Pub Date : 2014-12-01DOI: 10.1109/ICCIC.2014.7238358
A. K. Luhach, S. Dwivedi, C. K. Jha
In the last two decades, as with the growth of internet technologies, E-commerce proves to be the best system for conducting business. The E-commerce systems overshadowed the physical part of markets. E-commerce has the advantages of exposure and most organizations adopted E-commerce rapidly as other technologies. To support growing E-commerce, we require better system integration loom and security structure so that enterprise customers and partners efficiently associated through their nets. Service Oriented Architecture (SOA) may be the answer to their problems. SOA provides an autonomous platform for initiatives to transmit with their clients and collaborators. With the advantages, SOA is also endowed with ease for message tampering and unauthorized access. This causes the security technology implementation of SOA based E-commerce very difficult at other technologies or advances. This paper provides an overview of the various Service Development Approaches (SDA) used for migrating towards SOA and several factors discussed, which considered in the performance evaluation of SDAs. The performance evaluations of SDAs are out of scope, for this research. The primary aim of this editorial is to, identifies and evaluates the flaws in the current security standard for small and medium sized E-commerce system, and proposed a logical security framework for SOA based E-commerce.
{"title":"Applying SOA to an E-commerce system and designing a logical security framework for small and medium sized E-commerce based on SOA","authors":"A. K. Luhach, S. Dwivedi, C. K. Jha","doi":"10.1109/ICCIC.2014.7238358","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238358","url":null,"abstract":"In the last two decades, as with the growth of internet technologies, E-commerce proves to be the best system for conducting business. The E-commerce systems overshadowed the physical part of markets. E-commerce has the advantages of exposure and most organizations adopted E-commerce rapidly as other technologies. To support growing E-commerce, we require better system integration loom and security structure so that enterprise customers and partners efficiently associated through their nets. Service Oriented Architecture (SOA) may be the answer to their problems. SOA provides an autonomous platform for initiatives to transmit with their clients and collaborators. With the advantages, SOA is also endowed with ease for message tampering and unauthorized access. This causes the security technology implementation of SOA based E-commerce very difficult at other technologies or advances. This paper provides an overview of the various Service Development Approaches (SDA) used for migrating towards SOA and several factors discussed, which considered in the performance evaluation of SDAs. The performance evaluations of SDAs are out of scope, for this research. The primary aim of this editorial is to, identifies and evaluates the flaws in the current security standard for small and medium sized E-commerce system, and proposed a logical security framework for SOA based E-commerce.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115143954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCIC.2014.7238460
Ahamed Nizam Amirudin, Subramaniam Parasuraman
Biomechanical investigation of human movement contributing to rehabilitation treatment has gained an increasing interest from researchers on regards to human impairments and assistive techniques. There are many methods of treatment previously investigated namely with the focus being towards the nervous system. Due to the advancement of technology over time, motion capture became possible where it allowed biomechanical investigation on human joint gauge to obtain the specific detail of human motion. Prior to the advancement of motion capture cameras, subjects were filmed on TV-video and force platforms that recorded the reaction forces. Currently there are a few methods being researched to attain a better understanding on alternative methods to rehabilitate impaired subjects. Firstly being the usage of force plates in order to obtain the force at the foot to calculate the loadings at the joints and secondly employing surface marker techniques to construct a model of the lower extremities and to identify the anatomical joints. Another method uses Electromyography techniques which gives the estimated muscle strengths. Even with the techniques previously mentioned, the joint loadings such as the moment for the lower extremities while ascending and descending of staircase was not found during time of this project. Two steps staircase were used in this experiment where the kinematics was analyzed by a motion capture camera and an inverse dynamic approach was applied to compute the joint moments. Therefore this project would concentrate on the kinematics, dynamics, kinetics and human locomotion of lower extremities of a few subjects while incorporating the related parameter in developing the rehabilitation system.
{"title":"Bio mechanics and human locomotion","authors":"Ahamed Nizam Amirudin, Subramaniam Parasuraman","doi":"10.1109/ICCIC.2014.7238460","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238460","url":null,"abstract":"Biomechanical investigation of human movement contributing to rehabilitation treatment has gained an increasing interest from researchers on regards to human impairments and assistive techniques. There are many methods of treatment previously investigated namely with the focus being towards the nervous system. Due to the advancement of technology over time, motion capture became possible where it allowed biomechanical investigation on human joint gauge to obtain the specific detail of human motion. Prior to the advancement of motion capture cameras, subjects were filmed on TV-video and force platforms that recorded the reaction forces. Currently there are a few methods being researched to attain a better understanding on alternative methods to rehabilitate impaired subjects. Firstly being the usage of force plates in order to obtain the force at the foot to calculate the loadings at the joints and secondly employing surface marker techniques to construct a model of the lower extremities and to identify the anatomical joints. Another method uses Electromyography techniques which gives the estimated muscle strengths. Even with the techniques previously mentioned, the joint loadings such as the moment for the lower extremities while ascending and descending of staircase was not found during time of this project. Two steps staircase were used in this experiment where the kinematics was analyzed by a motion capture camera and an inverse dynamic approach was applied to compute the joint moments. Therefore this project would concentrate on the kinematics, dynamics, kinetics and human locomotion of lower extremities of a few subjects while incorporating the related parameter in developing the rehabilitation system.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116933455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCIC.2014.7238346
M. Mayilvaganan, D. Kalpanadevi
The proposed methodology involves to compares classification techniques for predicting the cognitive skill of students which can be evaluate by conducting the online test. The paper focuses the comparative performance of C4.5 algorithm, Naïve Bayes classifier algorithm which one is well suited accuracy for predicting the skill of expertise by experimenting in Rapid miner.
{"title":"Comparison of classification techniques for predicting the cognitive skill of students in education environment","authors":"M. Mayilvaganan, D. Kalpanadevi","doi":"10.1109/ICCIC.2014.7238346","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238346","url":null,"abstract":"The proposed methodology involves to compares classification techniques for predicting the cognitive skill of students which can be evaluate by conducting the online test. The paper focuses the comparative performance of C4.5 algorithm, Naïve Bayes classifier algorithm which one is well suited accuracy for predicting the skill of expertise by experimenting in Rapid miner.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"2 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120858240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCIC.2014.7238517
R. Rajkumar
In recent years control room environment is one of the highly required place in process automation industries. The user will get the information about the process station only on the control room. Here my proposed work will provide the information about the surrounding process parameters to the user instantly on his smart phone along with alarming feature so user can interact with the field parameters through his phone instantly. So user can teach the process plant to come back to its stable condition during emergency situations.
{"title":"An approach to implementation of inteligent data acquisition systems of process industries in Android platforms","authors":"R. Rajkumar","doi":"10.1109/ICCIC.2014.7238517","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238517","url":null,"abstract":"In recent years control room environment is one of the highly required place in process automation industries. The user will get the information about the process station only on the control room. Here my proposed work will provide the information about the surrounding process parameters to the user instantly on his smart phone along with alarming feature so user can interact with the field parameters through his phone instantly. So user can teach the process plant to come back to its stable condition during emergency situations.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127234838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCIC.2014.7238400
G. S. Suma, Dija S, Thomas K L
Due to the ever increasing growth rate of malwares, Memory Forensics has become unavoidable in a cyber crime investigation. This is because physical memory may contain crucial information that is available nowhere in the system hard disk. Memory Forensics deals with collection of forensically sound evidence from physical memory content of Suspect's system. This is a fast growing and challenging field in computer forensics where a live forensic methodology is adopted in order to acquire physical memory content. Analysis of the collected memory dump is very difficult due to the complex data structures in it, especially in Windows ×64 systems. Also, the complexity involved in 64-bit address translation makes the analysis tougher. This translation can be done only after finding an artifact called Directory Table Base (DTB). Even though there are few methods available for finding DTB, none is efficient for adopting in a memory analysis tool. In this paper, a novel methodology for finding DTB in a 64-bit Windows system is described in detail. The paper also explains algorithms for retrieving forensically relevant information like running processes and its associated details from physical memory dump collected from Windows7 × 64 machines.
{"title":"A novel methodology for windows 7 × 64 memory forensics","authors":"G. S. Suma, Dija S, Thomas K L","doi":"10.1109/ICCIC.2014.7238400","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238400","url":null,"abstract":"Due to the ever increasing growth rate of malwares, Memory Forensics has become unavoidable in a cyber crime investigation. This is because physical memory may contain crucial information that is available nowhere in the system hard disk. Memory Forensics deals with collection of forensically sound evidence from physical memory content of Suspect's system. This is a fast growing and challenging field in computer forensics where a live forensic methodology is adopted in order to acquire physical memory content. Analysis of the collected memory dump is very difficult due to the complex data structures in it, especially in Windows ×64 systems. Also, the complexity involved in 64-bit address translation makes the analysis tougher. This translation can be done only after finding an artifact called Directory Table Base (DTB). Even though there are few methods available for finding DTB, none is efficient for adopting in a memory analysis tool. In this paper, a novel methodology for finding DTB in a 64-bit Windows system is described in detail. The paper also explains algorithms for retrieving forensically relevant information like running processes and its associated details from physical memory dump collected from Windows7 × 64 machines.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"943 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116431593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCIC.2014.7238368
Shachi Sharma, Pranay Yadav
Impulse noise removal is considered one of the most burning topic in digital image processing (DIP). When an image is formed, factors like lighting (source, and intensity) and camera characteristics like the sensor response, lenses and also atmospheric condition affect the presence of the image. It hides the important fine points and information of images. In order to enhance the qualities of the image, the removal of noises becomes imperative and that should not be at the cost of any loss of image information like edges. Removal of noise is one of the most important pre-processing tasks of different of image analysis works and tasks like image enhancement, steganography, segmentation and other enhancement related process. In this research article, we have proposed a new method for the removal and restoration of gray images is introduced, when images are corrupted by impulse noise. This method proposed a novel combination of Mean. Median and trimmed value concept for elimination of fixed valued impulse noise. Our methodology ensures a better performance for different level low, medium and high density of fixed value impulse noise as compare to the other famous filters like Standard Median Filter (SMF), Decision Based Median Filter (DBMF) and Modified Decision Based Median Filter (MDBMF) etc. The main objective of the proposed method is to improve not only a peak signal to noise ratio (PSNR) but also improve the visual perception and reduction in blurring of the resultant image. In the proposed method when previous pixels values, 0's and 255's are present in the particular window and all the pixel values are 0's and 255's then the remaining corrupted pixels are substituted by mean and median value. Proposed methodology was tested on gray-scale images like Mandrill and Lena. The experimental result shows improved value of peak signal to noise ratio (PSNR) and mean square error (MSE) values with better visual and human perception.
{"title":"Removal of fixed valued impulse noise by improved Trimmed Mean Median filter","authors":"Shachi Sharma, Pranay Yadav","doi":"10.1109/ICCIC.2014.7238368","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238368","url":null,"abstract":"Impulse noise removal is considered one of the most burning topic in digital image processing (DIP). When an image is formed, factors like lighting (source, and intensity) and camera characteristics like the sensor response, lenses and also atmospheric condition affect the presence of the image. It hides the important fine points and information of images. In order to enhance the qualities of the image, the removal of noises becomes imperative and that should not be at the cost of any loss of image information like edges. Removal of noise is one of the most important pre-processing tasks of different of image analysis works and tasks like image enhancement, steganography, segmentation and other enhancement related process. In this research article, we have proposed a new method for the removal and restoration of gray images is introduced, when images are corrupted by impulse noise. This method proposed a novel combination of Mean. Median and trimmed value concept for elimination of fixed valued impulse noise. Our methodology ensures a better performance for different level low, medium and high density of fixed value impulse noise as compare to the other famous filters like Standard Median Filter (SMF), Decision Based Median Filter (DBMF) and Modified Decision Based Median Filter (MDBMF) etc. The main objective of the proposed method is to improve not only a peak signal to noise ratio (PSNR) but also improve the visual perception and reduction in blurring of the resultant image. In the proposed method when previous pixels values, 0's and 255's are present in the particular window and all the pixel values are 0's and 255's then the remaining corrupted pixels are substituted by mean and median value. Proposed methodology was tested on gray-scale images like Mandrill and Lena. The experimental result shows improved value of peak signal to noise ratio (PSNR) and mean square error (MSE) values with better visual and human perception.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122674214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCIC.2014.7238301
D. David, D. Rangaswamy
Clouds in the sky play an important role in predicting the weather. Satellite images provide an excellent view of clouds in the sky which can be certainly used in forecasting the weather. In Satellite images, particularly Infra Red (IR) images play a vital role in many applications. The satellite cloud images contain valuable information for weather forecasting and early prediction of different atmospheric disturbance such as typhoons, hurricanes etc. Very strong winds and torrential rainfall which makes people to become shelter less during cyclones. Therefore in forecasting weather, cyclone prediction has a major role as this is directly related to the lives and households of human being. Many sub-continents in the world have regions that are affected severely because of cyclones. In India, during Madi 2013 cyclone, nearly seven lakh people were forced to relocate, to prevent the loss of human life and their assets. So it is necessary to plan out your day accordingly so that you are not caught off guard. In the literatures, for cyclone prediction which is mainly dependent on Doppler Radars along with Historical Satellite images. Because of its limited range and semi-automatic approach, there is a need to propose a method to automate cyclone prediction, which finds the movement & direction of cyclone towards the given specific locality and relays those information to the subscribed users. Fuzzy C-means clustering is applied for segmenting each cyclone image, followed by extracting features like shape, color and texture for the same. Change Detection is the process of finding changes in multitemporal images. The features obtained from the multi-temporal cyclone IR images are compared with each other in order to determine the movement of cyclone.
{"title":"Forecasting of cyclone using multi-temporal change detected satellite images","authors":"D. David, D. Rangaswamy","doi":"10.1109/ICCIC.2014.7238301","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238301","url":null,"abstract":"Clouds in the sky play an important role in predicting the weather. Satellite images provide an excellent view of clouds in the sky which can be certainly used in forecasting the weather. In Satellite images, particularly Infra Red (IR) images play a vital role in many applications. The satellite cloud images contain valuable information for weather forecasting and early prediction of different atmospheric disturbance such as typhoons, hurricanes etc. Very strong winds and torrential rainfall which makes people to become shelter less during cyclones. Therefore in forecasting weather, cyclone prediction has a major role as this is directly related to the lives and households of human being. Many sub-continents in the world have regions that are affected severely because of cyclones. In India, during Madi 2013 cyclone, nearly seven lakh people were forced to relocate, to prevent the loss of human life and their assets. So it is necessary to plan out your day accordingly so that you are not caught off guard. In the literatures, for cyclone prediction which is mainly dependent on Doppler Radars along with Historical Satellite images. Because of its limited range and semi-automatic approach, there is a need to propose a method to automate cyclone prediction, which finds the movement & direction of cyclone towards the given specific locality and relays those information to the subscribed users. Fuzzy C-means clustering is applied for segmenting each cyclone image, followed by extracting features like shape, color and texture for the same. Change Detection is the process of finding changes in multitemporal images. The features obtained from the multi-temporal cyclone IR images are compared with each other in order to determine the movement of cyclone.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114183680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCIC.2014.7238345
Shubham Lavania, Palash Sushil Matey
The paper presents two advanced methods for comparative study in the field of computer vision. The first method involves the implementation of the Scalar Invariant Fourier Transform (SIFT) algorithm for the leaf recognition based on the key descriptors value. The second method involves the contour-based corner detection and classification which is done with the help of Mean Projection algorithm. The advantage of this system over the other Curvature Scale Space (CSS) systems is that there are fewer false-positive (FP) and false-negative (FN) points compared with recent standard corner detection techniques. The performance analysis of both the algorithm was done on the flavia database.
{"title":"Leaf recognition using contour based edge detection and SIFT algorithm","authors":"Shubham Lavania, Palash Sushil Matey","doi":"10.1109/ICCIC.2014.7238345","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238345","url":null,"abstract":"The paper presents two advanced methods for comparative study in the field of computer vision. The first method involves the implementation of the Scalar Invariant Fourier Transform (SIFT) algorithm for the leaf recognition based on the key descriptors value. The second method involves the contour-based corner detection and classification which is done with the help of Mean Projection algorithm. The advantage of this system over the other Curvature Scale Space (CSS) systems is that there are fewer false-positive (FP) and false-negative (FN) points compared with recent standard corner detection techniques. The performance analysis of both the algorithm was done on the flavia database.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122053692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCIC.2014.7238438
R. Leo, R. S. Milton, A. Kaviya
We consider grid connected solar microgrid system which contains a local consumers, solar photo voltaic (PV) systems, load and battery. The consumer as an agent continuously interacts with the environment and learns to take optimal actions through a model-free Reinforcement Learning algorithm, namely Q Learning. The aim of the agent is to optimally schedule the battery to increase the utility of the battery and solar photo voltaic system and thereby aims for the long term objective of reducing the power consumption from grid. Multiple agents sense the states of environment components and make collective decisions about how to respond to randomness in load and intermittent solar power by using a Multi agent reinforcement algorithm, namely Coordinated Q Learning (CQ Learning). Each agent learns to optimize individually and contribute to global optimization. Grid power consumed when solar PV system operates individually, by using Q learning is compared with operation of many such solar PV systems in a distributed environment using CQ learning and it is proved that the grid power requirement is considerably reduced in CQ learning than in Q learning. Simulation results using real numerical data are presented for a reliability test of the system.
{"title":"Multi agent reinforcement learning based distributed optimization of solar microgrid","authors":"R. Leo, R. S. Milton, A. Kaviya","doi":"10.1109/ICCIC.2014.7238438","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238438","url":null,"abstract":"We consider grid connected solar microgrid system which contains a local consumers, solar photo voltaic (PV) systems, load and battery. The consumer as an agent continuously interacts with the environment and learns to take optimal actions through a model-free Reinforcement Learning algorithm, namely Q Learning. The aim of the agent is to optimally schedule the battery to increase the utility of the battery and solar photo voltaic system and thereby aims for the long term objective of reducing the power consumption from grid. Multiple agents sense the states of environment components and make collective decisions about how to respond to randomness in load and intermittent solar power by using a Multi agent reinforcement algorithm, namely Coordinated Q Learning (CQ Learning). Each agent learns to optimize individually and contribute to global optimization. Grid power consumed when solar PV system operates individually, by using Q learning is compared with operation of many such solar PV systems in a distributed environment using CQ learning and it is proved that the grid power requirement is considerably reduced in CQ learning than in Q learning. Simulation results using real numerical data are presented for a reliability test of the system.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122059469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCIC.2014.7238363
G. S. Prakash, Shanu Sharma
Automated signature verification and forgery detection has many applications in the field of Bank-cheque processing, document authentication, ATM access etc. Handwritten signatures have proved to be important in authenticating a person's identity, who is signing the document. In this paper a Fuzzy Logic and Artificial Neural Network Based Off-line Signature Verification and Forgery Detection System is presented. As there are unique and important variations in the feature elements of each signature, so in order to match a particular signature with the database, the structural parameters of the signatures along with the local variations in the signature characteristics are used. These characteristics have been used to train the artificial neural network. The system uses the features extracted from the signatures such as centroid, height - width ratio, total area, Ist and IInd order derivatives, quadrant areas etc. After the verification of the signature the angle features are used in fuzzy logic based system for forgery detection.
{"title":"Computer vision & fuzzy logic based offline signature verification and forgery detection","authors":"G. S. Prakash, Shanu Sharma","doi":"10.1109/ICCIC.2014.7238363","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238363","url":null,"abstract":"Automated signature verification and forgery detection has many applications in the field of Bank-cheque processing, document authentication, ATM access etc. Handwritten signatures have proved to be important in authenticating a person's identity, who is signing the document. In this paper a Fuzzy Logic and Artificial Neural Network Based Off-line Signature Verification and Forgery Detection System is presented. As there are unique and important variations in the feature elements of each signature, so in order to match a particular signature with the database, the structural parameters of the signatures along with the local variations in the signature characteristics are used. These characteristics have been used to train the artificial neural network. The system uses the features extracted from the signatures such as centroid, height - width ratio, total area, Ist and IInd order derivatives, quadrant areas etc. After the verification of the signature the angle features are used in fuzzy logic based system for forgery detection.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129614777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}