Pub Date : 2012-12-31DOI: 10.1109/ICCICT.2012.6398112
Rupam Das, Asok Kumar, M. Sarkar, Soumyadep Dutta, Vivek Mukherjee
In this paper we present a simple convolution encoder that is implemented over mixed signals of various types of real number values. We make use of the Orthogonal Frequency Division Multiplexing (OFDM) technique for the band pass modulation methods. Here we also make use of the multiband OFDM transmitter that consists of blocks performing IFFT, interleaving, puncturing of sequences and modulation using orthogonal sequences. The main purpose of our paper is to set a basic example of working with higher error correcting codes over real number sequences directly using Fourier transforms and implement it through the noisy AWGN channel using the latest OFDM technique.[1].
{"title":"Mixed-signal convolutional encoder for a MB-OFDM transmitter","authors":"Rupam Das, Asok Kumar, M. Sarkar, Soumyadep Dutta, Vivek Mukherjee","doi":"10.1109/ICCICT.2012.6398112","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398112","url":null,"abstract":"In this paper we present a simple convolution encoder that is implemented over mixed signals of various types of real number values. We make use of the Orthogonal Frequency Division Multiplexing (OFDM) technique for the band pass modulation methods. Here we also make use of the multiband OFDM transmitter that consists of blocks performing IFFT, interleaving, puncturing of sequences and modulation using orthogonal sequences. The main purpose of our paper is to set a basic example of working with higher error correcting codes over real number sequences directly using Fourier transforms and implement it through the noisy AWGN channel using the latest OFDM technique.[1].","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114864498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/ICCICT.2012.6398139
D. Kalbande, S. Khan, G. Thampi
The purpose of this paper is to provide a methodology to assist small automobile manufacturing companies of India in selecting CAD/CAM system. The use of these tools in design and manufacturing of automobile applications makes it possible to remove much of the tedium and manual labor work involved. They allow complex designs to be made quicker and accurately. Many companies are using obsolete packages to design and manufacture automobiles. Since technology is changing rapidly and most companies cannot update with the technology advancements. They need to know what CAD/CAM packages are available and how to select one will help the companies. The selection of CAD/CAM/CIM tool/package is multi criteria, multi attribute, decision making process which involve many factors that can be solved using NAHP (Neuro Analytical Hierarchy Process). In NAHP, we are combining the power of AHP and Neural Network. To accomplish this purpose, data have been collected about current CAD/CAM systems. Important criteria for system selection and parameters for selection have also been identified and prioritized. NAHP is used as decision making technique to identify and prioritize important factors for selection of CAD/CAM/CIM system for small automobile manufacturing companies of India.
{"title":"Neuro Analytical hierarchy process (NAHP) approach for CAD/CAM/CIM tool selection in the context of small manufacturing industries","authors":"D. Kalbande, S. Khan, G. Thampi","doi":"10.1109/ICCICT.2012.6398139","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398139","url":null,"abstract":"The purpose of this paper is to provide a methodology to assist small automobile manufacturing companies of India in selecting CAD/CAM system. The use of these tools in design and manufacturing of automobile applications makes it possible to remove much of the tedium and manual labor work involved. They allow complex designs to be made quicker and accurately. Many companies are using obsolete packages to design and manufacture automobiles. Since technology is changing rapidly and most companies cannot update with the technology advancements. They need to know what CAD/CAM packages are available and how to select one will help the companies. The selection of CAD/CAM/CIM tool/package is multi criteria, multi attribute, decision making process which involve many factors that can be solved using NAHP (Neuro Analytical Hierarchy Process). In NAHP, we are combining the power of AHP and Neural Network. To accomplish this purpose, data have been collected about current CAD/CAM systems. Important criteria for system selection and parameters for selection have also been identified and prioritized. NAHP is used as decision making technique to identify and prioritize important factors for selection of CAD/CAM/CIM system for small automobile manufacturing companies of India.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114492896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/ICCICT.2012.6398155
S. Jadhav, V. Patil
Traditionally, the database is of text and numerical data only, which is having less attention nowadays because of the massive amount of multimedia content. In the multimedia and storage technology, the preceding two decades have resulted in a substantial progress that has led to building of a large repository of digital image, video, and audio data. Currently, the information retrieval from the multimedia content is having a great attention. For exploring through the myriad variety of media all over the world Content-based multimedia information retrieval provides paradigms and methods. In this paper, an extensive review on Multimedia content based retrieval is presented together with the classification by means of the multimedia content either it may be an image or audio or video. In addition, a concise description about multimedia content retrieval is presented. Further more, a brief description on image, audio and video retrieval is presented.
{"title":"Review of significant researches on multimedia information retrieval","authors":"S. Jadhav, V. Patil","doi":"10.1109/ICCICT.2012.6398155","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398155","url":null,"abstract":"Traditionally, the database is of text and numerical data only, which is having less attention nowadays because of the massive amount of multimedia content. In the multimedia and storage technology, the preceding two decades have resulted in a substantial progress that has led to building of a large repository of digital image, video, and audio data. Currently, the information retrieval from the multimedia content is having a great attention. For exploring through the myriad variety of media all over the world Content-based multimedia information retrieval provides paradigms and methods. In this paper, an extensive review on Multimedia content based retrieval is presented together with the classification by means of the multimedia content either it may be an image or audio or video. In addition, a concise description about multimedia content retrieval is presented. Further more, a brief description on image, audio and video retrieval is presented.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114746751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/ICCICT.2012.6398181
Swapnil D. Daphal, S. Jagtap
Processing of large amount of data is an important aspect of Speech Recognition (SR). However, to formulate speech recognition system in small devices is not simple. This paper suggests Digital Signal Processor (DSP) based speech recognition system with improved performance in terms of recognition accuracies and computational cost. The comprehensive survey of various approaches of feature extraction, like Mel Filter Banks with Mel Frequency Cepstrum Coefficients (MFCC) and Cochlear Filter Banks (CFB) with Zero-crossings is given. Amongst various feature classification techniques, the suitability of the Support Vector Machine (SVM) classifier for the proposed system is significant.
{"title":"DSP based improved Speech Recognition system","authors":"Swapnil D. Daphal, S. Jagtap","doi":"10.1109/ICCICT.2012.6398181","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398181","url":null,"abstract":"Processing of large amount of data is an important aspect of Speech Recognition (SR). However, to formulate speech recognition system in small devices is not simple. This paper suggests Digital Signal Processor (DSP) based speech recognition system with improved performance in terms of recognition accuracies and computational cost. The comprehensive survey of various approaches of feature extraction, like Mel Filter Banks with Mel Frequency Cepstrum Coefficients (MFCC) and Cochlear Filter Banks (CFB) with Zero-crossings is given. Amongst various feature classification techniques, the suitability of the Support Vector Machine (SVM) classifier for the proposed system is significant.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128275361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/ICCICT.2012.6398204
Aniruddha Kanhe, S. K. Das, Ankit Kumar Singh
In this paper, Vedic Multiplication Technique is used to implement IEEE 754 Floating point multiplier. The Urdhva-triyakbhyam sutra is used for the multiplication of Mantissa. The underflow and over flow cases are handled. The inputs to the multiplier are provided in IEEE 754, 32 bit format. The multiplier is implemented in VHDL and Virtex-5 FPGA is used.
{"title":"Design and implementation of floating point multiplier based on Vedic Multiplication Technique","authors":"Aniruddha Kanhe, S. K. Das, Ankit Kumar Singh","doi":"10.1109/ICCICT.2012.6398204","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398204","url":null,"abstract":"In this paper, Vedic Multiplication Technique is used to implement IEEE 754 Floating point multiplier. The Urdhva-triyakbhyam sutra is used for the multiplication of Mantissa. The underflow and over flow cases are handled. The inputs to the multiplier are provided in IEEE 754, 32 bit format. The multiplier is implemented in VHDL and Virtex-5 FPGA is used.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133965841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/ICCICT.2012.6398233
S. Sabharwal, R. Sibal, P. Kaur
Software complexity is one of the important quality attribute and predicting complexity is a difficult task for software engineers. Current measures can be used to compute complexity but these methods are not sufficient. New methods or paradigms are being searched for predicting complexity because complexity prediction can help us in estimating many other quality attributes like testability and maintainability. The main goal of this paper is to explore the role of new paradigms like fuzzy logic in complexity prediction. In this paper we have proposed a fuzzy logic based approach to predict software complexity.
{"title":"Software complexity: A fuzzy logic approach","authors":"S. Sabharwal, R. Sibal, P. Kaur","doi":"10.1109/ICCICT.2012.6398233","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398233","url":null,"abstract":"Software complexity is one of the important quality attribute and predicting complexity is a difficult task for software engineers. Current measures can be used to compute complexity but these methods are not sufficient. New methods or paradigms are being searched for predicting complexity because complexity prediction can help us in estimating many other quality attributes like testability and maintainability. The main goal of this paper is to explore the role of new paradigms like fuzzy logic in complexity prediction. In this paper we have proposed a fuzzy logic based approach to predict software complexity.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"279 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132882157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/ICCICT.2012.6398174
B. Chaudhari, P. Gothankar, A. Iyer, D. Ambawade
Wireless computing has evolved tremendously and is being used almost everywhere these days. With the obvious advantage of mobility and easy installation, it also provides service comparable to its wired counterpart. Wireless LANs are implemented in colleges,offices,campuses, and are fast growing. But security in a wireless environment is paramount, and it is essential to have secure transmission and reception of information. Hackers and Crackers can easily jeopardize and break into a LAN, and can compromise the confidentiality, and integrity of information. Hence, it is essential to provide some mechanism to ensure that sharing of information in a wireless environment, as well as the basic operation of a wireless LAN is without any risk. This paper presents a methodology by which we can achieve a secure wireless environment, and ensure information and user security. This paper discusses the various attacks on wireless systems, along with the rule generation for the firewall. The results of implementation, along with an analysis of the performance of the setup has been presented in this paper.
{"title":"Wireless network security using dynamic rule generation of firewall","authors":"B. Chaudhari, P. Gothankar, A. Iyer, D. Ambawade","doi":"10.1109/ICCICT.2012.6398174","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398174","url":null,"abstract":"Wireless computing has evolved tremendously and is being used almost everywhere these days. With the obvious advantage of mobility and easy installation, it also provides service comparable to its wired counterpart. Wireless LANs are implemented in colleges,offices,campuses, and are fast growing. But security in a wireless environment is paramount, and it is essential to have secure transmission and reception of information. Hackers and Crackers can easily jeopardize and break into a LAN, and can compromise the confidentiality, and integrity of information. Hence, it is essential to provide some mechanism to ensure that sharing of information in a wireless environment, as well as the basic operation of a wireless LAN is without any risk. This paper presents a methodology by which we can achieve a secure wireless environment, and ensure information and user security. This paper discusses the various attacks on wireless systems, along with the rule generation for the firewall. The results of implementation, along with an analysis of the performance of the setup has been presented in this paper.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133375053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/ICCICT.2012.6398098
A. Adamuthe, Sandeep U. Mane, G. Thampi
Personnel scheduling problems are multi-constrained combinatorial optimization problems. This paper deals with personnel scheduling problem where the objective is to assign personnel to task. The work presented is twofold, formulation of problem and application of genetic algorithmic approach to the problem. We have surveyed 45 Indian railway police stations from Mumbai division to formulate the problem and take the real world instances. This paper shows performance of genetic algorithms and hybrid genetic algorithms to a small problem instance with 14 personnel per shift. The results show that problem specific repair operator improves the working of GA at a significant level by avoiding premature convergence and gives the solution quickly.
{"title":"Genetic algorithmic approach for security personnel scheduling","authors":"A. Adamuthe, Sandeep U. Mane, G. Thampi","doi":"10.1109/ICCICT.2012.6398098","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398098","url":null,"abstract":"Personnel scheduling problems are multi-constrained combinatorial optimization problems. This paper deals with personnel scheduling problem where the objective is to assign personnel to task. The work presented is twofold, formulation of problem and application of genetic algorithmic approach to the problem. We have surveyed 45 Indian railway police stations from Mumbai division to formulate the problem and take the real world instances. This paper shows performance of genetic algorithms and hybrid genetic algorithms to a small problem instance with 14 personnel per shift. The results show that problem specific repair operator improves the working of GA at a significant level by avoiding premature convergence and gives the solution quickly.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130159870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/ICCICT.2012.6398210
S. Tannu, R. Sawant, Y. S. Rao
A novel discrete time control technique for Induction heating system is discussed. Discrete time control system is modular and flexible compared to its continuous counterpart. This control system holds major advantages of both phase shift control and pulse density modulation. Complete performance analysis of newly developed algorithm was done by conventional load simulations and Hardware in Loop Simulation (HILS). Superior to conventional control technique this technique enables us to implement configurable control system over an embedded processor.
{"title":"Discrete time control technique for induction heating system","authors":"S. Tannu, R. Sawant, Y. S. Rao","doi":"10.1109/ICCICT.2012.6398210","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398210","url":null,"abstract":"A novel discrete time control technique for Induction heating system is discussed. Discrete time control system is modular and flexible compared to its continuous counterpart. This control system holds major advantages of both phase shift control and pulse density modulation. Complete performance analysis of newly developed algorithm was done by conventional load simulations and Hardware in Loop Simulation (HILS). Superior to conventional control technique this technique enables us to implement configurable control system over an embedded processor.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"22 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128831566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/ICCICT.2012.6398151
S. Patil, M. Pawar
Interests on the human body have never decreased and research on it has never stopped since hundreds years ago. A study of EEG for analysis of composition of the brain and cognitive processes for biomedical applications is ongoing topic for research. For proper diagnosis of many neurological diseases such as epilepsy, tumors, problems associated with trauma accurate analysis of EEG signals is essential. In addition, to enhance the efficacy of Brain Computer Interface (BCI) systems it is required to determine methods of increasing the signal-to-noise ratio (SNR) of the observed EEG signals. EEG measured by placing electrodes on scalp usually has very small amplitude in microvolts, so the analysis of EEG data and the extraction of information from this data is a difficult problem. This problem become more complicated by the introduction of artifacts such as line noise from the power grid, eye blinks, eye movements, heartbeat, breathing, and other muscle activity. Discrete wavelet transform offers an effective solution for denoising nonstationary EEG signals. In this paper, wavelet denoising is applied to EEG acquired during performing different mental tasks. First decomposition of the EEG signal from database using five different types of wavelets viz. Haar, Daubechies, Symlet, Coiflet,Dmey is carried out. In denoising process, the thresholding method used for removing noise from contaminated EEG. Our objective to find best suitable wavelet type to particular task which gave better performance measure such as larger signal-to-Noise Ratio (SNR). The EEG database from the Colorado state university is used for experimentation.
{"title":"Quality advancement of EEG by wavelet denoising for biomedical analysis","authors":"S. Patil, M. Pawar","doi":"10.1109/ICCICT.2012.6398151","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398151","url":null,"abstract":"Interests on the human body have never decreased and research on it has never stopped since hundreds years ago. A study of EEG for analysis of composition of the brain and cognitive processes for biomedical applications is ongoing topic for research. For proper diagnosis of many neurological diseases such as epilepsy, tumors, problems associated with trauma accurate analysis of EEG signals is essential. In addition, to enhance the efficacy of Brain Computer Interface (BCI) systems it is required to determine methods of increasing the signal-to-noise ratio (SNR) of the observed EEG signals. EEG measured by placing electrodes on scalp usually has very small amplitude in microvolts, so the analysis of EEG data and the extraction of information from this data is a difficult problem. This problem become more complicated by the introduction of artifacts such as line noise from the power grid, eye blinks, eye movements, heartbeat, breathing, and other muscle activity. Discrete wavelet transform offers an effective solution for denoising nonstationary EEG signals. In this paper, wavelet denoising is applied to EEG acquired during performing different mental tasks. First decomposition of the EEG signal from database using five different types of wavelets viz. Haar, Daubechies, Symlet, Coiflet,Dmey is carried out. In denoising process, the thresholding method used for removing noise from contaminated EEG. Our objective to find best suitable wavelet type to particular task which gave better performance measure such as larger signal-to-Noise Ratio (SNR). The EEG database from the Colorado state university is used for experimentation.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127760376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}