Pub Date : 2014-08-01DOI: 10.1109/ICAETR.2014.7012931
Shrishti Jain, S. Raghuwanshi
In Mobile ad-hoc Network nodes dynamically moves from one place to another and if one node wants to communicate with other node then for communication route establishment between two communicating nodes should takes place Due to dynamic nature many routing attacks also takes place such as black hole and gray hole attack. A gray hole attack is a special kind of black hole attack in this attack malicious node takes part in route discovery process and after route gets discovered through them these nodes start dropping packets and some type of packet will be blocked, gray hole attack detection process is difficult rather than black hole attack. This paper presents Ad-hoc on demand Distance Vector Routing Protocol as a base routing strategies and some node set as a IDS (intrusion detection system) to detect gray hole attack. Here we apply behavioural anomaly base detection for gray hole attack and IDS node watch the anomaly of data generated by gray hole node and broadcast the gray hole node block message to all participated nodes for prevention of that type of attack. the entire work simulate using the network simulator-2 and analyze the performance using network base parameter and identify the anomaly generator node as well as data drop identification.
{"title":"Behavioural and node performance based Grayhole attack Detection and Amputation in AODV protocol","authors":"Shrishti Jain, S. Raghuwanshi","doi":"10.1109/ICAETR.2014.7012931","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012931","url":null,"abstract":"In Mobile ad-hoc Network nodes dynamically moves from one place to another and if one node wants to communicate with other node then for communication route establishment between two communicating nodes should takes place Due to dynamic nature many routing attacks also takes place such as black hole and gray hole attack. A gray hole attack is a special kind of black hole attack in this attack malicious node takes part in route discovery process and after route gets discovered through them these nodes start dropping packets and some type of packet will be blocked, gray hole attack detection process is difficult rather than black hole attack. This paper presents Ad-hoc on demand Distance Vector Routing Protocol as a base routing strategies and some node set as a IDS (intrusion detection system) to detect gray hole attack. Here we apply behavioural anomaly base detection for gray hole attack and IDS node watch the anomaly of data generated by gray hole node and broadcast the gray hole node block message to all participated nodes for prevention of that type of attack. the entire work simulate using the network simulator-2 and analyze the performance using network base parameter and identify the anomaly generator node as well as data drop identification.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126545910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-08-01DOI: 10.1109/ICAETR.2014.7012800
A. Joshi, Deepak Bhatia
This paper presents a compact dual-band bandstop filter (DBBSF) that features two controllable stopbands at 1.8 GHz and 5.2 GHz frequencies. A drastic reduction in size of the filter was achieved by taking advantage of a simplified architecture based on E-shaped resonator. The return losses of the simulated filter are measured to be -54.03 and -42.57 dB while the insertion losses are -0.01 and -0.10 dB at the respective stop bands. Due to its compact size and satisfactory stopband performance, the filter can be useful for modern communication technology.
{"title":"Analysis and design of compact dual-band bandstop filter using E-shaped resonators","authors":"A. Joshi, Deepak Bhatia","doi":"10.1109/ICAETR.2014.7012800","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012800","url":null,"abstract":"This paper presents a compact dual-band bandstop filter (DBBSF) that features two controllable stopbands at 1.8 GHz and 5.2 GHz frequencies. A drastic reduction in size of the filter was achieved by taking advantage of a simplified architecture based on E-shaped resonator. The return losses of the simulated filter are measured to be -54.03 and -42.57 dB while the insertion losses are -0.01 and -0.10 dB at the respective stop bands. Due to its compact size and satisfactory stopband performance, the filter can be useful for modern communication technology.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126817122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-08-01DOI: 10.1109/ICAETR.2014.7012886
Hardeep Kaur, J. Malhotra
The existing wireless data network standards are diverse and include those in 2.5G Wireless, 3G Wireless, beyond 3G Wireless, and there are various wireless standards which come under the IEEE 802 family include WiFi and WiMAX. These wireless standards can be classified according to their distance ranges in terms of wide area network, local area network, metropolitan area network, and personal area network. This paper includes the brief introduction to wireless data networks like cellular technology, WiFi and WiMAX. This paper mainly focuses on coexistence issues of 3G with WiFi and coexistence issues of 3G with WiMAX. It also provides the suitable solution to various coexistence problems.
{"title":"Coexistence issues and challenges amongst cellular, WiFi and WiMAX networks","authors":"Hardeep Kaur, J. Malhotra","doi":"10.1109/ICAETR.2014.7012886","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012886","url":null,"abstract":"The existing wireless data network standards are diverse and include those in 2.5G Wireless, 3G Wireless, beyond 3G Wireless, and there are various wireless standards which come under the IEEE 802 family include WiFi and WiMAX. These wireless standards can be classified according to their distance ranges in terms of wide area network, local area network, metropolitan area network, and personal area network. This paper includes the brief introduction to wireless data networks like cellular technology, WiFi and WiMAX. This paper mainly focuses on coexistence issues of 3G with WiFi and coexistence issues of 3G with WiMAX. It also provides the suitable solution to various coexistence problems.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126089378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-08-01DOI: 10.1109/ICAETR.2014.7012920
R. Murugadoss, M. Ramakrishnan
In this paper we demonstrate that finite linear combinations of compositions of a fixed, univariate function and a set of affine functional can uniformly approximate any continuous function of n real variables with support in the unit hypercube; only mild conditions are imposed on the univariate function. Our results settle an open question about representability in the class of single bidden layer neural networks. In particular, we show that arbitrary decision regions can be arbitrarily well approximated by continuous feedforward neural networks with only a single internal, hidden layer and any continuous sigmoidal nonlinearity. The paper discusses approximation properties of other possible types of nonlinearities that might be implemented by artificial neural networks. The daily registration has N cases that each of the well-known stimulus-answer couples represents. The objective of this work is to develop a function that allows finding the vector of entrance variables t to the vector of exit variables P. F is any function, in this case the electric power consumption. Their modeling with Artificial Neural Network (ANN) is Multi a Perceptron Layer (PMC). Another form of modeling it is using Interpolation Algorithms (AI).
{"title":"Universal approximation using probabilistic neural networks with sigmoid activation functions","authors":"R. Murugadoss, M. Ramakrishnan","doi":"10.1109/ICAETR.2014.7012920","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012920","url":null,"abstract":"In this paper we demonstrate that finite linear combinations of compositions of a fixed, univariate function and a set of affine functional can uniformly approximate any continuous function of n real variables with support in the unit hypercube; only mild conditions are imposed on the univariate function. Our results settle an open question about representability in the class of single bidden layer neural networks. In particular, we show that arbitrary decision regions can be arbitrarily well approximated by continuous feedforward neural networks with only a single internal, hidden layer and any continuous sigmoidal nonlinearity. The paper discusses approximation properties of other possible types of nonlinearities that might be implemented by artificial neural networks. The daily registration has N cases that each of the well-known stimulus-answer couples represents. The objective of this work is to develop a function that allows finding the vector of entrance variables t to the vector of exit variables P. F is any function, in this case the electric power consumption. Their modeling with Artificial Neural Network (ANN) is Multi a Perceptron Layer (PMC). Another form of modeling it is using Interpolation Algorithms (AI).","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127179117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-08-01DOI: 10.1109/ICAETR.2014.7012882
Avadh Kishor Singh, Ajeet Kumar, A. Maurya
Association rule mining along with frequent items has been comprehensively research in data mining. In this paper, we proposed a model for association rules to mine the generated frequent k-itemset. We take this process as extraction of rules which expressed most useful information. Therefore, transactional knowledge of using websites is considered to solve the purpose. In this paper we use interestingness measure that plays an important role in invalid rules thereby reducing the size of rule data sets. The performance analysis attempted with Apriori, most frequent rule mining algorithm and interestingness measure to compare the efficiency of websites. The proposed work reduces large number of immaterial rules and produces new set of rules with interesting measure. Our extensive experiments will use relevant rule mining to enhance websites and data accuracy.
{"title":"Association rule mining for web usage data to improve websites","authors":"Avadh Kishor Singh, Ajeet Kumar, A. Maurya","doi":"10.1109/ICAETR.2014.7012882","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012882","url":null,"abstract":"Association rule mining along with frequent items has been comprehensively research in data mining. In this paper, we proposed a model for association rules to mine the generated frequent k-itemset. We take this process as extraction of rules which expressed most useful information. Therefore, transactional knowledge of using websites is considered to solve the purpose. In this paper we use interestingness measure that plays an important role in invalid rules thereby reducing the size of rule data sets. The performance analysis attempted with Apriori, most frequent rule mining algorithm and interestingness measure to compare the efficiency of websites. The proposed work reduces large number of immaterial rules and produces new set of rules with interesting measure. Our extensive experiments will use relevant rule mining to enhance websites and data accuracy.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128206186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-08-01DOI: 10.1109/ICAETR.2014.7012941
C. Padmaja, Dr. B. L. Malleswari
The ever increasing development in wireless cellular mobile systems for future generation is that by using MIMO architecture, it is possible to increase the system capacity, higher bit rate, smaller bit error rate and reliability. MIMO systems have multiple antennas both at the transmitter and at the receiver.
{"title":"Review: Performance analysis of space-time-frequency MIMO OFDM techniques","authors":"C. Padmaja, Dr. B. L. Malleswari","doi":"10.1109/ICAETR.2014.7012941","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012941","url":null,"abstract":"The ever increasing development in wireless cellular mobile systems for future generation is that by using MIMO architecture, it is possible to increase the system capacity, higher bit rate, smaller bit error rate and reliability. MIMO systems have multiple antennas both at the transmitter and at the receiver.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130897423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-08-01DOI: 10.1109/ICAETR.2014.7012838
C. Ashwini, Eril Paul, P. Lakshmi
With the advancements in power electronics and semiconductor technologies, there has been a high improvement in the performance of the electronics systems and devices. In order to make the system compact, the number of components used should be less. When the device has to be used for high frequency applications, the switching losses increases and efficiency of the system reduces. Therefore, the emerging semiconductor Silicon Carbide is made use to operate at higher frequencies in the range of Mega Hertz. To further reduce the switching losses, soft switching technique is implemented. Also, to minimize the number of components used and the cost, a single inductor multi output dc - ac converter is employed. In this paper, a comparative analysis of the silicon and silicon carbide devices in a mutli - output dc - ac soft switched converter is performed using MATLAB/SIMULINK.
{"title":"SiC soft- switched dc - ac converter for high frequency application","authors":"C. Ashwini, Eril Paul, P. Lakshmi","doi":"10.1109/ICAETR.2014.7012838","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012838","url":null,"abstract":"With the advancements in power electronics and semiconductor technologies, there has been a high improvement in the performance of the electronics systems and devices. In order to make the system compact, the number of components used should be less. When the device has to be used for high frequency applications, the switching losses increases and efficiency of the system reduces. Therefore, the emerging semiconductor Silicon Carbide is made use to operate at higher frequencies in the range of Mega Hertz. To further reduce the switching losses, soft switching technique is implemented. Also, to minimize the number of components used and the cost, a single inductor multi output dc - ac converter is employed. In this paper, a comparative analysis of the silicon and silicon carbide devices in a mutli - output dc - ac soft switched converter is performed using MATLAB/SIMULINK.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"513 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133600901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-08-01DOI: 10.1109/ICAETR.2014.7012887
Reeta Dangi, R. C. Jain, Vivek Sharma
Order-preserving sub matrices (OPSM's) have been shown useful in capturing concurrent patterns in data when the relative magnitudes of data items are more important than their correct values. For example, in analyzing gene expression profiles obtained from micro-array experiments, the comparative magnitudes are important both since they represent the change of gene activities across the experiments, and since there is naturally a high level of noise in data that makes the exact values non trustable. To manage with data noise, repeated experiments are often conducted to collect multiple measurements. This paper includes Eigen value decomposition combined for solving data mining from order preserving sub-matrices from repeated dataset. Experimental results shows this method gives far better results in terms of time and candidate pattern ratio.
{"title":"Combined neural network approach for mining order-preserving sub matrices from repeated dataset","authors":"Reeta Dangi, R. C. Jain, Vivek Sharma","doi":"10.1109/ICAETR.2014.7012887","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012887","url":null,"abstract":"Order-preserving sub matrices (OPSM's) have been shown useful in capturing concurrent patterns in data when the relative magnitudes of data items are more important than their correct values. For example, in analyzing gene expression profiles obtained from micro-array experiments, the comparative magnitudes are important both since they represent the change of gene activities across the experiments, and since there is naturally a high level of noise in data that makes the exact values non trustable. To manage with data noise, repeated experiments are often conducted to collect multiple measurements. This paper includes Eigen value decomposition combined for solving data mining from order preserving sub-matrices from repeated dataset. Experimental results shows this method gives far better results in terms of time and candidate pattern ratio.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134050004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-08-01DOI: 10.1109/ICAETR.2014.7012847
Hrishabha Raj Jain, S. Sharma
In mobile ad hoc network (MANET), energy consumption is one among the foremost vital restrictions that deteriorate the performance of the whole network. Multi-path routing is better than the single path routing in ad hoc networks, because multi path routing allows the establishment of multiple path between a single source and single destination node. This paper presents a new approach of energy efficient secure multipath AODV (EESM-AODV) routing protocol for MANET based on AODV protocol is modified and converted to work on multiple path. Differing types of routing protocols planned over the years with minimal management overhead and network resources. AODV is well-liked routing protocol among others. It is a loop free, no centralized authority, single path, On-demand routing protocol and its performance is superior than different routing protocols in MANET. However, single path plan is that the most vital drawbacks of AODV. Also, it is a heap of routing overhead at the time of route repair and route discovery method. The mobile nodes in MANET also have restricted resources like battery power, restricted information measure that solely single path protocols cannot handle efficiently. so routing is also a really vital issue inside the look of a MANET. Multipath routing permits the multiple methods between one source and single destination node and during this paper conjointly offer security by filtering route discovery process in AODV routing protocol. The proposed approach contains an adaptive technique in which the our proposed scheme is more energy efficient. The filtering forwarding scheme slows down the spread of excessive RREQs originated by a node per unit time and with success prevents Denial of service attacks. This paper planned multipath extensions of AODV routing protocol and a security improvement against We compared results of AODV routing protocols in attacked condition and after applied our algorithm and enhance the results exploitation multipath scheme for AODV. We used ns-2 to simulate. Simulation results show that the energy consumption of network is less after applying our proposed algorithm and our Network gets more stable and that proposed technique has better packet delivery ratio and improved throughput.
{"title":"Improved energy efficient secure multipath AODV routing protocol for MANET","authors":"Hrishabha Raj Jain, S. Sharma","doi":"10.1109/ICAETR.2014.7012847","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012847","url":null,"abstract":"In mobile ad hoc network (MANET), energy consumption is one among the foremost vital restrictions that deteriorate the performance of the whole network. Multi-path routing is better than the single path routing in ad hoc networks, because multi path routing allows the establishment of multiple path between a single source and single destination node. This paper presents a new approach of energy efficient secure multipath AODV (EESM-AODV) routing protocol for MANET based on AODV protocol is modified and converted to work on multiple path. Differing types of routing protocols planned over the years with minimal management overhead and network resources. AODV is well-liked routing protocol among others. It is a loop free, no centralized authority, single path, On-demand routing protocol and its performance is superior than different routing protocols in MANET. However, single path plan is that the most vital drawbacks of AODV. Also, it is a heap of routing overhead at the time of route repair and route discovery method. The mobile nodes in MANET also have restricted resources like battery power, restricted information measure that solely single path protocols cannot handle efficiently. so routing is also a really vital issue inside the look of a MANET. Multipath routing permits the multiple methods between one source and single destination node and during this paper conjointly offer security by filtering route discovery process in AODV routing protocol. The proposed approach contains an adaptive technique in which the our proposed scheme is more energy efficient. The filtering forwarding scheme slows down the spread of excessive RREQs originated by a node per unit time and with success prevents Denial of service attacks. This paper planned multipath extensions of AODV routing protocol and a security improvement against We compared results of AODV routing protocols in attacked condition and after applied our algorithm and enhance the results exploitation multipath scheme for AODV. We used ns-2 to simulate. Simulation results show that the energy consumption of network is less after applying our proposed algorithm and our Network gets more stable and that proposed technique has better packet delivery ratio and improved throughput.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134241268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-08-01DOI: 10.1109/ICAETR.2014.7012835
C. Shanjana, A. James
This paper propose a method to segment individual characters from a Malayalam Handwritten document. All the existing systems for Malayalam handwritten character recognition segments isolated characters from a document and deals only with a subset of characters. The proposed method takes the words from the original handwritten document for segmentation. So, here the method has to deal with touching characters, breaks in the characters, different handwriting styles, fonts etc. Character segmentation is done by using the combination of Vertical Projection method and connected component analysis method. Then the unique features for identifying each characters are extracted and given to a classifier. The classifier identifies each character and corresponding Malayalam character is given as output.
{"title":"Character segmentation in Malayalam Handwritten documents","authors":"C. Shanjana, A. James","doi":"10.1109/ICAETR.2014.7012835","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012835","url":null,"abstract":"This paper propose a method to segment individual characters from a Malayalam Handwritten document. All the existing systems for Malayalam handwritten character recognition segments isolated characters from a document and deals only with a subset of characters. The proposed method takes the words from the original handwritten document for segmentation. So, here the method has to deal with touching characters, breaks in the characters, different handwriting styles, fonts etc. Character segmentation is done by using the combination of Vertical Projection method and connected component analysis method. Then the unique features for identifying each characters are extracted and given to a classifier. The classifier identifies each character and corresponding Malayalam character is given as output.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132947412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}