{"title":"Image de-noising algorithm based on image reconstruction and compression perception","authors":"Baohui Zhao, Wenzhun Huang, H. Wang, Zhe Liu","doi":"10.1109/ICICI.2017.8365188","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365188","url":null,"abstract":"In this paper, we conduct research on the image de-noising algorithm based on the image reconstruction and compression perception. Compressed sensing theory was proposed by the wide attention of experts in the field, the current compression perception theory has been applied to many fields, such as: basic compressed sensing radar, wireless sensor network as medical image processing. Therefore, we apply it on the area of the image de-noising. Combined with K-SVD algorithm and structure similarity measures, this paper puts forward the sparse representation of image de-noising algorithm based on structure similarity, to improve the dictionary. The performance and effectiveness are verified through the final experiment part.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115213429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling and simulation of nine-level cascaded H-bridge inverter based shunt active power filter for single-phase distribution system","authors":"B. Kumar, A. Chandramouli","doi":"10.1109/ICICI.2017.8365221","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365221","url":null,"abstract":"In this paper, a solitary phase Nine-Level cascaded H-Bridge (CHB) based Shunt Active Power Filter (SHAPF) in view of basic controller is proposed. Synchronous Reference Frame theory (SRF) is utilized for reference source current extraction and to create gating pulses for the SHAPF. The principle point of the cascaded bridge is to dispense harmonics, enhance power factor and reactive power compensation of the single-phase distribution framework. The suggested control calculation has two parts, changing the load current into stationary reference outline directions and estimation of peak amplitude of load currents. Consequently, a basic and dependable controller effortlessly of execution was created. The calculation for single-phase shunt active filter is intending to perform with exact tracking performance under step changes in load currents and to give great dynamic compensation. In this paper, synchronous reference theory PLL with Inverse-Park change is adopted for producing quadrature part of current. The execution of the control calculation is tried and assessed utilizing MATLAB/Simulink tool.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130986350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abdelmoty M. Ahmed, R. A. Alez, Gamal Tharwat, Muhammad Taha, Wade Ghribi, Ahmed S. Badawy, Suresh Babu Changalasetty, J. Bose
{"title":"Towards the design of automatic translation system from Arabic Sign Language to Arabic text","authors":"Abdelmoty M. Ahmed, R. A. Alez, Gamal Tharwat, Muhammad Taha, Wade Ghribi, Ahmed S. Badawy, Suresh Babu Changalasetty, J. Bose","doi":"10.1109/ICICI.2017.8365365","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365365","url":null,"abstract":"Automatic translation from or to sign language by recognizing patterns to produce a written text by using an annotated sign language corpus or any other tools of grammatical structure, syntactic rules, synthesis specifically for Arabic Sign Language. Arabic Sign Language still lack exhaustive scientific studies of their grammatical structure, morphology and syntactic rules, as well as the rules that govern the construction of sentences in this language. Such studies are necessary for the development and evolution of any sign language. In addition, the lack of tools that help researchers in studying Arabic Sign Language is another obstacle. In this paper we will show the importance of a system that would help to represent and translate Sign Language to a written text. In this context, we present a new proposal for the way towards the establishment of a system for the automated translation of the Arabic sign language into written text based on creation an annotated Arabic Sign Language corpus. This new proposed scheme can be useful for learning, teaching or studying for people who suffer from hearing difficulty. We also propose some rules which help developing Sign Language automatic translation systems.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"26 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131735283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A simple system for table extraction irrespective of boundary thickness and removal of detected spurious lines","authors":"S. Deivalakshmi","doi":"10.1109/ICICI.2017.8365236","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365236","url":null,"abstract":"Several types of table layout structures are ubiquitous in digitalized document images and are characterized by their row and column separators. Document image may consist of several undesirable lines introduced due to improper scanning, crease formation, accidental remarks etc., in addition to the desired lines in tables. Since tables being an effective component of document images for representing an information, one needs to extract the table from the document images. The proposed method aims at removing unwanted straight lines in binary document images, without affecting the essential details of the table by a two-step process. In the first step, the extraction of necessary details of the tables containing lines as row and column separators along with their respective frames is performed using Mask Processing. The second step involves the detection and removal of all straight lines using a Pseudo Diagonal Image (PDI) and its rotation. The proposed method exploits the novelty in utilizing a single mask for the detection of tables instead of multiple masks, hence the computational complexity for processing is lesser. Independency in the thickness of table boundary while extraction is also an effective characterization of the proposed algorithm. The Obtained result shows 93.35% precision and 92.33% recall.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123881719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Sridevi, M. RamasubbaReddy, Kannan Srinivasan, K. Radhakrishnan, C. Rathore, S. Nayak
{"title":"Study of significance of spectral and wavelet energy measures to detect the electrical onset of seizure","authors":"V. Sridevi, M. RamasubbaReddy, Kannan Srinivasan, K. Radhakrishnan, C. Rathore, S. Nayak","doi":"10.1109/ICICI.2017.8365218","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365218","url":null,"abstract":"The objective of this study is to assess the utility of spectral and wavelet energy measures in detecting electrical onset of seizure in patients with temporal lobe epilepsy (TLE). The scalp-recorded EEG data of 20 seizures from 11 TLE patients is used for this study. The spectral and wavelet energy in same set of frequency bands are calculated for each 4 s windowed EEG signal. Among the 14 measures, 3–6 Hz and 6–12 Hz band spectral and wavelet energy increases at electrical onset in 60% and 90% of the recorded seizures respectively. The spectral and wavelet energy in 1–3 Hz band increases in 40% of the recorded seizures. This study identifies the correlation between spectral and wavelet energy in same frequency bands. Hence the simple and efficient spectral energy measures are selected as significant features for the design of automated seizure detection system.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115232147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real time credit card fraud detection on huge imbalanced data using meta-classifiers","authors":"M. Kavitha, M. Suriakala","doi":"10.1109/ICICI.2017.8365263","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365263","url":null,"abstract":"Fraud detection in credit card transactions has several major challenges including the huge volume and high velocity of the transactions, data imbalance and frequent change in the fraud patterns. This paper presents a real-time tree based meta-classifier TBMC that can be used to identify fraudulent transactions in huge imbalanced data. The developed meta-classifier based model operates based on predictions in two levels. The first level of predictions is performed by Random Forest classifier, and the second level predictions are performed by an ensemble created with Decision Trees and Gradient Boosted Trees. The results obtained from first and the second level prediction models are integrated to form the final predictions. Experiments were conducted with UCSD-FICO data and the results were compared with state-of-the-art existing models, which showed high predictive levels of the developed TBMC model.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115387636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A compact CPW fed rectangular slot antenna with split ring resonator for WIMAX and WLAN applications","authors":"R. Pandeeswari","doi":"10.1109/ICICI.2017.8365330","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365330","url":null,"abstract":"This paper presents the design and analysis of a coplanar waveguide fed rectangular(CPW) slot antenna with split ring resonator(SRR) and closed ring. The overall dimension is 26 × 31 × 1.6 mm3. The antenna covers the frequency range of 3.28 GHz–4.15 GHz and 5.15 GHz–5.58GHz with impedance bandwidth(<-10dB) of 1.17GHz and 0.43 GHz respectively. Good radiation performance is observed for both bands. The antenna is suitable for WIMAX and WLAN applications. Parametric study is explored for optimum performance.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123292302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Learning","authors":"Karun Thankachan","doi":"10.1007/978-1-4899-7687-1_100005","DOIUrl":"https://doi.org/10.1007/978-1-4899-7687-1_100005","url":null,"abstract":"","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115713859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Priyanka, S. Janhavi, P. Subramanya, L. Naveen, Rahul Nyamangoudar, S. Routray, J. Suganya
{"title":"Emergence of small world behaviors in optical transport networks","authors":"N. Priyanka, S. Janhavi, P. Subramanya, L. Naveen, Rahul Nyamangoudar, S. Routray, J. Suganya","doi":"10.1109/ICICI.2017.8365243","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365243","url":null,"abstract":"Optical networks are ubiquitous these days in all corners of the globe. All the core networks are very much optical and they are the main traffic carriers for the people of the world. Over the last three decades, optical networks have gone through several changes. In this paper, we analyze the nodal degree changes in the topological aspects of the optical networks. Basically, the small world behaviors have been changed to a large extent in the recent past. In order to have an effective and fast communication, it is necessary to reduce the number of hop lengths from one node to other node. This leads to an increase in nodal degrees and thus the emergence of small world behaviors. In this article, we analyzed the topologies of 50 optical transport networks (OTNs). From the statistical analysis of the nodal degrees of these 50 OTNs and their evolution we found that the networks tend to show small world behaviors. We also compared the extent of small world behaviors found previously with the current ones. We found that 12 networks which did not exhibit small world behaviors a decade ago are having them now.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125038924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Text to image encryption technique using RGB substitution and AES","authors":"Amal Joshy, K. Baby, S. Padma, K. Fasila","doi":"10.1109/ICICI.2017.8365317","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365317","url":null,"abstract":"In this less secure cyber world, our proposed system will provide a way to transfer the data more securely. In this paper, we propose an android application having a method to transform the text into an image using an RGB substitution and then encrypt the resulting image using AES encryption algorithm. In this approach the secret key is smartly sent along with the cipher text in a single transmission. So that this method is capable of solving the key exchange problem that normally arises in encryption models. The encryption and decryption process make use of a combination database on both sender and receiver side, for text to image transformation. On this encrypted image, one more pixel is added, which stores the value of combinational number that was used to transform the text into image. The key which was used with the AES algorithm is transformed into its equivalent RGB resultant value. Finally the resultant value and image generated are transferred to the destination host. Reverse steps are applied at the receiver side to perform decryption. The proposed system which when implemented will lead to a highly secured transmission of the text.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"27 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123572874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}