Pub Date : 2012-12-31DOI: 10.1109/ICCICT.2012.6398178
D. Tayal, C. Gupta, A. Jain
The first pioneering study on Evolutionary Computation was studied by Holland (1975). Since the inception of Evolutionary Computation, researchers are constantly focusing on developing new methodologies, techniques, operators etc. for better convergence of the evolutionary algorithms. In the present paper, we propose a new crossover operator in Differential Evolution (DE) which has an effective convergence and enhances the efficiency of the optimization strategy, used for numerical data.
{"title":"A new crossover operator in Differential Evolution for numerical optimization","authors":"D. Tayal, C. Gupta, A. Jain","doi":"10.1109/ICCICT.2012.6398178","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398178","url":null,"abstract":"The first pioneering study on Evolutionary Computation was studied by Holland (1975). Since the inception of Evolutionary Computation, researchers are constantly focusing on developing new methodologies, techniques, operators etc. for better convergence of the evolutionary algorithms. In the present paper, we propose a new crossover operator in Differential Evolution (DE) which has an effective convergence and enhances the efficiency of the optimization strategy, used for numerical data.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125502946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/ICCICT.2012.6398164
Abhiram M H Student, Chetan Sadhu, K. Manikantan, S. Ramachandran
Iris recognition (IR) under varying live-tissues is challenging, and extracting tissue edge features is an effective approach to solve this problem. In this paper, we propose a unique combination of edge detection plus DCT based feature extraction for enhanced Iris Recognition. Two novel methods, namely circular sector and triangular shaped DCT feature extraction techniques are proposed. Individual stages of the IR system are examined and an attempt is made to improve each stage. A Binary Particle Swarm Optimization (BPSO)-based feature selection algorithm is used to search the feature vector space for obtaining the optimal feature subset. Experimental results show the promising performance of circular sector DCT extraction for iris recognition on Phoenix, MMU, IITD databases.
{"title":"Novel DCT based feature extraction for enhanced Iris Recognition","authors":"Abhiram M H Student, Chetan Sadhu, K. Manikantan, S. Ramachandran","doi":"10.1109/ICCICT.2012.6398164","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398164","url":null,"abstract":"Iris recognition (IR) under varying live-tissues is challenging, and extracting tissue edge features is an effective approach to solve this problem. In this paper, we propose a unique combination of edge detection plus DCT based feature extraction for enhanced Iris Recognition. Two novel methods, namely circular sector and triangular shaped DCT feature extraction techniques are proposed. Individual stages of the IR system are examined and an attempt is made to improve each stage. A Binary Particle Swarm Optimization (BPSO)-based feature selection algorithm is used to search the feature vector space for obtaining the optimal feature subset. Experimental results show the promising performance of circular sector DCT extraction for iris recognition on Phoenix, MMU, IITD databases.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121857499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/ICCICT.2012.6398130
S. Baidya, C. K. Bhattacharyya, S. Bhattacharyya
Deployment of sensor nodes with full coverage and connectivity is a real challenge in the field of Wireless Sensor Networks. In this paper we have done a comparative study to reach an optimum deployment solution without compromising coverage as well as the connectivity of a region using a layered deployment model. We have also presented the optimal coverage and optimal connectivity topology and their mathematical foundations.
{"title":"Finding optimal topology for coverage and connectivity using Layered Deployment Model: A comparative study","authors":"S. Baidya, C. K. Bhattacharyya, S. Bhattacharyya","doi":"10.1109/ICCICT.2012.6398130","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398130","url":null,"abstract":"Deployment of sensor nodes with full coverage and connectivity is a real challenge in the field of Wireless Sensor Networks. In this paper we have done a comparative study to reach an optimum deployment solution without compromising coverage as well as the connectivity of a region using a layered deployment model. We have also presented the optimal coverage and optimal connectivity topology and their mathematical foundations.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129169671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/ICCICT.2012.6398110
U. Patel, R. Petkar, D. Sharma, S. Vazirani
The purpose of air defense guided missile systems is to reduce or minimize the attacks by detecting and destroying enemy aircraft or missiles approaching a important area. These systems must be capable of defending strategic areas against attack from high altitude, high speed enemy aircraft by performing precision bombing on the aircraft and on the missiles launched by the aircraft. So to destroy the targets, the system must be capable of predicting the trajectory of the targets before and after the missile launch. Our study aims to study the amplitude monopulse radar system and designing a missile launching system which is able to calculate the predicted trajectory of the target based on the amplitude monopulse radar system using MATLAB. This missile launching system also calculates the trajectory of the missile used for destroying the target. The speed, azimuth and elevation angle for launching the missile is also calculated. This missile launching system is designed for stationary and moving objects having uniform speed or acceleration.
{"title":"Study and design of target tracking and antimissile launching by amplitude comparison monopulse radar tracking using MATLAB","authors":"U. Patel, R. Petkar, D. Sharma, S. Vazirani","doi":"10.1109/ICCICT.2012.6398110","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398110","url":null,"abstract":"The purpose of air defense guided missile systems is to reduce or minimize the attacks by detecting and destroying enemy aircraft or missiles approaching a important area. These systems must be capable of defending strategic areas against attack from high altitude, high speed enemy aircraft by performing precision bombing on the aircraft and on the missiles launched by the aircraft. So to destroy the targets, the system must be capable of predicting the trajectory of the targets before and after the missile launch. Our study aims to study the amplitude monopulse radar system and designing a missile launching system which is able to calculate the predicted trajectory of the target based on the amplitude monopulse radar system using MATLAB. This missile launching system also calculates the trajectory of the missile used for destroying the target. The speed, azimuth and elevation angle for launching the missile is also calculated. This missile launching system is designed for stationary and moving objects having uniform speed or acceleration.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129182943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/ICCICT.2012.6398196
V. Shekher, P. Rai, O. Prakash
This paper presents Intelligent control and performance evaluation of electric ceramic infrared heater with less energy consume. The design and implementation of different tuning of PID controller is also presented. A closed loop control system having IOPID controller has been developed for the temperature control for ceramic infrared heater. Using IOPID controller to test the comparative performances with the other tuning method of PID and intelligent controller tuning to validate it's effectiveness. The simulation result shows that the IOPID controller has good robustness, rapidly and good dynamic performance for high static gain. A fuzzy logic controller used for the same system for good stability and robust performance. Fuzzy logic controller has been widely used for non-linear, time delay and high order system. The results obtain reflect that use of intelligent controller based on Genetic Algorithm and Particle Swarm Optimization also improves the performance of process in terms of time domain specification and optimum stability.
{"title":"Performance evaluation of an intelligent controller design for a ceramic infrared heater","authors":"V. Shekher, P. Rai, O. Prakash","doi":"10.1109/ICCICT.2012.6398196","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398196","url":null,"abstract":"This paper presents Intelligent control and performance evaluation of electric ceramic infrared heater with less energy consume. The design and implementation of different tuning of PID controller is also presented. A closed loop control system having IOPID controller has been developed for the temperature control for ceramic infrared heater. Using IOPID controller to test the comparative performances with the other tuning method of PID and intelligent controller tuning to validate it's effectiveness. The simulation result shows that the IOPID controller has good robustness, rapidly and good dynamic performance for high static gain. A fuzzy logic controller used for the same system for good stability and robust performance. Fuzzy logic controller has been widely used for non-linear, time delay and high order system. The results obtain reflect that use of intelligent controller based on Genetic Algorithm and Particle Swarm Optimization also improves the performance of process in terms of time domain specification and optimum stability.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"570 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116175188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/ICCICT.2012.6398109
V. Abrol, P. Sharma
In practical Cognitive Radio Networks for Mobile Communication cluster based topology is used to increase spectrum detection performance. The energy of Head Node depletes faster than the member nodes and thus rotation of cluster head is needed for the energy efficiency of Cognitive Radio Networks. The level of hierarchy is increased in this approach by introducing a Super Node which communicates between the Head Nodes and the BTS. In this paper, a new scheme called Sector Coded Transmission (SCT) is proposed in which the Head Nodes are rotating with a two level hierarchy.
{"title":"Sector coded transmission protocol for Cognitive Radio Networks","authors":"V. Abrol, P. Sharma","doi":"10.1109/ICCICT.2012.6398109","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398109","url":null,"abstract":"In practical Cognitive Radio Networks for Mobile Communication cluster based topology is used to increase spectrum detection performance. The energy of Head Node depletes faster than the member nodes and thus rotation of cluster head is needed for the energy efficiency of Cognitive Radio Networks. The level of hierarchy is increased in this approach by introducing a Super Node which communicates between the Head Nodes and the BTS. In this paper, a new scheme called Sector Coded Transmission (SCT) is proposed in which the Head Nodes are rotating with a two level hierarchy.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124308552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/ICCICT.2012.6398160
R. Ansari, M. Devanalamath, K. Manikantan, S. Ramachandran
This paper proposes a Digital Watermarking Algorithm using a unique combination of Discrete Wavelet Transform (DWT), Discrete Fourier Transform (DFT) and Singular Value Decomposition (SVD) for secured transmission of data through watermarking digital color images. The singular values obtained from SVD of DWT+DFT transformed watermark is embedded onto the singular values obtained from SVD of DWT+DFT transformed color image. Experimental results show the promising performance of the proposed algorithm for watermarking. Peak Signal to Noise Ratio (PSNR) values for the watermarked image in the range of 65 to 85 dB and maximum correlation of 0.9998 are achieved.
{"title":"Robust Digital image Watermarking Algorithm in DWT-DFT-SVD domain for color images","authors":"R. Ansari, M. Devanalamath, K. Manikantan, S. Ramachandran","doi":"10.1109/ICCICT.2012.6398160","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398160","url":null,"abstract":"This paper proposes a Digital Watermarking Algorithm using a unique combination of Discrete Wavelet Transform (DWT), Discrete Fourier Transform (DFT) and Singular Value Decomposition (SVD) for secured transmission of data through watermarking digital color images. The singular values obtained from SVD of DWT+DFT transformed watermark is embedded onto the singular values obtained from SVD of DWT+DFT transformed color image. Experimental results show the promising performance of the proposed algorithm for watermarking. Peak Signal to Noise Ratio (PSNR) values for the watermarked image in the range of 65 to 85 dB and maximum correlation of 0.9998 are achieved.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126280819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/ICCICT.2012.6398102
A. Akash, S. Chandra, A. Abha, G. Nandi
Push recovery is an important technology needs to be developed for the effective use of bipedal humanoid robot in the household applications. In this paper, a three mass inverted pendulum model equivalent to Humanoid Open Architecture Platform (HOAP -2) has been developed and the effectiveness of the model has been demonstrated using a software framework known as WEBOTS. It has been developed as a test bed for the development of sophisticated Push recovery techniques for HOAP-2 humanoid robot. Functionality of this model is general and adaptable to any kind of three mass models. Ankle strategy technique has been implemented to verify the correctness of the model. The correctness of the model has been verified successfully by the simulation results.
{"title":"Modeling a bipedal humanoid robot using inverted pendulum towards push recovery","authors":"A. Akash, S. Chandra, A. Abha, G. Nandi","doi":"10.1109/ICCICT.2012.6398102","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398102","url":null,"abstract":"Push recovery is an important technology needs to be developed for the effective use of bipedal humanoid robot in the household applications. In this paper, a three mass inverted pendulum model equivalent to Humanoid Open Architecture Platform (HOAP -2) has been developed and the effectiveness of the model has been demonstrated using a software framework known as WEBOTS. It has been developed as a test bed for the development of sophisticated Push recovery techniques for HOAP-2 humanoid robot. Functionality of this model is general and adaptable to any kind of three mass models. Ankle strategy technique has been implemented to verify the correctness of the model. The correctness of the model has been verified successfully by the simulation results.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127947758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/ICCICT.2012.6398148
A. Reshamwala, S. Mahajan
A denial of service attack (DOS) is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. Sequential pattern mining is an important data mining problem with broad applications. Sequential Pattern Mining is to discover the frequent sequential pattern in the sequential event dataset. Intrusion detection using sequential pattern mining is a research focusing on the field of information security. In this paper, we have implemented Apriori a candidate generation algorithm and PrefixSpan a pattern growth algorithm on a network intrusion dataset from KDD Cup 1999, 10 percent of training dataset, which is the annual Data Mining and Knowledge Discovery competition organized by ACM Special Interest Group on Knowledge Discovery and Data Mining, the leading professional organization of data miners. To address the absence of timestamp in the dataset, we considered two approaches to generate the sequence database from the dataset. One is by taking service as reference attribute and the other one by taking a timestamp window of size one day (86400 seconds). We found that experimental results of PrefixSpan for predicting DoS attacks sequences on KDD cup 99 training dataset are efficient. These results are then compared with SPAM (Sequential Pattern Mining) algorithm which uses vertical bitmap data layout allowing for simple, efficient counting.
拒绝服务攻击(DOS)是针对网络结构的任何类型的攻击,目的是使服务器无法为其客户端提供服务。攻击的范围包括向服务器发送数百万个请求以试图降低其速度,向服务器发送大量无效数据包,以及使用无效或欺骗的IP地址发送请求。顺序模式挖掘是一个重要的数据挖掘问题,有着广泛的应用。序列模式挖掘是在序列事件数据集中发现频繁的序列模式。基于顺序模式挖掘的入侵检测是信息安全领域的研究热点。在本文中,我们实现了Apriori候选生成算法和PrefixSpan模式增长算法,该算法来自1999年KDD杯的网络入侵数据集,该数据集占训练数据集的10%,该数据集是由ACM知识发现和数据挖掘特别兴趣小组组织的年度数据挖掘和知识发现竞赛,这是数据挖掘者的主要专业组织。为了解决数据集中缺少时间戳的问题,我们考虑了两种从数据集中生成序列数据库的方法。一种方法是将service作为引用属性,另一种方法是采用一天(86400秒)大小的时间戳窗口。实验结果表明,PrefixSpan在KDD cup 99训练数据集上预测DoS攻击序列是有效的。然后将这些结果与SPAM(顺序模式挖掘)算法进行比较,该算法使用垂直位图数据布局,允许简单,高效的计数。
{"title":"Prediction of DoS attack sequences","authors":"A. Reshamwala, S. Mahajan","doi":"10.1109/ICCICT.2012.6398148","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398148","url":null,"abstract":"A denial of service attack (DOS) is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. Sequential pattern mining is an important data mining problem with broad applications. Sequential Pattern Mining is to discover the frequent sequential pattern in the sequential event dataset. Intrusion detection using sequential pattern mining is a research focusing on the field of information security. In this paper, we have implemented Apriori a candidate generation algorithm and PrefixSpan a pattern growth algorithm on a network intrusion dataset from KDD Cup 1999, 10 percent of training dataset, which is the annual Data Mining and Knowledge Discovery competition organized by ACM Special Interest Group on Knowledge Discovery and Data Mining, the leading professional organization of data miners. To address the absence of timestamp in the dataset, we considered two approaches to generate the sequence database from the dataset. One is by taking service as reference attribute and the other one by taking a timestamp window of size one day (86400 seconds). We found that experimental results of PrefixSpan for predicting DoS attacks sequences on KDD cup 99 training dataset are efficient. These results are then compared with SPAM (Sequential Pattern Mining) algorithm which uses vertical bitmap data layout allowing for simple, efficient counting.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127983176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/ICCICT.2012.6398129
N. Bhalani, J. Singh, M. Tiwari
This paper presents a new approach for the implementation of Karaoke Machine for vocal or instrument removal with recording user's voice and playback. Through the medium of this paper we are glad to showcase our observations and results. Karaoke is a form of entertainment in which users sing along with recorded music using a microphone. So first phase of our Karaoke machine involves removing the original voice of the artist in a song using Out of Phase Stereo method, then, we can record the user's voice while simultaneously playing the remaining music. In this paper, we present a real-time implementation of a Matlab/Simulink model of Karaoke Machine.
本文提出了一种新的实现卡拉ok机的方法,通过录制用户的声音和回放来实现人声或乐器的移除。通过本文的媒介,我们很高兴地展示我们的观察和结果。卡拉ok是一种娱乐形式,使用者用麦克风跟着录制好的音乐唱歌。因此,我们的卡拉ok机的第一阶段是使用Out of phase Stereo方法去除歌曲中艺术家的原始声音,然后,我们可以在录制用户声音的同时播放剩余的音乐。在本文中,我们提出了一个实时实现的卡拉ok机的Matlab/Simulink模型。
{"title":"Karaoke Machine implementation and validation using Out of Phase Stereo method","authors":"N. Bhalani, J. Singh, M. Tiwari","doi":"10.1109/ICCICT.2012.6398129","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398129","url":null,"abstract":"This paper presents a new approach for the implementation of Karaoke Machine for vocal or instrument removal with recording user's voice and playback. Through the medium of this paper we are glad to showcase our observations and results. Karaoke is a form of entertainment in which users sing along with recorded music using a microphone. So first phase of our Karaoke machine involves removing the original voice of the artist in a song using Out of Phase Stereo method, then, we can record the user's voice while simultaneously playing the remaining music. In this paper, we present a real-time implementation of a Matlab/Simulink model of Karaoke Machine.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121697404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}