{"title":"A personalized mobile travel recommender system using hybrid algorithm","authors":"Dr. Shini Renjith, C. Anjali","doi":"10.1109/COMPSC.2014.7032612","DOIUrl":"https://doi.org/10.1109/COMPSC.2014.7032612","url":null,"abstract":"The modern era witnesses the evolution of handheld devices from a simple communication medium to a sophisticated information access platform. Coupling it with intelligent recommendation techniques can transform it to an essential companion for users during their travel, purchases and other routine transactions. A recommender system extracts personalized information relevant to users, thereby limiting the information overload. Our application, Buddy@Move is a hybrid travel recommender which brings together the features of content-based, collaborative and demographic filtering techniques. While travel imprints of the user cater to content-based filtering, resulting in personalized recommendations, the societal transactions provide input for the collaborative portion. The system will make use of the individual demographic information, to suggest what suits the user thereby making it more intelligent and user acceptable.","PeriodicalId":388270,"journal":{"name":"2014 First International Conference on Computational Systems and Communications (ICCSC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123468246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ms. Mane, Dhanshree P. Patil, M. Sutaone, Akshay Sadalage
{"title":"Implementation of DCT using variable iterations CORDIC algorithm on FPGA","authors":"Ms. Mane, Dhanshree P. Patil, M. Sutaone, Akshay Sadalage","doi":"10.1109/COMPSC.2014.7032682","DOIUrl":"https://doi.org/10.1109/COMPSC.2014.7032682","url":null,"abstract":"CORDIC or CO-ordinate Rotation Digital Computer is a fast, simple, coherent and powerful algorithm which is used for diversified Digital Signal Processing applications. In pursuance of speed and accuracy requirements of todays applications, we put forward variable iterations CORDIC algorithm. In this algorithm, to boost speed we can lessen number of iterations in CORDIC algorithm for specific accuracy. This enhances efficiency of conventional CORDIC algorithm which we have used to compute Discrete Cosine Transform for image processing. One Dimensional Discrete Cosine Transform is implemented by using only 6 CORDIC blocks which needs only 6 multipliers. Because of the simplicity in hardware speed of image processing on FPGA is raised. Further increase in speed can be achieved by concurrently processing number of macro-blocks of an image on FPGA.","PeriodicalId":388270,"journal":{"name":"2014 First International Conference on Computational Systems and Communications (ICCSC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128427699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards improving the performance of language identification system for Indian languages","authors":"Abitha Anto, K. T. Sreekumar, C. S. Kumar, P. Raj","doi":"10.1109/COMPSC.2014.7032618","DOIUrl":"https://doi.org/10.1109/COMPSC.2014.7032618","url":null,"abstract":"In this paper, we present the details of a phonotactic language identification (LID) system developed for five Indian languages, English (Indian), Hindi, Malayalam, Tamil and Kan-nada. Since there are no publicly available speech databases for English, Malayalam and Kannada, we developed the database for each of the target languages by downloading the audio files from YouTube videos and removing the non-speech signals manually. The system was tested using a test data set consisting of 40 utterances with duration of 30, 10, and 3 sees, in each of 5 target languages. The performance evaluation was done separately accordingly to the NIST benchmarking sessions, for 30s, 10s and 3s segments separately. For the baseline system, we got an overall EER of 10.41 %, 19.56 % and 31.45 % for 30, 10, and 3 sees segments when tested with a 3-gram language model. The use of 4-gram language model has helped enhance the performance of the LID system to 9.81 %, 19.38 % and 32.77% respectively for 30,10 and 3 sees test segments. Further, by using the n-gram smoothing, we were able to improve the EER of the LID system, 9.02 %, 18.70 % and 29.24 % for 3-gram language models and 8.88 %, 16.46 % and 32.03 % for 4-gram language models, respectively for 30,10, and 3 sec test segments. The study shows that the use of 4-gram language models can help enhance the performance of LID systems for Indian languages.","PeriodicalId":388270,"journal":{"name":"2014 First International Conference on Computational Systems and Communications (ICCSC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126974465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of fast multiplier using modified Radix-4 booth algorithm with redundant binary adder for low energy applications","authors":"Laya Surendran, Rony Antony","doi":"10.1109/COMPSC.2014.7032660","DOIUrl":"https://doi.org/10.1109/COMPSC.2014.7032660","url":null,"abstract":"The main objective of this paper is to implement a multiplier for high speed and low energy applications. Multipliers are the building blocks of high performance systems like FIR filters, Digital signal processors, etc in which speed is the dominating factor. There are many multiplier architectures developed to increase the speed of algebra. Booth algorithm is the most effective algorithm used for fast performances. This works by introducing a high performance multiplier using Modified Radix-4 booth algorithm with Redundant Binary Adder to get high speed. A comparative study of different booth algorithms in terms of power consumption, delay, area, energy and energy delay product is also discussed in this work. All the circuits are simulated in the Cadence simulation tool using 180nm technology. The experimental results show that the proposed booth multiplier shows high speed, low energy and low energy delay product compared to the existing booth multipliers.","PeriodicalId":388270,"journal":{"name":"2014 First International Conference on Computational Systems and Communications (ICCSC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122084856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blind iterative carrier frequency offset estimation in orthogonal frequency division multiplexing system with non-constant modulus signalling","authors":"S. Sreedevi, R. Susan","doi":"10.1109/COMPSC.2014.7032639","DOIUrl":"https://doi.org/10.1109/COMPSC.2014.7032639","url":null,"abstract":"This paper introduces a blind carrier frequency offset (CFO) estimation scheme for orthogonal frequency division multiplexing (OFDM) systems. The proposed estimator is blind and can be used with non-constant modulus subcarrier modulations such as quadrature amplitude modulation (QAM). The proposed method is a novel technique to estimate CFO in orthogonal frequency division multiplexing systems involving both magnitude and angular methods of offset estimation. A major drawback for several CFO estimation techniques is the constant modulus constraint. The proposed estimate involve angular method where estimation depends only on the argument of the frequency domain signals. Hence, the modulus of the received symbols have no effect on the performance of the proposed algorithm. The estimation range is enhanced using magnitude method of offset estimation.","PeriodicalId":388270,"journal":{"name":"2014 First International Conference on Computational Systems and Communications (ICCSC)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114542757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The use of bees algorithm for RA and MA based resource allocation in OFDMA","authors":"C. Archana, K. N. Rejith","doi":"10.1109/COMPSC.2014.7032674","DOIUrl":"https://doi.org/10.1109/COMPSC.2014.7032674","url":null,"abstract":"The problem of resource allocation in multiuser orthogonal frequency division multiplexing (OFDM) system is a combinatorial optimization problem. The conventional methods for the problem demand high computational complexity and are found to be long iterative algorithms. Intelligent techniques such as genetic algorithms (GAs), simulated annealing, particle swarm optimization (PSO), Tabu search and others offer more speedy and robust solutions. Thus the use of bio-inspired approach to solve NP hard problems for obtaining optimal solutions is gaining importance in networking scenario. This paper suggests the use of Bees Algorithm (BA) as a new method for resource allocation in OFDMA systems. The margin and rate adaptive loading strategies are dealt using Bees algorithm. The results obtained using BA is compared with PSO based resource allocation in OFDMA .","PeriodicalId":388270,"journal":{"name":"2014 First International Conference on Computational Systems and Communications (ICCSC)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126462524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accelerating functional verification of PCI express endpoint by emulating host system using PCI express core","authors":"S. Badhe, Kedar Kulkarni, G. Gadre","doi":"10.1109/COMPSC.2014.7032673","DOIUrl":"https://doi.org/10.1109/COMPSC.2014.7032673","url":null,"abstract":"PCI Express is a high-performance I/O bus protocol. The PCI Express protocol provides higher bandwidth than the legacy buses that makes PCI Express as an ideal choice for a wide variety of applications such as Network Interface, Graphics Accelerators, and Storage Controllers (SSD). The PCI Express protocol supports many features to improve performance of I/O Bus, so verification of a design based on this protocol is a very long and time consuming process. As an application based on the PCI Express protocol becomes more and more complex the verification complexity increases many folds. PCI Express Endpoint device communicates with the host (Processor/Memory) using the Host Interface logic. This logic plays a vital role as it can affect the overall performance of the Endpoint device. The Host Interface logic is protocol specific and responsible for the data transfer from host to device and vice versa. Strategically, as this logic is very crucial, it has to be verified properly. There are multiple ways to verify the host interface logic. However, there is a trade-off between design development time (including verification time) and overall cost. In this paper we present a novel approach to verify the Host Interface Logic. Our method uses a PCI Express core that will act as the Root Complex connected to the Host Interface Logic, i.e. Design Under Test (DUT), this will help to minimize overall design development time by reducing verification time.","PeriodicalId":388270,"journal":{"name":"2014 First International Conference on Computational Systems and Communications (ICCSC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129007769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Memory optimization of HMAC/SHA-2 encryption","authors":"R. S. Rubayya, R. Resmi","doi":"10.1109/COMPSC.2014.7032663","DOIUrl":"https://doi.org/10.1109/COMPSC.2014.7032663","url":null,"abstract":"Society is undergoing a paradigm shift where the Information and Communication Technology revolution goes along with the evolution of the humankind The Internet is all around us and plays a crucial role in our ability to communicate We often distribute our personal and other classified information using the benefits of the global network Our demands to conceal confidential data are therefore being strongly manifested and become very important By ensuring the objectives of information security, such as confidentiality, data integrity, entity authentication, non-repudiation, and many more, cryptography provides a natural solution to the issue of data protection Modelling and simulation of this technology is an important and sensitive issue. In this work, a combination of two cryptographic techniques namely Secure Hash Algorithm and Hash Message Authentication Code are used. This proposes novel schemes for the Hash Message Authentication Code / Secure Hash Algorithm-2 (HMAC/SHA-2) family of hash functions show that it uses less area and consumes less power than the commonly used technique These results are crucial for supporting low area and low power cryptographic primitives in satellites.","PeriodicalId":388270,"journal":{"name":"2014 First International Conference on Computational Systems and Communications (ICCSC)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133017360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel algorithm for traffic reduction in wireless sensor networks","authors":"Asish P. Mathew, Abey Abraham, K. Preetha","doi":"10.1109/COMPSC.2014.7032649","DOIUrl":"https://doi.org/10.1109/COMPSC.2014.7032649","url":null,"abstract":"In Wireless Sensor Network, the communication generally takes higher energy than other operations like sensing and data processing. So the traffic reduction in communication is one of the most important concern for prolong the life of sensors. This paper presents three traffic reduction techniques based on dominating set. In the first approach base station is dynamically relocate to the sensing area in which heavy packet traffic. The selection of base station depends on various performance metrics such as energy, signal strength and the location of the selected node. The second approach intelligently distributes the burden of broadcasting process by applying the concept of localized domination set based multicast. In the third approach i.e., Dominant Set Pruning (DSP) is used to avoid unnecessary control packet flooding in sensor network The efficiency of dominant-set-based broadcasting or routing mainly depends on the overhead in constructing the Connected Dominating Set (CDS) and the size of the dominating set. The paper proposes a novel algorithm for determine the CDS with less computation complexity. The performance of the algorithm is evaluated by using simulation. The modified algorithm has a tremendous reduction in traffic than the existing AODV algorithm.","PeriodicalId":388270,"journal":{"name":"2014 First International Conference on Computational Systems and Communications (ICCSC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133402593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel architecture for ROF-WDM PON integration using PDM and remote modulation","authors":"V. Mohan, R. Pradeep, N. Vijayakumar","doi":"10.1109/COMPSC.2014.7032629","DOIUrl":"https://doi.org/10.1109/COMPSC.2014.7032629","url":null,"abstract":"A novel scheme for the integration of Radio Over Fiber technique with WDM-passive optical Networks is presented. WDM Passive Optical Network (WDM-PON) is an emerging solution for the ever increasing bandwidth requirements that can support a large number of users. Wireless communication now relies on RoF technology for meeting increased demand for capacity. This work proposes a scheme to integrate Radio over Fiber with WDM-Passive Optical Networks with dual polarisation, in which a wired baseband data and a wireless radio signal are modulated onto the two polarised components of a light source. The wavelength for upstream transmission is send to the BS from the Central Station. This remote modulation achieves Base Station design simplification, which is a critical aspect in future pico cellular approach.","PeriodicalId":388270,"journal":{"name":"2014 First International Conference on Computational Systems and Communications (ICCSC)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133297472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}