{"title":"Implementation of dictation system for Malayalam office document","authors":"P. Devi, J. Stephen, G. S. Kurambath, R. Kumar","doi":"10.1145/2345396.2345521","DOIUrl":"https://doi.org/10.1145/2345396.2345521","url":null,"abstract":"This paper describes the implementation of a dictation system for Malayalam office documents in OpenOffice Writer. Dictation system is built using state-of-the-art large vocabulary continuous speech recognition system for the Malayalam language. This system supports a vocabulary of 5000 most commonly used office domain words and is employed with a vocabulary updating facility to handle out-of-vocabulary words. The system is based on Hidden Markov Model (HMM), trained with huge (25 hours) amount of data. The training data is collected in room environment, ensuring the speaker variance and the phonetic richness. A hybrid model which integrates the rule based method with statistical method is used to handle the pronunciation variations for the creation of the pronunciation dictionary. The system is first of its kind which simplifies the tedious task of typing in Malayalam. Apart from dictating office documents with 75 ±5 % accuracy, the system is equipped with a facility of suggestion generation by which the user will be provided with alternate words for mis-recognized words. The system also supports some basic voice command operations for file operations like open, save, close etc. This system has an option to adapt to the user's voice which will improve the recognition accuracy by 2-5%. The system is successfully implemented in OpenOffice Writer and tested.","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129499233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web data mining trends and techniques","authors":"U. Patil, J. Patil","doi":"10.1145/2345396.2345551","DOIUrl":"https://doi.org/10.1145/2345396.2345551","url":null,"abstract":"Web Services and Web-based applications are growing at an exponential rate. This is generating a huge amount of Web data having its own peculiar characteristics. This in turn makes research in the area of Web Data Mining more challenging. Web Data Mining is an application of Data Mining which deals with extraction of interesting or hidden knowledge from the World Wide Web. Web Data Mining can be categorized into: Web Content Mining, Web Structure Mining, and Web Usage Mining. In this paper, we survey the state-of-the-art in each of these three types of Web Data Mining thereby describing a variety of specific trends and techniques. We also discuss different challenges and issues pertaining to Web Data Mining research.","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129672500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel algorithm for PAPR reduction in LTE system","authors":"O. Omer, A. Abdelreheem","doi":"10.1145/2345396.2345447","DOIUrl":"https://doi.org/10.1145/2345396.2345447","url":null,"abstract":"High Peak to Average Power Ratio (PAPR) is still one of the most important challenges in Orthogonal Frequency Division Multiplexing (OFDM) system. In this paper, we proposed a hybrid algorithm that is based selected mapping (SLM) technique for PAPR reduction in OFDM system. This algorithm incorporates the transformations into the SLM technique. Rather than using only Discrete Fourier Transform (DFT) in the traditional SLM technique, we propose to use Discrete Cosine Transform (DCT) and Discrete Sine Transform (DST) as well as DFT in the selection process, to get the lowest PAPR. The simulation results, based on simplified long term evaluation (LTE) system, show that the proposal technique can reduce the PAPR to about 3.2dB compared to traditional OFDM for N=512 at clipping probability of 10−3 with low additive complexity.","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129713503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identification of optimal cluster centroid of multi-variable functions for clustering concept-drift categorical data","authors":"K. Madhavi, A. Babu, A. A. Rao, S. Raju","doi":"10.1145/2345396.2345417","DOIUrl":"https://doi.org/10.1145/2345396.2345417","url":null,"abstract":"Identification of useful clusters in large datasets has attracted considerable interest in clustering process. Since data in the World Wide Web is increasing exponentially that affects on clustering accuracy and decision making, change in the concept between every cluster occurs named concept drift. This newly added time based data must be assigned/labeled into generated clusters at our hand. To say that the data labeling was performed well, the clusters must be efficient. Selecting initial cluster center (centroid) is the key factor that has high affection in generating effective clusters. The existing clustering methods selects centroid randomly. Different centroids results in different clusters. To avoid this random selection, we are proposing methods in selecting the centroid by analyzing the properties of data since the data with different properties exists in real world. Our previous work was concentrated in the identification centroid for the functions of single variable and two variable functions. This paper proposes methods in finding optimal cluster centroid for the multi-variable functions and then apply any existing clustering algorithm to generate clusters by using suitable distance measure.","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133883421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Genetic algorithm based airlines booking terminal open/close decision system","authors":"Aloysius George, B. R. Rajakumar, D. Binu","doi":"10.1145/2345396.2345426","DOIUrl":"https://doi.org/10.1145/2345396.2345426","url":null,"abstract":"With the increasing interest in decision support systems and the continuous advance of computer science, revenue management is a discipline which has received a great deal of interest in recent decades. Revenue management is the control of inventory and pricing of a perishable product in order to improve the efficiency of its marketing. Although revenue management has seen many new applications throughout the years, the main focus of research continues to be the airline industry. In the proposed system, in order to maximize the revenue of airline, an optimized flight booking and transportation terminal open/close decision system is presented using Genetic Algorithm. In this system, the particular booking terminal's historical booking data is observed. Consequently, its frequency is generated with linguistic variable and deviation of booking is interpreted. Using the observed data and genetic algorithm, the terminal open/close decision system is optimized. Finally, the experimentation is performed with the synthetic data to prove the significance of the system.","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130972007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Control of computer process using image processing and computer vision for low-processing devices","authors":"S. Prasad, Abhay Prakash, S. K. Peddoju, D. Ghosh","doi":"10.1145/2345396.2345583","DOIUrl":"https://doi.org/10.1145/2345396.2345583","url":null,"abstract":"In this paper a fast and efficient free hand motion detection method is proposed. Presenting an automated intelligent computer vision based HCI system to control and interact without skin-color MAP algorithm to detect motion with more accurate and more natural and efficient way. The experiment involves a very simple mathematics for color tolerance and for motion detection used a trigonometric concept further for action performance based on the gesture definition to compute on low-computing machine such as mobile devices. Here, hand gesture is used to operate presentation by the presenters for easiness while presenting in front of a large gathering and practically sounds good in performance.","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133666769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A framework for preserving privacy in cloud computing with user service dependent identity","authors":"S. M. Rahaman, M. Farhatullah","doi":"10.1145/2345396.2345419","DOIUrl":"https://doi.org/10.1145/2345396.2345419","url":null,"abstract":"The widespread focus on the Cloud Computing has necessitated the corresponding mechanisms to ensure privacy and security. Various attempts have been made in the past to safeguard the privacy of the individual or agency trying to utilize the services being provided by the cloud. The most challenging task is to provide services to the users while also preserving the privacy of the user's information. In this paper a model that incorporates a three-level architecture, Preserving cloud computing Privacy (PccP) model is proposed which aims to preserve privacy of information pertaining to cloud users. The Consumer Layer deals with all the aspects which relate to enabling the user of the cloud to access the cloud services being provided by the cloud service provider. The Network Interface Layer creates an appropriate mapping between the original IP addresses of the users with a modified IP address, and thereby ensuring the privacy of the IP address of the users. The Privacy Preserved Layer utilizes the functionality of the Unique User Cloud Identity Generator for which an algorithm is proposed in this paper to generate an unique User Service Dependent Identity (USID) with privacy check by establishing mapping among the existing user identity (ID), if any to ID's available in a pool of User ID's to enhance the privacy of sensitive user information.","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132110190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Clustering and classifying informative attributes using rough set theory","authors":"R. Nayak, Debahuti Mishra, Satyabrata Das, Kailash Shaw, Sashikala Mishra, Ramamani Tripathy","doi":"10.1145/2345396.2345416","DOIUrl":"https://doi.org/10.1145/2345396.2345416","url":null,"abstract":"Clustering techniques are the unsupervised data mining applications and are important in data mining methods for exploring natural structure and identifying interesting patterns in original data, also it is proved to be helpful in finding coexpressed samples. In cluster analysis, generally the given dataset is partitioned into groups based on the given features such that the data objects in the same group are more similar to each other than the data objects in other groups. The objects are clustered or grouped based on the principle of maximizing intra-class similarity and minimizing interclass similarity. In this paper, the rough set theory (RST) has been used for attribute clustering. RST is a theory adopted to deal with rough and unsure knowledge, which analyzes the clusters and finds the data principles when previous knowledge is not available, providing a new method for data classification. With the continuous change in data objects we have to improve these relevant technologies over time, and we have to propose creative theory in response, meeting the demands of application, though there are many rough set methods. In this paper; after implementing the rough set based attribute clustering method on real life leukemia dataset, we classify them using some of the traditional classification techniques such as Multilayered Perceptron (MLP) based classifier, Naïve Bayesian (NB) classifier and Support Vector Machine (SVM). At the end, the same classification techniques are applied to classify the original leukemia dataset before application of rough set based attribute clustering. Finally the paper provides a comparative analysis among the traditional classifiers and the proposed corresponding rough set based classifiers. Among all, the proposed MLP classifier is found to be the better classifier than the others giving higher classification accuracy and it is proved to be efficient having lower error ratio.","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114653143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient DoG based fingerprint enhancement scheme","authors":"S. Samantaray, Sambit Bakshi, P. K. Sa","doi":"10.1145/2345396.2345486","DOIUrl":"https://doi.org/10.1145/2345396.2345486","url":null,"abstract":"This paper focuses on fingerprint image enhancement techniques through histogram equalization applied locally on the degraded image. The proposed work is based on the Laplacian pyramid framework that decomposes the input image into a number of band-pass images to improve the local contrast, as well as the local edge information. The resultant image is passed through the regular methodologies of fingerprint, like ridge orientation, ridge frequency calculation, filtering, binarization and finally the morphological operation thinning. Experiments using different texture of images are conducted to enhance the images and to show a comparative result in terms of number of minutiae extracted from them along with the spurious and actual number existing in each enhanced image. Experimental results outperform the existing fingerprint enhancement techniques and prove the suitability of the proposed method.","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114817671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Temporal characteristics of clustering in mobile ad hoc network","authors":"J. Singh, P. Dutta, A. Chakrabarti","doi":"10.1145/2345396.2345439","DOIUrl":"https://doi.org/10.1145/2345396.2345439","url":null,"abstract":"Clustering partitions the ad hoc network into several groups of nodes to induce a hierarchical architecture. Each group of nodes is called a cluster and is managed by a manager called cluster-head. One of the popular technique to cluster ad hoc network is based on node weights. The node weights are assigned on the basis of certain node parameters like average numbers of neighbours, sum of distances of neighbours etc. In node weight based clustering, the cluster formation and maintenance are decided by the weights of neighbouring nodes. In this article, We explore the impact of different mobility pattern on the weight based clustering algorithms. We have simulated the network using four different mobility patterns: (i) Random Way Point, (ii) Restricted Random Way Point, (iii) Gauss Markov and (iv) Random Direction mobility. We have also tried to find out the effect of average speed of nodes on clustering the network under different mobility patterns. The weights of mobile nodes are represented as a time series and modelled by Autoregressive model of order p i. e. AR(p). The order p of the model is found to lye between 1 and 3. The fitted model is then used to make prediction about the node weights. The predicted node weights are close the actual node weights as indicated by the statistical analysis.","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128298407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}