2014 International Conference on Contemporary Computing and Informatics (IC3I)最新文献

筛选
英文 中文
Video retrieval: An accurate approach based on Kirsch descriptor 视频检索:一种基于Kirsch描述符的精确方法
2014 International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019753
B. H. Shekar, K. R. Holla, M. Kumari
{"title":"Video retrieval: An accurate approach based on Kirsch descriptor","authors":"B. H. Shekar, K. R. Holla, M. Kumari","doi":"10.1109/IC3I.2014.7019753","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019753","url":null,"abstract":"In this paper, a video retrieval model is developed based on Kirsch local descriptor. In the first stage, the input video is segmented into shots and keyframes are extracted. In the next stage, local descriptors are extracted from each keyframe and clustered into k clusters using k-means clustering procedure. Given a query frame, the local descriptors are extracted from it in a similar manner, and then compared with the descriptors of the database video using k-nearest neighbor search algorithm to find the matching keyframe. Experiments have been performed on the TRECVID video segments to demonstrate the performance of the proposed approach for video retrieval applications.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114078960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A novel cross layer wireless mesh network protocol for distributed generation in electrical networks 一种用于电网分布式发电的新型跨层无线网状网络协议
2014 International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019824
S. V. Vambase, S. Mangalwede
{"title":"A novel cross layer wireless mesh network protocol for distributed generation in electrical networks","authors":"S. V. Vambase, S. Mangalwede","doi":"10.1109/IC3I.2014.7019824","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019824","url":null,"abstract":"One of the most widely used resources is electricity. However, electrical network has a serious issue of uniform distribution of electricity. This paper investigates the distributed generation systems in electrical network and proposes an interdisciplinary mechanism for effective sharing of electricity across the electrical sub-network. The proposed mechanism is based on wireless mesh network and micro-controller. The proposed system forms a wireless mesh network used to exchange information (such as current status, predicted status of electricity generators) between mesh nodes (in WMN). The information from mesh node is used by micro-controller to drive the electrical devices. The micro-controller is responsible for controlling the direction of flow of electricity and quantity of electricity to be permitted on a particular part of electrical network.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114198433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
High performance single and multi-GPU acceleration for Diffuse Optical Tomography 用于漫射光学断层成像的高性能单和多gpu加速
2014 International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019809
M. Saikia, R. Kanhirodan
{"title":"High performance single and multi-GPU acceleration for Diffuse Optical Tomography","authors":"M. Saikia, R. Kanhirodan","doi":"10.1109/IC3I.2014.7019809","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019809","url":null,"abstract":"Diffuse Optical Tomography (DOT) is a diagnostic imaging modality, where optical parameters such as absorption and scattering coefficient distributions inside the living tissue are recovered to understand the structural and functional variations in the tissue under study. The numerical method of DOT image reconstruction is an iterative process that demands high computational power, especially in the case of recovering fully three dimensional (3D) optical property distribution inside a complex geometry such as human head which hampers physician to view reconstructed images and monitor a patient in real time. In order to reconstruct 3D DOT images at a high speed, Broyden method based iterative image reconstruction algorithm and a parallelization strategy are employed in CUDA parallel computing platform to utilize tremendous computational power of GPU. Three different single GPU systems equipped with Nvidia Tesla C2070, Tesla k20c and Tesla k40 respectively, and a muti-GPU (two Tesla M2090 GPUs) in a computing node in a HPC cluster are used to evaluate computation performance due to algorithmic improvement and GPU parallel computation. We have used three dimensional finite element method (FEM) and discretized an infant head into 45702 tetrahedral elements and 8703 nodes to solve the forward and inverse problems. We have achieved a significant speedup for the 3D DOT image reconstruction of the head phantom.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114536581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
An application of Fourier statistical features in scene text detection 傅里叶统计特征在场景文本检测中的应用
2014 International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019660
H. C. Vinod, S. Niranjan, V. N. Manjunath Aradhya
{"title":"An application of Fourier statistical features in scene text detection","authors":"H. C. Vinod, S. Niranjan, V. N. Manjunath Aradhya","doi":"10.1109/IC3I.2014.7019660","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019660","url":null,"abstract":"Text that appears in images contains important and useful data. Text detection and extraction in images have been applied in many applications. In this paper, we propose n Fourier-Statistical Features in RGB space and Mathematical statistical method for detecting and extracting text in camera images. In RGB space Fourier-Statistical Features is used for detecting text in the image of complex background, contrasting fonts, distinct scripts and different font sizes, In RGB space Fourier transform based features with statistical features and then figured out Fourier-Statistical Features from RGB bands are subject to Fuzzy C-means clustering to classify text pixels from the image background. Classified text pixels of text blocks are determined by inspecting the projection profiles, mathematical statistical method and extract the text part from the image. The suggested approach is examined by carrying on experiments on images of low contrast, complex background, multilingual languages, contrasting fonts, and sizes of text in the image.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116752083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Architectural semantics of AADL using Event-B 使用Event-B的AADL体系结构语义
2014 International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019780
Meenakshi D'Souza, S. Ramesh, M. Satpathy
{"title":"Architectural semantics of AADL using Event-B","authors":"Meenakshi D'Souza, S. Ramesh, M. Satpathy","doi":"10.1109/IC3I.2014.7019780","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019780","url":null,"abstract":"AADL (Architectural Analysis and Design Language) can describe the architecture of an embedded control system at various levels of abstraction. In addition, AADL supports refinement mechanisms for refining abstract models to more detailed ones. However, the refinement mechanism in AADL is of informal nature. Event-B is an independent formal modelling notation for rigorous development of software systems. In Event-B, consistency of a model and refinement relationship can be formally verified. In this paper, we consider a meaningful subset of AADL, and give its semantics in terms of refinement and model decomposition mechanism of Event-B. An AADL model at any level of abstraction can be mapped to an Event-B model, and in the process, the informal refinement relationship between AADL models can be formalized in Event-B. In addition, the decomposition of a component into sub-components can be mapped to Event-B decomposition. We discuss our approach by referring to the case study of a simplified Cruise Controller.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114440041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Designing challenges to utilize white-space for configurable femtocell base on slotted TDM 基于开槽时分复用的可配置基站利用空白空间的设计挑战
2014 International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019640
Nikhil P. Wyawahare, S. Haridas
{"title":"Designing challenges to utilize white-space for configurable femtocell base on slotted TDM","authors":"Nikhil P. Wyawahare, S. Haridas","doi":"10.1109/IC3I.2014.7019640","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019640","url":null,"abstract":"This paper is based on deployment of white spaces which are free or unused frequency space. This term related with Television frequency broadcast range is known as TV White Space (TVWS). So the transition of analog TV signals into digital TV signals results in creation of some more free frequency spectrum that also adds up to more TV white Spaces, since earlier TV channels which were being transmitted were allotted a certain UHF/VHF frequency channel bands. Now these TV channels are encoded digitally in a slightly different band and then transmitted. With this, the availability of White Space Spectrum has increased and so, many wireless solution providers are getting attracted to develop and deploy as opportunistic spectrum access in Wi-Fi like systems working on TV White Spaces. In time domain (TDMA) these white spaces can be referred as free or unused time slots. And are selected for transmission of messages using message generator, here selection and detection is done at transmitter section.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128250263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Power cognizant algorithms using slack reclamation method 基于松弛回收方法的功率认知算法
2014 International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019696
B. Beena, C. Prashanth
{"title":"Power cognizant algorithms using slack reclamation method","authors":"B. Beena, C. Prashanth","doi":"10.1109/IC3I.2014.7019696","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019696","url":null,"abstract":"In this paper, we present few energy-cognizant algorithms using slack reclamation method. In the present design, the Earliest-Deadline-First (EDF) scheduling policies have been employed on the both CPUs for the dynamic tasks and FIFO scheduling for static tasks. When a new task arrives and the primary processor is active then that task will be scheduled in secondary if that processor is inactive else based on priority context switching will happen. The proposed System shows significant energy saving compared to existing SSPT algorithms.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133894252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SAHI vs. Selenium: A comparative analysis SAHI与硒:比较分析
2014 International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019594
Thanuja Janarthana Naidu, Nor Asyikin Basri, Saravanan Nagenthram
{"title":"SAHI vs. Selenium: A comparative analysis","authors":"Thanuja Janarthana Naidu, Nor Asyikin Basri, Saravanan Nagenthram","doi":"10.1109/IC3I.2014.7019594","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019594","url":null,"abstract":"Functional testing for wireless based graphic user interfaces is one of the most routine and basic quality verification and validation on telecommunication products. These tests are often done based on requirements and specifications set and defined by product designers and original equipment manufacturers. As manual testing consumes considerable resource, having various time-to-market periods and user scenarios, automation is vital for testing. There are several tools that could perform automation, so we have conducted a study on two of the most commonly used web automation testing tools to allow test engineers and web and wireless software developers to make an informed decision on which tools to use based on their needs and resource. Which tool would give the best user experience? Which is easier to learn and maintain? Which tool needs lesser test resources and how convenient would the setup be for multiple iteration testing cycles? These, among other questions are answered during the course of this white paper.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133602660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An approach for face detection using artificial intelligence 一种基于人工智能的人脸检测方法
2014 International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019739
Vandana S. Bhat, J. Pujari
{"title":"An approach for face detection using artificial intelligence","authors":"Vandana S. Bhat, J. Pujari","doi":"10.1109/IC3I.2014.7019739","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019739","url":null,"abstract":"This paper proposes a method for detecting faces in a given image by combining Gabor filter and Neural network. The first phase uses gabor filter which generates a feature set. Face and non face templates is taken and processed with gabor filter.The face images are present in spatial (time) domain. The conversion of images into frequency domain is processed through inverse fast fourier transform. The subsequent frequency domain images is conjugated with gabor filter bank and feature vector is generated. The second phase involves a method where all the features are given as input to neural network of 2 hidden layer with scaled conjugate training. Thus this approach being deployed, is a convolution of Gabor filter with frequency domain of training and test images provided a feature vector that was sourced to neural network. Proposed system was tested and the results indicated the efficient performance.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133935279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey on interoperability, security, trust, privacy standardization of cloud computing 云计算的互操作性、安全、信任、隐私标准化研究
2014 International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019735
C. Saravanakumar, C. Arun
{"title":"Survey on interoperability, security, trust, privacy standardization of cloud computing","authors":"C. Saravanakumar, C. Arun","doi":"10.1109/IC3I.2014.7019735","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019735","url":null,"abstract":"Cloud computing is a service oriented concept which offers everything as a service. These services are deployed at the server with necessary credentials in order to provide reliable services to the customer. The customer always wants to process and store the data in the cloud with an efficient access over different location. The security is the key parameter to secure the customer's data. The cloud computing security issues are addressed in various standards and techniques which lacks in providing a complete solution. The privacy issues in the cloud access are handled and assessed by using privacy protocols and assessment techniques which are also addressed. The trust issues in cloud computing has been addressed with different models. An inter-cloud and intra-cloud standard of cloud interoperability has been identified in order to highlight the challenges exist during the cloud interaction. The cloud resources are deployed over cloud environment with different models also faces a problem. This paper focuses on a recent survey related to the cloud interoperability, security, privacy and trust based on standards and guidelines have been analyzed. The overall focus on this paper is to establish an interoperability among different cloud service providers for effective interaction by maximizing the QoS of cloud computing.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133000618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信