{"title":"An integrated system for tracking and recognition using Kalman filter","authors":"A. Vijay, Anoop K. Johnson","doi":"10.1109/ICCICCT.2014.6993118","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993118","url":null,"abstract":"Tracking of any object from a video scene becomes more critical not only for security applications but also for analyzing traffic. This system integrates low level image processing as well as high level image processing through online data model and offline data model for more efficiency and robustness. Also this makes the system to handle occlusion conditions and abrupt color intensity variation conditions. This system uses median filtering and blob extraction for moving object detection. The offline model employs high level image processing recognize the moving objects. Here the Kalman filter is used for effective tracking under complex situations.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"10 1","pages":"1065-1069"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85204647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A review on hyperspectral image compression","authors":"Sanjith S, Ganesan R","doi":"10.1109/ICCICCT.2014.6993136","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993136","url":null,"abstract":"The growth of small satellite communication technologies, demands for data transmission and storage is rapidly increased. The advancements in computer technology and digital data processing techniques improves the efficiency of transmission and storage of data. Recently hyperspectral image compression has got considerable attention and so many researches had been made in this field and got positive results in compression ratio. In this paper we have made a state-of-the-art investigation about hyperspectral image compression which can be used in satellites onboard compression. Mainly this investigation is focused on lossy, lossless and near lossless compression methods and methodologies used to perform the compression. Topics covered includes Distributed Source Coding (DSC), Slepian-Wolf theory, M-CALIC, LAIS-LUT, FIVQ, DCT, JPEG2000 Multidimensional lattice vector quantization. As a final point the merits and demerits are discussed.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"76 3 1","pages":"1159-1163"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87856029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of various ARP poisoning mitigation techniques: A comparison","authors":"Nikhil Tripathi, B. Mehtre","doi":"10.1109/ICCICCT.2014.6992942","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992942","url":null,"abstract":"Address Resolution Protocol (ARP) is the fundamental and one of the most frequently used protocol involved in computer communications. Within a LAN, ARP messages are used to resolve IP addresses into corresponding MAC addresses. Nevertheless, some of the limitations within this protocol make it rather vulnerable. The two most prominent limitations are - unauthenticated and stateless nature of ARP. The attackers can easily exploit these loopholes for their personal gain. ARP poisoning is considered as unitary of the basic attacks which is utilized to launch higher level attacks. Several solutions have been proposed in the literature to detect and prevent these attacks. However, all of the proposed solutions are limited to a certain extent. Some solutions are effective in a special set of scenarios while others are rather suited for scenarios belonging to a different band. As new techniques of ARP poisoning have evolved with time, researchers are getting motivated to propose new solutions. In this paper, we have presented a comparative analysis of different proposed solutions which are rather popular in the literature. We have compared different mitigation techniques based on some of the important factors that are considered as limitations to the proposed solutions. These factors are derived from the scenarios which are possible within a LAN when an ARP Poisoning attack is launched. A brief tabular format is likewise introduced in this paper which offers a fast overview of comparison between different proposed schemes. This comparative study can further be used to offer and build up a more efficient and effective scheme which, on one hand, enjoys the combined advantage of different mitigation techniques and on the other hand, does not hold the old limitations.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"69 1","pages":"125-132"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73435204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A retrospective study based on the soft computing approach in Electro Chemical discharge machining","authors":"J. Joe, Jeba Rajan, M. Dev Anand, P. Gopu","doi":"10.1109/ICCICCT.2014.6993194","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993194","url":null,"abstract":"The improvement in materials strength as days goes and goes, hybrid type of unconventional machining process has been developed and continuous. In that case researchers developed the combined process of Electro Chemical Machining (ECM) and Electrical Discharge Machining (EDM) for increase the quality of the components. In this current review work, the setting of different levels of parameters in Electro Chemical Discharge Machining (ECDM) and their corresponding effect in the various responses has been studied. The different prediction and optimization approaches used for control the parameters in different work also reviewed.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"4 1","pages":"1482-1486"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90636073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Gopi Krishna Rao, M. Subramanyam, K. Satyaprasad
{"title":"Study on PID controller design and performance based on tuning techniques","authors":"P. Gopi Krishna Rao, M. Subramanyam, K. Satyaprasad","doi":"10.1109/ICCICCT.2014.6993183","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993183","url":null,"abstract":"The simplicity, ease of implementation and robustness has attracted the use of Proportional, Integral and Derivative (PID) controllers in the chemical process industries. Numerous tuning techniques are available for tuning of PID controllers, each one of it has its pros and cons. Majority of the tuning techniques are proposed for First Order System with Time Delay (FOPDT). This paper presents the technique for obtaining the FOPDT model using Sundaresan and Krishnaswamy method and performance comparison of PID controller based on open loop, closed loop tuning techniques and PID controller tuned with Internal Model Control (IMC) technique for setpoint tracking and disturbance rejection. Analysis is carried out in terms of Integral error criteria's, Integral Absolute Error (IAE) and Integral Squared Error (ISE) and time response information viz. rise time, settling time, % peak overshoot and maximum sensitivity. Superheated steam temperature system of 500 MW boiler and Mean arterial blood pressure system are considered for the simulation study. The results indicate that the ratio of time delay and time constant have influence on the performance of the tuning techniques. IMC - PID provides the flexibility of adjustment for desired performance in comparison to other tuning techniques.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"23 1","pages":"1411-1417"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78229963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mining relationships from text in social networking sites","authors":"Munish Bhargav, A. Bhargav","doi":"10.1109/ICCICCT.2014.6992925","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992925","url":null,"abstract":"Majority of an individual's social interaction takes place through social networking site like Facebook. But one thing to focus is that the way we interact with different people through these social networking sites are different. If we are interacting with our close friends we use more informal language whereas with our relatives or elders and with our seniors at job interaction is little less informal or some time formal also as compared to the interaction with close friends. This difference in interaction can be a good measure of guessing relationship of the persons interacting with each other through these social networking sites. In this research paper we collected data through one of the very famous and very fast growing social networking site, Facebook. We considered comments, wall posts and messages exchanged through chat boxes of some people. From this data we have extracted some very interesting features like difference in number of emoticons, type of emoticons, degree of informal language, degree of intentional spelling mistakes, frequency of social acronyms and degree and type of interjections used in interaction of different people. We have used these features for mining relationships of the people involved in online social interaction.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"69 1","pages":"31-35"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78703650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FPGA partitioning and synthesis of reconfigurable video compression module","authors":"Neena Baby, C. Pradeep","doi":"10.1109/ICCICCT.2014.6992987","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992987","url":null,"abstract":"Nowadays Field Programmable Gate Arrays (FPGAs) are increasingly considered in space applications as they are flexible and reprogrammable. They play an important role in geographical and weather forecasting processes. However, these devices are sensitive to the effects of radiation especially in modern de signs that deal with smaller CMOS structures. This paper discusses the various steps involved in designing a video compression system that can be used for space applications. A brief idea of a self-repairing algorithm is also proposed that can help in sustaining the compression system for a longer duration. The algorithm is based on modern reconfigurable architectures. The different steps involved in compression are designed using Verilog HDL. The design is simulated and synthesized using Xilinx IS E 14.2.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"32 1","pages":"360-364"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78889940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"American Sign Language interpreter system for deaf and dumb individuals","authors":"S. Upendran, A. Thamizharasi","doi":"10.1109/ICCICCT.2014.6993193","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993193","url":null,"abstract":"The proposed scheme recognizes and interprets American Sign Language symbols that have static gestures. The system provides an opportunity for deaf and dumb individuals to communicate and learn using computers. American Sign Language is a widely used and accepted standard for communication by people with hearing and speaking impairments. The proposed system recognizes and translates static hand gesture of alphabets in AS L into textual output. This text can further be converted into speech. The user of the system is free from data acquisition devices. The concepts of Principal Component Analysis (PCA) are used on the static gesture images of the AS L alphabet. The PCA features extracted from the image are used to classify the image into one of the AS L alphabet. The recognition of AS L gestures results in a textual output and is then can be converted into speech. Thus, the scheme helps the hearing and speech impaired to talk using computers.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"1 1","pages":"1477-1481"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76765331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Hasitha, N. S. Chinmayi, B. Sravya, V. K. Mittal
{"title":"Robot for the physically challenged","authors":"C. Hasitha, N. S. Chinmayi, B. Sravya, V. K. Mittal","doi":"10.1109/ICCICCT.2014.6993172","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993172","url":null,"abstract":"In the past decade, robotic applications in human life have made significant progress. However, mobility of robots and user convenience of their control is still a challenge. Utility of robots for a physically challenged person, with practicality and ease of operation, is another issue. In this paper, a robotic solution is proposed for utilization by the physically challenged. A prototype robot is developed using RF signals, with voice control or remote control options. The human voice/remote controlled robot, has obstacle avoidance and edge avoidance features as well. The prototype is useful for applications in diverse fields.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"86 1","pages":"1349-1354"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76975241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An examination of next generation IP migration techniques: Constraints and evaluation","authors":"Junaid Latief Shah, J. Parvez","doi":"10.1109/ICCICCT.2014.6993064","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993064","url":null,"abstract":"IP Next Generation (IPng) or IPv6 engineered by IETF is the successor of IPv4, the contemporary version of Internet Protocol. IPv6 is designed to solve the long term performance, reliability and scalability problems of IPv4. Although IPv6 implementation is yet to attain a maturity level, its success will ultimately depend on its implementation in a broader perspective. The IPv6 network migration is seen as an intricate daunting task impeding its evolution. Nevertheless with emergence of new IPv6 migration techniques, its complete integration with current IP networks seems to be achievable in near future. This paper attempts to examine current IP transitioning techniques and outlines the key deployment issues, challenges and migration paths. The paper also makes an empirical evaluation of three most commonly used transition mechanisms namely Dual Stack, Automatic 6to4 Tunneling and Manual 6in4 Tunneling and makes a comparison of performance metrics with native IPv6 environment. The simulation results are significant and give an insight about choosing best transition technique and an idea about network migration and capacity planning. The simulation-based comparison has been carried using OPNET (ver. 14.5) simulation framework.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"348 1","pages":"776-781"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77322345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}