{"title":"A Study on Keyframe Extraction Methods for Video Summary","authors":"Sujatha C, U. Mudenagudi","doi":"10.1109/CICN.2011.15","DOIUrl":"https://doi.org/10.1109/CICN.2011.15","url":null,"abstract":"In this paper we carry out a survey on key frame extraction methods for Video Summary. We also discuss the summary evaluation criteria and compare the approaches based on the method, data set and the results. Video Summary is a process of presenting an abstract of entire video within a short period of time. It aims to provide a compact video representation, while preserving the essential activities of the original video. It is an essential task in video analysis and indexing applications. Most of the video summaries are based on selection of key frames within the shots of a video. Many of them use motion features and few use visual features for extracting the key frames. The video summary quality assessment methods are based more on subjective and less on objective measures. Tong wei Ren et al has provided a framework to assess the quality of the video against a given reference summary using both subjective and objective measures. Ciocca et al used the objective measures for evaluation of summary and most of them evaluate by taking the subjective opinion of experts. A framework for automatic evalution is needed based on both subjective and objective measures without the reference summary.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125087594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Sedani, K. Borisagar, D. Kamdar, G. R. Kulkarni
{"title":"Simulation and Performance Analysis of WiMAX System Using Transmit Diversity and Alamouti Coding Scheme with Real Time Image Input","authors":"B. Sedani, K. Borisagar, D. Kamdar, G. R. Kulkarni","doi":"10.1109/CICN.2011.149","DOIUrl":"https://doi.org/10.1109/CICN.2011.149","url":null,"abstract":"This paper presents the simulation and performance analyses of WiMAX (Worldwide Interoperability for Microwave Access) system along with transmit antenna diversity technique using Alamouti coding scheme. Traditionally the design of wireless systems has been focused on increasing the reliability of the air interface where fading and interference are viewed as nuisances. Recent focus is now on spectral efficiency, associated with this shift is a new point of view that fading can be viewed as an opportunity to be exploited. In the initial stages, the single antenna system was used at transmitter and receiver in both the sides (SISO system) anticipating lower spectral efficiency and lesser capacity. It can be seen that root cause of the poor performance of these technique is that reliable communication depends on the strength of the single signal path only which may be in a deep fade under certain circumstances. A natural solution is to ensure that the information symbols pass through multiple signal paths, each of which fades independently, making sure that reliable communication is possible as long as one of the paths is strong. This technique is called diversity. The main objective of this paper is to achieve the greater reduction in bit error rate in 4G wireless system using antenna diversity principles along with efficient wireless channels. The quality based simulation models are developed for WiMAX system using antenna diversity technique and real time image input. The simulation results are presented along with the comparative analysis for several test cases.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130287235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Swarm Intelligence for Feature Identification in Natural Terrain Environment","authors":"Pooja Arora, A. Mishra, V. Panchal","doi":"10.1109/CICN.2011.157","DOIUrl":"https://doi.org/10.1109/CICN.2011.157","url":null,"abstract":"One of the most important problems in remote sensing studies is the classification of features in the satellite images, as it provides land use/ land cover information of the area under study. The Land Cover information like vegetation, water bodies, rocky area, sandy area etc. and its change over a period of time greatly affect local, regional and global environmental changes. Land Use information like buildings, roads and railway tracks are important features of urban infrastructure which crucially affect the life of people in cities. Recent developments in biologically inspired optimization techniques have motivated the researchers to explore the application of these techniques to the problem of satellite image feature classification. In this paper particle swarm optimization (PSO) along with the morphological operators is used for the identification of urban features like road and railway network, as well as land cover types, contained in the image. The concept of this paper is to explore and utilize the neighborhood information of the swarm computing algorithm to accurately identify features in the natural terrain environment. The test areas used are located in urban environment of Chandigarh and Saharanpur. Google Earth images of these areas were acquired and processed. The approach adopted has yielded satisfactory results.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127390063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FPGA Implementation of Secure Time Shared Hash Stream Cipher","authors":"K. Jithendra, K. Lalmohan, P. Deepthi","doi":"10.1109/CICN.2011.80","DOIUrl":"https://doi.org/10.1109/CICN.2011.80","url":null,"abstract":"Hash functions are widely used in secure communication systems for message authentication and data integrity verification. For encryption of data, stream ciphers are preferred to block ciphers because it consumes less power and hardware. In this paper we propose implementation and analysis of a circuit for both Hash generation and Encryption of data, based on a single hardware block in the time shared manner. The design of stream cipher based on hardware efficient hash function was reported earlier but in a paper which appeared later, the security of this stream cipher was proved to be very low. In this paper, we investigate how to overcome this weakness and make the design more secure, without much increase in hardware complexity. Here, we implement a 128 bit message encryption circuit which facilitates data integrity check using hash function in FPGA.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129086439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modified RSA Algorithm: A Secure Approach","authors":"Aayush Chhabra, S. Mathur","doi":"10.1109/CICN.2011.117","DOIUrl":"https://doi.org/10.1109/CICN.2011.117","url":null,"abstract":"In this paper we introduce an approach which is more secure than original RSA algorithm, which is used for digital signatures and encryption in public key cryptography. This approach eliminates the need to transfer n, the product of two random but essentially big prime numbers, in the public key due to which it becomes difficult for the intruder to guess the factors of n and hence the encrypted message remains safe from the hackers. Thus this approach provides a more secure path for transmission and reception of messages through public key cryptography.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115059166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Knowledge Discovery in Text Mining Technique Using Association Rules Extraction","authors":"V. Bhujade, N. Janwe","doi":"10.1109/CICN.2011.104","DOIUrl":"https://doi.org/10.1109/CICN.2011.104","url":null,"abstract":"This paper describes text mining technique for automatically extracting association rules from collections of textual documents. The technique called, Extracting Association Rules from Text (EART). It depends on keyword features for discover association rules amongst keywords labeling the documents. EART system ignores the order in which the words occur, but instead focusing on the words and their statistical distributions in documents. The system based on Information Retrieval scheme (TF-IDF) for selecting most important keywords for association rules generation. It consists of three phases: Text Preprocessing phase (transformation, filtration, stemming and indexing of the documents), Association Rule Mining (ARM) phase (applying our designed algorithm for Generating Association Rules based on Weighting scheme GARW) and Visualization phase (visualization of results). Experiments applied on Online WebPages related to the cryptography. The extracted association rules contain important features.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123394176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Attack on RSA through Formal Verification Methods","authors":"Sachin Upadhyay, Yashpal Singh","doi":"10.1109/CICN.2011.33","DOIUrl":"https://doi.org/10.1109/CICN.2011.33","url":null,"abstract":"By considering the old results if the private exponent d used in RSA cryptosystem is less than n^0.292 than the system is insecure. So the problem is that we need to consider a very big prime numbers in order to make our system secure. Our approach will help to increase the range of private exponent d up to n^0.5. This will help the individual to have bigger ranges regarding the prime numbers, so that the system remains secure to a greater extent.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"645 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117099520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Chowdhury, Rumana Amin, S. M. S. Islam, Md. Shoaibur Rahman, S. Binzaid
{"title":"Mixed-Signal VLSI Design in 0.5µm Process of Nano-Power Subcompact Mirror-Amplifier for AccuSensor","authors":"I. Chowdhury, Rumana Amin, S. M. S. Islam, Md. Shoaibur Rahman, S. Binzaid","doi":"10.1109/CICN.2011.112","DOIUrl":"https://doi.org/10.1109/CICN.2011.112","url":null,"abstract":"Emerging semiconductor VLSI requires improved device density on a single chip solution that many parameters are becoming vital concern for cost reduction by lowering the chip area, lowering power dissipation, reducing operating voltage, increasing speed etc. A previously designed precision sensor application mirror-amplifier was considered for optimizing in chip area consumption and improves sensing to make it ultra-precise, also this work has reduced the IC to a subcompact die sizes. MAGIC is used as two-dimensional CAD layout tool. Also PSPICE is used for electrical simulation purposes employed by extraction tool. Feature size is taken from mSCN3M_SUBM.30 process for 0.6μm layout and 0.5μm enhanced fabrication process. The improved design has area of 101?X48? (minimized from 126?X59?) or 30.3μmX15μm (minimized from 37.8μmX17.7μm) in 0.6?m CMOS design process. For multi-die placement, two sets of chip are designed those are placed on the four sub-dies in a single MOSIS tiny chip die. For one set of chip coincidence detector is designed to make the mirror-amplifier ultra precise, buffer stage is designed for another set of chip to drive large load. This paper presents details of the key research works, results, completed chip layout and packaging of the chip.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130860820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Elliptical Patch UWB Antenna with Reduced Ground Plane Effect","authors":"A. Katariya, Heena Gupta, K. Prajapat","doi":"10.1109/CICN.2011.26","DOIUrl":"https://doi.org/10.1109/CICN.2011.26","url":null,"abstract":"The design and analysis of printed antenna with the reduced ground plane effect, fed by micro strip line for Ultra Wide Band (UWB) communication systems is presented. The simulated results indicate that by cutting an elliptical patch at radiator, the proposed antenna yields a wide operating bandwidth of 2.1-13.8 GHz for-10dB return loss. In particular, the ground-plane effect on impedance performance is greatly reduced by cutting the patch from the radiator because the electric currents on the ground plane are significantly suppressed at the lower edge operating frequencies. In addition to being small in size of 15mm x15mm, the antenna presents three-dimensional omni directional radiation across the entire UWB bandwidth with high gain. The proposed antenna has satisfactory band notched characteristics with the peak value of the VSWR in the stop band is 8.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"560 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131625321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Wavelet-Based Denoising Method of SAR Image Using Interscale Dependency","authors":"Roopa Ahirwar, A. Choubey","doi":"10.1109/CICN.2011.11","DOIUrl":"https://doi.org/10.1109/CICN.2011.11","url":null,"abstract":"This paper attempts to undertake the study of two types of noise such as Salt and Pepper (SPN), Speckle (SPKN). Different noise densities have been removed by using four types of filters as meidan filter, Lee filter, Kuan filter, Frost filter, and Wavelet based Bivariate Shrinkage function. Synthetic aperture radar (SAR) images are inherently affected by multiplicative speckle noise, which is due to the coherent nature of the scattering phenomenon. Multiwavelet transform technique has a big advantage over the other techniques that it less distorts spectral characteristics of the image denoising We apply the proposed method for speckle SAR images by using logarithmic transformation. We present a novel approach to estimating the mean square error (MSE) associated with any given threshold level in both hard and soft thresholding This paper proposes different filtering techniques based on statistical methods for the removal of speckle noise.. The quality of the enhanced images is measured by the statistical quantity measures: Noise Variance, Mean Square Error (MSE), Equivalent Numbers of Looks (ENL), Signal-to-Noise Ratio (SNR), and Peak Signal-to-Noise Ratio (PSNR),","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131292995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}