre","doi":"10.1109/ICCCI.2014.6921729","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921729","url":null,"abstract":"The aim of this paper is to automate the car and the car parking as well. It discusses a project which presents a miniature model of an automated car parking system that can regulate and manage the number of cars that can be parked in a given space at any given time based on the availability of parking spot. Automated parking is a method of parking and exiting cars using sensing devices. The entering to or leaving from the parking lot is commanded by an Android based application. We have studied some of the existing systems and it shows that most of the existing systems aren't completely automated and require a certain level of human interference or interaction in or with the system. The difference between our system and the other existing systems is that we aim to make our system as less human dependent as possible by automating the cars as well as the entire parking lot, on the other hand most existing systems require human personnel (or the car owner) to park the car themselves. To prove the effectiveness of the system proposed by us we have developed and presented a mathematical model which will be discussed in brief further in the paper.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114856928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 80
An improved WBAN MAC protocol 改进的WBAN MAC协议
2014 International Conference on Computer Communication and Informatics Pub Date : 2014-10-16 DOI: 10.1109/ICCCI.2014.6921750
S. Bhoir, A. Vidhate
{"title":"An improved WBAN MAC protocol","authors":"S. Bhoir, A. Vidhate","doi":"10.1109/ICCCI.2014.6921750","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921750","url":null,"abstract":"A Wireless Body Area Network (WBAN) is considered as a special type of a Wireless Sensor Network (WSN) with its own challenges and requirements. A traditional WSN is designed to achieve higher efficiency, however, WBAN is designed to achieve maximum throughput, minimum delay and to maximize the energy efficiency, all together. Our analysis indicates that available protocols for WSN are not easily portable for WBAN, specifically Medium Access Control (MAC) Protocols. Thus, we have proposed a new WBAN MAC Protocol based on Aloha protocol which differentiates and preferred various types of traffic based on emergency case. The proposed protocol has been simulated using different scenarios and the obtained results are analyzed and compared using NS-2 Simulator.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128803994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A compact asymmetric coplanar strip fed antenna with modified ground plane for WLAN applicaion 一种紧凑的非对称共面带状馈电天线,具有改进的地平面,用于WLAN应用
2014 International Conference on Computer Communication and Informatics Pub Date : 2014-10-16 DOI: 10.1109/ICCCI.2014.6921788
K. Ansal, T. Shanmuganatham
{"title":"A compact asymmetric coplanar strip fed antenna with modified ground plane for WLAN applicaion","authors":"K. Ansal, T. Shanmuganatham","doi":"10.1109/ICCCI.2014.6921788","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921788","url":null,"abstract":"An asymmetric coplanar strip fed monopole antenna with modified ground plane for WLAN applications is presented. The proposed antenna operating at 5.2GHz covering IEEE802.11WLAN/RFID. The characteristic performance of the antenna is due to the meandered current paths excited in the radiating structure. The proposed design has an overall dimension of only 35×7.35mm2 printed on a dielectric substrate of dielectric constant 4.4. The planar design, simple feeding and compact design make it easy for the integration of the antenna into printed circuit boards. Details of the design of the antenna results of simulation are presented and discussed.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129995961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Partial differential equation based ROF filter for MRI brain images 基于偏微分方程的脑MRI图像ROF滤波
2014 International Conference on Computer Communication and Informatics Pub Date : 2014-10-16 DOI: 10.1109/ICCCI.2014.6921764
S. Jansi, P. Subashini
{"title":"Partial differential equation based ROF filter for MRI brain images","authors":"S. Jansi, P. Subashini","doi":"10.1109/ICCCI.2014.6921764","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921764","url":null,"abstract":"Image denoising is an important in the field of medical image processing and computer vision. Image denoising continues a challenge for researchers because noise removal gives artifacts and the main source for blurring of the images. In this work four different methods are proposed to reduce the image artifacts and noise in the MRI images and also Partial Differential Equations (PDE) is applied to ROF filter to get better results in MRI brain images. The existing methods are compared and estimated based on the error rate and their quality of the image. The efficiency of the proposed denoising technique is measured by using quantitative performance and in terms of visual quality of the images.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123302320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Enhanced 2ACK scheme to Prevent Routing Misbehavior Using OLSR Protocol 使用OLSR协议防止路由错误行为的增强2ACK方案
2014 International Conference on Computer Communication and Informatics Pub Date : 2014-10-16 DOI: 10.1109/ICCCI.2014.6921818
Jyoti Joshi, V. Amarsinh
{"title":"Enhanced 2ACK scheme to Prevent Routing Misbehavior Using OLSR Protocol","authors":"Jyoti Joshi, V. Amarsinh","doi":"10.1109/ICCCI.2014.6921818","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921818","url":null,"abstract":"In Mobile Adhoc Networks (MANET), Network nodes move randomly so the topology changes unpredictably and faster. Due to the changing topology, packet loss is a common phenomenon. Routing protocols used in such type of networks generally based on the assumption that, all participating nodes will be fully cooperative. But, due to the open structure, node misbehavior may exist and so the packet loss occurs. We propose a 2ACK scheme in OLSR protocol with an objective to reduce the node misbehavior. In this paper, we conduct the experiments on NS-2 on existing 2ACK scheme as well as enhanced 2ACK scheme based on OLSR. Our results prove that the proposed scheme is better option than the existing 2ACK scheme.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121585628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An integration of wireless sensor network through Wi-max for agriculture monitoring 通过Wi-max集成无线传感器网络,用于农业监测
2014 International Conference on Computer Communication and Informatics Pub Date : 2014-10-16 DOI: 10.1109/ICCCI.2014.6921824
M. Rani, C. Suganya, S. Kamalesh, A. Sumithra
{"title":"An integration of wireless sensor network through Wi-max for agriculture monitoring","authors":"M. Rani, C. Suganya, S. Kamalesh, A. Sumithra","doi":"10.1109/ICCCI.2014.6921824","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921824","url":null,"abstract":"The present work is to develop a smart wireless sensor network (WSN) for an agricultural environment. Monitoring of environmental factors has increased in importance of water level management to increase the underwater level. In agricultural environment we have to consider various factors such as temperature, moisture content available in the soil depends on that the water flow will be allowed and the amount of water flow range and amount of pressure to be retrieved. In this approach to measuring these factors in an agricultural environment two options to be given that is manually taking measurements and automatic process the sensor data is checking them at various times. If the ability to document the details changes occurred in the sensor field extend this to remote monitoring using Wimax, anywhere we can monitor and control the agricultural field with smart irrigation system using these sensors with the help of Wimax. In this based on Wimax technology the sensor nodes sends the data wirelessly to the central server and collect the data.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134160708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信