{"title":"A new crossover operator in Differential Evolution for numerical optimization","authors":"D. Tayal, C. Gupta, A. Jain","doi":"10.1109/ICCICT.2012.6398178","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398178","url":null,"abstract":"The first pioneering study on Evolutionary Computation was studied by Holland (1975). Since the inception of Evolutionary Computation, researchers are constantly focusing on developing new methodologies, techniques, operators etc. for better convergence of the evolutionary algorithms. In the present paper, we propose a new crossover operator in Differential Evolution (DE) which has an effective convergence and enhances the efficiency of the optimization strategy, used for numerical data.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125502946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abhiram M H Student, Chetan Sadhu, K. Manikantan, S. Ramachandran
{"title":"Novel DCT based feature extraction for enhanced Iris Recognition","authors":"Abhiram M H Student, Chetan Sadhu, K. Manikantan, S. Ramachandran","doi":"10.1109/ICCICT.2012.6398164","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398164","url":null,"abstract":"Iris recognition (IR) under varying live-tissues is challenging, and extracting tissue edge features is an effective approach to solve this problem. In this paper, we propose a unique combination of edge detection plus DCT based feature extraction for enhanced Iris Recognition. Two novel methods, namely circular sector and triangular shaped DCT feature extraction techniques are proposed. Individual stages of the IR system are examined and an attempt is made to improve each stage. A Binary Particle Swarm Optimization (BPSO)-based feature selection algorithm is used to search the feature vector space for obtaining the optimal feature subset. Experimental results show the promising performance of circular sector DCT extraction for iris recognition on Phoenix, MMU, IITD databases.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121857499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Finding optimal topology for coverage and connectivity using Layered Deployment Model: A comparative study","authors":"S. Baidya, C. K. Bhattacharyya, S. Bhattacharyya","doi":"10.1109/ICCICT.2012.6398130","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398130","url":null,"abstract":"Deployment of sensor nodes with full coverage and connectivity is a real challenge in the field of Wireless Sensor Networks. In this paper we have done a comparative study to reach an optimum deployment solution without compromising coverage as well as the connectivity of a region using a layered deployment model. We have also presented the optimal coverage and optimal connectivity topology and their mathematical foundations.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129169671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study and design of target tracking and antimissile launching by amplitude comparison monopulse radar tracking using MATLAB","authors":"U. Patel, R. Petkar, D. Sharma, S. Vazirani","doi":"10.1109/ICCICT.2012.6398110","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398110","url":null,"abstract":"The purpose of air defense guided missile systems is to reduce or minimize the attacks by detecting and destroying enemy aircraft or missiles approaching a important area. These systems must be capable of defending strategic areas against attack from high altitude, high speed enemy aircraft by performing precision bombing on the aircraft and on the missiles launched by the aircraft. So to destroy the targets, the system must be capable of predicting the trajectory of the targets before and after the missile launch. Our study aims to study the amplitude monopulse radar system and designing a missile launching system which is able to calculate the predicted trajectory of the target based on the amplitude monopulse radar system using MATLAB. This missile launching system also calculates the trajectory of the missile used for destroying the target. The speed, azimuth and elevation angle for launching the missile is also calculated. This missile launching system is designed for stationary and moving objects having uniform speed or acceleration.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129182943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of an intelligent controller design for a ceramic infrared heater","authors":"V. Shekher, P. Rai, O. Prakash","doi":"10.1109/ICCICT.2012.6398196","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398196","url":null,"abstract":"This paper presents Intelligent control and performance evaluation of electric ceramic infrared heater with less energy consume. The design and implementation of different tuning of PID controller is also presented. A closed loop control system having IOPID controller has been developed for the temperature control for ceramic infrared heater. Using IOPID controller to test the comparative performances with the other tuning method of PID and intelligent controller tuning to validate it's effectiveness. The simulation result shows that the IOPID controller has good robustness, rapidly and good dynamic performance for high static gain. A fuzzy logic controller used for the same system for good stability and robust performance. Fuzzy logic controller has been widely used for non-linear, time delay and high order system. The results obtain reflect that use of intelligent controller based on Genetic Algorithm and Particle Swarm Optimization also improves the performance of process in terms of time domain specification and optimum stability.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"570 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116175188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sector coded transmission protocol for Cognitive Radio Networks","authors":"V. Abrol, P. Sharma","doi":"10.1109/ICCICT.2012.6398109","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398109","url":null,"abstract":"In practical Cognitive Radio Networks for Mobile Communication cluster based topology is used to increase spectrum detection performance. The energy of Head Node depletes faster than the member nodes and thus rotation of cluster head is needed for the energy efficiency of Cognitive Radio Networks. The level of hierarchy is increased in this approach by introducing a Super Node which communicates between the Head Nodes and the BTS. In this paper, a new scheme called Sector Coded Transmission (SCT) is proposed in which the Head Nodes are rotating with a two level hierarchy.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124308552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Ansari, M. Devanalamath, K. Manikantan, S. Ramachandran
{"title":"Robust Digital image Watermarking Algorithm in DWT-DFT-SVD domain for color images","authors":"R. Ansari, M. Devanalamath, K. Manikantan, S. Ramachandran","doi":"10.1109/ICCICT.2012.6398160","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398160","url":null,"abstract":"This paper proposes a Digital Watermarking Algorithm using a unique combination of Discrete Wavelet Transform (DWT), Discrete Fourier Transform (DFT) and Singular Value Decomposition (SVD) for secured transmission of data through watermarking digital color images. The singular values obtained from SVD of DWT+DFT transformed watermark is embedded onto the singular values obtained from SVD of DWT+DFT transformed color image. Experimental results show the promising performance of the proposed algorithm for watermarking. Peak Signal to Noise Ratio (PSNR) values for the watermarked image in the range of 65 to 85 dB and maximum correlation of 0.9998 are achieved.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126280819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling a bipedal humanoid robot using inverted pendulum towards push recovery","authors":"A. Akash, S. Chandra, A. Abha, G. Nandi","doi":"10.1109/ICCICT.2012.6398102","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398102","url":null,"abstract":"Push recovery is an important technology needs to be developed for the effective use of bipedal humanoid robot in the household applications. In this paper, a three mass inverted pendulum model equivalent to Humanoid Open Architecture Platform (HOAP -2) has been developed and the effectiveness of the model has been demonstrated using a software framework known as WEBOTS. It has been developed as a test bed for the development of sophisticated Push recovery techniques for HOAP-2 humanoid robot. Functionality of this model is general and adaptable to any kind of three mass models. Ankle strategy technique has been implemented to verify the correctness of the model. The correctness of the model has been verified successfully by the simulation results.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127947758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prediction of DoS attack sequences","authors":"A. Reshamwala, S. Mahajan","doi":"10.1109/ICCICT.2012.6398148","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398148","url":null,"abstract":"A denial of service attack (DOS) is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. Sequential pattern mining is an important data mining problem with broad applications. Sequential Pattern Mining is to discover the frequent sequential pattern in the sequential event dataset. Intrusion detection using sequential pattern mining is a research focusing on the field of information security. In this paper, we have implemented Apriori a candidate generation algorithm and PrefixSpan a pattern growth algorithm on a network intrusion dataset from KDD Cup 1999, 10 percent of training dataset, which is the annual Data Mining and Knowledge Discovery competition organized by ACM Special Interest Group on Knowledge Discovery and Data Mining, the leading professional organization of data miners. To address the absence of timestamp in the dataset, we considered two approaches to generate the sequence database from the dataset. One is by taking service as reference attribute and the other one by taking a timestamp window of size one day (86400 seconds). We found that experimental results of PrefixSpan for predicting DoS attacks sequences on KDD cup 99 training dataset are efficient. These results are then compared with SPAM (Sequential Pattern Mining) algorithm which uses vertical bitmap data layout allowing for simple, efficient counting.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127983176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Karaoke Machine implementation and validation using Out of Phase Stereo method","authors":"N. Bhalani, J. Singh, M. Tiwari","doi":"10.1109/ICCICT.2012.6398129","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398129","url":null,"abstract":"This paper presents a new approach for the implementation of Karaoke Machine for vocal or instrument removal with recording user's voice and playback. Through the medium of this paper we are glad to showcase our observations and results. Karaoke is a form of entertainment in which users sing along with recorded music using a microphone. So first phase of our Karaoke machine involves removing the original voice of the artist in a song using Out of Phase Stereo method, then, we can record the user's voice while simultaneously playing the remaining music. In this paper, we present a real-time implementation of a Matlab/Simulink model of Karaoke Machine.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121697404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}