Pub Date : 2015-12-01DOI: 10.1109/ICCIC.2015.7435746
S. Sridhara, B. Ramesh
A Wireless cellular Ad-hoc network is a collection of wireless mobile hosts that makes a momentary network with or without a centralized management or wired infrastructure. This is the era of growing smart phone technology people are dependent on the service provided by phone so in this scenario providing quality of service is essential task for service providers. Smart phone is movable device user can move anywhere any time it result in difficulty to find that message packet use in cellular ad-hoc network and creating best possible route in real time. An infrastructure with Quality of Service (QoS) support is a crucial factor for multimedia services in Wireless cellular network. The service existing has to address many requirement like slow data rate, link selection ratio, cost and other factor which affect QoS. In this paper author enhance device to device communication (D2D) by the implementation of selective admission scheme based on selectivity in cellular ad-hoc network. The simulation has been conducted for various parameters such as energy efficiency and slot utilization, and the results obtained show that the projected methodology can significantly improve the performance of proposed routing for varied application in cellular ad-hoc network in order to improve device battery life and overall network proficiency. The proposed architecture shows that communication based on D2D in ad-hoc cellular network can provide a better QoS and efficiency for different service and can also improve the overall network capacity performance by distinct user's energy optimization.
{"title":"An adaptive multicast routing for varied services in wireless cellular ad-hoc network","authors":"S. Sridhara, B. Ramesh","doi":"10.1109/ICCIC.2015.7435746","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435746","url":null,"abstract":"A Wireless cellular Ad-hoc network is a collection of wireless mobile hosts that makes a momentary network with or without a centralized management or wired infrastructure. This is the era of growing smart phone technology people are dependent on the service provided by phone so in this scenario providing quality of service is essential task for service providers. Smart phone is movable device user can move anywhere any time it result in difficulty to find that message packet use in cellular ad-hoc network and creating best possible route in real time. An infrastructure with Quality of Service (QoS) support is a crucial factor for multimedia services in Wireless cellular network. The service existing has to address many requirement like slow data rate, link selection ratio, cost and other factor which affect QoS. In this paper author enhance device to device communication (D2D) by the implementation of selective admission scheme based on selectivity in cellular ad-hoc network. The simulation has been conducted for various parameters such as energy efficiency and slot utilization, and the results obtained show that the projected methodology can significantly improve the performance of proposed routing for varied application in cellular ad-hoc network in order to improve device battery life and overall network proficiency. The proposed architecture shows that communication based on D2D in ad-hoc cellular network can provide a better QoS and efficiency for different service and can also improve the overall network capacity performance by distinct user's energy optimization.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125647430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/ICCIC.2015.7435678
M. Thangaraj, P. P. Ponmalar, S. Anuradha
A worldwide network of Internet Of Things (IOT) is going to be the future network, which connects objects of different application fields, functionality and technology. These objects are uniquely addressable and use standard communication protocol and communicate in a heterogeneous networking environment. Anytime, anyplace connecting anything idea brought out significant advancements in the healthcare domain. This paper discusses with the implemented real world scenario of smart autonomous hospital management with the IOT. This paper aims at explaining in detail the technology drivers behind the IOT and health care with the information on data modeling of medical devices, data validation of critical incident data, data mapping of existing IOT data into different other associated system data, workflow or the process flow behind the technical operations of the remote device coordination, the architecture of network, middleware, databases, application services. The challenges and the associated solution in this field is discussed with the use case.
{"title":"Internet Of Things (IOT) enabled smart autonomous hospital management system - A real world health care use case with the technology drivers","authors":"M. Thangaraj, P. P. Ponmalar, S. Anuradha","doi":"10.1109/ICCIC.2015.7435678","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435678","url":null,"abstract":"A worldwide network of Internet Of Things (IOT) is going to be the future network, which connects objects of different application fields, functionality and technology. These objects are uniquely addressable and use standard communication protocol and communicate in a heterogeneous networking environment. Anytime, anyplace connecting anything idea brought out significant advancements in the healthcare domain. This paper discusses with the implemented real world scenario of smart autonomous hospital management with the IOT. This paper aims at explaining in detail the technology drivers behind the IOT and health care with the information on data modeling of medical devices, data validation of critical incident data, data mapping of existing IOT data into different other associated system data, workflow or the process flow behind the technical operations of the remote device coordination, the architecture of network, middleware, databases, application services. The challenges and the associated solution in this field is discussed with the use case.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131507304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/ICCIC.2015.7435729
Ashutosh A. Mange, A. Choudhari, Shyam Prasad
This work present new approach eye tracking with very less expensive IR sensor & IR led based apparatus connected to the computer. Photodiode & phototransistor are light reflection based component, the system design by use these components can be called as light reflection based system or non-imaging sensor base system. Basically this system is having very low complexity & very low computational approach. The infrared light sensitive apparatus is eye mounted spectacle, is used to measure the different voltages reflected from iris for the computation of cursor position in the computer screen. For the accurate position of cursor highly efficient microcontroller based hardware system is used, which is accurately sample time varying signal & digitized in digital. Based on the movement of predefined eye wings the system is able to perform left click, right click and double click with perfect accuracy on computer system. As it is Infrared light based system the computational approach is very low as compared to video or camera based system, so the physical size of system is very small and manufacturing cost of system is also very less.
{"title":"Gaze and blinking base human machine interaction system","authors":"Ashutosh A. Mange, A. Choudhari, Shyam Prasad","doi":"10.1109/ICCIC.2015.7435729","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435729","url":null,"abstract":"This work present new approach eye tracking with very less expensive IR sensor & IR led based apparatus connected to the computer. Photodiode & phototransistor are light reflection based component, the system design by use these components can be called as light reflection based system or non-imaging sensor base system. Basically this system is having very low complexity & very low computational approach. The infrared light sensitive apparatus is eye mounted spectacle, is used to measure the different voltages reflected from iris for the computation of cursor position in the computer screen. For the accurate position of cursor highly efficient microcontroller based hardware system is used, which is accurately sample time varying signal & digitized in digital. Based on the movement of predefined eye wings the system is able to perform left click, right click and double click with perfect accuracy on computer system. As it is Infrared light based system the computational approach is very low as compared to video or camera based system, so the physical size of system is very small and manufacturing cost of system is also very less.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131525043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/ICCIC.2015.7435663
K. Dhanasree, C. Shobabindu
Real time massive amounts of data has led the enterprise to maintain a distributed architecture so as to achieve higher storage benefits and parallelized query processing. Consistent improvement in query processing time is achieved using distributed materialized views and indexing. So the present olap technology is very much influenced by distributing fragments of views over multiple sites. To address the storage constraint only needed views are materialized and the views materialized at various sites need not be same. One of the common problem encountered in distributed View management scheme is multiple query redirects. User queries are redirected if the requested view is not located and materialized at a particular site. Much work is done on distributed view maintenance, addressing functionalities like view updates and deletions. To our knowledge there is no better view management scheme under distributed scenario following distribution of vertical fragments. In this paper we propose a novel distributed view management scheme called the signature proxy, which will identify where the required views are located and materialized and directs the query to the respective site. The model is designed to reduce the number of query redirects and the communication cost.
{"title":"SPS: Distributed view indexing","authors":"K. Dhanasree, C. Shobabindu","doi":"10.1109/ICCIC.2015.7435663","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435663","url":null,"abstract":"Real time massive amounts of data has led the enterprise to maintain a distributed architecture so as to achieve higher storage benefits and parallelized query processing. Consistent improvement in query processing time is achieved using distributed materialized views and indexing. So the present olap technology is very much influenced by distributing fragments of views over multiple sites. To address the storage constraint only needed views are materialized and the views materialized at various sites need not be same. One of the common problem encountered in distributed View management scheme is multiple query redirects. User queries are redirected if the requested view is not located and materialized at a particular site. Much work is done on distributed view maintenance, addressing functionalities like view updates and deletions. To our knowledge there is no better view management scheme under distributed scenario following distribution of vertical fragments. In this paper we propose a novel distributed view management scheme called the signature proxy, which will identify where the required views are located and materialized and directs the query to the respective site. The model is designed to reduce the number of query redirects and the communication cost.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134292128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/ICCIC.2015.7435702
S. Priyadharshini, R. Canessane
Today's world is in safe of secure environment but really we are in need of healthy food and chemical-free environment which is free from pollution and harmful pesticides. This paper is to project the aspects of geographical information system(GIS) in agricultural field for effective yield and efficient use of water for crops and it helps as a guide to the non-technical person(farmer) who suffer in making good productivity due to missing of seasonal rainfall. In terms of effective yield the requirement based on climatic condition, soil type and rainfall. Additionally an important factor is in terms of managing water, hereby we concentrate on evapotranspiration and it is evaluated by penman-monteith method. This method is best of ET calculation. Linear Regression Analysis is evaluated between estimated ET and observed ET. The knowledge discovered from the large dataset and conglomeration of GIS helps in precise management of agricultural crops with good yield in organic farming.
{"title":"Evaluation of evapotranspiration for agricultural crops","authors":"S. Priyadharshini, R. Canessane","doi":"10.1109/ICCIC.2015.7435702","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435702","url":null,"abstract":"Today's world is in safe of secure environment but really we are in need of healthy food and chemical-free environment which is free from pollution and harmful pesticides. This paper is to project the aspects of geographical information system(GIS) in agricultural field for effective yield and efficient use of water for crops and it helps as a guide to the non-technical person(farmer) who suffer in making good productivity due to missing of seasonal rainfall. In terms of effective yield the requirement based on climatic condition, soil type and rainfall. Additionally an important factor is in terms of managing water, hereby we concentrate on evapotranspiration and it is evaluated by penman-monteith method. This method is best of ET calculation. Linear Regression Analysis is evaluated between estimated ET and observed ET. The knowledge discovered from the large dataset and conglomeration of GIS helps in precise management of agricultural crops with good yield in organic farming.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133277602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/ICCIC.2015.7435733
Nidhi, D. K. Lobiyal
The study has been conducted on the small real world area of JNU where the traffic trends were monitored manually. One month data has been taken into consideration for analyzing the macroscopic traffic flow of JNU. The traffic patterns were observed from the four different entrance/exist gates. In this, the realistic car mobility covering one month, 24 hour traffic in a span of 1019.38 acres region has been analyzed. Further, the real world behavior such as low traffic at night and high peak Incoming traffic at around 9:00 AM and outgoing at around 5:00 PM, excluding weekends, has been observed. The density and speed was calculated by the given flow of vehicular traffic. Later, the realization of traffic stream model i.e. flow-density relation was discussed. In this, the importance of scaling factor in case of less data availability came into picture.
{"title":"Data collection and analysis of macroscopic real-time urban traffic flow","authors":"Nidhi, D. K. Lobiyal","doi":"10.1109/ICCIC.2015.7435733","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435733","url":null,"abstract":"The study has been conducted on the small real world area of JNU where the traffic trends were monitored manually. One month data has been taken into consideration for analyzing the macroscopic traffic flow of JNU. The traffic patterns were observed from the four different entrance/exist gates. In this, the realistic car mobility covering one month, 24 hour traffic in a span of 1019.38 acres region has been analyzed. Further, the real world behavior such as low traffic at night and high peak Incoming traffic at around 9:00 AM and outgoing at around 5:00 PM, excluding weekends, has been observed. The density and speed was calculated by the given flow of vehicular traffic. Later, the realization of traffic stream model i.e. flow-density relation was discussed. In this, the importance of scaling factor in case of less data availability came into picture.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130487661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/ICCIC.2015.7435773
Inderjeet Singh Bamrah, A. Girdhar
Indian education system has diversification in terms of reservation policy when it comes to student enrollment. This diversification leads to variability in the pattern of enrollment in the course and makes the related predictions quite difficult. The proposed work has focused on the reduction of the variability by associating student potential with the reservation policy to find its impact on the course. Linear regression analysis has been performed to find the dependency of sub-reservation and tertiary level reservation within a reservation policy. A hypothesis regarding average chance percentage for reserved and non-reserved category students has been tested and found to be in favor of reserved category students. Further, data mining tool on the enriched data set has been applied to disclose the hidden patterns and to perform enrollment related predictions.
{"title":"Investigation on impact of reservation policy on student enrollment using data mining","authors":"Inderjeet Singh Bamrah, A. Girdhar","doi":"10.1109/ICCIC.2015.7435773","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435773","url":null,"abstract":"Indian education system has diversification in terms of reservation policy when it comes to student enrollment. This diversification leads to variability in the pattern of enrollment in the course and makes the related predictions quite difficult. The proposed work has focused on the reduction of the variability by associating student potential with the reservation policy to find its impact on the course. Linear regression analysis has been performed to find the dependency of sub-reservation and tertiary level reservation within a reservation policy. A hypothesis regarding average chance percentage for reserved and non-reserved category students has been tested and found to be in favor of reserved category students. Further, data mining tool on the enriched data set has been applied to disclose the hidden patterns and to perform enrollment related predictions.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"526 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132382161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/ICCIC.2015.7435751
Smita Kuldiwar, D. Parasar
This paper presents Reversible Color Transmission of Compressed Fragment -Visible Mosaic Image of the same size for hiding the secret image. By applying the digital watermarking on mosaic image using DWT and PCA transformation increase the security, authentication, copyright protection and all types of internet applications. Most commonly used methods of watermarking are discrete cosine transform (DCT), discrete wavelet transform (DWT).A hybrid digital image watermarking scheme based on Discrete Wavelet Transform (DWT) and Principal Component Analysis (PCA). These transform domain technique provides criteria of imperceptibility as well as robustness than Discrete Cosine Transform and Discrete Wavelet Transform. The proposed method, originally designed for dealing with color images. An additional approach here is used to enhance the embedded watermark data security is also proposed. The proposed scheme is tested using a number of images. Experimental result shows no visible difference between the recovered secret image and original secret image. It also calculated RMSE, MSSIM, PSNR and NC values of the watermarked image which give good result than previous method. Good experimental results show the quality of being doable of the proposed method.
{"title":"Reversible color transmission of compressed fragment-visible mosaic image","authors":"Smita Kuldiwar, D. Parasar","doi":"10.1109/ICCIC.2015.7435751","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435751","url":null,"abstract":"This paper presents Reversible Color Transmission of Compressed Fragment -Visible Mosaic Image of the same size for hiding the secret image. By applying the digital watermarking on mosaic image using DWT and PCA transformation increase the security, authentication, copyright protection and all types of internet applications. Most commonly used methods of watermarking are discrete cosine transform (DCT), discrete wavelet transform (DWT).A hybrid digital image watermarking scheme based on Discrete Wavelet Transform (DWT) and Principal Component Analysis (PCA). These transform domain technique provides criteria of imperceptibility as well as robustness than Discrete Cosine Transform and Discrete Wavelet Transform. The proposed method, originally designed for dealing with color images. An additional approach here is used to enhance the embedded watermark data security is also proposed. The proposed scheme is tested using a number of images. Experimental result shows no visible difference between the recovered secret image and original secret image. It also calculated RMSE, MSSIM, PSNR and NC values of the watermarked image which give good result than previous method. Good experimental results show the quality of being doable of the proposed method.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123614106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/ICCIC.2015.7435819
Vidya Krishnamoorthy, Senthilkumar Mathi
The fourth generation (4G) network is new wireless technology that offers much advancement to the wireless market. In 4G, the forward key separation plays a vital role in handover process and it can be vulnerable due to the presence of rogue base stations. Periodically updating the root key stored in base stations reduces the consequence of the attacks. But, the selection of the best possible key update interval is a vague issue as it is difficult to achieve stability between the degree of the exposed messages and the signalling load. To attack the service of websites, competitors sign up into the website multiple times and degrade the performance of the web server. Hence, this paper proposes a method that maintains history/status tables to keep a record of the media access control address in an intranet environment. The unique addresses, the media access control and internet protocol addresses are maintained in the status tables and used to identify each node distinctly. The proposed system guarantees authenticity of the host connected in the environment. Finally, the performance analysis shows that our proposed system provides better security and significant reduction in latency.
{"title":"Security enhancement of handover key management based on media access control address in 4G LTE networks","authors":"Vidya Krishnamoorthy, Senthilkumar Mathi","doi":"10.1109/ICCIC.2015.7435819","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435819","url":null,"abstract":"The fourth generation (4G) network is new wireless technology that offers much advancement to the wireless market. In 4G, the forward key separation plays a vital role in handover process and it can be vulnerable due to the presence of rogue base stations. Periodically updating the root key stored in base stations reduces the consequence of the attacks. But, the selection of the best possible key update interval is a vague issue as it is difficult to achieve stability between the degree of the exposed messages and the signalling load. To attack the service of websites, competitors sign up into the website multiple times and degrade the performance of the web server. Hence, this paper proposes a method that maintains history/status tables to keep a record of the media access control address in an intranet environment. The unique addresses, the media access control and internet protocol addresses are maintained in the status tables and used to identify each node distinctly. The proposed system guarantees authenticity of the host connected in the environment. Finally, the performance analysis shows that our proposed system provides better security and significant reduction in latency.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124398916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/ICCIC.2015.7435709
Soma Dey, R. Goswami
Text Extraction from different background is always a challenging problem in these emerging field of research area of image processing. In our project we have implemented upon Noise Removal segmentation, Curve-let Transformation features and Support Vector Machine classifier. In that we calculated on successful result purpose on still images and some real time images for different background location image on features extraction and classified techniques. Previously, Different methodologies have been used for texture feature extraction. The method which we proposed gives a better accuracy and efficiency towards extract texture feature analysis as with wavelet transform. Curve-let, Gradient Edge Operator on Support Vector Machine Classifier analysis and performance measure is completely new in this paper.
{"title":"A morphological segmentation and curve-let features extraction on text region classification using SVM","authors":"Soma Dey, R. Goswami","doi":"10.1109/ICCIC.2015.7435709","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435709","url":null,"abstract":"Text Extraction from different background is always a challenging problem in these emerging field of research area of image processing. In our project we have implemented upon Noise Removal segmentation, Curve-let Transformation features and Support Vector Machine classifier. In that we calculated on successful result purpose on still images and some real time images for different background location image on features extraction and classified techniques. Previously, Different methodologies have been used for texture feature extraction. The method which we proposed gives a better accuracy and efficiency towards extract texture feature analysis as with wavelet transform. Curve-let, Gradient Edge Operator on Support Vector Machine Classifier analysis and performance measure is completely new in this paper.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123125584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}