{"title":"PSO and GA parameters estimation for digital watermarking algorithm","authors":"Varsha Parashar, Garima Mehta","doi":"10.1109/ICRITO.2016.7784985","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7784985","url":null,"abstract":"The digital watermarking schemes provide multimedia exchanged between parties with copyright protection and authentication especially to digital media. In this paper a secured watermarking algorithm for strengthening of digital media using Particle Swan Optimization and Genetic Algorithm search optimization meta-heuristic techniques is proposed. Image quality is computed using Mean Squared Error, Normalized Cross Correlation and Peak Signal-to-Noise Ratio to calculate the distortion or noise in the image with respect to parameters like luminance, contrast and correlation loss. The coefficient is selected using Particle Swan Optimization and Genetic Algorithm to embed Discrete Wavelet Transformed high level coefficients on the host image. Different attacks are modelled to access the imperceptibility and robustness. The experimental results are reported to demonstrate the effective solution of the proposed schemes.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132069295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of power feeding circuit for Wi-Fi devices operating at 2.4 GHz standard","authors":"Prashant Jha, Hitesh Poddar, K. Shambavi","doi":"10.1109/ICRITO.2016.7784991","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7784991","url":null,"abstract":"In this paper, a method to design a feeding circuit for Wi-Fi devices which operate at 2.4 GHz standard has been proposed. The feeding circuit is a branch line coupler which couples a power 10 dB below the 0 dB level of the input power. In order to combat problems due to extremely high impedance, a rectangular ring headed dumbbell shaped Defected Ground Structure (DGS) is employed below the parallel arms of the Branch line coupler. DGS helps in working with high impedance microstrip lines which if conventionally used, require width which is impractically small. Finally a compact feeding circuit to a Wi-Fi device operating at 2.4 GHz band which couples a power of 10 dB below the input power level into the device was designed.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127973906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shubhankar Kapoor, Ashish Singh, Utkarsha Goswami, Saswat Kumar, G. Chitranshi
{"title":"Design and implementation of a robust system for recognizing alphabets using artifical neural network","authors":"Shubhankar Kapoor, Ashish Singh, Utkarsha Goswami, Saswat Kumar, G. Chitranshi","doi":"10.1109/ICRITO.2016.7785026","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7785026","url":null,"abstract":"Language or pattern recognition is an ever-growing field in research. The motivation behind this work is the growing importance of foreign languages in everyday life. It is specifically focused on groups who might have to face a foreign language somewhere and can't seem to understand it. This will also be beneficial for partially visually impaired persons. It will help in recognizing the alphabets and letters written in a particular language stored in the database. The program was trained with different samples of a different letters of an alphabet and the data was stored. Using Artificial Neural Network and pattern recognition techniques, the hardware can now read whatever form of letter is presented in front of it. Using the neural network the success rate was found to be higher than 97%.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"416 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134468926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating risks in cloud computing: Security perspective","authors":"Amit Dhingra, D. Rai","doi":"10.1109/ICRITO.2016.7785013","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7785013","url":null,"abstract":"The cloud computing provide resources and service as and when required over the internet. In cloud computing environment users share highly important data, maintaining centralizing storage of data and resource sharing which tents to extends financial benefit, rather managing their own systems. World is still not very open to cloud computing platform due to many security, privacy and policy related issues that are responsible for limiting the adoption of cloud computing. However, legal challenges and policies issues of cloud computing are the major cause in slow down the growth of cloud computing. In this paper potential of cloud computing with reference to Security, Privacy and Policy issues are examined as a part of major concern which makes the computing potential puny and review of existing literature for security challenges and policies issues in cloud computing.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115526476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pairwise sequence alignment of biological database using soft computing approach","authors":"Harleen Kaur, L. Chand","doi":"10.1109/ICRITO.2016.7784929","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7784929","url":null,"abstract":"A Biological sequence alignment is the cornerstone of bioinformatics. The sequence alignment is carried out to extrapolate the evolutionary relationship among the living species which can help to characterize the functionality of unidentified sequences. The overall objective of pairwise alignment is to determine the uttermost alikeness among residues. Dynamic programming (DP) is the most popular technique for pairwise alignment but the downside of this approach is the proliferation of space and time complexity while handling considerable biological sequence. Various soft computing algorithms such as GA, PSO, ACO, GSA and many more, are in trend from past few years. These algorithms are inspired by natural evolution which helps to find near optimal solutions for optimization problem in reasonable amount of time. In this paper pairwise sequence alignment of protein is done using hybrid approach of soft computing algorithms which subsume Gravitational Search Algorithm (GSA) and Particle Swarm Optimization (PSO). The enactment of this hybrid approach is examined by comparing the simulation results with the DP based algorithms.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122732604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel approach for improving recommender system","authors":"S. Khatri, Sonam Gupta","doi":"10.1109/ICRITO.2016.7785025","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7785025","url":null,"abstract":"Recommender systems these days tend to achieve status and importance. The algorithms and approaches present in a recommender system define the importance and worth of the recommender systems. Till now, the research which have been done has concentrated on generating the new approaches and algorithms so that by implementing them some good recommendations can be provided to the users. In this research paper we propose that a recommender system can be developed efficiently so that it can work beyond the conventional accuracy conditions and this can be done by comparative study of any two algorithms and generating a new algorithm based on the results of both algorithms which would give some more accurate results. Experimental results specifies that the people with different views mostly tends to favor different types of algorithms. There are few criteria for evaluating the recommender systems which can be helpful in judging the performance.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128750420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Semantic similarity between terms for query suggestion","authors":"Mamta Kathuria, Payal, C. K. Nagpal, Neelam Duhan","doi":"10.1109/ICRITO.2016.7784959","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7784959","url":null,"abstract":"To retrieve semantically related documents with the query submitted by the user has always become a challenging task. An efficient assessment of semantic similarity is of critical importance in the area of information retrieval and web mining so as to associate the query with its associated documents. However their cannot be any accurate measure for semantic similarity as its domain is spread not only over individual words but also on the terms, phrases, sentences, entity and sometime even over whole of the document. To calculate semantic similarity between terms based on synsets a new method is proposed in this paper in which synsets are derived using online resources. The advantage of the proposed work is that, the semantic similarity between terms is calculated that helps in query suggestion or replacement of one query with the most appropriate query.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126183263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jawed Ahmed, M. A. Alam, Abdul Mobin, Shahla Tarannum
{"title":"A soft computing approach for obesity assessment","authors":"Jawed Ahmed, M. A. Alam, Abdul Mobin, Shahla Tarannum","doi":"10.1109/ICRITO.2016.7784946","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7784946","url":null,"abstract":"Body Mass Index is treated as an indicator to the case of pre-obesity and obesity. BMI values for pre-obesity and obesity are different. The range of BMI for pre-obesity is 25.00-29.99 while for obesity it is 30.00 or above. There is just a mere difference of 0.01 between 29.99 and 30.00. This little difference may be due to either wrong measurement in BMI or wrong diagnosis by doctor. But this difference may affect the health status of patient by changing the category from pre-obese to obese or obese to pre-obese. With the help of soft computing techniques, the wrong measurement in BMI or wrong diagnosis by medical practitioners may be either removed or minimized. In this paper we have used intuitionistic fuzzy logic, a kind of soft computing technique.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127120180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-stage diffusion dynamics based on optimal control theory","authors":"Adarsh Anand, Shakshi Singhal, Ompal Singh","doi":"10.1109/ICRITO.2016.7784934","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7784934","url":null,"abstract":"In this relentlessly innovative market, product diffusion has a pre-eminent importance for any firm. The comprehend study of the adoption process assists the manufacturer to facilitate the growth of their product. It is observed that the adoption of the product goes through multiple stages before the actual adoption occurs. As market shows dynamic behavior, the fluctuating price acts as a vital characteristic in the consumer buying decisions. In the present paper, a multi-stage innovation diffusion model is formulated where the evolution of sales takes place in three stages, namely, development of innovation awareness, motivation and ultimate adoption. The proposed model showcases the impact of dynamic pricing policy of the product on the motivation for actual adoption by the potential consumers. For this purpose, an optimization model based on optimal control theory problem is formulated. In addition, analytical results for the optimal pricing policy for an innovation are also investigated. The proposed model is further tested on different real life sales data sets for validation purpose and results provide empirical support to the model. The paper also provides the numerical illustration of the discrete model of proposed problem to evaluate the influence of price, the marketing factor on the company's new product introduction approach.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126483982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessment of defect prediction models using machine learning techniques for object-oriented systems","authors":"R. Malhotra, Shivani Shukla, Geet Sawhney","doi":"10.1109/ICRITO.2016.7785021","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7785021","url":null,"abstract":"Software development is an essential field today. The advancement in software systems leads to risk of them being exposed to defects. It is important to predict the defects well in advance in order to help the researchers and developers to build cost effective and reliable software. Defect prediction models extract information about the software from its past releases and predict the occurrence of defects in future releases. A number of Machine Learning (ML) algorithms proposed and used in the literature to efficiently develop defect prediction models. What is required is the comparison of these ML techniques to quantify the advantage in performance of using a particular technique over another. This study scrutinizes and compares the performances of 17 ML techniques on the selected datasets to find the ML technique which gives the best performance for determining defect prone classes in an Object-Oriented(OO) software. Also, the superiority of the best ML technique is statistically evaluated. The result of this study demonstrates the predictive capability of ML techniques and advocates the use of Bagging as the best ML technique for defect prediction.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127023398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}