P. Singh, Shantanu Jana, R. Sarkar, N. Das, M. Nasipuri
{"title":"A two-stage style detection approach for printed Roman script words","authors":"P. Singh, Shantanu Jana, R. Sarkar, N. Das, M. Nasipuri","doi":"10.1109/C3IT.2015.7060110","DOIUrl":"https://doi.org/10.1109/C3IT.2015.7060110","url":null,"abstract":"Development of Optical Character Recognition (OCR) for printed Roman script is still an active area of research. Automatic Style Identification (ASI) can be used to improve the performance of OCR system and keyword spotting techniques for printed Roman script. This paper proposes a two stage font invariant technique for detection of italic, bold, underlined, normal and all capital styled words for printed Roman script. In the first stage, the technique separates the underlined words from non-underlined words. In the second stage, a 25-element feature set has been extracted from the non-underlined words to identify the other said styled words which are evaluated using multiple classifiers. The technique has been tested on 2100 words printed in five well-known fonts namely, Arial, Cambria, Calibri, Gill Sans, and Times New Roman in which each of the font contributes exactly about 420 words. Based on the identification accuracies of multiple classifiers, Multi Layer Perceptron (MLP) classifier has been chosen as the final classifier which was tested comprehensively using different folds and with different number of epochs. Overall accuracy of the system is found to be 98.25% using 3-fold cross validation scheme.","PeriodicalId":402311,"journal":{"name":"Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT)","volume":"149 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130862021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Architecture and secure implementation for video conferencing technique","authors":"Manoj K. Mishra, S. Mukhopadhyay, G. P. Biswas","doi":"10.1109/C3IT.2015.7060168","DOIUrl":"https://doi.org/10.1109/C3IT.2015.7060168","url":null,"abstract":"With rapid development of various multimedia technologies, ample amount of multimedia data are generated and transmitted for different usage incliding commercial, medical, military etc, and if they are not well protected, the data may be accessed by opponents or unauthorized users. Thus, security and privacy protection of the important messages have become important issues, and a number of techniques based on selective, entropy-based and/or complete encryption are developed. In this paper, we consider some existing cryptographic techniques namely trusted third-party, RSA, GDH.2, RC4 etc. and integrated themselves in such a way that an overall securiy protection to the video conferencing is achieved. Both the required block diagrams and the protools of the proposed scheme are provided, and a security and performance analysis show that it is well secured, computation-efficient and applicable for real life operations.","PeriodicalId":402311,"journal":{"name":"Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124152911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy VQ based image compression by bacterial foraging optimization algorithm with varying population","authors":"Nandita Sanyal, A. Chatterjee, S. Munshi","doi":"10.1109/C3IT.2015.7060121","DOIUrl":"https://doi.org/10.1109/C3IT.2015.7060121","url":null,"abstract":"In this paper, a new variant of bacterial foraging optimization (BFO) algorithm, called bacterial foraging optimization algorithm with varying population (named BFVPA) is proposed for Fuzzy Vector Quantization based image compression. The work shows how BFVPA can be effectively utilized for reduction in average distortion measure between training and reconstructed image and how it can improve upon the performance of BFOA utilized for solving similar problems. In contrast to BFOA, where a fixed population of bacteria is utilized, the basic essence of BFVPA is that the population size undergoes variation through the phases of chemotaxis, metabolism, elimination and quorum sensing, in each iteration. The proposed algorithm has been employed on several benchmark gray scale images and the compression performances are computed in terms of a popular performance index, called PSNR. The performances show that BFVPA is able to provide an overall, superior performance compared to that of BFOA.","PeriodicalId":402311,"journal":{"name":"Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122465544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Facial landmark detection using FAST Corner Detector of UGC-DDMC Face Database of Tripura tribes","authors":"Tumpa Dey, Tamojay Deb","doi":"10.1109/C3IT.2015.7060195","DOIUrl":"https://doi.org/10.1109/C3IT.2015.7060195","url":null,"abstract":"We have performed facial landmark detection of visible face images and studied the performance of Features from Accelerated Segment Test (FAST) Corner Detector technique on IRIS Face Database and newly created UGC-DDMC Face Database to justify the design approach of the face database. This paper describes detection of the facial landmarks of UGC-DDMC face database which includes left eye corners, right eye corners, left eyebrows, right eyebrows, lip corners, nostrils. It consists of two parts: In first part, a morphological opening operation is used to estimate the background. Then create a more uniform background by subtract the background image from original image. In the second part, the facial landmarks had been detected using Fast corner detector technique. The Fast corner detector works on the corner response function (CRF), which is computed as a minimum change of intensity over all possible direction. The Fast corner detector is significantly faster to compute than other algorithms. The experiment has been done over the UGC-DDMC Face Database of Tribes of, which is being developed by IT Department of Dasaratha Deb Memorial College, Khowai, Tripura. In our Experiment initially we used 108 Facial images with different pose from the UGC-DDMC Face Database and 110 images from IRIS Database. Performance results for ntIS database is 100% and UGC-DDMC Database is 74%. It has been seen that algorithmic performance is high with low threshold value and with higher values if shows good performance. Fiducial points obtained during this process will be useful for any feature based Face recognition process. Thus, we can justify the design process of the UGC-DDMC Face Database.","PeriodicalId":402311,"journal":{"name":"Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114615120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LMMSE equalized DCSK communication system over a multipath fading channel with AWGN noise","authors":"Sandip Das, Soumitra Kr Mandal, Moitrayee Chakraborty","doi":"10.1109/C3IT.2015.7060167","DOIUrl":"https://doi.org/10.1109/C3IT.2015.7060167","url":null,"abstract":"The advances in the development of chaos based communication system suggests that chaos shift keying (CSK) and its variant Differential CSK (DCSK) are one of the most promising candidates for practical implementation. In this paper a DCSK communication system incorporating a non coherent approach of demodulation based on a correlation detector is considered over a multipath fading channel. Specifically, it can be anticipated that the channel will introduce attenuation and cause distortion in the transmitted sequence due to fading and multipath. This distortion will cause Intersymbol interference (ISI) and will also add noise. Channel equalizers are capable of removing ISI from the transmitted sequence and also noise. In this paper the performance of a linear MMSE channel equalizer is analysed for a DCSK communication system over a multipath fading channel with additive white Gaussian noise.","PeriodicalId":402311,"journal":{"name":"Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124240869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of structured irregular LDPC codes from structured regular LDPC codes","authors":"V. Kulkarni, K. J. Sankar","doi":"10.1109/C3IT.2015.7060128","DOIUrl":"https://doi.org/10.1109/C3IT.2015.7060128","url":null,"abstract":"Irregular Low-Density Parity-Check (LDPC) codes exhibit a performance extremely close to the Shannon capacity formula. In this paper, we presented a method of developing structured irregular LDPC codes from structured regular LDPC codes. The design is based on the expansion of the column-weight two LDPC codes. We used our proposed technique of developing a column-weight two structured regular LDPC codes based on Gray code representations and adapted the expansion method proposed in literature to convert regular codes into irregular ones, and it is noticed that there is an improvement in obtained code rates using the proposed technique. It is also found that encoding process is simpler and requires less memory.","PeriodicalId":402311,"journal":{"name":"Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125201658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new clustered load balancing approach for distributed systems","authors":"Moumita Chatterjee, S. Setua","doi":"10.1109/C3IT.2015.7060188","DOIUrl":"https://doi.org/10.1109/C3IT.2015.7060188","url":null,"abstract":"A distributed system consists of several autonomous nodes, where some of the nodes may be overloaded due to a large number of job arrivals while others nodes are idle without any processing. Load Balancing is used for effectively distributing the load among the nodes. Centralized load balancing schemes are not scalable as the load balancing decision depends on a central server. In contrast fully distributed schemes are scalable but they do not produce a balanced load distribution as they use local information. In this paper we propose a clustered load balancing policy for a heterogeneous distributed computing system. Our algorithm estimates different system parameters like CPU Utilization, Memory Utilization, CPU Queue length, and Response time of the system to decide the workload of each node. The proposed strategy privileges local load balancing over global load balancing and thus reduces communication over global network. Simulation results show that the proposed algorithm performs well.","PeriodicalId":402311,"journal":{"name":"Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124984830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Frequent pattern generation in association rule mining using weighted support","authors":"Subrata Bose, Subrata Datta","doi":"10.1109/C3IT.2015.7060207","DOIUrl":"https://doi.org/10.1109/C3IT.2015.7060207","url":null,"abstract":"Determination of frequent sets from a large database is the key to Association Rule mining from the point view of efficiency of algorithms to scale up and discovering frequent sets which lead to useful association rules. Some of the existing methods have either very low or very high pruning, which is the cause of generation of larger or lesser number of frequent patterns. In this paper we have adopted a balanced approach for frequent pattern selection. Our proposed measure weighted support considers association and dissociation among items as well as the impact of null transactions on them for frequent set generation. Impact of increasing itemset size on weighted support gives rise to variable threshold The experimental results obtained after implementation of the proposed algorithm justify the approach.","PeriodicalId":402311,"journal":{"name":"Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123286238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of fuzzy based intelligent energy efficient routing protocol for WANET","authors":"S. Das, S. Tripathi, A. P. Burnwal","doi":"10.1109/C3IT.2015.7060201","DOIUrl":"https://doi.org/10.1109/C3IT.2015.7060201","url":null,"abstract":"Wireless ad-hoc networks (WANET) have recently emerged as a premier research topic due to its infrastructure-less and dynamic natures. Topologies of this network can changes very frequently due to its dynamic nature. The node of this network fitted with limited capacity battery which is major problem in real-time operation. The present paper proposes a routing protocol; named Fuzzy based Intelligent Energy Efficient Routing protocol (FIE2R) for WANET. The entire operation of FIE2R is handle by decision maker which divide the entire process into two phases first is WANET graph initiation phase that helps to find out reward of each route into second phase. Based on the comprehensive simulation of FIE2R using MATLAB and NS2 and comparative study of same with other existing protocols, it is observed that proposed routing protocol contributes to the performance improvements in terms of energy efficiency.","PeriodicalId":402311,"journal":{"name":"Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117139765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Characteristics of a planar metal antenna in vicinity of human head at 900 MHz and 1800 MHz","authors":"S. Mondal, P. Sarkar","doi":"10.1109/C3IT.2015.7060205","DOIUrl":"https://doi.org/10.1109/C3IT.2015.7060205","url":null,"abstract":"In this paper a parametric study on characteristics of a planar metal antenna in vicinity of a homogenous human head at 900 MHz and 1800 MHz are carried out. Initially the planar metal antenna is designed at 900 MHz and 1800 MHz. The impedance and radiation characteristics of these antennas are shown in free space and in proximity of a human head. Also Specific Absorption Rate (SAR) for different distances of the antenna from head are evaluated and compared.","PeriodicalId":402311,"journal":{"name":"Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115950240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}