Pub Date : 2015-12-01DOI: 10.1109/ICCIC.2015.7435757
Sharayu Hurdale, P. Khandekar
Super resolution technique gives an effective way to increase image resolution. Lower resolution is converted into higher resolution. By proposed super resolution algorithm, image is resolved sixteen times. This paper presents a FPGA (Field Programmable Gate Array) implementation of super resolution algorithm. FPGA is used because of its various advantages. In super resolution image size is increased by adopting information from input image itself. Using this algorithm image can be resolved up-to 2x, 4x, 8x and 16x.
{"title":"Implementation of super-resolution algorithm on FPGA","authors":"Sharayu Hurdale, P. Khandekar","doi":"10.1109/ICCIC.2015.7435757","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435757","url":null,"abstract":"Super resolution technique gives an effective way to increase image resolution. Lower resolution is converted into higher resolution. By proposed super resolution algorithm, image is resolved sixteen times. This paper presents a FPGA (Field Programmable Gate Array) implementation of super resolution algorithm. FPGA is used because of its various advantages. In super resolution image size is increased by adopting information from input image itself. Using this algorithm image can be resolved up-to 2x, 4x, 8x and 16x.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125792572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/ICCIC.2015.7435691
K. M. Varuna Rao, U. Ghanekar
This paper presents a transform domain fragile watermarking technique based on Fermat number transform (FNT). This transform domain is very simple and efficient in terms of computational complexity and speed. FNT is a true digital transform, which makes the watermarking method free from round-off errors. In this method, the image is divided into non-overlapping blocks and FNT is applied on each block. The transformed coefficients are then quantized and embedded by the watermark bits. Finally, inverse FNT is taken and all the blocks are combined together. This method has eight variations depending on the fragility requirements. Depending upon the requirement of fragility and PSNR different variants of this method can be used.
{"title":"Transform domain fragile watermarking using fermat number transform","authors":"K. M. Varuna Rao, U. Ghanekar","doi":"10.1109/ICCIC.2015.7435691","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435691","url":null,"abstract":"This paper presents a transform domain fragile watermarking technique based on Fermat number transform (FNT). This transform domain is very simple and efficient in terms of computational complexity and speed. FNT is a true digital transform, which makes the watermarking method free from round-off errors. In this method, the image is divided into non-overlapping blocks and FNT is applied on each block. The transformed coefficients are then quantized and embedded by the watermark bits. Finally, inverse FNT is taken and all the blocks are combined together. This method has eight variations depending on the fragility requirements. Depending upon the requirement of fragility and PSNR different variants of this method can be used.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121023105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/ICCIC.2015.7435670
B. Gayathri, C. Sumathi
Diagnosing various diseases in medical field is very difficult even for medical expert. For solving this problem data mining was introduced. It discovers knowledge from the database. There are many subfields in data mining. One of the subfield is fuzzy logic. It is applied in many fields such as control theory, Artificial Intelligence (AI) and also in the field of medicine. This paper focuses on detecting the risk of breast cancer by using fuzzy logic. The dataset used in this work is retrieved from UCI machine learning repository. The aim of this proposed work is to detect the breast cancer by reducing the variables, so that it reduces the time taken for diagnosing the disease. The features were extracted by using one of the feature selection method called Linear Discriminant Analysis (LDA) and training is done by using one of the fuzzy inference method called Mamdani Fuzzy inference model. The results were evaluated by using the above model. It gave the result of 93%.
{"title":"Mamdani fuzzy inference system for breast cancer risk detection","authors":"B. Gayathri, C. Sumathi","doi":"10.1109/ICCIC.2015.7435670","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435670","url":null,"abstract":"Diagnosing various diseases in medical field is very difficult even for medical expert. For solving this problem data mining was introduced. It discovers knowledge from the database. There are many subfields in data mining. One of the subfield is fuzzy logic. It is applied in many fields such as control theory, Artificial Intelligence (AI) and also in the field of medicine. This paper focuses on detecting the risk of breast cancer by using fuzzy logic. The dataset used in this work is retrieved from UCI machine learning repository. The aim of this proposed work is to detect the breast cancer by reducing the variables, so that it reduces the time taken for diagnosing the disease. The features were extracted by using one of the feature selection method called Linear Discriminant Analysis (LDA) and training is done by using one of the fuzzy inference method called Mamdani Fuzzy inference model. The results were evaluated by using the above model. It gave the result of 93%.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"342 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126711154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/ICCIC.2015.7435786
S. Begum, C. Indumathi
Many Organizations depend on Web Applications for performing various activities and stores the collected details in the database. Testing of the database is done to ensure the correctness for the design and working of the database. This paper performs testing of database design for the application using the Entity Relationship diagram for various components used in the database, the model is generated from the relational database that represents various data, entities and the relationship among them. It generates the test data in the form of semantics of the prolog facts and the rules. The Guard queries are generated as test cases for the database. These are executed to validate that the design of the database is appropriate for the Web Application with the objects.
{"title":"ER diagram based web application testing","authors":"S. Begum, C. Indumathi","doi":"10.1109/ICCIC.2015.7435786","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435786","url":null,"abstract":"Many Organizations depend on Web Applications for performing various activities and stores the collected details in the database. Testing of the database is done to ensure the correctness for the design and working of the database. This paper performs testing of database design for the application using the Entity Relationship diagram for various components used in the database, the model is generated from the relational database that represents various data, entities and the relationship among them. It generates the test data in the form of semantics of the prolog facts and the rules. The Guard queries are generated as test cases for the database. These are executed to validate that the design of the database is appropriate for the Web Application with the objects.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124145916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/ICCIC.2015.7435698
M. Devipriya, C. Mala
In wireless ad hoc networks, misbehavior of nodes in computation of backoff value is one of the problems that affects the performance at MAC layer. To overcome this problem, this paper proposes a solution in which Contention Window subrange is specified by the receiver to the sender through CTS/ ACK packet. The advantage of sending the Contention Window subrange is, it is easier to detect the misbehaving nodes. From the simulation results, it can be inferred that the proposed solution reduces the misbehavior of the nodes.
{"title":"Mitigating the misbehavior of nodes at MAC layer in wireless ad hoc network","authors":"M. Devipriya, C. Mala","doi":"10.1109/ICCIC.2015.7435698","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435698","url":null,"abstract":"In wireless ad hoc networks, misbehavior of nodes in computation of backoff value is one of the problems that affects the performance at MAC layer. To overcome this problem, this paper proposes a solution in which Contention Window subrange is specified by the receiver to the sender through CTS/ ACK packet. The advantage of sending the Contention Window subrange is, it is easier to detect the misbehaving nodes. From the simulation results, it can be inferred that the proposed solution reduces the misbehavior of the nodes.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121652782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/ICCIC.2015.7435708
K. Kanimozhi, A. Shunmugalatha
This paper analyses the performance of photovoltaic (PV) system in different climatic conditions and proposes an optimal topology to improve the tracking efficiency conditions. The maximum operating point is determined by the intersection point of its characteristic curves which is not always same due to losses in the system. DC-DC converters together with maximum power point tracking systems (MPPT) are used to avoid these losses. Different algorithms have been proposed for MPPT. The choice of the right DC-DC converter configuration has not been studied so widely. In this paper practical and theoretical analysis of Cuk converter with resistive load connected to PV modules with a modified Perturb and Observe (P&O) MPPT controller is done and influence of Cuk in the optimum performance of the PV system is proved.
{"title":"Optimal choice of DC-DC converter for enhancement of power tracking efficiency in photovoltaic system: Optimal choice of DC-DC converter for PV system","authors":"K. Kanimozhi, A. Shunmugalatha","doi":"10.1109/ICCIC.2015.7435708","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435708","url":null,"abstract":"This paper analyses the performance of photovoltaic (PV) system in different climatic conditions and proposes an optimal topology to improve the tracking efficiency conditions. The maximum operating point is determined by the intersection point of its characteristic curves which is not always same due to losses in the system. DC-DC converters together with maximum power point tracking systems (MPPT) are used to avoid these losses. Different algorithms have been proposed for MPPT. The choice of the right DC-DC converter configuration has not been studied so widely. In this paper practical and theoretical analysis of Cuk converter with resistive load connected to PV modules with a modified Perturb and Observe (P&O) MPPT controller is done and influence of Cuk in the optimum performance of the PV system is proved.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121872253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/ICCIC.2015.7435764
A. Jayan, S. Dija
Cyber forensics deals with the collection of digital artifacts from digital devices that can be presented in the court as evidence. There are many areas of cyber forensics. Some of these are Disk Forensics, Network Forensics, Mobile Forensics, Database Forensics, etc. This paper mainly focuses on E-mail Forensics coming under network forensics. Emails are highly vulnerable to attacks. Email spoofing is the major one among many forms of email-based attacks. Detecting email spoofing is an important challenge in email forensic investigation. In this paper, different methods to detect spoofing by analyzing the mail header are discussed.
{"title":"Detection of spoofed mails","authors":"A. Jayan, S. Dija","doi":"10.1109/ICCIC.2015.7435764","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435764","url":null,"abstract":"Cyber forensics deals with the collection of digital artifacts from digital devices that can be presented in the court as evidence. There are many areas of cyber forensics. Some of these are Disk Forensics, Network Forensics, Mobile Forensics, Database Forensics, etc. This paper mainly focuses on E-mail Forensics coming under network forensics. Emails are highly vulnerable to attacks. Email spoofing is the major one among many forms of email-based attacks. Detecting email spoofing is an important challenge in email forensic investigation. In this paper, different methods to detect spoofing by analyzing the mail header are discussed.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131349858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/ICCIC.2015.7435825
K. Jayanthi, Madurakavi Karthikeyan
An investigation comparative of many descriptors of various images in content-based image retrieval system (CBIR) is described in the paper. This paper describes more number of various features in CBIR system and compare the four different Color and texture based existing low level Feature Extraction Techniques such as Tamura Texture Features, RGP Color Histogram, Gabor Features and Joint Picture Editor Group (JPEG) Coefficients Histogram. The Proposed Techniques such as Fuzzy color and texture histogram (FCTH) and Color and edge directivity descriptor (CEDD) which retrieve the relevant images matching with edge, texture and color value from the Corel library. The Haar wavelet transform (HWT), Discrete wavelet transform (DWT) and algorithm of Fuzzy linking with Gabor filter are used in the proposed paper. The proposed approach gives good result in Average Image Retrieval precision (IRP) and Recall value.
{"title":"An experimental comparison of features in content based image retrieval system","authors":"K. Jayanthi, Madurakavi Karthikeyan","doi":"10.1109/ICCIC.2015.7435825","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435825","url":null,"abstract":"An investigation comparative of many descriptors of various images in content-based image retrieval system (CBIR) is described in the paper. This paper describes more number of various features in CBIR system and compare the four different Color and texture based existing low level Feature Extraction Techniques such as Tamura Texture Features, RGP Color Histogram, Gabor Features and Joint Picture Editor Group (JPEG) Coefficients Histogram. The Proposed Techniques such as Fuzzy color and texture histogram (FCTH) and Color and edge directivity descriptor (CEDD) which retrieve the relevant images matching with edge, texture and color value from the Corel library. The Haar wavelet transform (HWT), Discrete wavelet transform (DWT) and algorithm of Fuzzy linking with Gabor filter are used in the proposed paper. The proposed approach gives good result in Average Image Retrieval precision (IRP) and Recall value.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128377479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/ICCIC.2015.7435803
N. Neeru, L. Kaur
Recognition of a face under different emotions is a challenging subject. Human expression frequently changes with mood. during recognition of face, human may have any expression (neutral, happy, sad, angry, disgust or surprise) and thus, in case, where only neutral face expression has been stored in database, it become difficult to recognize the face of person which is under emotions other than neutral expression. The work done in this paper is twofold. First, local binary pattern (LBP) and center-symmetric local binary pattern (CS-LBP) has been applied to extract the local binary features of the image. Second, Euclidean distance, histogram intersection and chi-square distance is used for recognition of face. The performance is evaluated on the Japanese Female Facial Expression (JAFFE) database and results are compared in terms of recognition rate and time taken for processing. It has been observed that CS-LBP provides better recognition rate rather than LBP in case of different expressions of face.
{"title":"Face recognition based on LBP and CS-LBP technique under different emotions","authors":"N. Neeru, L. Kaur","doi":"10.1109/ICCIC.2015.7435803","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435803","url":null,"abstract":"Recognition of a face under different emotions is a challenging subject. Human expression frequently changes with mood. during recognition of face, human may have any expression (neutral, happy, sad, angry, disgust or surprise) and thus, in case, where only neutral face expression has been stored in database, it become difficult to recognize the face of person which is under emotions other than neutral expression. The work done in this paper is twofold. First, local binary pattern (LBP) and center-symmetric local binary pattern (CS-LBP) has been applied to extract the local binary features of the image. Second, Euclidean distance, histogram intersection and chi-square distance is used for recognition of face. The performance is evaluated on the Japanese Female Facial Expression (JAFFE) database and results are compared in terms of recognition rate and time taken for processing. It has been observed that CS-LBP provides better recognition rate rather than LBP in case of different expressions of face.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116449838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/ICCIC.2015.7435808
Sreekumar Unni, Vishnu S. Nair, S. Gunasekar
Indian e-commerce space is experiencing a tremendous growth that India along with China together is expected to cross the US as largest online retail markets in the world, and that the drivers behind the expansion of e-commerce in India and China are almost same. Recent studies reveals that close to one-third of Internet users are already making online purchases, this growth of e-commerce will rely to a great extend on increased spending from the existing buyers than from fresh online buyers. Hence the demand for retaining existing customers has turned out to be one of the most important objectives of e-retailers. Minimizing the delivery time of the order has turned out to be one of the most important factors in achieving customer satisfaction as per the studies done by various researchers. This paper tries to identify the factors which determine the perceived satisfaction among online shoppers with regard to the delivery time featured offered by the e-retailers. In the study we find that delivery time and website information plays a key role in determining the overall satisfaction with the e-retailer. The study also reveals that people who are highly satisfied with delivery time in non-metros are more likely to be satisfied overall with the e-retailer.
{"title":"E-retail and online customer satisfaction: Differential impact of delivery time in Indian metros","authors":"Sreekumar Unni, Vishnu S. Nair, S. Gunasekar","doi":"10.1109/ICCIC.2015.7435808","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435808","url":null,"abstract":"Indian e-commerce space is experiencing a tremendous growth that India along with China together is expected to cross the US as largest online retail markets in the world, and that the drivers behind the expansion of e-commerce in India and China are almost same. Recent studies reveals that close to one-third of Internet users are already making online purchases, this growth of e-commerce will rely to a great extend on increased spending from the existing buyers than from fresh online buyers. Hence the demand for retaining existing customers has turned out to be one of the most important objectives of e-retailers. Minimizing the delivery time of the order has turned out to be one of the most important factors in achieving customer satisfaction as per the studies done by various researchers. This paper tries to identify the factors which determine the perceived satisfaction among online shoppers with regard to the delivery time featured offered by the e-retailers. In the study we find that delivery time and website information plays a key role in determining the overall satisfaction with the e-retailer. The study also reveals that people who are highly satisfied with delivery time in non-metros are more likely to be satisfied overall with the e-retailer.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"321 3-4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134428030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}