{"title":"Speech compression using different transform techniques","authors":"G. Rajesh, A. Kumar, K. Ranjeet","doi":"10.1109/ICCCT.2011.6075173","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075173","url":null,"abstract":"Speech Compression is a field of digital signal processing that focuses on reducing bit-rate of speech signals to enhance transmission speed and storage requirement of fast developing multimedia. This paper explores a transform based methodology for compression of the speech signal. In this methodology, different transforms such as Discrete Wavelet Transform (DWT), fast Fourier Transform (FFT) and Discrete Cosine Transform (DCT) are exploited. A comparative study of performance of different transforms is made in terms of Signal-to-noise ratio (SNR), Peak signal-to-noise ratio (PSNR) and Normalized root-mean square error (NRMSE). The simulation results included illustrate the effectiveness of these transforms in the field of data compression. When compared, Discrete Wavelet Transform gives higher compression respect to Discrete Cosine Transform and Fast Fourier Transform in terms of compression ratio, and DWT as well as good fidelity parameters also.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125787287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Document image retrieval using signature as query","authors":"M. Shirdhonkar, M. Kokare","doi":"10.1109/ICCCT.2011.6075200","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075200","url":null,"abstract":"In this paper, we presents a new approach to document image retrieval based on signature. The database contains document images with English text combined with headlines, ruling lines, logo, trade mark and signature. In searching a repository of business documents, task of interest is that of using a query signature image to retrieve from a database. The signature retrieval task involves a two step process of extracting all the signatures from the document and performing a match on these signatures. We have proposed to use the rotated complex wavelet filters (RCWF) and dual tree complex wavelet transform (DT-CWT) together to derive signature feature extraction. In retrieval phase, Canberra distance measure is used. Further, relevance with query point movement (QPM) is used to improve the retrieval performance. Experimental results shows that document image retrieval rate of proposed method is satisfactory.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128175035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Clustering of scale free networks using a k-medoid framework","authors":"Samik Ray, M. K. Pakhira","doi":"10.1109/ICCCT.2011.6075178","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075178","url":null,"abstract":"Clustering is a very important topic in the field of pattern recognition and artificial intelligence. Also it has become popular in newer application areas like communication networking, data mining, bio-informatics, web mining, mobile computing etc. This article describes a network clustering technique based on PAM or k-medoid algorithm with appropriate modification. This algorithm works faster than the classical k-medoid based algorithms designed for networks and provides better results. A better final cluster structure is obtained as the sum of within cluster spreads, i.e., the clustering metric has improved drastically. The result has compared with those obtained by a graph k-medoid and a geodesic distance based (considering only highest degree nodes) network clustering algorithms. We have shown that the degree of a node is a significant contributor for better clustering.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"59 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134343579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A modified parallel approach to Single Source Shortest Path Problem for massively dense graphs using CUDA","authors":"Sumit Kumar, A. Misra, R. S. Tomar","doi":"10.1109/ICCCT.2011.6075214","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075214","url":null,"abstract":"Today's Graphics Processing Units (GPUs) possess enormous computation power with highly parallel and multithreaded architecture, and the most attractive feature being their low costs. NVIDIA's CUDA provides an interface to the developers to use the GPUs for General Purpose Parallel Computing. In this paper, we present a modified algorithm of Single Source Shortest Path Problem on GPU using CUDA. First, we modify the standard BELLMAN-FORD algorithm to remove its drawbacks and make it suitable for parallel implementation, and then implement it using CUDA. For dense graphs, our Algorithm gains a speedup of 10×–12× over the previously proposed parallel algorithm. Our Algorithm also accept graphs with negative weighted edges and can detect any reachable Negative Weighted Cycle, which widens its scope to accept generalized problems.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132595850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A metric suite for early estimation of software testing effort using requirement engineering document and its validation","authors":"Ashish Sharma, D. S. Kushwaha","doi":"10.1109/ICCCT.2011.6075150","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075150","url":null,"abstract":"Software testing is one of the most important and critical activity of software development life cycle which ensures software quality and directly influences the development cost and success of the software. This paper empirically proposes a test metric for the estimation of the software testing effort using IEEE-Software Requirement Specification (SRS) document in order to avoid budget overshoot, schedule escalation etc., at very early stage of software development. Further the effort required to develop or test the software will also depend on the complexity of the proposed software. Therefore the proposed test metric computes the requirement based complexity for yet to be developed software on the basis of SRS document. Later the proposed measure is also compared with other proposals for test effort estimation like code based, cognitive value based and use case based measures. The result obtained validates that the proposed test metric is a comprehensive one and compares well with various other prominent measures. The computation of proposed test effort estimation involves least overhead as compared to others.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133291763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A cryptanalytic attack on the knapsack cryptosystem using binary Firefly algorithm","authors":"Supravo Palit, Saptarshi Neil Sinha, Mostafiz Amin Molla, Atreyee Khanra, Malay Kule","doi":"10.1109/ICCCT.2011.6075143","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075143","url":null,"abstract":"This paper presents a binary Firefly Algorithm (FA), for cryptanalysis of knapsack cipher algorithm so as to deduce the meaning of an encrypted message (i.e. to determine a plaintext from the cipher text). The implemented algorithm has been characterized, in this paper, by a number of properties and operations that build up and evolve the fireflies' positions. These include light intensity, distances, attractiveness, and position updating, fitness evaluation. The results of the Firefly algorithm are compared with the results shown by Genetic Algorithm (GA), to discover the plaintext from the cipher text. Experimental results show that binary firefly algorithm is capable of finding correct results more efficiently than GA.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125684544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Suchetana Chakraborty, Sandip Chakraborty, Sukumar Nandi, S. Karmakar
{"title":"A reliable and total order tree based broadcast in wireless sensor network","authors":"Suchetana Chakraborty, Sandip Chakraborty, Sukumar Nandi, S. Karmakar","doi":"10.1109/ICCCT.2011.6075099","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075099","url":null,"abstract":"A reliable broadcast demands that each data packet forwarded from the source node is received by all other nodes in the network without any loss. A flooding based Broadcast scheme incurs significant overhead due to explosion of packets in the network. So an efficient way of routing packets in order to broadcast saves the energy of resource constrained sensor nodes. The delivery of broadcast packets at each node in correct sequence is also crucial for certain applications. In this paper a tree based broadcast mechanism is proposed that constructs a spanning tree out of all nodes in the network rooted at the source of the broadcast. The broadcast tree eventually becomes a Breadth-First Search(BFS) tree where each node maintains the shortest path to the root. So packets routed through the shortest paths reduce transmission delay and packet loss. BFS tree based broadcast saves the battery power at each node by reducing the number of packet transmissions. The proposed scheme for broadcast is also crash tolerant. Each node computes a maintenance plan during the broadcast tree construction for future requirement. If a node dies, all the nodes in neighborhood repairs the tree locally within constant round of message transmissions. Each broadcast packet is assured to be delivered at each node without redundancy and maintaining the correct order.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115847221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Human mobility based message transfer in Delay Tolerant Networks — A single relay approach","authors":"R. J. D'Souza, Johny Jose","doi":"10.1109/ICCCT.2011.6075187","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075187","url":null,"abstract":"A Delay Tolerant Network (DTN) is a type of Mobile Ad Hoc Network, where end-to-end connectivity between a pair of nodes may never exist. Due to this lack of end-to-end connectivity, traditional routing methods are not suitable in a DTN. However, various approaches have been proposed to achieve message transfer in such a network. This work looks into utilizing the capacity of 802.11n wireless standard, available on the modern mobile devices for this task. Modern mobile devices are equipped with multiple wireless ports as well as ever increasing processing power and storage capacity. They are not utilized as an alternative means for message transfer, even when the infrastructure-based connectivity is not available. The mobile devices move around according to the human mobility pattern, which is semi-deterministic in nature. This work studies how this semi-deterministic nature of human mobility can be effectively utilized for message transfer in a DTN environment. Simulation shows that the existing features of mobile devices are sufficient to achieve close to 100% connection opportunities.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126210469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sowmya Suryadevara, R. Naaz, Shweta, Shuchi Kapoor, Anand Sharma
{"title":"Visual cryptography improvises the security of tongue as a biometric in banking system","authors":"Sowmya Suryadevara, R. Naaz, Shweta, Shuchi Kapoor, Anand Sharma","doi":"10.1109/ICCCT.2011.6075146","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075146","url":null,"abstract":"The importance of utilizing biometrics to establish personal authenticity and to detect imposters is growing in the present scenario of global security concern. Also the Development of a biometric system for personal identification, which fulfills the requirement for access control of secured areas and other applications like identity validation for social welfare, crime detection, ATM access, computer security, etc. is felt to be the need of the day. The human tongue promises to deliver a level of uniqueness to identification applications that other biometrics cannot match in context of that it is well protected in mouth and is difficult to forge. The tongue also presents both geometric shape information and physiological texture information which are potentially useful in identity verification applications. The 3D scanning of human tongue is an important tool to acquire accurate shape and texture information of tongue for recognition purposes. As we use biometrics mainly for security purpose so preserving the privacy of digital biometric data (e.g. tongue prints) stored in a central database has become of paramount importance, for this we are using visual cryptography while using it in biometric authentication system. This paper proposes the tongue biometric with visual cryptography technique to increase the efficiency of the proposed tongue biometric authentication system (banking system) using 3D database.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128475652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bayesian versus support vector machine based approaches for facial feature classification in image sequences","authors":"R. A. Patil, V. Sahula, A. S. Mandal","doi":"10.1109/ICCCT.2011.6075168","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075168","url":null,"abstract":"A method for automatic facial expression recognition in image sequences, is introduced which make use of Candide wire frame model and active appearance algorithm for tracking, and Bayesian classifier for classification. On the first frame of face image sequence, Candide wire frame model is adapted properly. In subsequent frames of image sequence, facial features are tracked using active appearance algorithm. The algorithm adapts Candide wire frame model to the face in each of the frames and tracks the grid in consecutive video frames over time. Last frame of image sequence corresponds to greatest facial expression intensity. The difference of the node coordinates between the first and the greatest facial expression intensity frame, called the geometrical displacement of Candide wire frame nodes is used as an input to a classifier, which classifies facial expression into one of the class such as happy, surprise, sad, anger, disgust and fear. The experimental results show that the proposed method is better in classification correctness in comparison with binary SVM tree classifier.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116843428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}