2012 International Conference on Communication, Information & Computing Technology (ICCICT)最新文献

筛选
英文 中文
A new crossover operator in Differential Evolution for numerical optimization 一种新的用于数值优化的微分进化交叉算子
D. Tayal, C. Gupta, A. Jain
{"title":"A new crossover operator in Differential Evolution for numerical optimization","authors":"D. Tayal, C. Gupta, A. Jain","doi":"10.1109/ICCICT.2012.6398178","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398178","url":null,"abstract":"The first pioneering study on Evolutionary Computation was studied by Holland (1975). Since the inception of Evolutionary Computation, researchers are constantly focusing on developing new methodologies, techniques, operators etc. for better convergence of the evolutionary algorithms. In the present paper, we propose a new crossover operator in Differential Evolution (DE) which has an effective convergence and enhances the efficiency of the optimization strategy, used for numerical data.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125502946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Novel DCT based feature extraction for enhanced Iris Recognition 基于DCT的虹膜特征提取方法
Abhiram M H Student, Chetan Sadhu, K. Manikantan, S. Ramachandran
{"title":"Novel DCT based feature extraction for enhanced Iris Recognition","authors":"Abhiram M H Student, Chetan Sadhu, K. Manikantan, S. Ramachandran","doi":"10.1109/ICCICT.2012.6398164","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398164","url":null,"abstract":"Iris recognition (IR) under varying live-tissues is challenging, and extracting tissue edge features is an effective approach to solve this problem. In this paper, we propose a unique combination of edge detection plus DCT based feature extraction for enhanced Iris Recognition. Two novel methods, namely circular sector and triangular shaped DCT feature extraction techniques are proposed. Individual stages of the IR system are examined and an attempt is made to improve each stage. A Binary Particle Swarm Optimization (BPSO)-based feature selection algorithm is used to search the feature vector space for obtaining the optimal feature subset. Experimental results show the promising performance of circular sector DCT extraction for iris recognition on Phoenix, MMU, IITD databases.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121857499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Finding optimal topology for coverage and connectivity using Layered Deployment Model: A comparative study 使用分层部署模型寻找覆盖和连接的最佳拓扑:比较研究
S. Baidya, C. K. Bhattacharyya, S. Bhattacharyya
{"title":"Finding optimal topology for coverage and connectivity using Layered Deployment Model: A comparative study","authors":"S. Baidya, C. K. Bhattacharyya, S. Bhattacharyya","doi":"10.1109/ICCICT.2012.6398130","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398130","url":null,"abstract":"Deployment of sensor nodes with full coverage and connectivity is a real challenge in the field of Wireless Sensor Networks. In this paper we have done a comparative study to reach an optimum deployment solution without compromising coverage as well as the connectivity of a region using a layered deployment model. We have also presented the optimal coverage and optimal connectivity topology and their mathematical foundations.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129169671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Study and design of target tracking and antimissile launching by amplitude comparison monopulse radar tracking using MATLAB 利用MATLAB研究和设计了基于幅度比较单脉冲雷达跟踪的目标跟踪和反导发射
U. Patel, R. Petkar, D. Sharma, S. Vazirani
{"title":"Study and design of target tracking and antimissile launching by amplitude comparison monopulse radar tracking using MATLAB","authors":"U. Patel, R. Petkar, D. Sharma, S. Vazirani","doi":"10.1109/ICCICT.2012.6398110","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398110","url":null,"abstract":"The purpose of air defense guided missile systems is to reduce or minimize the attacks by detecting and destroying enemy aircraft or missiles approaching a important area. These systems must be capable of defending strategic areas against attack from high altitude, high speed enemy aircraft by performing precision bombing on the aircraft and on the missiles launched by the aircraft. So to destroy the targets, the system must be capable of predicting the trajectory of the targets before and after the missile launch. Our study aims to study the amplitude monopulse radar system and designing a missile launching system which is able to calculate the predicted trajectory of the target based on the amplitude monopulse radar system using MATLAB. This missile launching system also calculates the trajectory of the missile used for destroying the target. The speed, azimuth and elevation angle for launching the missile is also calculated. This missile launching system is designed for stationary and moving objects having uniform speed or acceleration.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129182943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance evaluation of an intelligent controller design for a ceramic infrared heater 陶瓷红外加热器智能控制器设计的性能评价
V. Shekher, P. Rai, O. Prakash
{"title":"Performance evaluation of an intelligent controller design for a ceramic infrared heater","authors":"V. Shekher, P. Rai, O. Prakash","doi":"10.1109/ICCICT.2012.6398196","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398196","url":null,"abstract":"This paper presents Intelligent control and performance evaluation of electric ceramic infrared heater with less energy consume. The design and implementation of different tuning of PID controller is also presented. A closed loop control system having IOPID controller has been developed for the temperature control for ceramic infrared heater. Using IOPID controller to test the comparative performances with the other tuning method of PID and intelligent controller tuning to validate it's effectiveness. The simulation result shows that the IOPID controller has good robustness, rapidly and good dynamic performance for high static gain. A fuzzy logic controller used for the same system for good stability and robust performance. Fuzzy logic controller has been widely used for non-linear, time delay and high order system. The results obtain reflect that use of intelligent controller based on Genetic Algorithm and Particle Swarm Optimization also improves the performance of process in terms of time domain specification and optimum stability.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"570 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116175188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Sector coded transmission protocol for Cognitive Radio Networks 认知无线网络扇区编码传输协议
V. Abrol, P. Sharma
{"title":"Sector coded transmission protocol for Cognitive Radio Networks","authors":"V. Abrol, P. Sharma","doi":"10.1109/ICCICT.2012.6398109","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398109","url":null,"abstract":"In practical Cognitive Radio Networks for Mobile Communication cluster based topology is used to increase spectrum detection performance. The energy of Head Node depletes faster than the member nodes and thus rotation of cluster head is needed for the energy efficiency of Cognitive Radio Networks. The level of hierarchy is increased in this approach by introducing a Super Node which communicates between the Head Nodes and the BTS. In this paper, a new scheme called Sector Coded Transmission (SCT) is proposed in which the Head Nodes are rotating with a two level hierarchy.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124308552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Robust Digital image Watermarking Algorithm in DWT-DFT-SVD domain for color images 彩色图像DWT-DFT-SVD域鲁棒数字图像水印算法
R. Ansari, M. Devanalamath, K. Manikantan, S. Ramachandran
{"title":"Robust Digital image Watermarking Algorithm in DWT-DFT-SVD domain for color images","authors":"R. Ansari, M. Devanalamath, K. Manikantan, S. Ramachandran","doi":"10.1109/ICCICT.2012.6398160","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398160","url":null,"abstract":"This paper proposes a Digital Watermarking Algorithm using a unique combination of Discrete Wavelet Transform (DWT), Discrete Fourier Transform (DFT) and Singular Value Decomposition (SVD) for secured transmission of data through watermarking digital color images. The singular values obtained from SVD of DWT+DFT transformed watermark is embedded onto the singular values obtained from SVD of DWT+DFT transformed color image. Experimental results show the promising performance of the proposed algorithm for watermarking. Peak Signal to Noise Ratio (PSNR) values for the watermarked image in the range of 65 to 85 dB and maximum correlation of 0.9998 are achieved.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126280819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Modeling a bipedal humanoid robot using inverted pendulum towards push recovery 利用倒立摆对两足仿人机器人进行推力回收建模
A. Akash, S. Chandra, A. Abha, G. Nandi
{"title":"Modeling a bipedal humanoid robot using inverted pendulum towards push recovery","authors":"A. Akash, S. Chandra, A. Abha, G. Nandi","doi":"10.1109/ICCICT.2012.6398102","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398102","url":null,"abstract":"Push recovery is an important technology needs to be developed for the effective use of bipedal humanoid robot in the household applications. In this paper, a three mass inverted pendulum model equivalent to Humanoid Open Architecture Platform (HOAP -2) has been developed and the effectiveness of the model has been demonstrated using a software framework known as WEBOTS. It has been developed as a test bed for the development of sophisticated Push recovery techniques for HOAP-2 humanoid robot. Functionality of this model is general and adaptable to any kind of three mass models. Ankle strategy technique has been implemented to verify the correctness of the model. The correctness of the model has been verified successfully by the simulation results.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127947758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Prediction of DoS attack sequences DoS攻击序列预测
A. Reshamwala, S. Mahajan
{"title":"Prediction of DoS attack sequences","authors":"A. Reshamwala, S. Mahajan","doi":"10.1109/ICCICT.2012.6398148","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398148","url":null,"abstract":"A denial of service attack (DOS) is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. Sequential pattern mining is an important data mining problem with broad applications. Sequential Pattern Mining is to discover the frequent sequential pattern in the sequential event dataset. Intrusion detection using sequential pattern mining is a research focusing on the field of information security. In this paper, we have implemented Apriori a candidate generation algorithm and PrefixSpan a pattern growth algorithm on a network intrusion dataset from KDD Cup 1999, 10 percent of training dataset, which is the annual Data Mining and Knowledge Discovery competition organized by ACM Special Interest Group on Knowledge Discovery and Data Mining, the leading professional organization of data miners. To address the absence of timestamp in the dataset, we considered two approaches to generate the sequence database from the dataset. One is by taking service as reference attribute and the other one by taking a timestamp window of size one day (86400 seconds). We found that experimental results of PrefixSpan for predicting DoS attacks sequences on KDD cup 99 training dataset are efficient. These results are then compared with SPAM (Sequential Pattern Mining) algorithm which uses vertical bitmap data layout allowing for simple, efficient counting.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127983176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Karaoke Machine implementation and validation using Out of Phase Stereo method 使用非相位立体声方法的卡拉ok机实现和验证
N. Bhalani, J. Singh, M. Tiwari
{"title":"Karaoke Machine implementation and validation using Out of Phase Stereo method","authors":"N. Bhalani, J. Singh, M. Tiwari","doi":"10.1109/ICCICT.2012.6398129","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398129","url":null,"abstract":"This paper presents a new approach for the implementation of Karaoke Machine for vocal or instrument removal with recording user's voice and playback. Through the medium of this paper we are glad to showcase our observations and results. Karaoke is a form of entertainment in which users sing along with recorded music using a microphone. So first phase of our Karaoke machine involves removing the original voice of the artist in a song using Out of Phase Stereo method, then, we can record the user's voice while simultaneously playing the remaining music. In this paper, we present a real-time implementation of a Matlab/Simulink model of Karaoke Machine.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121697404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信