Pub Date : 2007-12-01DOI: 10.1109/ICCITECHN.2007.4579374
Md Nizam Uddin, Shakil Akter Khan
Text summarization is the technique which automatically creates an abstract or summary of a text. The technique has been developed for many years. So a survey has been done on different summarization techniques. No work in this area has been done for Bangla language. This paper presents a text summarizer for Bangla, which uses some extraction methods for text summarization.
{"title":"A study on text summarization techniques and implement few of them for Bangla language","authors":"Md Nizam Uddin, Shakil Akter Khan","doi":"10.1109/ICCITECHN.2007.4579374","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2007.4579374","url":null,"abstract":"Text summarization is the technique which automatically creates an abstract or summary of a text. The technique has been developed for many years. So a survey has been done on different summarization techniques. No work in this area has been done for Bangla language. This paper presents a text summarizer for Bangla, which uses some extraction methods for text summarization.","PeriodicalId":338170,"journal":{"name":"2007 10th international conference on computer and information technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128576628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-12-01DOI: 10.1109/ICCITECHN.2007.4579373
Md. Abdus Sattar, K. Mahmud, Humayun Arafat, A. F. M. Noor, Uz Zaman
One of the important reasons for poor recognition rate in optical character recognition (OCR) system is the error in character segmentation. Existence of different type of characters in the scanned documents is a major problem to design an effective character segmentation procedure. In this paper, a new technique is presented for identification and segmentation of Bengali printed characters. This paper focuses on the segmentation of printed Bengali characters for efficient recognition of the characters. Our Line segmentation success rate is 99.7 % for 1000 lines, we have tested. Our Word segmentation success rate is 99.8 % for 4900 words tested. From the experiment we noticed that isolated characters fall into isolated group in 99.50 % cases. Most of the errors come from connected characters and characters having tau in front of them as segmenting tau we take the help of width. From the experiment we noticed that most of the errors came from components having multi-touching points between two characters.
{"title":"Segmenting bangla text for optical recognition","authors":"Md. Abdus Sattar, K. Mahmud, Humayun Arafat, A. F. M. Noor, Uz Zaman","doi":"10.1109/ICCITECHN.2007.4579373","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2007.4579373","url":null,"abstract":"One of the important reasons for poor recognition rate in optical character recognition (OCR) system is the error in character segmentation. Existence of different type of characters in the scanned documents is a major problem to design an effective character segmentation procedure. In this paper, a new technique is presented for identification and segmentation of Bengali printed characters. This paper focuses on the segmentation of printed Bengali characters for efficient recognition of the characters. Our Line segmentation success rate is 99.7 % for 1000 lines, we have tested. Our Word segmentation success rate is 99.8 % for 4900 words tested. From the experiment we noticed that isolated characters fall into isolated group in 99.50 % cases. Most of the errors come from connected characters and characters having tau in front of them as segmenting tau we take the help of width. From the experiment we noticed that most of the errors came from components having multi-touching points between two characters.","PeriodicalId":338170,"journal":{"name":"2007 10th international conference on computer and information technology","volume":"794 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128952575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-12-01DOI: 10.1109/ICCITECHN.2007.4579429
N. Amin, M. Khadem
IC packages, in semiconductor industries, are being marked through certain sequence by either laser marker or ink markers. A critical step in the final visual inspection is the orientation check of ICs that can be determined by detecting images of pin-1 notch or pin-1 dimple, which are molded/marked on the IC packages. This study accomplishes a software interface for a simple cost-effective approach to develop an automated low cost vision system that is capable of detecting the IC orientation on a JEDEC tray for a laser/ink marker system used in the IC industries. The algorithm has the competence and flexibility to distinguish correct orientation for various types of IC packages (QFP, PGA, BGA, flip chip etc.). The workable prototype possesses input variables, control system and output variables along with software implementation using the pattern recognition template based on RGB (red-green-blue) color method for every pixel of the images. Images of Pin-1 dimple or pin-1 notch of the IC packages are considered to perform image matching with the software development. The accuracy level has been achieved to a threshold value of above 80% of the total pixels scanned between the matched images. With this threshold value, matching efficiency between two similar images has been attained near about 100%, based on the proposed algorithmic results. Illumination variation, vibration of the machine on conveyors and handlers, computerpsilas timing gap with the Web camera and low resolution (320times240 or 277times245 pixels) of the taken images have made the image matching a complicated one. However, all the constraints are taken into account for setting the threshold value and obtaining the matching accuracy and have been achieved the appropriate matching algorithm to implement the cost effective automated IC orientation checking system.
{"title":"Interface development for cost effective automated IC orientation checking systems","authors":"N. Amin, M. Khadem","doi":"10.1109/ICCITECHN.2007.4579429","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2007.4579429","url":null,"abstract":"IC packages, in semiconductor industries, are being marked through certain sequence by either laser marker or ink markers. A critical step in the final visual inspection is the orientation check of ICs that can be determined by detecting images of pin-1 notch or pin-1 dimple, which are molded/marked on the IC packages. This study accomplishes a software interface for a simple cost-effective approach to develop an automated low cost vision system that is capable of detecting the IC orientation on a JEDEC tray for a laser/ink marker system used in the IC industries. The algorithm has the competence and flexibility to distinguish correct orientation for various types of IC packages (QFP, PGA, BGA, flip chip etc.). The workable prototype possesses input variables, control system and output variables along with software implementation using the pattern recognition template based on RGB (red-green-blue) color method for every pixel of the images. Images of Pin-1 dimple or pin-1 notch of the IC packages are considered to perform image matching with the software development. The accuracy level has been achieved to a threshold value of above 80% of the total pixels scanned between the matched images. With this threshold value, matching efficiency between two similar images has been attained near about 100%, based on the proposed algorithmic results. Illumination variation, vibration of the machine on conveyors and handlers, computerpsilas timing gap with the Web camera and low resolution (320times240 or 277times245 pixels) of the taken images have made the image matching a complicated one. However, all the constraints are taken into account for setting the threshold value and obtaining the matching accuracy and have been achieved the appropriate matching algorithm to implement the cost effective automated IC orientation checking system.","PeriodicalId":338170,"journal":{"name":"2007 10th international conference on computer and information technology","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127396088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Biometric authentication has become increasingly popular in security systems. Recently, the systems based on the human iris, which develops a unique pattern before birth, have produced very high rates of recognition. The iris image is first blurred using a Gaussian filter, and the edge is detected using the Canny edge detection technique. An algorithm, which uses the center of the image as a starting point, is proposed to isolate the pupillary region. The initial estimate of the location of the pupil is then refined, and the iris is located by using the integrodifferential operator. In order to detect the upper and the lower eyelids, we deploy the integrodifferential operator again; however, the path of contour integration is changed from circular to arcuate. A thresholding technique is then applied to locate the eyelashes. The annular iris region is unwrapped from a polar coordinate system to a rectangular canvas. The 2D Gabor wavelets are used to extract the discriminating features. Then, the phase information is extracted to produce an iris code of 2048 bit and a mask, which denotes the noisy regions, of the same length. The Hamming distance is applied for the matching purpose. We also design a graphical user interface (GUI) in Java which allows the comparison of two images, the verification that an image is that of a specific person, and to search through the previously scanned irises for an exact match. The proposed scheme is computationally effective as well as reliable in term of recognition rate of 99.21%.
{"title":"Iris Recognition: A Java based implementation","authors":"Kaushik Roy, Darrel Hudgin, Prabir Bhattacharya, Ramesh Chandra Debnath","doi":"10.1109/ICCITECHN.2007.4579428","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2007.4579428","url":null,"abstract":"Biometric authentication has become increasingly popular in security systems. Recently, the systems based on the human iris, which develops a unique pattern before birth, have produced very high rates of recognition. The iris image is first blurred using a Gaussian filter, and the edge is detected using the Canny edge detection technique. An algorithm, which uses the center of the image as a starting point, is proposed to isolate the pupillary region. The initial estimate of the location of the pupil is then refined, and the iris is located by using the integrodifferential operator. In order to detect the upper and the lower eyelids, we deploy the integrodifferential operator again; however, the path of contour integration is changed from circular to arcuate. A thresholding technique is then applied to locate the eyelashes. The annular iris region is unwrapped from a polar coordinate system to a rectangular canvas. The 2D Gabor wavelets are used to extract the discriminating features. Then, the phase information is extracted to produce an iris code of 2048 bit and a mask, which denotes the noisy regions, of the same length. The Hamming distance is applied for the matching purpose. We also design a graphical user interface (GUI) in Java which allows the comparison of two images, the verification that an image is that of a specific person, and to search through the previously scanned irises for an exact match. The proposed scheme is computationally effective as well as reliable in term of recognition rate of 99.21%.","PeriodicalId":338170,"journal":{"name":"2007 10th international conference on computer and information technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122422032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-12-01DOI: 10.1109/ICCITECHN.2007.4579368
S. Sadid-Al-Hasan
The EIDI (Enhanced Intelligent Database Interface) integrates artificial intelligence and database systems where the AI system can access one or more databases on one or more remote database management systems (DBMSs). The interface can support a wide variety of different DBMSs with static as well as dynamic capabilities. SQL is used to communicate with remote DBMSs and the implementation of the EIDI provides a high degree of portability. The query language of the EIDI is a restricted subset of function free Horn clauses, which are translated to SQL. Results from the EIDI are returned one tuple at a time and the EIDI manages a dynamic cache of result relations to improve efficiency. The objective of this paper is to present firstly a brief overview of the area of AI/DB integration-which worked as the main motivation behind the EIDI, then a discussion on the major features of EIDI and subsequently the architecture and salient components of the EIDI.
{"title":"Design of EIDI: A cache-based interface to integrate ai and database systems with dynamism","authors":"S. Sadid-Al-Hasan","doi":"10.1109/ICCITECHN.2007.4579368","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2007.4579368","url":null,"abstract":"The EIDI (Enhanced Intelligent Database Interface) integrates artificial intelligence and database systems where the AI system can access one or more databases on one or more remote database management systems (DBMSs). The interface can support a wide variety of different DBMSs with static as well as dynamic capabilities. SQL is used to communicate with remote DBMSs and the implementation of the EIDI provides a high degree of portability. The query language of the EIDI is a restricted subset of function free Horn clauses, which are translated to SQL. Results from the EIDI are returned one tuple at a time and the EIDI manages a dynamic cache of result relations to improve efficiency. The objective of this paper is to present firstly a brief overview of the area of AI/DB integration-which worked as the main motivation behind the EIDI, then a discussion on the major features of EIDI and subsequently the architecture and salient components of the EIDI.","PeriodicalId":338170,"journal":{"name":"2007 10th international conference on computer and information technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122689216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-12-01DOI: 10.1109/ICCITECHN.2007.4579384
B. Sultana, M. Khandker
Vertically stacked optical banyan (VSOB) networks are attractive for serving as optical switching systems due to the good properties of banyan network structures (such as the small depth and self-routing capability). Crosstalk between optical signals passing through the same DC is an intrinsic drawback in DC-based optical networks. Vertical stacking of multiple copies (planes) of an optical banyan network, namely vertically stacked optical banyan (VSOB) network, can remove the crosstalk problem in switch network, and can also make the network nonblocking. This paper deals with the blocking behavior of VSOB networks when some links are broken or failed. We found the approximate value for lower bound on number of planes required to make a VSOB networks nonblocking allowing link-failures. We have an interesting finding that the blocking probability of the VSOB networks does not always increase with the increase of link-failures; blocking probability decreases for certain range of link-failures, and then increases again. As far as we know that for switching networks, such fluctuating variation of blocking probability with the increase of link failures rate deserves special attention in switch design.
{"title":"Lower bound on number of planes for vertically stacked optical banyan networks with link failures","authors":"B. Sultana, M. Khandker","doi":"10.1109/ICCITECHN.2007.4579384","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2007.4579384","url":null,"abstract":"Vertically stacked optical banyan (VSOB) networks are attractive for serving as optical switching systems due to the good properties of banyan network structures (such as the small depth and self-routing capability). Crosstalk between optical signals passing through the same DC is an intrinsic drawback in DC-based optical networks. Vertical stacking of multiple copies (planes) of an optical banyan network, namely vertically stacked optical banyan (VSOB) network, can remove the crosstalk problem in switch network, and can also make the network nonblocking. This paper deals with the blocking behavior of VSOB networks when some links are broken or failed. We found the approximate value for lower bound on number of planes required to make a VSOB networks nonblocking allowing link-failures. We have an interesting finding that the blocking probability of the VSOB networks does not always increase with the increase of link-failures; blocking probability decreases for certain range of link-failures, and then increases again. As far as we know that for switching networks, such fluctuating variation of blocking probability with the increase of link failures rate deserves special attention in switch design.","PeriodicalId":338170,"journal":{"name":"2007 10th international conference on computer and information technology","volume":"242 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129977467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-12-01DOI: 10.1109/ICCITECHN.2007.4579405
Mozammel H. A. Khan
Multiple-valued quantum circuits are a promising choice for future quantum computing technology since they have several advantages over binary quantum circuits. In this paper, we propose quaternary multi-qudit controlled gate family and show their realization on the top of liquid ion-trap realizable 1-qudit gates and 2-qudit Muthukrishnan-Stroud gates. Then we show a method of synthesizing incompletely specified multi-output quaternary function using quaternary 1-qudit gates and multi-qudit controlled gates.
{"title":"Synthesis of incompletely specified multi-output quaternary function using quaternary quantum gates","authors":"Mozammel H. A. Khan","doi":"10.1109/ICCITECHN.2007.4579405","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2007.4579405","url":null,"abstract":"Multiple-valued quantum circuits are a promising choice for future quantum computing technology since they have several advantages over binary quantum circuits. In this paper, we propose quaternary multi-qudit controlled gate family and show their realization on the top of liquid ion-trap realizable 1-qudit gates and 2-qudit Muthukrishnan-Stroud gates. Then we show a method of synthesizing incompletely specified multi-output quaternary function using quaternary 1-qudit gates and multi-qudit controlled gates.","PeriodicalId":338170,"journal":{"name":"2007 10th international conference on computer and information technology","volume":"7 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113963887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-12-01DOI: 10.1109/ICCITECHN.2007.4579437
M.F. Al Ameen, D. Islam, S. A. Hossain
In the field of Analog VLSI layout design, large variation of MOS component sizes causes mismatches and reduces the performance and splitting is necessary to reduce the variation. On the other hand, intensity of imposing always varies during fabrication. In this ongoing research, the solutions of above problems are introduced with some algorithm implementations. Two different sizes of components can be split into optimized number of pieces and an algorithm distributes them in an average and symmetrical (better) arrangement such that it can ensure average imposing and the efficiency increases. The computer generated solutions are compared with other possible solutions and proved better.
{"title":"Algorithms for synthesis and average distribution of variable sized MOS components for efficient Analog VLSI devices","authors":"M.F. Al Ameen, D. Islam, S. A. Hossain","doi":"10.1109/ICCITECHN.2007.4579437","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2007.4579437","url":null,"abstract":"In the field of Analog VLSI layout design, large variation of MOS component sizes causes mismatches and reduces the performance and splitting is necessary to reduce the variation. On the other hand, intensity of imposing always varies during fabrication. In this ongoing research, the solutions of above problems are introduced with some algorithm implementations. Two different sizes of components can be split into optimized number of pieces and an algorithm distributes them in an average and symmetrical (better) arrangement such that it can ensure average imposing and the efficiency increases. The computer generated solutions are compared with other possible solutions and proved better.","PeriodicalId":338170,"journal":{"name":"2007 10th international conference on computer and information technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128913082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-12-01DOI: 10.1109/ICCITECHN.2007.4579451
Md. Bahlul Haider, K. Sugihara
To obtain a satisfactory performance in the wireless sensor network, optimal routing is the most important aspect. The lifetime of the sensor network depends mostly on the routing topology. In order to route the data in an efficient way, we propose an almost Delaunay triangulation routing approach, which could be generated locally. This routing graph is generated only once and can be used during the whole lifetime of the wireless sensor network.
{"title":"Almost Delaunay triangulation routing in wireless sensor networks","authors":"Md. Bahlul Haider, K. Sugihara","doi":"10.1109/ICCITECHN.2007.4579451","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2007.4579451","url":null,"abstract":"To obtain a satisfactory performance in the wireless sensor network, optimal routing is the most important aspect. The lifetime of the sensor network depends mostly on the routing topology. In order to route the data in an efficient way, we propose an almost Delaunay triangulation routing approach, which could be generated locally. This routing graph is generated only once and can be used during the whole lifetime of the wireless sensor network.","PeriodicalId":338170,"journal":{"name":"2007 10th international conference on computer and information technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129092186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-12-01DOI: 10.1109/ICCITECHN.2007.4579408
M.N. Islam, M.Z. Rahman
This paper presents the findings of research relating to electronic commerce adoption in Bangladesh. A survey questionnaire was used to gather opinions about the current status of electronic commerce in Bangladesh organizations. The survey was conducted between April 2006 and August 2006. The focus of the survey was to investigate potential benefits of electronic commerce, potential barriers and risks in electronic commerce. The expectations regarding evolution of electronic commerce also tried to find out.
{"title":"Electronic commerce adoption small and medium scale industry in Bangladesh","authors":"M.N. Islam, M.Z. Rahman","doi":"10.1109/ICCITECHN.2007.4579408","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2007.4579408","url":null,"abstract":"This paper presents the findings of research relating to electronic commerce adoption in Bangladesh. A survey questionnaire was used to gather opinions about the current status of electronic commerce in Bangladesh organizations. The survey was conducted between April 2006 and August 2006. The focus of the survey was to investigate potential benefits of electronic commerce, potential barriers and risks in electronic commerce. The expectations regarding evolution of electronic commerce also tried to find out.","PeriodicalId":338170,"journal":{"name":"2007 10th international conference on computer and information technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116857466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}