Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT)最新文献

筛选
英文 中文
Fractal image compression with quadtree partitioning and a new fast classification strategy 基于四叉树分割的分形图像压缩及新的快速分类策略
U. Nandi, J. K. Mandal, S. Santra, Suman Nandi
{"title":"Fractal image compression with quadtree partitioning and a new fast classification strategy","authors":"U. Nandi, J. K. Mandal, S. Santra, Suman Nandi","doi":"10.1109/C3IT.2015.7060153","DOIUrl":"https://doi.org/10.1109/C3IT.2015.7060153","url":null,"abstract":"In this paper, a new fast classification strategy is proposed for fractal image compression with quadtree partitioning technique. The scheme significantly reduces the number of mean square error (MSE) computations during encoding of images. Performance in terms of compression ratios, compression time and PSNR of the fractal image compression with existing and proposed classification strategy are compared. Both techniques use quadtree partitioning scheme. The proposed classification strategy reduces the compression time significantly of the fractal image compression technique maintaining compression ratio and PSNR almost same with its counterpart.","PeriodicalId":402311,"journal":{"name":"Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT)","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121627930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Diagnosing heterogeneous dynamics for wind particle trajectory in wavelet domain 小波域风粒子轨迹非均质动力学诊断
S. Mukhopadhyay, Ritwik Barman, S. Dey, A. Mitra, P. Panigrahi, P. Bhattacharya, K. K. Dhar
{"title":"Diagnosing heterogeneous dynamics for wind particle trajectory in wavelet domain","authors":"S. Mukhopadhyay, Ritwik Barman, S. Dey, A. Mitra, P. Panigrahi, P. Bhattacharya, K. K. Dhar","doi":"10.1109/C3IT.2015.7060135","DOIUrl":"https://doi.org/10.1109/C3IT.2015.7060135","url":null,"abstract":"In this paper the dynamical changes of wind speed from summer to rainy season due to arrival of monsoon has been described. Wavelet transform based method identifies local dynamics of interest. This is accomplished using strong thresholding, whose advantage is to avoid the arbitary threshold that might conceal variability in raw data. Wavelet local maxima approach differentiates the seasonal variations due to arrival of monsoon. The results are furthur verified with Energy spectrum vs day plots for different seasons which also confirm the substantial changes.","PeriodicalId":402311,"journal":{"name":"Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132601323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An approach to assess the optimality of refining RC4 一种评价RC4精炼最优性的方法
Suman Das, H. Dey, R. Ghosh
{"title":"An approach to assess the optimality of refining RC4","authors":"Suman Das, H. Dey, R. Ghosh","doi":"10.1109/C3IT.2015.7060139","DOIUrl":"https://doi.org/10.1109/C3IT.2015.7060139","url":null,"abstract":"Though RC4 has proved itself as a simple, fast and robust stream cipher and it is trusted by many organizations, a number of researchers claimed that RC4 has some weakness and bias in its internal states. To increase its security, some guidelines recommended discarding some initial bytes like N, 2N or more from the RC4 key-stream (N is 256, generally). In this paper, the authors tried to find out the optimum number of bytes that is to be discarded to have a more secured RC4, by analyzing some variants of it. All the algorithms, including the original one, are analyzed by the NIST Statistical Test Suite and it has been found that it is not necessary discarding more and more number of bytes to increase the security of RC4.","PeriodicalId":402311,"journal":{"name":"Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126601195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A novel rules optimizer with feature selection using rough-entropy-coverage partitioning based reduci 基于粗糙熵覆盖划分约简的特征选择规则优化器
Tapan Chowdhury, S. Setua, Susanta Chakraborty
{"title":"A novel rules optimizer with feature selection using rough-entropy-coverage partitioning based reduci","authors":"Tapan Chowdhury, S. Setua, Susanta Chakraborty","doi":"10.1109/C3IT.2015.7060193","DOIUrl":"https://doi.org/10.1109/C3IT.2015.7060193","url":null,"abstract":"This paper presents a novel approach for optimizing the number of decision rules and select important features based on reduct. We compute the reduct using entropy value of conditional attribute then eradicates the redundant dataset, noisy features and uncertainty of dataset using coverage factor and generate optimized number of rules. Experimental results show that this approach achieves high data reduction with important feature selection as well as optimize the number of rules compared to earlier works.","PeriodicalId":402311,"journal":{"name":"Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116664236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Computational complexity analysis of PTS technique under graphics processing unit 图形处理单元下PTS技术的计算复杂度分析
S. Yadav, P. Pradhan, Sarat Kumar Parra
{"title":"Computational complexity analysis of PTS technique under graphics processing unit","authors":"S. Yadav, P. Pradhan, Sarat Kumar Parra","doi":"10.1109/C3IT.2015.7060162","DOIUrl":"https://doi.org/10.1109/C3IT.2015.7060162","url":null,"abstract":"Peak-to-Average Power Ratio (PAPR) reduction is a important signal processing aspect of Orthogonal Frequency Division Multiplexing (OFDM). Minimization of PAPR can be achieved efficiently using PTS Technique. The main drawback of PTS lies in its computational complexity due to large order of multiple IFFT and phase factor computation. Typically simulation to tune 4 sub-blocks with 4 phase factors in PTS is achievable using standard computing hardware. In this paper we present performance comparison of PTS technique using different number of sub-blocks (V=2, 4, 6 and 8) with different phase factors (W=2, 4 and 8) under Central Processing Unit (CPU) and Graphics Processing Unit (GPU) environments. The performance gain of GPU over CPU in terms of speedup is presented and the computational complexity involved is analyzed. The CPU is approx 3.7×, 7×, and 9× faster than CPU in case of 2, 4, and 8 phase factors respectively.","PeriodicalId":402311,"journal":{"name":"Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114711942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A two-stage style detection approach for printed Roman script words 印刷罗马文字的两阶段风格检测方法
P. Singh, Shantanu Jana, R. Sarkar, N. Das, M. Nasipuri
{"title":"A two-stage style detection approach for printed Roman script words","authors":"P. Singh, Shantanu Jana, R. Sarkar, N. Das, M. Nasipuri","doi":"10.1109/C3IT.2015.7060110","DOIUrl":"https://doi.org/10.1109/C3IT.2015.7060110","url":null,"abstract":"Development of Optical Character Recognition (OCR) for printed Roman script is still an active area of research. Automatic Style Identification (ASI) can be used to improve the performance of OCR system and keyword spotting techniques for printed Roman script. This paper proposes a two stage font invariant technique for detection of italic, bold, underlined, normal and all capital styled words for printed Roman script. In the first stage, the technique separates the underlined words from non-underlined words. In the second stage, a 25-element feature set has been extracted from the non-underlined words to identify the other said styled words which are evaluated using multiple classifiers. The technique has been tested on 2100 words printed in five well-known fonts namely, Arial, Cambria, Calibri, Gill Sans, and Times New Roman in which each of the font contributes exactly about 420 words. Based on the identification accuracies of multiple classifiers, Multi Layer Perceptron (MLP) classifier has been chosen as the final classifier which was tested comprehensively using different folds and with different number of epochs. Overall accuracy of the system is found to be 98.25% using 3-fold cross validation scheme.","PeriodicalId":402311,"journal":{"name":"Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT)","volume":"149 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130862021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzzy VQ based image compression by bacterial foraging optimization algorithm with varying population 基于变种群细菌觅食优化算法的模糊VQ图像压缩
Nandita Sanyal, A. Chatterjee, S. Munshi
{"title":"Fuzzy VQ based image compression by bacterial foraging optimization algorithm with varying population","authors":"Nandita Sanyal, A. Chatterjee, S. Munshi","doi":"10.1109/C3IT.2015.7060121","DOIUrl":"https://doi.org/10.1109/C3IT.2015.7060121","url":null,"abstract":"In this paper, a new variant of bacterial foraging optimization (BFO) algorithm, called bacterial foraging optimization algorithm with varying population (named BFVPA) is proposed for Fuzzy Vector Quantization based image compression. The work shows how BFVPA can be effectively utilized for reduction in average distortion measure between training and reconstructed image and how it can improve upon the performance of BFOA utilized for solving similar problems. In contrast to BFOA, where a fixed population of bacteria is utilized, the basic essence of BFVPA is that the population size undergoes variation through the phases of chemotaxis, metabolism, elimination and quorum sensing, in each iteration. The proposed algorithm has been employed on several benchmark gray scale images and the compression performances are computed in terms of a popular performance index, called PSNR. The performances show that BFVPA is able to provide an overall, superior performance compared to that of BFOA.","PeriodicalId":402311,"journal":{"name":"Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122465544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Stability aspects of single electron threshold logic based 4 bit carry look ahead adder 基于4位进位前置加法器的单电子阈值逻辑稳定性分析
Arpita Ghosh, A. Jain, N. Singh, S. Sarkar
{"title":"Stability aspects of single electron threshold logic based 4 bit carry look ahead adder","authors":"Arpita Ghosh, A. Jain, N. Singh, S. Sarkar","doi":"10.1109/C3IT.2015.7060138","DOIUrl":"https://doi.org/10.1109/C3IT.2015.7060138","url":null,"abstract":"This paper demonstrates the detailed design of carry look ahead adder with the single electron tunneling based threshold logic. Tunneling is a mechanism in which a single electron can cross a sandwiched structure of insulating layer between two conducting materials known as tunnel junction. The threshold logic works mainly on the basis of the comparison in between the threshold and the weighted sum. Here single electron tunneling technology is used for designing threshold logic gates. The proposed circuit is simulated in SIMON environment. The simulated input and output waveforms confirm the proper functioning of the designed circuit. One of the main concerns of our design is the circuit stability aspect. The stability plots of the proposed circuit are simulated and the results are also discussed in the paper.","PeriodicalId":402311,"journal":{"name":"Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124555215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Architecture and secure implementation for video conferencing technique 视频会议技术的体系结构和安全实现
Manoj K. Mishra, S. Mukhopadhyay, G. P. Biswas
{"title":"Architecture and secure implementation for video conferencing technique","authors":"Manoj K. Mishra, S. Mukhopadhyay, G. P. Biswas","doi":"10.1109/C3IT.2015.7060168","DOIUrl":"https://doi.org/10.1109/C3IT.2015.7060168","url":null,"abstract":"With rapid development of various multimedia technologies, ample amount of multimedia data are generated and transmitted for different usage incliding commercial, medical, military etc, and if they are not well protected, the data may be accessed by opponents or unauthorized users. Thus, security and privacy protection of the important messages have become important issues, and a number of techniques based on selective, entropy-based and/or complete encryption are developed. In this paper, we consider some existing cryptographic techniques namely trusted third-party, RSA, GDH.2, RC4 etc. and integrated themselves in such a way that an overall securiy protection to the video conferencing is achieved. Both the required block diagrams and the protools of the proposed scheme are provided, and a security and performance analysis show that it is well secured, computation-efficient and applicable for real life operations.","PeriodicalId":402311,"journal":{"name":"Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124152911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SCARS: A scalable context-aware recommendation system scar:一个可扩展的上下文感知推荐系统
Suman Datta, Joy deep Das, Prosenjit Gupta, S. Majumder
{"title":"SCARS: A scalable context-aware recommendation system","authors":"Suman Datta, Joy deep Das, Prosenjit Gupta, S. Majumder","doi":"10.1109/C3IT.2015.7060210","DOIUrl":"https://doi.org/10.1109/C3IT.2015.7060210","url":null,"abstract":"Recommender Systems (RS) are used to provide personalized suggestions for information, products and services that are not already used or experienced by a user, but are very likely to be preferred by him/her. Most of the existing RS employ variations of Collaborative Filtering (CF) for suggesting items relevant to users' interests. However, CF requires similarity computations that grows polynomially with the number of users and items in the database. In order to handle this scalability problem and speeding up the recommendation process, we propose a clustering based recommendation method. The proposed work utilizes the different user attributes such as age, gender, occupation, etc. as contextual features and then partitions the users' space on the basis of these attributes. We divide the entire users' space into smaller clusters based on the context, and then apply the recommendation algorithm separately to the clusters. This helps us to reduce the running time of the algorithm as we avoid computations over the entire data. In this work, we present a scalable CF framework that extends the traditional CF algorithms by incorporating users context into the recommendation process. While recommending to a target user in a specific cluster, our approach uses the ratings of the target user as well as the rating history of the other users in that cluster. One of the main objectives of our work is to reduce the running time without compromising the recommendation quality much. This ensures scalability, allowing us to tackle bigger datasets using the same resources. We have tested our algorithm on the MovieLens dataset, however, our recommendation approach is perfectly generalized. Experiments conducted indicate that our method is quite effective in reducing the running time.","PeriodicalId":402311,"journal":{"name":"Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126552763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信