{"title":"Segmentation of closely set and touching lines in handwritten document images using fringe maps","authors":"V. K. Koppula, A. Negi","doi":"10.1109/I2CT.2014.7092176","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092176","url":null,"abstract":"Segmentation of handwritten text line is a challenge due to the large variety of situations that arise. The concept of a text line itself is difficult since a simple geometric concept like a bounding box for a line is not always applicable. Further, line skew may vary across a line, and also between lines. The problem in handwritten texts is also difficult since there is a large variation in spacing between lines in the writing. This paper presents a new method to address the issues of handwritten line segmentation. We propose the use of regions of white space amidst the text to bring out segmentation. The segmenting paths are found using the concept of fringe maps which are computed on the input binary image. Essentially the fringe value at any white space location helps to guide segmentation since it gives an indication of distance to text. Here we improve upon certain concepts of segmentation based on fringes and show several situations where this concept is successful and more natural than other approaches in the literature. Performance is compared with other approaches in literature on easily accessible ICDAR 2009 dataset.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128897235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohit Sharma, Nimish Unde, K. Borude, Amol Paradkar
{"title":"A data mining based approach towards detection of low rate DoS attack","authors":"Mohit Sharma, Nimish Unde, K. Borude, Amol Paradkar","doi":"10.1109/I2CT.2014.7092203","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092203","url":null,"abstract":"Low rate Denial of Service attack is an advanced form of DoS attack which has high concealment characteristics due to its behaviour like normal traffic. Due to this characteristics of LDoS, currently available tools and IDS have very low efficiency in detection of LDoS attacks and hence these attacks are successful in thwarting legitimate users from accessing the network resources. Most of the researchers propose to make changes in protocols, router, network configuration, node functionalities and network topography in their proposed solution which is highly impractical. This paper presents a data mining based approach for detection of LDoS attack without making any changes in the network environment. Experimental results are provided to support the proposed mechanism.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125487597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Obtaining the natural frequencies of linear time-invariant dynamic systems from driving-point system-function measurements employing conceptual source-measure units","authors":"I. R. Rao, K. Shubhanga","doi":"10.1109/I2CT.2014.7092092","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092092","url":null,"abstract":"This paper presents two mathematical conceptualizations of driving-point system-function measurement of linear time-invariant (LTI) systems with lumped-parameter description. Whereas the formalization of this dual pair of Source-Measure Units (SMU) has been - for the twin purposes of ease of demonstration and ready cognizance - effected with a specific relevance to electrical quantities, the underlying concept of system-function is sufficiently general to be universally applicable to all classes of LTI systems. The formulation has been done in the time-domain, thus retaining full immediacy with the real system variables. The outcome of the measurement, therefore, upon due rationalization, emerges as a rationic polynomial. The natural frequencies of the system are then extractible from the characteristic polynomial, which latter is contained in the measured rationic. The `naturality' of the system-under-test as observed from a specified port-of-access is thus laid bare. The method is illustrated through examples, which also show the invariance of the system characteristic polynomial with respect to the point of view of the observer, except in cases of pole-zero cancellation. An alternative interpretation of the singularities of the system-function has also been furnished.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"321 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124541025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A review paper on 3-T Xor cells and 8-T adder design in Cadence 180nm","authors":"A. Khan, Shivendra Pandey, Jyotirmoy Pathak","doi":"10.1109/I2CT.2014.7092068","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092068","url":null,"abstract":"The paper gives a review of already existing 3-T XOR cells and provides an optimized value of (W/L) on the basis of simulation results obtained, so as to improve the threshold loss problems present in the existing designs of 3-T XOR cells thus helping improve the driving capability, however the driving capability is not sufficient for large circuits like multipliers, hence has a scope for further improvement. Using the best improved version of 3-T XOR cell a Full Adder Circuits is designed. All the basic circuits and their improved versions have been implemented in Cadence Virtuoso for 180nm technology and 1.8v sources.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121250136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Azeem, Muhammad Ahsan, N. Minhas, Khadija Noreen
{"title":"Specification of e-Health system using Z: A motivation to formal methods","authors":"M. Azeem, Muhammad Ahsan, N. Minhas, Khadija Noreen","doi":"10.1109/I2CT.2014.7092123","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092123","url":null,"abstract":"Formal Method (FM) is an emergent feature that uses mathematical notations to mark accurate and explicit specifications that error and discrepancies are identified during early phases of the software development process. By using the Z specification, system specification, design and verification can improve the quality effectively. In this paper, we present the formal specification for the e-Health system by using Z schema. This paper will be motivation to Formal Methods that FM not only beneficial for mission critical systems but also in the commercial and business oriented applications, because the development time, verification and maintenance cost will drastically reduce.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121682261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of wireless electric board for writing and sketching using ARM based embedded system","authors":"Shekhar H. Bodake, V. Puranik","doi":"10.1109/I2CT.2014.7092071","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092071","url":null,"abstract":"Nowadays using multimedia applications is common in classroom teaching. As we know that use of chalk produces dust which pollutes air and also it is found that chalk dust causes hazardous effects on health of students and parents. In the other hand, use of multimedia helps in better teaching and learning process. Companies like Hitachi, Panasonic, are manufacturing smart equipments which can efficiently replace the traditional blackboard. This design includes two modules viz. ARM9 board processor for unit which will be controlled by user i.e. teacher called handheld Unit hardware and Embedded Linux operating system for its software. Another module is remote unit which consist of Raspberry-Pi ARM 11 Board. Teacher has to write on a notebook sized touch screen which is interfaced with ARM9 handheld unit board. Written signals are converted into electrical signals and given to ARM11 board by using wireless RF module (Zigbee). Then Arm11 board controls and processes these signals and displays the written contents by the projector in large view by interfacing projector to HDMI port provided with Raspberry-Pi. This complete module makes classroom teaching more efficient and easy for the sake of students and teachers.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124384692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reduction of UHP in heterogeneous wireless networks","authors":"S. R. Halhalli, Subhash Kulkarni, K. Anjaneyulu","doi":"10.1109/I2CT.2014.7092278","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092278","url":null,"abstract":"Mobility management enables the Mobile Terminal to switch between networks for better resource management and is still a hot research topic. Handoff management is one such challenge for maintaining active connections for roaming mobile terminals, as they change their network point of attachment. In heterogeneous networks, it is critical to evaluate and select the best algorithm out of the different algorithms, available for vertical handoff. Wrong decision probability (WDP) is one of the performances metric which is used to measure the efficiency of handover algorithms in providing such seamless service. In this work, probability equations are derived for five network models and probabilities are computed for unnecessary handover, missing handover and wrong decisions. The handoff algorithm for the five network model is designed to evaluate the performance of algorithms designed based on combination of received signal strength and bandwidth using Wrong Decision Probability model. Presentation of analytical and simulation results is made to validate the vertical handover and is compared with the results of handoff algorithm for the five network model designed considering bandwidth alone.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125673546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extracting knowledge from ontology using Jena for semantic web","authors":"A. Ameen, K. Khan, B. Rani","doi":"10.1109/I2CT.2014.7092025","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092025","url":null,"abstract":"Semantic Web extends the current web by standardizing the semantics. Purpose of Semantic Web is to make people share data and content among different applications. This is made possible by using ontologies which represents shared understanding of a domain. Semantic Web uses ontologies for representing knowledge in a uniform way that can be easily processed and shared among machine. This paper gives detail description of the role of ontologies in Semantic Web and tools required for constructing Semantic Web applications. An application is created which loads the ontology created in Protégé into Eclipse and displays the properties and classes of ontology.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128000841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rajesh Duvvuru, P. J. Rao, S. Singh, S. Deepthi, Tanvi Sirsat
{"title":"Enhancing ADSTM using ROHC in wireless networks","authors":"Rajesh Duvvuru, P. J. Rao, S. Singh, S. Deepthi, Tanvi Sirsat","doi":"10.1109/I2CT.2014.7092057","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092057","url":null,"abstract":"IP transition is one of the innovative and challenging areas for the researchers in the recent times. Presently, the transition scheme in Advanced Dual Stack Transition Mechanism (ADSTM) is consuming more time in wireless networks, which impede in general performance of the network. This paper discusses the fast transition of IPV4 packets to IPV6 packets in the Wireless networks via ADSTM. To enhance the performance of ADSTM in wireless network, it is incorporated with the Super Fast Packet Transmission Algorithm (SFTPA). In SFTPA instead of Internet Protocol Header Compression (IPHC) algorithm it is replaced with Robust Header Compression (ROHC) algorithm for better compression, which will reflects in the fast transmission of data packets in Wireless Networks. Simulation experiments were conducted on both the DSTM and ROHC individually and later on their results were merged for the better performance. This work proves that SFTPA has performed better than Fast Packet Transition Algorithm (FPTA) without hampering the Quality-of-Service.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131388017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive antenna array pattern synthesis for suppressed sidelobe level and controlled null using genetic algorithm","authors":"Parthasarathi Pal, D. Mondal","doi":"10.1109/I2CT.2014.7092156","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092156","url":null,"abstract":"This paper contains optimal radiation pattern of linear adaptive antenna array obtained using Genetic Algorithm (GA) for reducing the sidelobe level (SLL) and imposing nulls at prescribed interfering directions. Different Fitness functions have been used for performance study of GA for achieving optimal current distribution on the array aperture. Null imposition is considered in this paper in three different ways such as null at single point, multiple directions and nulls in a wide spatial range. The same fitness function has been used here to impose deeper nulls at various desired directions as well as for creating wide nulls. The minimum SLL is achieved for a 20 element isotropic array at approximately -51dB whereas a deeper null of approximately -99dB has been imposed at 40°. The relation between the fitness functions and the excitations are also discussed herewith. Obtained results show that the resultant patterns have SLL and null-performance as per requirement. It also shown that the SLL reduction approach can be extended to the array pattern with main beam steered to desired user. Multiple objectives such as null placement as well as sidelobe suppression are simultaneously achieved with a single fitness function in single-stage optimization.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134093492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}