Pub Date : 2011-12-01DOI: 10.1109/WICT.2011.6141312
Sahana Bhosale, R. Daruwala
In broadband wireless access network, continuous high speed data communication can be provided to mobile subscribers by well designed mobility management, where handover is a key element in maintaining air link to base station even in high velocity. When a mobile station changes its geographical position, it may also need to change its attachment point in the network in order to retain the quality of the connection. Currently, the mobility of a terminal is a requirement of great importance, supported by a procedure known as handover. Horizontal Handover (HHO) is a symmetric process and happens within the same technology e.g between different Wifi cells. If it is executed between different technologies, for example, WiMAX to Wi-Fi, then it is called vertical HO. In this paper, initially we have investigated the performance of horizontal handovers within Wifi cells and then that of vertical handover between Wi-Fi and WiMAX. Evaluation of packet loss is done while transferring constant bit rate traffic (CBR) for UDP protocol This experiment can be used for academic purpose to help students understand the concept of handover.
{"title":"Experimental analysis of horizontal and vertical handovers in wireless access networks using NS2","authors":"Sahana Bhosale, R. Daruwala","doi":"10.1109/WICT.2011.6141312","DOIUrl":"https://doi.org/10.1109/WICT.2011.6141312","url":null,"abstract":"In broadband wireless access network, continuous high speed data communication can be provided to mobile subscribers by well designed mobility management, where handover is a key element in maintaining air link to base station even in high velocity. When a mobile station changes its geographical position, it may also need to change its attachment point in the network in order to retain the quality of the connection. Currently, the mobility of a terminal is a requirement of great importance, supported by a procedure known as handover. Horizontal Handover (HHO) is a symmetric process and happens within the same technology e.g between different Wifi cells. If it is executed between different technologies, for example, WiMAX to Wi-Fi, then it is called vertical HO. In this paper, initially we have investigated the performance of horizontal handovers within Wifi cells and then that of vertical handover between Wi-Fi and WiMAX. Evaluation of packet loss is done while transferring constant bit rate traffic (CBR) for UDP protocol This experiment can be used for academic purpose to help students understand the concept of handover.","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"17a 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128190910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/WICT.2011.6141449
A. Q. Ansari, N. Gupta
In this paper, a Neuro-Fuzzy integrated system, which is based on fuzzy inference system using on-line learning ability of neural network is presented. By using on-line learning procedure, the proposed neuro-fuzzy integrated system (NFIS) can be used to construct an input-output mapping based on fuzzy if-then rules and the tuning of the parameters of membership function. The membership functions for NFIS have been realized using operational transconductance amplifier (OTA). Attention is given to design the circuits with low power consumption 2.91mW and size less than 0.65 mm2 within the neuro-fuzzy chip. SPICE simulations showed that they are suitable to real time application.
{"title":"Neuro-Fuzzy integrated system and its VLSI design for generating membership function","authors":"A. Q. Ansari, N. Gupta","doi":"10.1109/WICT.2011.6141449","DOIUrl":"https://doi.org/10.1109/WICT.2011.6141449","url":null,"abstract":"In this paper, a Neuro-Fuzzy integrated system, which is based on fuzzy inference system using on-line learning ability of neural network is presented. By using on-line learning procedure, the proposed neuro-fuzzy integrated system (NFIS) can be used to construct an input-output mapping based on fuzzy if-then rules and the tuning of the parameters of membership function. The membership functions for NFIS have been realized using operational transconductance amplifier (OTA). Attention is given to design the circuits with low power consumption 2.91mW and size less than 0.65 mm2 within the neuro-fuzzy chip. SPICE simulations showed that they are suitable to real time application.","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124255722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/WICT.2011.6141236
G. Govindan, A. Nair
It is widely recognized that the information from the amino acid sequence can serve as crucial pointers in predicting subcellular location of proteins. We introduce a new feature vector for predicting proteins targeted to various compartments in the intracellular and secretory pathway from protein sequence. Features are based on the global Composition, Transition and Distribution (CTD) of amino acid attributes such as hydrophobicity, normalized van der Waals volume, polarity, polarizability, charge, secondary structure and solvent accessibility. Sequences are considered in three equal parts and the features are extracted separately for all the three parts. Based on the feature vectors, we have trained a Support Vector Machine to classify intracellular and secretory proteins. Our method gives an accuracy of 92% in human, 88% in plant and 95% in fungi with independent dataset at root level of the protein sorting pathway.
{"title":"Classification of proteins in intracellular and secretory pathway using global descriptors of amino acid sequence","authors":"G. Govindan, A. Nair","doi":"10.1109/WICT.2011.6141236","DOIUrl":"https://doi.org/10.1109/WICT.2011.6141236","url":null,"abstract":"It is widely recognized that the information from the amino acid sequence can serve as crucial pointers in predicting subcellular location of proteins. We introduce a new feature vector for predicting proteins targeted to various compartments in the intracellular and secretory pathway from protein sequence. Features are based on the global Composition, Transition and Distribution (CTD) of amino acid attributes such as hydrophobicity, normalized van der Waals volume, polarity, polarizability, charge, secondary structure and solvent accessibility. Sequences are considered in three equal parts and the features are extracted separately for all the three parts. Based on the feature vectors, we have trained a Support Vector Machine to classify intracellular and secretory proteins. Our method gives an accuracy of 92% in human, 88% in plant and 95% in fungi with independent dataset at root level of the protein sorting pathway.","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128963107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/WICT.2011.6141229
T. Gopalakrishnan, S. Ramakrishnan, K. Balasamy, A.S. Muthananda Murugavel
In this paper, the requirements, techniques and applications of digital watermarking for high-quality images were discussed. The several classes of digital watermarking techniques defined by their appearance and application domains specify the requirements and summarize the current research efforts in the image applications. An optimal watermark embedding method is developed to achieve minimum watermarking distortion. A secret embedding key is designed to securely embed the fragile watermarks so that the method is robust to counterfeiting, even when the malicious attackers are fully aware of the watermark embedding algorithm. For robustness this algorithm should resist all kinds of attacks, such as common signal processing operators, geometric attacks and so on.
{"title":"Semi fragile watermarking using Gaussian mixture model for malicious image attacks","authors":"T. Gopalakrishnan, S. Ramakrishnan, K. Balasamy, A.S. Muthananda Murugavel","doi":"10.1109/WICT.2011.6141229","DOIUrl":"https://doi.org/10.1109/WICT.2011.6141229","url":null,"abstract":"In this paper, the requirements, techniques and applications of digital watermarking for high-quality images were discussed. The several classes of digital watermarking techniques defined by their appearance and application domains specify the requirements and summarize the current research efforts in the image applications. An optimal watermark embedding method is developed to achieve minimum watermarking distortion. A secret embedding key is designed to securely embed the fragile watermarks so that the method is robust to counterfeiting, even when the malicious attackers are fully aware of the watermark embedding algorithm. For robustness this algorithm should resist all kinds of attacks, such as common signal processing operators, geometric attacks and so on.","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126472950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/WICT.2011.6141444
T. Bera, S. K. Biswas, K. Rajan, N. Jampana
Conductivity image reconstruction is studied with a Block Matrix based Multiple Regularization (BMMR) technique in Electrical Impedance Tomography (EIT) using practical phantoms. The response matrix (JTJ) is partitioned into several sub-block matrices and the largest element of each sub-block matrices is taken as regularization parameter for the nodes of the FEM mesh contained by that sub-block. Boundary potential data are collected from practical phantoms with different inhomogeneity configurations and the conductivity images are reconstructed in a Model Based Iterative Image Reconstruction (MoBIIR) algorithm. Conductivity images, reconstructed with BMMR technique, are compared with the images obtained with Single-step Tikhonov Regularization (STR) and modified Levenberg-Marquardt Regularization (LMR) methods. Results show that BMMR technique reduces the reconstruction error and reconstruct the better conductivity images by improving the conductivity profile of the domain under test for all the phantoms. Image analysis showed that the BMMR method improves image contrast parameters, conductivity profiles, and spatial resolution of the reconstructed images.
{"title":"Improving the image reconstruction in Electrical Impedance Tomography (EIT) with block matrix-based Multiple Regularization (BMMR): A practical phantom study","authors":"T. Bera, S. K. Biswas, K. Rajan, N. Jampana","doi":"10.1109/WICT.2011.6141444","DOIUrl":"https://doi.org/10.1109/WICT.2011.6141444","url":null,"abstract":"Conductivity image reconstruction is studied with a Block Matrix based Multiple Regularization (BMMR) technique in Electrical Impedance Tomography (EIT) using practical phantoms. The response matrix (JTJ) is partitioned into several sub-block matrices and the largest element of each sub-block matrices is taken as regularization parameter for the nodes of the FEM mesh contained by that sub-block. Boundary potential data are collected from practical phantoms with different inhomogeneity configurations and the conductivity images are reconstructed in a Model Based Iterative Image Reconstruction (MoBIIR) algorithm. Conductivity images, reconstructed with BMMR technique, are compared with the images obtained with Single-step Tikhonov Regularization (STR) and modified Levenberg-Marquardt Regularization (LMR) methods. Results show that BMMR technique reduces the reconstruction error and reconstruct the better conductivity images by improving the conductivity profile of the domain under test for all the phantoms. Image analysis showed that the BMMR method improves image contrast parameters, conductivity profiles, and spatial resolution of the reconstructed images.","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126428535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/WICT.2011.6141398
Vinod Kumar, J. Sachdeva, I. Gupta, N. Khandelwal, C. Ahuja
The present study is conducted to assist radiologists in marking tumor boundaries and in decision making process for multiclass classification of brain tumors. Primary brain tumors and secondary brain tumors along with normal regions are segmented by Gradient Vector Flow (GVF)-a boundary based technique. GVF is a user interactive model for extracting tumor boundaries. These segmented regions of interest (ROIs) are than classified by using Principal Component Analysis-Artificial Neural Network (PCA-ANN) approach. The study is performed on diversified dataset of 856 ROIs from 428 post contrast T1- weighted MR images of 55 patients. 218 texture and intensity features are extracted from ROIs. PCA is used for reduction of dimensionality of the feature space. Six classes which include primary tumors such as Astrocytoma (AS), Glioblastoma Multiforme (GBM), child tumor-Medulloblastoma (MED) and Meningioma (MEN), secondary tumor-Metastatic (MET) along with normal regions (NR) are discriminated using ANN. Test results show that the PCA-ANN approach has enhanced the overall accuracy of ANN from 72.97 % to 95.37%. The proposed method has delivered a high accuracy for each class: AS-90.74%, GBM-88.46%, MED-85.00%, MEN-90.70%, MET-96.67%and NR-93.78%. It is observed that PCA-ANN provides better results than the existing methods.
{"title":"Classification of brain tumors using PCA-ANN","authors":"Vinod Kumar, J. Sachdeva, I. Gupta, N. Khandelwal, C. Ahuja","doi":"10.1109/WICT.2011.6141398","DOIUrl":"https://doi.org/10.1109/WICT.2011.6141398","url":null,"abstract":"The present study is conducted to assist radiologists in marking tumor boundaries and in decision making process for multiclass classification of brain tumors. Primary brain tumors and secondary brain tumors along with normal regions are segmented by Gradient Vector Flow (GVF)-a boundary based technique. GVF is a user interactive model for extracting tumor boundaries. These segmented regions of interest (ROIs) are than classified by using Principal Component Analysis-Artificial Neural Network (PCA-ANN) approach. The study is performed on diversified dataset of 856 ROIs from 428 post contrast T1- weighted MR images of 55 patients. 218 texture and intensity features are extracted from ROIs. PCA is used for reduction of dimensionality of the feature space. Six classes which include primary tumors such as Astrocytoma (AS), Glioblastoma Multiforme (GBM), child tumor-Medulloblastoma (MED) and Meningioma (MEN), secondary tumor-Metastatic (MET) along with normal regions (NR) are discriminated using ANN. Test results show that the PCA-ANN approach has enhanced the overall accuracy of ANN from 72.97 % to 95.37%. The proposed method has delivered a high accuracy for each class: AS-90.74%, GBM-88.46%, MED-85.00%, MEN-90.70%, MET-96.67%and NR-93.78%. It is observed that PCA-ANN provides better results than the existing methods.","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127226385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/WICT.2011.6141278
R. Jha, U. Dalal
Security has grown to be a major concern in regulate to provide restricted communication in Wireless as well as wired environment. As far as security concern related to WiMAX network i.e for PHY Layer (Jamming and scrambling) and MAC Layer attack protection has been provided by (AES, PKM etc) one separate Layer(Security Layer). In current scenario Network Layer security is more vital and we have analyzed and simulated the effect of misbehaving node (Without MAC Layer). It misbehaves in the sense that the node does not respect its MAC protocols and avariciously sends its packets without any restriction (Flooding of packets) because it doesn't follow any protocol. Using OPNET we investigate the performance comparison analysis with and without misbehavior node. The packets transmitted in a network from Servers to Clients not only indicate the maximum amount of information provided but how much secure information is present in the network is the major point of deliberation. So many unauthorized clients are present in the network which can destroy a packets flowing to authorize node. One of the attacks is Misbehavior Node attack (Network Layer), in which the node does not follow any protocol but continuously transmits Constant Bit Rate (CBR) packets, which introduces noise in the network and upset the performance of the network.
在无线和有线环境中提供受限通信的监管中,安全性已成为一个主要问题。至于与WiMAX网络有关的安全问题,即物理层(干扰和加扰)和MAC层的攻击保护已由(AES, PKM等)一个单独的层(安全层)提供。在当前的场景中,网络层的安全更为重要,我们分析和模拟了行为不端的节点(无MAC层)的影响。它的错误行为是节点不尊重它的MAC协议,并且贪婪地发送它的数据包而没有任何限制(数据包泛滥),因为它不遵循任何协议。利用OPNET进行了有和无不当行为节点的性能比较分析。网络中从服务器到客户端传输的数据包不仅表明所提供的最大信息量,而且表明网络中存在多少安全信息是主要的考虑点。网络中存在许多未经授权的客户端,这可能会破坏流向授权节点的数据包。其中一种攻击是网络层错误行为节点攻击(Misbehavior Node attack, Network Layer),该攻击是指节点不遵循任何协议,连续发送CBR (Constant Bit Rate)报文,在网络中引入噪声,影响网络性能。
{"title":"Security analysis of WiMAX network: With Misbehavior Node attack","authors":"R. Jha, U. Dalal","doi":"10.1109/WICT.2011.6141278","DOIUrl":"https://doi.org/10.1109/WICT.2011.6141278","url":null,"abstract":"Security has grown to be a major concern in regulate to provide restricted communication in Wireless as well as wired environment. As far as security concern related to WiMAX network i.e for PHY Layer (Jamming and scrambling) and MAC Layer attack protection has been provided by (AES, PKM etc) one separate Layer(Security Layer). In current scenario Network Layer security is more vital and we have analyzed and simulated the effect of misbehaving node (Without MAC Layer). It misbehaves in the sense that the node does not respect its MAC protocols and avariciously sends its packets without any restriction (Flooding of packets) because it doesn't follow any protocol. Using OPNET we investigate the performance comparison analysis with and without misbehavior node. The packets transmitted in a network from Servers to Clients not only indicate the maximum amount of information provided but how much secure information is present in the network is the major point of deliberation. So many unauthorized clients are present in the network which can destroy a packets flowing to authorize node. One of the attacks is Misbehavior Node attack (Network Layer), in which the node does not follow any protocol but continuously transmits Constant Bit Rate (CBR) packets, which introduces noise in the network and upset the performance of the network.","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"662 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122966110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/WICT.2011.6141422
L. Armstrong, D. Diepeveen, N. Gandhi
This paper examines the grains value chain in agriculture, and identifies the importance in developing strategies which could better secure food production. The study highlights examples of successful integration of ICTs in agricultural supply and value chains. The development of strategies to integrate these ICTs into the supply chain will be proposed. It will be argued that the use of high powered computing for data mining and other technologies such as sensor networks, mobile communications, and GPS technologies can revolutionize the efficiency of these supply chains and therefore improve the food security. The study carried out a situational analysis of agricultural resources using standard internet search engines and applying data mining techniques in order to demonstrate how such technologies can be used to show difference in value chains across different situations. An assessment of the study found that the results from the grain-industry dataset support the similar supply chain grouping reported for other research studies. These groupings reflect the more-developed food-industry supply chains and may not capture all the interactions in less-developed supply chains. For example, when several of the food production processes are carried out by one food-producer, the activities will be more difficult to identify.
{"title":"Effective ICTs in agricultural value chains to improve food security: An international perspective","authors":"L. Armstrong, D. Diepeveen, N. Gandhi","doi":"10.1109/WICT.2011.6141422","DOIUrl":"https://doi.org/10.1109/WICT.2011.6141422","url":null,"abstract":"This paper examines the grains value chain in agriculture, and identifies the importance in developing strategies which could better secure food production. The study highlights examples of successful integration of ICTs in agricultural supply and value chains. The development of strategies to integrate these ICTs into the supply chain will be proposed. It will be argued that the use of high powered computing for data mining and other technologies such as sensor networks, mobile communications, and GPS technologies can revolutionize the efficiency of these supply chains and therefore improve the food security. The study carried out a situational analysis of agricultural resources using standard internet search engines and applying data mining techniques in order to demonstrate how such technologies can be used to show difference in value chains across different situations. An assessment of the study found that the results from the grain-industry dataset support the similar supply chain grouping reported for other research studies. These groupings reflect the more-developed food-industry supply chains and may not capture all the interactions in less-developed supply chains. For example, when several of the food production processes are carried out by one food-producer, the activities will be more difficult to identify.","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126960603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/WICT.2011.6141424
A. Tripathy, J. Adinarayana, D. Sudharsan, S. Merchant, U. Desai, K. Vijayalakshmi, D. Raji Reddy, G. Sreenivas, S. Ninomiya, M. Hirafuji, T. Kiura, K. Tanaka
Data driven precision agriculture aspects, particularly the pest/disease management, require a dynamic crop-weather data. An experiment was conducted in a semi-arid region to understand the crop-weather-pest/disease relations using wireless sensory and field-level surveillance data on closely related and interdependent pest (Thrips) - disease (Bud Necrosis) dynamics of groundnut crop. Data mining techniques were used to turn the data into useful information/knowledge/relations/trends and correlation of crop-weather-pest/disease continuum. These dynamics obtained from the data mining techniques and trained through mathematical models were validated with corresponding surveillance data. Results obtained from 2009 & 2010 kharif seasons (monsoon) and 2009–10 & 2010–11 rabi seasons (post monsoon) data could be used to develop a real to near real-time decision support system for pest/disease predictions.
{"title":"Data mining and wireless sensor network for agriculture pest/disease predictions","authors":"A. Tripathy, J. Adinarayana, D. Sudharsan, S. Merchant, U. Desai, K. Vijayalakshmi, D. Raji Reddy, G. Sreenivas, S. Ninomiya, M. Hirafuji, T. Kiura, K. Tanaka","doi":"10.1109/WICT.2011.6141424","DOIUrl":"https://doi.org/10.1109/WICT.2011.6141424","url":null,"abstract":"Data driven precision agriculture aspects, particularly the pest/disease management, require a dynamic crop-weather data. An experiment was conducted in a semi-arid region to understand the crop-weather-pest/disease relations using wireless sensory and field-level surveillance data on closely related and interdependent pest (Thrips) - disease (Bud Necrosis) dynamics of groundnut crop. Data mining techniques were used to turn the data into useful information/knowledge/relations/trends and correlation of crop-weather-pest/disease continuum. These dynamics obtained from the data mining techniques and trained through mathematical models were validated with corresponding surveillance data. Results obtained from 2009 & 2010 kharif seasons (monsoon) and 2009–10 & 2010–11 rabi seasons (post monsoon) data could be used to develop a real to near real-time decision support system for pest/disease predictions.","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122861477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/WICT.2011.6141432
Foyzul Hassan, Mohammed Rokibul Alam Kotwal, M. N. Huda
Hidden factor such as gender characteristic plays an important role on the performance of Bangla (widely used as Bengali) automatic speech recognition (ASR). If there is a suppression process that represses the decrease of differences in acoustic-likelihood among categories resulted from gender factors, a robust ASR system can be realized. In our previous paper, we proposed a technique of gender effects suppression that composed of two hidden Markov model (HMM)-based classifiers that focused on a gender factor. In the proposed study, we have designed a new ASR for Bangla by suppressing the gender effects, which embeds three HMM-based classifiers for corresponding male, female and geneder-independent (GI) characteristics. In an experiment on Bangla speech database prepared by us, the proposed system that incorporates GI-classifier has achieved a significant improvement of word correct rate, word accuracy and sentence correct rate in comparison with our previous method that did not incorporate GI-classifier.
{"title":"Bangla ASR design by suppressing gender factor with gender-independent and gender-based HMM classifiers","authors":"Foyzul Hassan, Mohammed Rokibul Alam Kotwal, M. N. Huda","doi":"10.1109/WICT.2011.6141432","DOIUrl":"https://doi.org/10.1109/WICT.2011.6141432","url":null,"abstract":"Hidden factor such as gender characteristic plays an important role on the performance of Bangla (widely used as Bengali) automatic speech recognition (ASR). If there is a suppression process that represses the decrease of differences in acoustic-likelihood among categories resulted from gender factors, a robust ASR system can be realized. In our previous paper, we proposed a technique of gender effects suppression that composed of two hidden Markov model (HMM)-based classifiers that focused on a gender factor. In the proposed study, we have designed a new ASR for Bangla by suppressing the gender effects, which embeds three HMM-based classifiers for corresponding male, female and geneder-independent (GI) characteristics. In an experiment on Bangla speech database prepared by us, the proposed system that incorporates GI-classifier has achieved a significant improvement of word correct rate, word accuracy and sentence correct rate in comparison with our previous method that did not incorporate GI-classifier.","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127733269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}