{"title":"Relevancy tag ranking","authors":"Garima Agrawal, Rashmi Chaudhary, P. Singh","doi":"10.1109/ICCCT.2011.6075169","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075169","url":null,"abstract":"Tags are metadata which helps describe the visual content of an image that makes browsing easier by better organization. Recent boom of Social Media sharing Websites has popularized tagging among a large pool of users by facilitating sharing and embedding of personal photographs. Inappropriate and Random tagging has come out of the blue as a major drawback of personalized tagging limiting the effectiveness of their search and retrieval. In this paper, we propose a tag indexing scheme, which helps to rank the tags of an image according to their pertinence with image content. We first segment the image, calculate the size of segmented objects, and continue parsing for object identification. Then we perform the Probabilistic density estimation and finally couple it with social image retrieval approaches to improve its effectiveness. This tag ranking approach significantly hikes up the performance of tag based image search and retrieval.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127037011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Local search based approach in grid scheduling using Simulated Annealing","authors":"R. Goswami, T. Ghosh, S. Barman","doi":"10.1109/ICCCT.2011.6075112","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075112","url":null,"abstract":"Grid computing is a High Performance Computing environment. Load balancing is an important aspect of Grids, which provide the necessary resource management features. This decision is made by a resource management component of the Grid, namely, the Grid scheduler. While Grid users are often interested in satisfaction of their Quality of Service (QoS) requirements, these cannot be satisfactorily handled by commonly used queue-based approaches. In this paper, a local search based approach based on Simulated Annealing (SA) is proposed as a periodical optimizer to other dynamic, space shared and schedule-based scheduling policies. SA is found to be most reliable method to apply in practice. Using SA it has been proved that it is possible to converge to the best solution.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129058325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact of attribute selection on defect proneness prediction in OO software","authors":"Bharavi Mishra, K. K. Shukla","doi":"10.1109/ICCCT.2011.6075151","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075151","url":null,"abstract":"Defect proneness prediction of software modules always attracts the developers because it can reduce the testing efforts as well as software development time. In the current context, with the piling up of constraints like requirement ambiguity and complex development process, developing fault free reliable software is a daunting task. To deliver reliable software, software engineers are required to execute exhaustive test cases which become tedious and costly for software enterprises. To ameliorate the testing process one can use a defect prediction model so that testers can focus their efforts on defect prone modules. Building a defect prediction model becomes very complex task when the number of attributes is very large and the attributes are correlated. It is not easy even for a simple classifier to cope with this problem. Therefore, while developing a defect proneness prediction model, one should always be careful about feature selection. This research analyzes the impact of attribute selection on Naive Bayes (NB) based prediction model. Our results are based on Eclipse and KC1 bug database. On the basis of experimental results, we show that careful combination of attribute selection and machine learning apparently useful and, on the Eclipse data set, yield reasonable good performance with 88% probability of detection and 49% false alarm rate.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128883596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing of two channel polyphase quadrature mirror filter bank using power optimization method","authors":"Ankita Gupta, S. Agarwal","doi":"10.1109/ICCCT.2011.6075113","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075113","url":null,"abstract":"This paper proposes an efficient method for the design of two-channel, quadrature mirror filter (QMF) bank using polyphase components. The design problem is formulated to minimize an objective function, which is a linear combination of pass-band error and stop-band residual energy of the low-pass analysis filter of the filter bank. Unlike the other techniques which involves linear and non linear optimization, our formulation reduces the design equation to an eigenvector problem. An objective function that minimizes the stop-band energy and square error of the distortion transfer function uses the polyphase components and optimization is done using the power method. Simulation results of the algorithm shows the improved performance of the proposed method. Polyphase decomposition results dramatic computational efficiency and reduces number of iterations.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124521942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel compact hexagonal double dumbbell shaped LPF with high steepness and wide rejection bandwidth","authors":"J. Kishor, Rashid Mahmood, Pramod Kumar, M. Beg","doi":"10.1109/ICCCT.2011.6075106","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075106","url":null,"abstract":"In this paper a novel compact wideband high rejection low-pass filter is presented. The low pass filter (LPF) consists of two hexagonal dumbbell shaped resonator placed perpendicular to each other. With such structure undesired harmonics are effectively suppressed with improvement in the stop band and sharpness factor. The proposed filter also has constant group delay within the rejection band. The new filter has compact configuration even better filter properties than the traditional filter. This design gives insight in designing a low-pass filter with reduced size of an arbitrarily shape. Using electromagnetic simulation software, it is shown that a compact LPF with 4.7GHz cutoff frequency and band reject of up to 16GHz has been successfully designed and simulated.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134475946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BAAP: Blackhole attack avoidance protocol for wireless network","authors":"Saurabh Gupta, Subrat Kar, S. Dharmaraja","doi":"10.1109/ICCCT.2011.6075136","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075136","url":null,"abstract":"The lack of centralised infrastructure in adhoc network makes it vulnerable to various attacks. MANET routing disrupts if the participating node start performing malicious activity instead of the intended function. One such specific attack is a blackhole attack in which malicious node falsely claiming itself as having the fresh and shortest path to the destination. In this paper, we propose a protocol for avoiding blackhole attack without the contraint of special hardware and dependency on physical medium of wireless network. BAAP forms link disjoint multi-path during path discovery to provide greater path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Non-malicious nodes gradually isolate the blackhole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130535236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Neural network based software effort estimation & evaluation criterion MMRE","authors":"Vachik S. Dave, Kamlesh Dutta","doi":"10.1109/ICCCT.2011.6075192","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075192","url":null,"abstract":"Evaluation of any prediction model is the most important part for comparison. Mean Magnitude Relative Error (MMRE) is one of the traditional evaluation criterion. In this paper we demonstrate the application of MMRE for model for predicting software development effort estimation and show that MMRE is not a suitable evaluation criterion for the software development estimation models. The argument is supported by series of simulations. In this paper we also suggest changes needed in MMRE calculations and propose Modified MMRE algorithm for the effort estimation evaluation criterion.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132537805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An optimal and dynamic vehicular traffic management system","authors":"Devendra Kumar Jain, S. Sharma, M. Yadav","doi":"10.1109/ICCCT.2011.6075198","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075198","url":null,"abstract":"The management of vehicular traffic is always an issue of concern for major city administrations. Even major metropolitan cities in India can be seen suffering with the poor traffic management system which is leading to vehicular jams at various routes, while free traffic at others. This needs to be balanced, so as to utilize the resources like highways and flyovers in an efficient manner. We propose a novel vehicular traffic management system, which can prove to be of immense benefit in maintaining the vehicular traffic properly.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124923103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Plant leaf species identification using Curvelet transform","authors":"S. Prasad, Piyush Kumar, R. Tripathi","doi":"10.1109/ICCCT.2011.6075212","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075212","url":null,"abstract":"In this paper, a novel approach for feature extraction from natural image such as plant leaf is proposed for automated living plant species recognition useful for botanical students in their research for plant species identification. A new multi-resolution and multidirectional Curvelet transform is applied on subdivided leaf images to extract leaf information, mathematically so that the orientation of the object in the image does not matter and which also increase the accuracy rate. These coefficients will be the input to a trained SVM classifier to classify the result. Compared to other exiting methods and tools in this field of plant species recognition the proposed system gives a higher accuracy rate of around 95.6% with 624 leaf dataset.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122274846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Active control systems for anti-synchronization based on sliding mode control","authors":"Satnesh Singh","doi":"10.1109/ICCCT.2011.6075125","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075125","url":null,"abstract":"In this paper, design of SMC based controller is proposed for anti-synchronization of active control systems. To achieve this goal, a proportional integral (PI) switching surface is proposed to simplify the task of assigning the performance of the closed-loop error system in sliding motion. Having established the PI switching surface, a sliding mode controller is designed. This controller is effective and guarantees the occurrence of sliding motion and achieves anti-synchronization of master slave configuration in active control system. Finally, numerical simulations of active control system are performed to demonstrate the effectiveness of the proposed control strategy.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127839940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}