ICCA Volume 2
ICCA Volume 2
ICCA Volume 2
Volume 2
Volume 2
In association with
Association of Scientists, Developers and Faculties (ASDF), India
Association of Computer Machinery(ACM)
Science & Engineering Research Support society (SERSC), Korea
Editor-in-Chief
Published by
Association of Scientists, Developers and Faculties
Address: 27, 3rd main road, Kumaran Nagar Extn., Lawspet, Pondicherry-65008
This book, or parts thereof, may not be reproduced in any form or by any means, electronic or mechanical, including
photocopying, recording or any information storage and retrieval system now known or to be invented, without written
permission from the ICCA 2012 Organizers or the Publisher.
Disclaimer:
No responsibility is assumed by the ICCA 2012 Organizers/Publisher for any injury and/ or damage to persons or
property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products
or ideas contained in the material herein. Contents, used in the papers and how it is submitted and approved by the
contributors after changes in the formatting. Whilst every attempt made to ensure that all aspects of the paper are uniform
in style, the ICCA 2012 Organizers, Publisher or the Editor(s) will not be responsible whatsoever for the accuracy,
correctness or representation of any statements or documents presented in the papers.
ISBN-13: 978-81-920575-5-2
ISBN-10: 81-920575-5-2
PREFACE
This proceeding is a part of International Conference on Computer Applications 2012 which was
held in Pondicherry, India from 27-Dec-2012 and 31-Dec-2012. This conference was hosted by
Techno Forum Research and Development Centre, Pondicherry in association with Association of
Computer Machinery(ACM), Association of Scientists, Developers and Faculties (ASDF), India,
British Computer Society (BCS), UK and Science and Engineering Supporting Society (Society),
Korea.
The world is changing. From shopping malls to transport terminals, aircraft to passenger ships, the
infrastructure of society has to cope with ever more intense and complex flows of people. Today,
more than ever, safety, efficiency and comfort are issues that must be addressed by all designers. The
World Trade Centre disaster brought into tragic focus the need for well-designed evacuation systems.
The new regulatory framework in the marine industry, acknowledges not only the importance of
ensuring that the built environment is safe, but also the central role that evacuation simulation can
play in achieving this.
An additional need is to design spaces for efficiency ensuring that maximum throughput can be
achieved during normal operations and comfort ensuring that the resulting flows offer little
opportunity for needless queuing or excessive congestion. These complex demands challenge
traditional prescriptive design guides and regulations. Designers and regulators are consequently
turning to performance-based analysis and regulations facilitated by the new generation of people
movement models.
When a greater changes are achieved these past years, still more is to be achieved which still seems
to be blue sky of 1970s. But for all the challenges, capabilities continue to advance at phenomenal
speed. Even three years ago it may have been considered a challenge to perform a network design
involving the evacuation of 45,000 people from a 120 story building, but with todays sophisticated
modelling tools and high-end PCs, this is now possible. Todays challenges are much more ambitious
and involve simulating the movement and behaviour of over one million people in city-sized
geometries. The management of these network is also easy and more specifically all the 45,000
people can be monitored by a single person sitting in his cabin. This has been the evidence of the
development these days.
As such, the conference represents a unique opportunity for experts and beginners to gain insight into
the rapidly.
Also I would like to thank all the co-operators for bringing out these proceedings for you which
majorly includes my mom Mrs. K. Lakshmi and my dad Mr. J. Kunasekaran. Apart from them my
biggest worthy gang of friends including Dr. S. Prithiv Rajan, Chairman of this conference, Dr. R. S.
Sudhakar, Patron of this Conference, Dr. A. Manikandan and Dr. S. Avinash, Convener of this
conference, Dr. E. Sai Kishore, Organizing Secretary of this Conference and the entire team which
worked along with me for the rapid success of the conference for past 1 year from the date of
initiating this Conference. Also I need to appreciate Prof. T. R. Srinivasan and his team of Vidyaa
Vikas College of Engineering and Technology for helping to make the publication job easy.
Finally, I thank my family, friends, students and colleagues for their constant encouragement and
support for making this type of conference.
-- K. Kokula Krishna Hari
Editor-in-Chief
Organizing Committee
Chief Patron
Kokula Krishna Hari K, Founder & President, Techno Forum Group, Pondicherry, India
Patron
Sudhakar R S, Chief Executive Officer(CEO), Techno Forum Group, Pondicherry, India
Chairman
Prithiv Rajan S, Chairman & Advisor, Techno Forum Group, Pondicherry, India
Convener
Manikandan A, Chief Human Resources Officer(CHRO), Techno Forum Group, India
Organizing Secretary
Sai Kishore E
Operations Chair
G S Tomar
International Chair
Maaruf Ali
Hospitality
Muthualagan R Alagappa College of Technology, Chennai
Technical Chair
Samir Kumar Bandyopadhyay Former Registrar, University of Calcutta, India
Ponnusamy R
President, Artificial Intelligence Association of India, India
Srinivasan T R,Vice-Principal, Vidyaa Vikas College of Engineering and Technology
MIS Co-Ordinator
Harish G Trustee, Techno Forum Research and Development Centre, Pondicherry
Academic Chair
Bommanna Raja K, Principal, Excel College of Engineering for Women, India
Tai-Hoon Kim Professor & Chairman, Dept. of Multimedia, Hanmam University, Korea
TECHNICAL REVIEWERS
Ashish Chaurasia Gyan Ganga Institute of Technology & Sciences, Jabalpur, India
Kiran Kumari Patil Reva Institute of Technology and Management, Bangalore, India
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
Part I
Proceedings of the Second International Conference on
Computer Applications 2012
ICCA 12
Volume 2
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
Bichitra Kalita
I. INTRODUCTION
The concept of NP-complete problem had been
introduced by S.A. Cook in 1971 [1]. It has been found
that the complexity theory regarding the SAT problems
was the first known NP-complete problem which
determines whether Boolean formula having AND,
variables with
NOT, OR gates and v1, v2,...,vn
parenthesis, has a satisfiable assignment.
It is known that a Boolean formula is in kconjunctive normal form if it is in a conjunction of m
clauses like c1, c2,....,cm and each clause contains exactly k
vaiables or their negation. K.Subramani [2] has studied
the computational of three types of queries relating to
satisfiability, equivalence and hull inclusion. He has
formulated to study the NP-completeness for 3CNF
which are Not All-Equal satisfiability. Satisfiability of
2-CNF formula has been checked in polynomial time
algorithm and 3-CNF satisfiability formula has been
found to be NP-complete.
It has already known that the SATs have many
practical applications in planning, circuit design, spinglass model, molecular biology [4],[3],[5]. Many
research work on 3-SAT has been reported. Many exact
and heuristic algorithms have been introduced. Exact
algorithms can determine whether a problem is
satisfiable or unsatisfiable and this type of algorithms
has an exponential worst-case time complexity. Heuristic
algorithms can determine a problem quickly but they are
not guaranteed to give a definite solution to all problems.
There are so many examples relating to exact
algorithms. It is known that the splitting algorithms
reduces the problem for the input formula F to the
problem for polynomial many formulas F1,F2,......,Fp and
make a recursive call for each or one of Fis [12]. In
addition to it has been found as an example that the
heuristic algorithms are stochastic local search (SLS)
and evolutionary algorithms(EAs). One heuristic
algorithm, known as EF_3SAT for solving 3-SAT
problem has been forwarded by Istvan Borgulya [6].
Let us remind some known definitions which are
related to our present discussion as follows.
Definition1: Given a Boolean formula , does
Proc. of the Intl. Conf. on Computer Applications
Volume 1. Copyright 2012 Techno Forum Group, India.
ISBN:978-81-920575-5-2:: doi: 10.73725/ISBN_0768
ACM #: dber.imera.10.73725
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
www.asdf.org.in
is
(1)
1= (y1 (y2 x2))
Table 1 is the truth table of (1)
Disjunctive normal form (or DNF) formula for 1
X2
1
1
1
1
0
0
0
0
1
0
1
0
1
0
1
0
1
1
0
0
1
1
0
0
(3)
(y1 (y2
x2))
0
1
0
0
1
0
1
1
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
y4
1
1
1
1
0
0
0
0
1
0
1
0
1
0
1
0
1
1
0
0
1
1
0
0
X2
1
1
1
1
0
0
0
0
1
0
1
0
1
0
1
0
1
1
0
0
1
1
0
0
X3
1
1
1
1
0
0
0
0
1
0
1
0
1
0
1
0
1
1
0
0
1
1
0
0
(y2 (y3
v y4))
1
1
1
0
0
0
1
1
(y3 (x1
x2))
1
0
1
1
0
1
0
0
(y4 (x1
x3))
1
0
0
1
0
1
1
0
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
Goto print
[5].
Else
j=j+1
}
Printf satisfied for x1,x2, ...,xk
Print: printf unsatisfied for x1,x2, ...,xk
u=u+1
}
Complexity Analysis of the Algorithm:
To convert decimal number u to binary number,
complexity = O(k), where 2k-1 u 2k
Algorithm to convert a decimal number u to binary
number
int i, num, k
i = 1;
While (num > 1)
{
a[i] = num % 2
i++;
num = num /2;
}
K = i -1;
For (j = 1; j < i ; j++)
{
B[j] = a[k];
k-- ;
}
Here complexity of the decimal to binary conversion
is = k,
It is observed that k = 4 and u = 8 when 23 8 24
k = 6 and u = 32 when 25 32 26
k = 4 and u = 9 when 23 9 24
k = 5 and u = 16 when 24 16 25
k =5 and u = 25 when 24 25 25
Hence complexity of the conversion of a decimal
number uto binary number = O(k),
where 2k -1 u 2k
The worst-case time Complexity of the main
algorithm = 2k(k + k + mk + m) = O(2kmk).
Example: = (x1 v x2 v x3) (x1 v x2 v x3) (x1 v
x2 v x3)
Ans: Applying the above algorithm we can test that
the is satisfiable.
[6].
[7].
[8].
[9].
[10].
[11].
[12].
REFERENCES
[1]. S. A. Cook, The complexity of theorem-proving
procedure, in proceeding of the ACM Symposium on
Theory of Computing (STOC 71),1971.151-158
[2]. K. Subramani, On the Complexities of Selected
Satisfiability and Equivalence Queries over Boolean
Formulas and Inclusion Queries over Hulls, Journal of
Applied Mathematics and Decision Sciences, Volume 2009,
Article ID 845804, 18 pages, 2009.
[3]. CRISANTI A., LEUZZI L., PARISI G., The 3-SAT
problem with large number of clauses in the co-replica
symmetry breaking scheme. J. Phys. A: Math. Gen 35
(2002) pp. 481-497.
[4]. DU D., GU I.,PARDALOS P. (eds), Satisfiability Problem.
Theory and Applications. (1997) Vol.35. DIMACS Series
in Discrete Mathematics and Theoretical Computer Science,
AMS, Providence, Rhode Island.
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
Janani Rajasekaran
Pavithra Rajendran
I.
INTRODUCTION
www.asdf.org.in
PREPROCESSING
Skew detection, Binarization, Noise
reduction
SEGMENTATION
FEATURE EXTRACTION
CLASSIFICATION
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
II.
III. ENCHANCEMENT OF OCR AND TESTING
TOOL
BIGRAM STATISTICS
An bigram is a subsequence of two subsequence
items from a given sequence. The items can
bephonemes, syllables, letter words or base pairs
according to the application. This is a type of
probabilistic model for predicting the next item in such
a sequence. Bigram are used in various areas of
statistical natural language processing and genetic
sequence analysis. The number of occurrences of a
particular character given the other character was
found out. Bigram statistics on text will tell the
probability of occurrences of all combinations and we
can
find
the
normalized
frequency
we can find the normalized frequency. For e.g. in
English alphabets, "qu" will have probability close to
1,"qd" close to 0.
There are cases where two components merge
together and give another component. But by studying
the aspect ratio we can recognize that something has
gone wrong in between these characters. This further
reduces the accuracy of the OCR output.
Fig iii
Fig ii
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
Fig vi
Fig iv
CERTAIN ISSUES
There are certain problems found in the OCR
output. In Tamil Language,[2] Unicode of two matras
cannot follow one another. For instance in the word with
Fig vii
Fig v
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
Fig viii
Beyond the unicodes of matra occurring
together and the recognition of punctuation marks at the
middle, there is another problem found at the OCR
output. The problem is that, in Tamil Language, the
text cannot have a number between characters.
This decreases the efficiency of OCR output. Thereby, a
program is written which detect such problems and
convert these numbers into # symbol. For example, the
above word changes as shown in figure ix .This might
increase the efficiency of the output.
Fig ix
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
10
Fig x
Fig xi
STEPS TO BE FOLLOWED
STEP1:
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
11
Fig xii
IV.
www.asdf.org.in
REFERENCES
[1]
[2]
[3]
[4]
K.H.Aparna,
Sumanth
Jagannathan,
P.Krishnan
and
V.S.Chakravarthy, An Optical Character Recognition system for
Tamil newsprint, National Conference on Communications,
IITMadras, January 2003.
B.J.Manikandan,Gowrishankar,V.Anoop,A.Datta,
and
V.SChakravarthy, LEKHAK: A System for Online Recognition
of Handwritten Tamil Characters, International Conference on
Natural Language Processing (ICON), December 2002.
B.B.Chaudhuri and U.Pal An OCR System to read two Indian
languages scripts Bangla and Devangari (Hindi), International
Conference on Document Analysis and Recognition, August 1820, ULM Germany, PP1011-1015 (1987).
Swapnil Belhe, Chetan Paulzagade, Sanket Surve, Nitesh
Jawanjal, Kapil Mehrotra, Anil Motwani, "Annotation Tool and
XML Representation for Online Indic Data," icfhr, pp.664-669,
2010 12th International Conference on Frontiers in Handwriting
Recognition, 2010
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
12
I INTRODUCTION
The study of Diffusion Limited Aggregation (DLA)
in Electrodeposition of Dendritic patterns has become a
very important tool for understanding irregular objects,
complex systems and phenomena in which a scale
invariance of some sort exists in various scientific
disciplines. These complex shapes are studied in a broad
variety of systems that span through the interdisciplinary
spectrum of modern research including life sciences and
biology, chemical sciences as well as materials sciences,
geology etc. In the field of physical chemistry, fractals
have been observed in growth processes called as
electrodeposition. Recently scientists in various scientific
disciplines have started studying this phenomenon. The
first aggregation model is based on joining the
Proc. of the Intl. Conf. on Computer Applications
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
13
(b)
Fig. 1 Simulated electrodeposition patterns using bias parameter B
= 0.001 at two different stages of simulation of electrodeposition, (a) is
for 1000 points and (b) for 1500 points attached.
(a)
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
www.asdf.org.in
14
[8].Wirtz
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
15
I. INTRODUCTION
A technology product is different from an application
because it is based on a set of specifications that the
underlying technology is based on. A specification is
usually evolved with the help of a community. For a
technology product there are two implications, viz.
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
Communication
Engine (CE)
Instrumented
Code
Analysis
Workbench
(AW)
Core
Persistent
Data Store
16
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
Instrumentation
Engine
Core
Log Writer
Byte Code
Writer
Byte Code
Transformer
Real-time
Statistics
Engine
Control
Engine
Byte Code
Reader
TCP / IP
Server
AW
- Reports
- Call Trace
- Pattern
Analysis
- JVM Replay
- Charting
Engine
- Unexited
Methods
- Responsetime spectrum
- Object
www.asdf.org.in
17
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
www.asdf.org.in
18
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
where, t0, t1, t2, t3, t4, t5, t6 and t7 represent the
timestamps required for response time calculation.
As can be seen, the main method enters first, followed
by A, B and C respectively. And since C is the last method,
it is the first one to exit. Only after C exits does B exit, after
which A and main follow. Thus the logs generated are based
on the actual call sequence.
Coming back to the validation of logs, the logs have to
be validated against the actual sequence of method calls
during the execution of an application. It is difficult with a
third party application, since the exact sequence of method
calls will be difficult to trace. A home-grown application
seemed to be the best solution, since in that case the exact
call sequence would be available along with the
approximate response times. Development and maintenance
of an application meant additional time and efforts. Hence a
more simple approach was identified.
For this a Programmable Test suite was defined
consisting of programs representative of the different
scenarios the profiler can encounter when dealing with realworld applications. For each scenario a program was
written, so there were programs for Recursion, Iteration,
Multi-threading, Daemon Thread execution to name a few.
The advantage here was that the method call sequence
was already known resulting in identification of the desired
format of logs. Also the suite itself was extensible as
expanding the scope meant addition of a new program.
With the use of the Programmable Test suite, the process
became very simple. First the instrumentation of the
programs was carried out, followed by the execution of the
same resulting in the generation of logs. These logs were
then compared with the desired format of logs for
ascertaining correctness.
However in certain cases though everything else is
correct, there will be an inconsistency in the logs collected.
In these special cases the validation requires a few
additional steps as mentioned below
i.
Selective instrumentation
www.asdf.org.in
19
User Interaction
The control through user interaction essentially involves
signaling over TCP / IP communication. Two test cases
were defined here
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
www.asdf.org.in
20
Challenges faced
a) How to validate the analysis results presented by
each of the modules?
b)
How to validate the analysis presented by two
different analysis modules for the same profiling session?
c)
How to handle inconsistent logs?
ii.
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
iii.
B. Performance Testing
Performance testing involved calibration of the
Instrumentation overheads as well as AW. The
Instrumentation process has a direct impact on the
applications performance.
AW on the other hand performs a memory-intensive
activity essential to derive relevant information from the
collected logs.
Performance calibration of both the aspects are required
to understand the requirements and limitations of Jensor.
i.
21
100
Compute
10
IO Reads
IO Writes
0.1 1 2 3 4 5
6 7 8 9 10
0.01
0.001
Increasing Workload
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
Figure 3: - Calibrations
The pink line in the graph in Figure 3 displays Jensor
overheads. It clearly displays that profiling overhead per
method is of the order of 10 30 microseconds. Only in
cases where CPU intensive compute operations (taking few
microseconds) are performed can Jensor exert an overhead.
This is where adaptive profiling helps. Jensor can track its
own overheads and stop profiling methods on which it
imposes significant overhead. For the Read and Write IO
workloads, the overhead in terms of response time is
negligibly small.
The CPU and memory utilization for Jensor depends on
number of classes instrumented and the frequency of their
invocations. For 132 classes in a Sun Microsystems
Java2D demo application, the CPU overhead is less than 3%
and memory consumption is less than 1 MB.
AW Calibration
Pie-Chart (in
MBs)
Response-time
Spectrum (in
MBs)
58
0.08
59
0.1
141
16
31
84
314
29
149
10
72
274
41
55
55
12
302
462
158
Required size of
Plot files (in
MBs)
Total memory
(in MBs)
Unexited +
Unexited
Details (in
MBs)
Debug Tree /
Call Trace (in
MBs)
Pattern Analysis
(in MBs)
Summary
Report (in MBs)
ii.
22
LEARNINGS
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
23
REFERENCES
[1]
[2]
[3]
[4]
Sun
JVM
Specifications
2nd
Edition
http://java.sun.com/docs/books/jvms/second_edition/html/VMSpecT
OC.doc.html
Khanapurkar Amol B., Malan Suresh B., "State-Machine based
Adaptive Application Profiling : Near-zero Overheads using
Progressive Refinements", International Conference on Computer
Applications 2010 [ICCA 2010], Pondicherry, 24-27 Dec 2010
Khanapurkar A., Malan S., Performance Engineering of a Java
Profiler, 3rd National Conference on Information and Software
Engineering (NCISE 2011). 18th& 19th Feb, 2011
ASM
Java
bytecode
manipulation
framework.
http://asm.objectweb.org/
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
24
the application.
Algorithms in Simulated Parallel Condition
A Performance Analysis
Gagandeep Singh1
M.Tech(C.S.E)
ACET, Manawala, Amritsar
I. INTRODUCTION
In parallel processing, the parallel portion of the
application can be accelerated according to the number of
processors allocated to it. In a homogeneous architecture,
where all processors are identical, the sequential portion of
the application will have to be executed in one of the
processors, considerably degrading the execution time of
Proc. of the Intl. Conf. on Computer Applications
Volume 1. Copyright 2012 Techno Forum Group, India.
ISBN: 978-81-920575-5-2:: doi: 10. 73753/ISBN_0768
ACM #: dber.imera.10. 73753
www.asdf.org.in
Chhailadeep Kaur2
Assist. Prof. (Deptt. Of IT)
ACET, Manawala, Amritsar
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
25
SIMD Computers
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
26
Parallel
utilities
to
ease
file
manipulation.
2.2.4 Comparison between different Scheduling
Algorithms
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
C
R
T
Sche
Thr
PU
urnar espon
duling
Ut oughpu
ound se
algorith
ilizati t
time time
m
on
First
L
Lo
In
ow
w
First
Out
Hi
gh
St
D
eadli arvati
on
ne
fre
hand
ling e
H
igh
N
o
Ye
s
Shor
M
N
M
Hig
M
test
ediu
o
edium
remaini edium h
m
ng time
Rou
ndHi
Me
M
L
N
robin
gh
dium
edium ow
o
s
scheduli
ng
No
Ye
www.asdf.org.in
27
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
www.asdf.org.in
28
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
29
I.
INTRODUCTION
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
Bloom filters also have the unusual property that the time
needed to either add items or to check whether an item is in
the set is a fixed constant, O(k), completely independent of
the number of items already in the set.
One important feature of Bloom filters is that there is a
clear tradeoff between the size of the filter and the rate of
false positives. The false positive rate of Bloom filter is
e kn/m
.
When the set of elements is changing over time, in that
case the insertions and deletions in the Bloom filter become
important. Inserting elements into a Bloom filter hash the
element k times and set the bits to 1. However, deletion
process is hashing the element to be deleted k times and set
the corresponding bits to 0, is not possible. This is because
setting a location to 0 that is hashed to by some other
element in the set, and the resultant Bloom filter is no longer
correctly reflects all elements in the set. To avoid this
problem, Counting Bloom Filter (CBF) has an entry in the
Bloom filter is not a single bit but instead a small counter.
When an item is inserted, the corresponding counters are
incremented; and when an item is deleted, the corresponding
counters are decremented.
Compressed Bloom filter (Mitzenmacher, 2002)
improves the performance when the Bloom filter is passed as
a message, and its transmission size is a limiting factor.
Bloom filter is suggested as a means for sharing Web cache
information. In this setting, proxies do not share the exact
contents of their caches, but instead periodically broadcast
Bloom filters representing their cache. By using compressed
Bloom filters, proxies can reduce the number of bits
broadcast, the false positive rate, and/or the amount of
computation per lookup. The cost is the processing time for
compression and decompression. It can use simple arithmetic
www.asdf.org.in
30
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
III.
GENETIC ALGORITHM
www.asdf.org.in
31
SIMULATED ANNEALING
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
32
Where
n
i 1
rj
nj
1
j
(1 i L)
x
a
m
C C
L L
F F
f i
f
i
x
a
m
C 0
x
a
m
m
ri
2
n
l
V.
1 2 fi
n
l
fi ri
C. Weight Assignment
The first step for assigning weight to spam words is
estimating the word probability that depends on word
frequency. Word frequency is measured by the number of
occurrences of a specific word in the document. Estimating
probabilities is achieved using Bayes conditional probability
theorem according to which the probability of a word given
that the message is spam can be estimated as follows:
(3)
(4)
B. Problem Definition
Consider a standard supervised learning problem with a
set of training data D = {<Y1,Z1 >,..., <Yi, Zi>, ,< Yr ,Zr
>} , where Yi is an instance represented as a single feature
vector, Zi = C(Yi ) is the target value of Yi , where C is the
target function. Where Y1, Y2, , Yr set of text document
collection C is a class label to classify into spam or
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
ni1
fi1
wi1
ni2
fi2
wi2
nij
fij
wij
niL
fiL
wiL
33
where nij, fij and wij refer respectively the number of words,
false positive rate of and the weight of the jth bin of ith
chromosome. A set of 3 genes <n,f,w> encodes a protein a
trait, that is a single bin.
E. Initial Population
One chromosome in the population represents one
possible solution for assigning the triples <n, f, w> for L
Bloom filters. Therefore, a population represents a number
of candidate solutions for the Bloom filters. At the initial
stage, each chromosome randomly chooses different <n, f,
w> for L Bins. The fitness function for each individual can
be calculated based on the equation (2).
F. Selection
In selection the offspring producing individuals are
chosen. Each individual in the selection pool receives a
reproduction probability depending on the own fitness value
and the fitness value of all other individuals in the selection
pool. This fitness is used for the actual selection in the step
afterwards. This simplest selection scheme is roulette-wheel
selection, also called stochastic sampling with replacement.
The proposed system employs roulette-wheel selection
method.
G.
Crossover
The interesting behavior happens from genetic
algorithms because of the ability of the solutions to learn
from each other. Solutions can combine to form offspring
for the next generation. Occasionally they will pass on their
worst information, but doing crossover in combination with
a powerful selection technique perceives better solutions
result. Crossover occurs with a user specified probability
called, the crossover probability Pc. Many crossover
www.asdf.org.in
Evaluation
After producing offspring they must be inserted into the
population. By a reinsertion scheme individuals should be
inserted into the new population and it determines which
individuals of the population will be replaced by offspring.
The used selection algorithm determines the reinsertion
scheme. The elitist combined with fitness-based reinsertion
prevents this losing of information and is the recommended
method. At each generation, a given number of the least fit
parent is replaced by the same number of the most fit
offspring.
J.
Hybrid GA with SA
A combination of a genetic algorithm and a SA can
speed up the search to locate the exact global optimum. In
this hybrid, applying a SA to the solutions that are guided
by a GA to the most promising region can accelerate
convergence to the global optimum. The time needed to
reach the global optimum can be further reduced if local
search methods and local knowledge are used to accelerate
locating the most promising search.
For any hybrid algorithm, a local search can be applied
to either every individual in the population or only few
individuals. Applying a local search to every individual in
the population on expensive function evaluations can waste
resources without providing any more useful information.
Applying a local search to a large fraction of the population
can limit exploration of the search space by allowing the
genetic algorithm to evolve for a small number of
generations. Deciding upon the optimal fraction of the
population which should perform local search, and the basis
on which these individuals are chosen, has a great impact on
the performance of a hybrid. The proposed system hybrids
SA with GA when the best chromosome has same fitness
value for designated number of iterations.
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
VI.
EXPERIMENTAL RESULTS
Fstandard (L) f n i w i
i 1
Bin
size
10
11
12
www.asdf.org.in
34
Numbe
r of
Strings
121, 127
131, 194
206, 243
454, 500
512, 512
93, 96
107, 117
181, 255
292, 351
501, 503
504
73, 100
108, 113
116, 169
212, 311
339, 464
496, 499
Average
String
weight
4.883, 4.621
4.413, 4.147
3.835, 3.491
2.932, 2.130
1.307, 0.402
4.908, 4.683
4.518, 4.344
4.099, 3.769
3.344, 2.817
2.104, 1.285
0.396
4.926, 4.718
4.544, 4.370
4.171, 3.955
3.665, 3.262
2.726, 2.054
1.270, 0.391
False positive
rate
0.0171, 0.0208
0.0234, 0.0792
0.0918, 0.1320
0.3384, 0.3738
0.3825, 0.3825
0.0050, 0.0059
0.0101, 0.0149
0.0660, 0.1452
0.1855, 0.2462
0.3746, 0.3760
0.3768
0.0012, 0.0073
0.0105, 0.0129
0.0144, 0.0544
0.0982, 0.2056
0.2343, 0.3463
0.3709, 0.3731
Cost of
BBF
Cost of
Standar
d BF
6082.75
6339.97
6061.40
6336.48
6042.18
6333.24
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
TABLE II.
Bin
size
10
11
12
Number
of
Strings
96, 137
147, 152
215, 253
479, 496
511, 514
95, 104
108, 118
179, 250
294, 345
497, 504
506
73, 104
105, 112
114, 171
212, 304
350, 457
494, 504
35
False positive
rate
0.0059, 0.0276
0.0352, 0.0393
0.1014, 0.1430
0.3580, 0.3709
0.3818, 0.3840
0.0056, 0.0088
0.0105, 0.0155
0.0640, 0.1397
0.1876, 0.2403
0.3716, 0.3768
0.3782
0.0012, 0.0088
0.0092, 0.0124
0.0134, 0.0563
0.0982, 0.1982
0.2452, 0.3408
0.3694, 0.3768
Cost of
BBF
6080.679
6061.072
VII. CONCLUSIONS
Bloom filters are simple randomized data structures that
are useful in practice. The BBF is an extension of BF, and
inherits the best feature of BF such as time and space
saving. The BBF treats strings in a set in a different way
depending on their significance, groups the strings into bins
and allocates different false positive rate to different bins.
Important spam words have lower false positive rate than
less significant words. GA has been used many types of
optimization problem. The proposed system used GA to
minimize the total membership invalidation cost of the BF.
Premature convergence was the main problem for GA. It is
caused by lower diversity of the population. Apparently
maintaining higher diversity is important to obtained better
result. To increase the diversity as well as preventing
premature convergence SA is incorporated in GA when the
best fit chromosome fitness value has no change for
designated number of iterations. The experiment results
show that the result obtained from GA-SA has lesser false
positive rate than values obtained from GA.
REFERENCES
[1]
[2]
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
[3]
www.asdf.org.in
[13]
[14]
[15]
[16]
[17]
[18]
[19]
36
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
37
I.
Visual
Cryptograhy,
Genetic
INTRODUCTION
www.asdf.org.in
RELATED WORK
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
PROPOSED SYSTEM
ALGORITHM DESCRIPTION
www.asdf.org.in
38
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
39
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
VI.
(a) 1st ES
(b) 2nd ES
(c) 3rd ES
(d) 4th ES
Fig 3.5 Encrypted Shares
The encrypted shares generated in grayscale are as follows
www.asdf.org.in
40
PERFORMANCE ANALYSIS
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
[8]
VII. CONCLUSION
[12]
[9]
[10]
[11]
[13]
[14]
[15]
[16]
[17]
[18]
41
REFERENCE
[1]
[2]
[3]
[4]
[5]
[6]
[7]
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
42
Kuyoro Shade O.
Computer Science Department
Babcock University
Ilishan-Remo, Nigeria
www.asdf.org.in
Solanke Ilesanmi
Computer Technology Department
Yaba College of Technology
Yaba, Lagos, Nigeria
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
www.asdf.org.in
43
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
www.asdf.org.in
44
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
45
[2]
[3]
[4]
[5]
[6]
[7]
United
Nations
Development
Programmes
Asia-Pacific
Development Information
Programme (UNDP-APDIP),
http://157.150.195.10/depts/dhl/events/infosociety/toc/toc9.pdf
J. Y. Hamel, ICT4D and the Human Development and Capabilities
Approach: The
Potentials of Information and
Communication Technology. Human Development Research Paper
2010/37, UNDP. (2010).
R. Harris Information and communication technologies for poverty
alleviation, the United Nations Development Programmes AsiaPacific Development Information, Programme (UNDP-APDIP),
2004. http://157.150.195.10/depts/dhl/events/infosociety/toc/toc9.pdf
J. A. Van Dijk. Digital divide research, achievements and
shortcomings, Poetics 34(4-5), 221-235. 2006
J. Von Braun and M. Torero, (eds.) ICTs: Information and
Communication Technologies for the Poor, International Food Policy
Research Institute (IFPRI), brief. 2005. Available at
http://www.ifpri.org/sites/default/files/publications/ib40.pdf
R. Chapman, and T. Slaymaker, (2002). ICTs and rural development:
review of the literature, current interventions and opportunities for
action, Working Paper 1992
UNCTAD Information Economy Report 2010: ICTs, Enterprises and
Poverty Alleviation, Technical report, United Nations Conference on
Trade and Development (UNCTAD).
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
46
Department of Mathematics
Anna University
Chennai, India
I.
INTRODUCTION
RELATED WORK
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
www.asdf.org.in
47
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
48
K-SHARING
OPTIMIZATION PROCESS
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
49
INPUT
certain period.
ALGORITHM
OUTPUT
We=
Ws =
Ww=
Wlp=
n=
e=
t=
s=
www.asdf.org.in
V.
CONCLUSION
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
[2]
[3]
[4]
www.asdf.org.in
50
[5]
[6]
[7]
[8]
[9]
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
51
[email protected]
Electronics Engg. Department
Y.C.C.E Nagpur
Abstract- Segmentation of images into regions for
measurement or recognition is probably the most single
problem area for image analysis numerical evaluations are
needed to quantify the consistency between them. Error
measures can be used for consistency quantification because
are allowing a principled comparison between segmentation
results on different images, with differing numbers of
regions, and generated by different algorithms with different
parameters. This paper presents a graphical interface for
evaluating three graph-based image segmentation
algorithms: the color set back-projection algorithm, an
efficient graph based image segmentation algorithm known
also as the local variation algorithm and a new and original
segmentation algorithm using a hexagonal structure defined
on the set of image pixels.
Keywords - image segmentation, segmentation error
measures, Hexagonal structure of set of pixel., color set back
projection algorithms.
I INTRODUCTION
IMAGE segmentation is one of the most difficult and
challenging tasks in image processing and can be defined
as the process of dividing an image into different regions
such that each region is homogeneous while not the union
of any two adjacent regions. The consistency between
segmentations must be evaluated Because no unique
segmentation of an image can exist. If two different
segmentations
arise
from
different
perceptual
organizations of the scene, then it is fair to declare the
segmentations Inconsistent [3]. This paper presents a
graphical interface used for an objective and quantitative
evaluation of three graph-based segmentation Algorithms
that will be described further. For each of these
algorithms three characteristics are examined [4]:
Correctness, stability with respect to parameter Choice,
stability with respect to image choice. The evaluation of
the
Algorithms is based on two metrics (GCE, LCE) defined
in [3] which can be used to measure the
Proc. of the Intl. Conf. on Computer Applications
Volume 1. Copyright 2012 Techno Forum Group, India.
ISBN: 978-81-920575-5-2:: doi: 10. 73788/ISBN_0768
ACM #: dber.imera.10. 73788
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
with two colors, etc. ,until the salient regions are extracted
736 b) Back-projection onto the image - a transformation
from the RGB color space to HSV color space and a
quantization of the HSV color space at 166 colors is
performed for each segmented image c) Thresholding and
labeling image insignificant color information is
reduced and the significant color regions are evidentiated,
followed by the generation, in automatic way, of the
regions of a single color, of the two colors, of three
colors. In the implementation of the color set backprojection Algorithm that can be found it in [1] [13].
After processing the global histogram of the image, and
the color set are provided. The process of regions
extraction is using the filtered matrix and it is a depth first traversal described in pseudo-cod in the following
way: Procedure
Find regions (Image i, colorset C)
1) InitStack (S)
2) Visited =
3) For *each node P in the I do
4) If *color of P is in C then
5) PUSH (P)
6) Visited - Visited U {P}
7) While not Empty(S) do
8) CrtPoint +-POP (S)
9) Visited - Visited U {CrtPoint}
10) For *each unvisited neighbor S of CarPoint
do
11) if *color of S is in C then
12) Visited +- Visited U {S}
13) PUSH(S)
14) End
15) End
16) End
17) *Output detected region
18) End
19) End
The total running time for a call of the procedure
Find Regions (Image /, colorset C) is O (m2 * n2) where
m is
The width and n is the height of the image [1][13].
III. LOCAL VARIATION ALGORITHM
This algorithm described in [6] is using a graph based
approach for the image segmentation process. The pixels
are considered the graph nodes so in this way it is
possible to define an undirected graph G = (V, E) where
the vertices Vi from V represent the set of elements to be
segmented. Each edge (Vi' V j ) belonging to E has
associated a corresponding weight W( Vi' V j) calculated
based on color, which is a measure of the dissimilarity
between neighboring elements Vi and V j .A minimum
spanning tree is obtained using Kruskal's algorithm. The
connected components that are obtained represent image's
regions. It is supposed that the graph has m edges and n
www.asdf.org.in
52
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
Algorithm function
Make Set(x)
x.parent := x
x.rank := 0
function Union(x, y)
xRoot := Find(x)
yRoot := Find(y)
if xRoot.rank > yRoot.rank
yRoot.parent := xRoot
else if xRoot.rank < yRoot.rank
xRoot.parent := yRoot
else if xRoot != yRoot
yRoot.parent := xRoot
xRoot.rank := xRoot.rank + 1
function Find(x)
if x.parent == x
return x
else
x.parent := Find(x.parent)
return x.parent
IV. IMAGE SEGMENTATION USING A
HEXAGONAL STRUC TURE DEFINED ON THE SE T
OF PIXELS
The technique is based on a new and original
utilization of pixels from the image that are integrated
into a network type graph [2].
The hexagonal network structure on the image
Pixels, as presented in figure 1 were selected to improve
the running time required by the algorithms used for
segmentation and contour detection. The hexagonal
structure represents a grid-graph and for each hexagon h
in this structure there exist 6-hexagons that are neighbors
in a 6-connected sense. The time complexity of the
algorithms is reduced by using hexagons instead of pixels
as elementary piece of information. The index of each
hexagon is stored in a vector of numbers [1.N], where N,
the number of hexagons, is calculated using the formula
[2]:
N= (height l ) /2*(Width - widthmod 4)/2 -1)
Where height and width represent the height and the
width of the image.
53
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
www.asdf.org.in
54
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
55
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
VII. CONCLUSION
In this paper it is proposed a graphical interface for
evaluating three graph-based image segmentation
algorithms: the color set back-projection algorithm, the
image segmentation using a hexagonal structure defined
on the set of image pixels and the local variation
algorithm. Error measures like GCE, LCE are used to
evaluate the accuracy of each segmentation produced by
the algorithms. The values for the error measures are
calculated using the described application specially
created for this purpose. The proposed error measures
quantity the consistency between segmentations of
differing granularities. Because human segmentation is
considered truth segmentations the error measures are
calculated in relation with manual segmentation. The
GCE and LCE demonstrate that the image segmentation
based on a hexagonal Structure produces a better
segmentation than the other methods. In the future work
the comparative study will be effectuated on medical
images.
56
REFERENCES
[I] D. D. Burdescu, L. Stanescu" A New Algorithm for Content-Based
Region Query in Multimedia Databases" Congres DEXA 2005
:Database and expert systems applications Copenhagen, 22-26 August
2005 , vol. 3588, pp. 124-133.
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
57
K.Kumar
Asst.Prof, MCA Department ,
Veltech Dr.RR and Dr.SR Technical University
Chennai, India
Abstract - Driven by an increasingly competitive global
economy and access to record amounts of student loan
funding, adults have flocked to college for academic degrees
that they did not attain as traditional undergraduates, citing
various reasons, including: the college degree did not seem
necessary for success when they were entering job fields at 18
22 years of age; higher education was not accessible (or
practical) to them as traditional undergraduates due to
funding, distance, or limited degree offerings; or, the student
began, but did not complete, a college degree program as a
traditional undergraduate.
Not all adults who did not achieve college degrees as
traditional students seek degrees in adulthood. Many are not
drawn to college campuses (actual or virtual) by the reasons
mentioned earlier. Still others may be interested in attaining a
degree, but face numerous barriers that cannot be overcome
by personal motivation. In todays scenario changes are
happening at a faster pace. Therefore the requirement by
company towards working adult group is increasing. The
adults are not able to keep pace with the requirement, just
because of their age and tight schedule . The solution is may
be amidst tight schedule they need to go for training session to
get themselves equipped. However companies cannot afford
to send them for long training sessions. One solution to help
such learners is to help them to go for continuing education
from their home or at office from desktop.
Keywords : Virtual University,
intergration,eknowledge
Interlinking,
Learning,
I. INTRODUCTION
The continuing education id through e-learning or
electronic learning. That is learn as much as possible and
update yourself through Computer Based Tutorials(CBT),
Community of Practice(CoP by having discussions with
your peers during free hours, learning and updating
yourself through video conferencing , where you learn and
share your experience and finally take some short term
courses from universities that provide learning
opportunities through interaction and helping the adult
learners to continue education through e-learning.
Definitely e-learning is the solution for the day for these
adult learners to en cash the opportunity and update their
knowledge through short term courses provided by
university. But the problem lies with respect to designing
Proc. of the Intl. Conf. on Computer Applications
Volume 1. Copyright 2012 Techno Forum Group, India.
ISBN: 978-81-920575-5-2:: doi: 10. 73795/ISBN_0768
ACM #: dber.imera.10. 73795
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
58
II.
AIM OF THE RESEARCH
In order to bolster our knowledge resources, to obtain
and maintain the competitive edge in the world, we require
a system of identification and nurturing of talent and
lifelong learning. Knowledge modules based on the
personalized needs of the learner would need to be
delivered to him /her at the right time with the right content
interactively to take care of his / her aspirations. In due
course of time there would be a need to develop and
maintain the knowledge and capability profile of every
individual learner / worker. Such a system would have to
be developed in a cost effective manner over a period of
time, integrating, inter-alia the following objectives:
1. Effective utilization of intellectual resources,
minimizing wastage of time in scouting for opportunities
or desired items of knowledge appropriate to the
requirement,
2. Certification of attainments of any kind at any level
acquired through formal or non formal means in
conventional or non conventional fields.
3. Any-time availability of desired knowledge at
appropriate levels of comprehension to all for self paced
learning,
4. Platform for sharing of ideas and techniques and
pooling of knowledge resources.
5. Systematically building a huge database of the
capabilities of every individual human resource over a
period of time.
7. Nurturing of scholars and learners.
8. Support to all the learners / workers for any of their
perceived learning needs,
9. Extensive leveraging of the advancements in the
field of ICT for taking the knowledge resources to the door
steps of the learner,
10. Use e-learning as an effort multiplier for providing
access, quality and equality in the sphere of providing
education to every learner in the country.
11. Provide for Connectivity & access devices, content
generation, personalization & mentoring, testing &
certification and encouragement of talent.
12. Bringing efforts of different interested agencies
working in the field of e-learning under one umbrella and
establishing logical linkages between various activities.
13. Providing e-books & e-journals, utilizing the
repository of contents generated so far and the automation
of evaluation processes. Creating a high impact brand for
e-Journals in leading disciplines with a provision for good
incentive-based payment to the researchers publishing their
high quality papers in these e- Journals.
14. Spreading Digital Literacy for teacher
empowerment and encouraging teachers to be available on
the net to guide the learners.
15. Voice support for educational material delivery and
interactivity for the content on the portal.
16. Development of interfaces for other cognitive
faculties which would also help physically challenged
III.
PROBLEM STATEMENT
With an ever expanding field of knowledge, the
knowledge and skill sets required by an individual to
successfully lead life has also expanded, throwing up
challenges of learning more and more throughout ones
life. Add to that challenges of pedagogy being faced by the
teachers to package more and more for the uptake by the
students within the same amount of time available. A
proper balance between content generation, research in
critical areas relating to imparting of education and
connectivity for integrating our knowledge with the
advancements in other countries is to be attempted. For
this, what is needed is a critical mass of experts in every
field working in a networked manner with dedication. The
objectives of the National Mission on Education through
ICT shall include ( a ) the development of knowledge
modules having the right content to take care of the
aspirations and to address to the personalized needs of the
learners; (b) research in the field of pedagogy for
development of efficient learning modules for disparate
groups of learners; (c) standardization and quality
assurance of contents to make them world class; (d)
building connectivity and knowledge network among and
within institutions of higher learning in the country with a
view of achieving critical mass of researchers in any given
field; (e ) availability of eknowledge contents, free of cost
to Indians; (f) spreading digital literacy for teacher
empowerment (g) experimentation and field trial in the
area of performance optimization of low cost
access/devices for use of ICT in education; (h) providing
support for the creation of virtual technological
universities; (i) identification and nurturing of talent; (j)
certification of competencies of the human resources
acquired either through formal or non-formal means and
the evolution of a legal framework for it; and (k)
developing and maintaining the database with the profiles
of our human resources.
IV.
LITERATURE REVIEW
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
59
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
60
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
61
eCM eCoreModel
Problemsfacedbylearnersaftertrainingis
givenasscopeforimprovement
CoreEngine
Trackand
Fire
Learnersusingtheemodel
Operations
Web
Interface
Database
Email
System
Output
deliverables
Learnerswantingtoimprove
Training
Problemsfacedduringtraining
V Virtual University
5.1 New Age New Organizations- Virtual Universities
During the last few years, many universities and
colleges are getting ready to face the impact of
globalization and emerging competition in marketing
education by forming consortia of colleges and
universities. The major approach employed is to partner
with other colleges and universities and to offer the best
available educational expertise, courses and services to
students both on-campus and off-campus. This is also
aimed at survival of small institutions against the
competition from the big ones; and is using first generation
technologies. Many colleges and universities have formed
partnerships- virtual universities- by using essentially first
generation technologies for becoming competitive and
earning resources to support .
Three features of the university need to be underscored:
The virtual university is not being
proposed as a university in the conventional single
institutional sense. It will, in fact, be a virtual
organization.
The virtual university will carry out its
functions by optimizing ICT applications,
particularly those that enable the creation and
deployment of content databases based on
learning objects and granules..
The virtual university will be as much
concerned with adding value to conventional
on-campus instruction as it is with serving
learners at a distance.
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
62
EnhancedVirtualLearningModel
Browsethewebsitefor
coursecontent
Experiential
Learning
Satisfied
Registrationforthe
course
Learn
n
io
s
se
S
t
x
e
N
r
o
f
n
o
ti
rat
is
g
e
R
Conference
Brainstorming
Chatting,Mailing
&Blogging
Listenand
Learn
Interactivelearning
AttendSpecial
Class
Submittheassignment
Workshop
Guest
Lecture
Audio
Seminar
Visual
Learning
Knowledgegaining
andapplying
Pk
Inl
Animation
No
Clear
Interview
Tests
TestOutcome
Yes
Video
Conferencing
Legend
Getthecertificate
Pk PriorKnowledge
C Content
End
InI Interactivelitorarties
Individuals/Institutions
Funder
Authorized
ContactCenter
Authorized
ContactCenter
Authorized
ContactCenter
Authorized
ContactCenter
Processes
TeachingandLearning
VirtualUniversity[LegalEntity]
Enrolment
Credentials
Funder
Curriculum
Support/QualityAssurance
VirtualPlatform[EVLM]
ProjectFinance
Tools
Funder
Students
Students
Students
Figure 5.2 The EVLM embedded inside model link for virtual
university
V. CONCLUSION
The virtual campus may widen opportunities for some,
but not by and large for those at the low end of the socio-
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
63
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
64
I. INTRODUCTION
The mortality rate for lung cancer is higher than that
of other kinds of cancers around the world. To improve
the chance of survival, an early detection of lung cancer
is crucial. Lung nodule detection is a challenging task in
medical imaging. Lung cancer is the most common cause
of death due to cancer in both men and women
throughout the world [1]. The five-year survival rate is
about 15%, and it has not significantly increased over the
last 20 years. Early diagnosis of
lung cancer can improve the effectiveness of the
treatment and therefore fast accurate analysis of
pulmonary nodules is of major importance. Lung cancer
results from an abnormality in the body's basic unit of
life, the cell. Normally, the body maintains a system of
checks and balances on cell growth so that cells divide to
produce new cells only when new cells are needed.
Proc. of the Intl. Conf. on Computer Applications
Volume 1. Copyright 2012 Techno Forum Group, India.
ISBN: 978-81-920575-5-2:: doi: 10. 73802/ISBN_0768
ACM #: dber.imera.10. 73802
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
65
Denoising of CT image
using Filtering
ROI Extraction
using
Region Growing
Training
Data
Benign / Malignant
Figure l. Lung tumor prediction system
A. Image Denoising
CT images are found to have random noise. The
random distortion makes it difficult to perform perfect
image processing. Filtering method is chosen because it
effectively removes random noise present and also
smoothens the image. The input to the denoising module
is a 2D lung CT image in JPEG format of size 512 x 512.
Let the observed intensity function Uo(x, y) denote the
pixel values of a noisy image. Let u(x, y) denote the
desired clean image, and n be the
additive noise, is represented in (1).
uo(x,y) = u(x,y)+ n(x,y)
(1)
The Denoising method results smoothness effect is as
shown by the histogram in Fig. 2.
www.asdf.org.in
(3)
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
66
C. ROI Extraction
Lung nodules are approximately spherical regions of
relatively high density found in CT images. Lung nodule,
also referred to as tumor regions, is a white mass of
tissue located in the lungs. In this work, lung nodules are
the desired regions of interest. Region growing is a
segmentation method especially used for the delineation
of small, simple structures such as tumors and lesions.
The ROIs are segmented using region growing method as
follows:
1. In lung CT images the tumor regions have a
maximum intensity value of 255.
2. A pixel is added to the regions if it satisfies the
following criteria:
The absolute difference between the seed and any
pixel is less than 50. The value of 50 is arrived after
analyzing the histogram.
A pixel is included, if it has 8-connectivity to any
one of the pixels in that region
3. If a pixel is connected to more than one region then
the regions are merged.
Region growing is one of the best methods to
segment tumor regions as the borders of regions found
by region growing are perfectly thin and connected. The
extracted ROIs are then subject to feature extraction for
analysis.
D. Feature Extraction
Textural features from the spatial distribution
can be used to characterize images. The extracted ROIs
can be distinguished as either cancerous or not using
their texture characteristics. Gray Level Co-occurrence
Matrix (GLCM) is one of the most popular ways to
describe the texture of an image. GLCM is defined as a
matrix of relative frequencies p(i,j) calculated as how
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
67
Output values
Target value
Classification
0.0022
0.6964
0.1476
0.9279
0.8256
0.9361
0.9960
0
1
0
1
1
1
1
Non-Cancerous
Cancerous
Non-Cancerous
Cancerous
Cancerous
Cancerous
Cancerous
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
BPN Classification
68
REFERENCES
[1] Weir HK et. al. ," Annual rpe ort to the nation on the status of
cancer, 1975 -2000 ," Journal National Cancer Institute, vol. 95 , No.
17,p p.
1276 -1299 , Sep. 2003.
[2] Omar S. Al-Kadi, and D. Watson," Texture analysis of aggressive
and nonaggressive lung tumor CE CT images," IEEE Transaction on
Biomedical Engineering, vol. 55, no.7, p p. 1822-1830 , July 2008.
[3] Zhong Xue, Kelvin Wong, and Stpehen Wong," Joint registration
and segmentation of serial lung CT images in microendoscopy
molecular image-guided therapy," Springer Medical Imaging and
Augmented Reality, vol. 5128, no. 4, p p. 12-20 , Aug. 2008.
[4 ] Serhat Ozekes, Onur Osman, and Osman N. Ucan," Nodule
detection in a lung region that's segmented with using genetic cellular
neural networks and 3D template matching with fuzzy rule based
thresholding," Korean Journal of Radiology , vol. 9. no. I, pp. 1 -9, Feb.
2008.
[5 ] Jamshid Dehmeshki, Hamdan Amin, Manlio Valdivieso, and
Xujiong Ye, "Segmentation of pulmonary nodules in thoracic CT
scans: A region growing approach," IEEE Transactions on Medical
Imaging, vol. 27, no. 4, p p. 467-480 , April 2008.
[6 ] A A Farag, AEI-Baz, and G. Gimelfarb, "Quantitative nodule
detection in low dose chest CT scans: New template modeling and
evaluation for CAD system design," Proc. of International Conference
on Medical Image Computing and Computer Assisted Intervention, p p.
720-728, Oct. 2005.
[7] Leonid I. Rudin, Stanley Osher, Emad Fatemi, "Nonlinear total
variation based noise removal algorithms," Physica D, vol. 60 no. l-4 ,
pp. 259 -268, Nov. 1992.
[8] Shiying Hu, Eric A Huffman, and Jospeh M. Reinhardt," Automatic
lung segementation for accurate quantitiation of volumetric X-Ray CT
images", IEEE Transactions on Medical Imaging, vol. 20, no. 6, pp.
490 -498, June 2001.
[9] D. J. Withey and Z. J. Koles," Medical image segmentation:
Methods and software," Proceedings of NFSI & ICFBI, pp.140 -143 ,
Oct. 2007. 523
[10] R M. Haralick, K. Shanmugam and I.H. Dinstein," Textural
features for image classification," IEEE Transactions on Systems, Man
and Cybematics, vol.3, no. 6, p p. 610 -621, Nov. 1 973.
[11] L. Fausett, Fundamentals of Neural Networks-Architectures,
Algorithms, and Applications: Prentice Hall, 1994.
[12] R C. Gonzales and R E. Woods, Digital Image Processing: Pearson
Education, 2003.
86.7 %
85. 2 %
89.6 %
85. 2 %
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
69
P.Sathishkumar, B. Tech
I.
INTRODUCTION
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
III.
FABRIC DEFECTS
A. Data set
Fabric defects can be classified basically into 3 types
namely colour defects, construction defects and presence of
dirt on the fabric material. The defects that occur during the
colour and placement issues (i.e., during labelling, colouring
of the sewing thread and errors in embroidery design) are
called as trims, accessories and embellishment defects.
Some of the major defects which occur frequently are :
Bad shedding, Broken pick, Crack, End out, Float, Holes,
Knots, Loose warp, Oil mark, Oil stain, Rust stain, Selvedge
float, Smash, Weft bar, Weft crack which are shown in
figure 1 through 16.
Figure 3: Crack
Figure 5: Float
70
Figure 6: Hole
B. GLCM
A GLCM is a second order statistic method. It is a G x G
matrix P, in which G represent the set of possible grey level
values in the image. The GLCM is defined by:
Pd [i, j ] nij
(1)
N [i, j ]
Figure 7: Knots
P[i, j ]
P[i, j ]
i
(2)
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
1.
Energy
(13)
Cen Pd [i, j ]2
i
2.
(3)
Ce Pd [i, j ] ln Pd [i, j ]
j
(5)
i, j
Contrast
C ( k , n ) (i j ) k Pd [i, j ]n
i
5.
6.
(4)
Maximum Probability
C m max Pd [i, j ]
4.
(6)
(7)
Correlation
[ijP [i, j ]]
d
Cc
(8)
i j
where
i iPd [i, j ],
i2 i 2 Pd [i, j ] i2
C. Histogram
The histogram is the first order statistics method.
Histogram of a digital image with gray levels in the range [0,
L-1] is a discrete function h(rk) = nk, where rk is the kth gray
level and nk is the number of pixels in the image having gray
level rk. Some of the properties of the histogram help to
identify the defect in the fabric materials are given in Eq. 9
through 13.
1.
Mean
(9)
2.
Standard deviation
(10)
3.
Entropy
H(x)=-log(
4.
(11)
Skewness
Where m=3.
Kurtosis
www.asdf.org.in
(12)
5.
Where m=4
IV.
Entropy
3.
71
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
d10
d11
d12
d13
d14
d15
d16
eff
60
92
100
100
92
100
80
76.75
56
92
100
100
92
100
80
76.5
44
84
100
100
92
100
100
75
56
88
100
100
80
92
80
71.25
d1
d2
d3
d4
d5
d6
d7
d8
d9
d10
d11
d12
d13
d14
d15
d16
eff
f2
88
64
72
100
100
80
24
96
100
96
92
100
88
96
96
40
83.2
f3
100
92
28
24
60
100
40
100
100
64
80
100
84
96
40
28
71
f4
92
100
76
100
100
80
44
84
100
72
84
100
48
96
80
16
79.5
TABLE II.
d1
d2
d3
d4
d5
d6
d7
d8
d9
d10
d11
d12
d13
d14
d15
d16
eff
f1
92
92
60
100
100
84
36
96
100
96
92
100
96
96
88
16
84
f2
92
92
60
100
100
84
36
96
100
96
92
100
96
96
88
16
84
f3
100
88
28
24
40
100
40
92
100
44
76
100
76
96
40
32
67.25
TABLE III.
d1
d2
d3
d4
d5
d6
d7
d8
d9
f5
100
100
68
48
100
84
48
76
100
88
84
100
96
96
4
28
76.25
84
5
92
1,2
100 1,2,3,4,5
100 1,2,3,4,5
92
1,2,3
100 1,2,3,5
100
3
f6
28
76
76
56
76
76
56
80
96
56
88
80
48
40
68
76
67.25
Max
100
100
76
100
100
100
56
100
100
96
92
100
96
96
96
76
3,5
4,5
4,6
1,2,4
1,2,4,5
3
6
3
1,2,3,4,5
1,2
1,2
1,2,3,4,5
5
1,2,3,4,5
1,2
6
d1
d2
d3
d4
d5
d6
d7
d8
d9
d10
d11
d12
d13
d14
d15
d16
eff
f1
88
76
28
44
76
80
24
100
100
84
92
40
100
100
100
16
71.75
f2
88
76
28
44
76
80
24
100
100
84
92
40
100
100
100
16
71.75
f3
100
84
24
0
100
100
20
96
100
56
96
100
100
96
44
16
70.75
f4
92
80
16
80
56
80
28
100
100
68
84
76
72
100
100
16
71.75
f5
100
100
20
72
76
88
20
80
100
72
92
72
100
100
100
28
76.25
f6
28
76
72
52
80
72
56
84
96
52
88
80
48
40
68
72
66.5
Max
100
100
72
80
100
100
56
100
100
84
96
100
100
100
100
72
3,5
5
6
4
3
3
6
1,2,3
1,2,3,4,5
1,2
3
3
1,2,3,5
1,2,4,5
1,2,4,5
6
f5
100
100
68
100
100
84
32
60
100
84
88
100
96
96
36
32
79.75
f6
28
76
76
56
76
76
60
80
96
56
88
80
48
40
68
80
67.75
Max
100
100
76
100
100
100
60
96
100
96
92
100
96
100
88
80
TABLE V.
3,5
4,5
4,6
1,2,4,5
1,2,4,5
3
6
1,2
1,2,3,4,5
1,2
1,2
1,2,3,4,5
1,2,5
4
1,2
6
f1
f2 f3 f4 f5
100 100 100 100 100
64 64 40 52 68
20 20 16 16 12
40 40 24 12 76
100 100 100 52 100
96 96 100 100 100
28 28 56 28 48
56 56 44 84 32
100 100 100 100 100
www.asdf.org.in
52
88
80
48
40
68
72
66.25
f1
88
64
68
100
100
80
24
96
100
96
92
100
88
96
96
40
83
84
88
100
100
68
100
72
78
72
f6
28
76
72
48
80
72
56
84
96
Max
100 1,2,3,4,5
76
6
72
6
76
5
100 1,2,3,5
100 3,4,5
56
3,6
84
4,6
100 1,2,3,4,5
d1
d2
d3
d4
d5
d6
d7
d8
d9
d10
d11
d12
d13
d14
d15
d16
eff
f1
72
60
100
96
56
40
40
48
100
48
32
64
84
96
16
52
62.75
f2
12
84
24
100
68
84
52
0
64
60
64
92
100
12
72
20
56.75
V.
HISTOGRAM GREY-LEVEL 25
f3
60
68
24
100
80
100
44
8
96
56
80
60
100
20
72
12
61.25
f4
40
100
52
96
76
44
76
72
72
68
56
88
16
48
68
24
62.25
f5
32
100
52
100
68
52
76
60
56
68
64
92
4
48
72
24
60.5
Max
72
100
76
100
80
100
76
72
100
68
64
92
100
96
72
52
1
4,5
1
2,3,5
3
3
5,6
5
1
5,6
2,6
2,6
2,3
1
2,3,6
1
CONCLUSION
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
ACKNOWLEDGMENT
We wish to express our profound gratitude to Prof.
K.Gangatharan, HOD of Information Technology of Amrita
University. We also wish to express our sincere gratitude to
Prem who has provided the test image data set.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
www.asdf.org.in
73
[9]
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
74
Prof. D. Loganathan
I.
INTRODUCTION
Capacity
Robustness
Security
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
III.
75
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
76
Block Pattern
Binary Value
1111
Encoded Data
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
1110
10
1101
11
1011
0110
77
Converting
the
decimal
sequence
into
corresponding binary value.
Match the corresponding binary value with the
block pattern encoding table to retrieve the the
secret image S.
01
011
VII.
CONCLUSION
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
78
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
79
R.Bremananth
d w x2 f i , f j
H k H
i
(k )
max(H i (k ) H j (k ))
, if H i , j 0
0, otherwise
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
80
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
81
Methods Initial
Ith
frame Frame
KFE
Final
frame
Spatial
0.59
0.58
0.6
0.85
Temporal
3.52
3.50
3.62
3.83
Histogram
1.7
1.65
1.75
2.71
3.63 %
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
82
IV.CONCLUSION
The paper presents a method based on the image
histogram difference and edge matching rate for key frames
extraction. The approach avoids shot segmentation and has a
good adaptability. The entire experimental results show that
the algorithm has the high accuracy to detect key frames and
the extracted key frames represent the main content of the
given video. Meanwhile, the algorithm provides a good basis
for video retrieval. However, in the condition of the
complicated background of objects motion there exists
errors in the extracted edges of objects, leading to a certain
redundancy, and further study is needed. Furthermore, the
method can be employed to both shots and clips, and can be
easily extended to any other useful visual or semantic
features and distance metrics.
REFERENCES
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
83
[8] Costas Cotsaces, Nikos Nikolaidis, and Ioannis Pitas, Video shot
detection and condensed representation: a review, IEEE Signal Processing,
vol. 23, no. 2, pp. 28-37, 2006.
[9] K. Huang, C. Chang, Y. Hsu, S. Yang. KeyProbe: A Technique for
Animation Keyframe Extraction The Visual Computer, Volume 21, pp.
532-541, 2005.
[10] Lijie Liu, Student Member, IEEE, and Guoliang Fan, Member, IEEE ,
Combined Key-frame Extraction and Object-based Video Segmentation .
[11]A.Rahimi,Fast
connected
components
on
images,http://web.media.mit.edu/~rahimi/2001.
[12] B.T. Truong and S. Venkatesh, Video abstraction: A system- atic
review and classification, ACM Trans. on Multimedia Computing,
Communications and Applications, vol. 3, no. 1, 2007.
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
84
I.
INTRODUCTION
RELATED WORKS
A. Web service
Web Service [4] is a model of the distributed component
based on the XML. It is the standard technology for the
implementation of the service-oriented architecture
through the interaction among deployed various services
on the internet. The advantage of the web services is as
followings.
1. Using the HTTP protocol.
2. Platform and language independent (loosely coupled).
3. Synchronous and asynchronous messaging.
4. Reuse of existing system resources.
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
85
D (i, j 1) s (x i , y i ) (match/mismatch)
(gap in x)
D (i 1, j ) g
D (i, j 1) g
(gap in y)
www.asdf.org.in
(1)
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
86
III.
PROPOSED METHODOLOGY
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
IV.
The remote servers of the WS are to send the SMS back
to the score of an alignment result. Each server of the WS
also must to send the state information of the assigned
works of the specified remote server of WS to the JSS at
the same time.
The service processes of the MSAs are as follows:
1. Enter the user ID and Password over the user interface
on the internet. (This offers all services through ID
and password authentication)
2. Request the services
Repeated 2.
3. When the specified server request a service from SMS.
87
CONCLUSION
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
88
Associate Professor
KCG College of Technology
Chennai, India
INTRODUCTION
www.asdf.org.in
II.
MULTIPLIIERS
A. Proposed Methodology
The proposed methodology identifies design space
compression and provides various alternatives. New
methodologies are developed from first principle to
perform arithmetic operations. In one such method, we try
to utilize the redundancy naturally available in arithmetic
operations such as addition, multiplication etc. Another
technique that we propose to use while optimizing is
constraining the redundant operations.
The methodology of design space compression utilizes
in the first phase the redundancy naturally available in the
output space of the arithmetic operations. The first step is
to reduce the redundancy and secondly to make them
constraints for optimization. The output is parallelized and
thus performance optimization is achieved. Further
optimization is done to the parallel circuit thus obtained
through custom design so that area gets further optimized.
As a consequence, reduction of both area and
improvement of performance is achieved and also the third
parameter, power gets reduced. Thus design space
compression is achieved.
B. Multiplier Design Space Compression
The steps involved in the typical multiplier design
space compression are as follows:
1. First identify the redundancy in the output space of
the multiplier say n bit in length.
2. After eliminating the redundant outputs identify the
bit patterns that will form the output space.
3. Identify their multiplier and multiplicand
combinations.
4. This will also have many redundancies and these are
used for reducing where ever possible or for constraining
to optimize the output space.
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
A. 2-Bit Multipliers
V.
RESULT
89
Multiplier a1a0
VI.
CONCLUSION
B. 3-Bit Multipliers
[1]
TABLE 2. 3-BIT MULTIPLICATION
Multipl
icand
b2 b1 b0
Multiplier a2a1a0
0
10
12
14
12
15
18
21
12
16
20
24
28
10
15
20
25
30
35
12
18
24
30
36
42
14
21
28
35
42
49
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
90
Mr.Yogesh M. Gaidhane
I. INTRODUCTION (HEADING 1)
Auscultation is one of the most important non-invasive
and simple diagnostic tools for detecting disorders in the
respiratory tract like lung diseases [1]. It is defined as the
act of listening for sounds within the body, mainly for
ascertaining the condition of the lungs, heart and other
organs [2]. Diseases such as asthma, tuberculosis can be
identified with this method through the analysis of lung and
tracheal sounds.
Research on the diagnosis of respiratory pulmonary
conditions like bronchitis, sleep apnea, asthma has
established the utility of the stethoscope's acoustic signal in
common day to day practice. However, despite their
effectiveness, these instruments only provide a limited and
subjective perception of the respiratory sounds. The
drawbacks of using stethoscopes and listening to the sounds
using the human ear are a) their inability to provide an
objective study of the respiratory sounds detected, b) their
lack of sufficient sensitivity and (c) the existence of the
imperfect system of nomenclature [3].
Proc. of the Intl. Conf. on Computer Applications
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
A. Lung Sounds
Lung sounds are produced by vertical and turbulent flow
within lung airways during inspiration and expiration of air
[5] . Lung sounds recorded on the chest wall represent not
only generated sound in lung airways but also the effects of
thoracic tissues and sound sensor characteristics on sound
transmitted from the lungs to a data acquisition system
[8]. Lung sounds exhibit a Power Spectral Density (PSD)
that is broadband with power decreasing as frequency
increases [5]. The logarithm of amplitude and the logarithm
of frequency are approximately linearly related in healthy
subjects provided that the signals do not contain
adventitious sounds. As the flow in lung airways increases,
sound intensity that the signals do not contain adventitious
as the flow in the lung airways increases sound intensity
increases and several mathematical relations between lung
sounds and airflow have been proposed [9]. It is important
to note that aspiratory and expiratory lung sounds differ in
terms of both amplitude and frequency range. At
comparable flows, aspiratory lung sounds will exhibit
greater intensity than expiratory sounds [9].
91
NAME
TYPE
Wheez
Continuous
NATU
RE
In/ Out
Both
Stridor
Continuous
Out
Rochi
Continuous
Out
Discontinuo
In
ASSOCIATED
DISEASE
Asthma
Crackl
es
Epiglottis
infection
Bronchitis
Pneumonia
us
www.asdf.org.in
B. Heart Sounds
Heart sounds are produced by the flow of blood into and
out of the heart and by the movement of structures involved
in the control of this flow [10]. The first heart sound results
when blood is pumped from the heart to the rest of the body,
during the latter half of the cardiac cycle, and it is
comprised of sounds resulting from the rise and release of
pressure within the left ventricle along with the increase in
ascending aortic pressure [10]. After blood leaves the
ventricles, the simultaneous closing of the semi lunar
valves, which connect the ventricles with the aorta and
pulmonary arteries, causes the second heart sound.
The
electrocardiogram
(ECG)
represents
the
depolarization and repolarisation of heart muscles during
each cardiac cycle. Depolarization of ventricular muscles
during ventricular contraction results in three signals
known as the Q, R, and S-waves of the ECG [10]. The first
heart sound immediately follows the QRS complex. In
health, the last 3040% of the interval between successive
R-wave peaks contains a period that is void of first and
second heart sounds [7].
Characteristics of heart sound signals have been assessed
in terms of both intensity and frequency. Though peak
frequencies of heart sounds have been shown to be much
lower than those of lung sounds [11], comparisons between
lung sound recordings acquired over the anterior right upper
lobe containing and excluding heart sounds show that PSD
in both cases is maximal below150 Hz.
III. HS CANCELLATION
During breathing lung sounds propagate through the
lung tissue and can be heard over the chest wall. The tissue
acts as
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
www.asdf.org.in
92
Method
Figg. 1 Block Diagraam For Proposed M
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
93
(BATT) it
i is composedd of a speakerr in rigid encllosure
covered at the top by Viscoelaastic polyureethane
polymer surface madde of Akton (action prooducts,
Hagerstow
wn, MD). By using a simpple Audio recoording
software this system can generate an
a data base for
f the
detail futuuristic, compaarative diseasee diagnosis sysstem
Fig.4 Block D
Diagram For heartt sound detection
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
Fig.4 Block
B
Diagram
m For heart souund Cancellatiion
V. CO
ONCLUSION
N
s
researchh is to
The primaary objective oof respiratory sound
bbring about im
mprovements to monitorinng and diagnoosis of
rrespiratory dissease, the pottential usefulnness of any m
method
ffor filtering heeart sounds froom lung soundds rests on its ability
a
tto perform in a clinical settting. Because the heart andd lung
ssound signals overlap in thhe time and frequency
f
dom
mains,
rremoving HS interference from
f
respiratorry sound recorrdings
iis a challenginng task. The pproposed methhod for HS rem
moval
bbased on a single
s
recordinng has shownn promising rresults
m
mainly in term
ms of lung sound characteeristic preservvation.
T
This method ddid not add anny noticeable clicks
c
or artifaacts in
tthe reconstruccted signal. Manual inspectiion by visual means
m
oof the reconstrructed signals confirmed thaat lung soundss were
tthe dominantt sounds wiith no perceeptible HS inn the
bbackground. F
Furthermore, the proposedd technique inn this
ppaper is far m
more efficiennt than other techniques foor HS
ccancellation inn terms of com
mputational loaad and speed.
This papeer presents a novel methood for heart sound
ccancellation fr
from lung sounnd records usiing LabVIEW
W. The
m
method uses the Multisscale productt of the w
wavelet
ccoefficients oof the originall signal to deetect HS segm
ments.
O
Once the HS segments aree identified, thhe method rem
moves
tthem from thhe wavelet ccoefficients aat every leveel and
eestimates the created
c
gaps. The
T results weere promising in HS
rremoval from
m LS without hhampering thee main compoonents
oof LS
94
S
andd G.R.Wodicka, Respiratory souunds
[7] H.Pasterkamp, S.S..Kraman,
Amer. J. Respir. Crit Care Med.vvol.
advaances beyond thee stethoscope, A
156,, no. 3, Pt 1, pp. 9974987, Sept. 19997.
[8] H
H. Pasterkamp, R.
R Fenton, A. Taal, and V. Cherniick, Interferencee of
carddiovascular soundds with phonopnneumography in children,
c
Am. Rev.
R
Resppir. Dis., vol. 1311, no. 1, pp. 61644, Jan. 1985.
[9] I.V.
I
Vovk, V.T. G
Grinchenko, and V
V.N. Oleinik, M
Modeling the acouustic
propperties of the cheest and measuringg breath sounds, Acoustical Physsics,
vol. 41, no. 5, pp. 6677676, 1995.
[10]] I. Hossain andd Z. Moussavi, Relationship between airflow and
norm
mal lung sounds, in Proc. 24th A
Ann. Int. Conf. IIEEE Eng. Mediccine
Biollogy Soc., EMBC
C02, Oct. 2002, pp.
p 11201122.
[11]] A.A. Luisada, The areas of aauscultation and the two main heart
sounnds,Med.Times, vol. 92, pp. 811, Jan. 1964.
[12]] P.J. Arnott, G.W
W. Pfeiffer, and M
M.E. Tavel, Specctral analysis of heart
sounnds: Relationships between some pphysical characterristics and frequeency
specctra of first and ssecond heart sounnds in normals annd hypertensivess, J
Biom
med. Eng., vol. 6,, no. 2, pp. 121128, Apr. 1984.
[13]] M. T. Pourazad , Z. Moussavi , G.
G Thomas,Hearrt sound cancellattion
from
m lung sound reccordings using tim
me-frequency filttering, Internatioonal
Fedeeration for Medical and Biologiccal Engineering 22006, Med Biol Eng
E
Com
mput (2006) 44: 216225.
[14]] S. Haykin, Adaaptive Filter Theoory, 4th ed. Uppeer Saddle River, NJ:
Prenntice-Hall, 2002.
[15]] Z. Moussavi, D
D. Flores, and G.. Thomas, Heartt sound cancellattion
baseed on multiscale pproducts and lineaar prediction, in Proc. 26th Ann. Int.
Connf. IEEE Eng. Medicine Biology Sooc., EMBC04, Sept. 2004, pp. 3840
38433.
[16]] I. Hossain and Z
Z. Moussavi, Ann overview of heaart-noise reductionn of
lungg sound using waavelet transform bbased filter, in Proc. 25th Ann. Int.
Connf. IEEE Eng. Meedicine Biology Soc.,
S
EMBC03, Sept.
S
2003, pp. 458
461..
[17]] J. Gnitecki, I. H
Hossain, Z. Mousssavi, and H. Pasteerkamp, Qualitaative
and quantitative evaaluation of heartt sound reductioon from lung souund
Trans. Biomed. Eng., vol. 52, no. 10, pp. 1788
recoordings, IEEE T
17922,Oct. 2005.
[18]] S. Mallat and S. Zhong, Characcterization of signnals from Multisccale
edgees, IEEE Trans. Pattern Anal. Mach.
M
Intell., vol. 14, no. 7, pp. 710
732,, Jul. 1992.
[19]] Daniel Flores-Taapia, Zahra M. K.
K Moussavi, , Gabbriel Thomas, Heart
sounnd cancellation bbased on multisccale products andd linear predictioon,
IEEE
E Trans. Biomed. Eng., vol. 54, noo. 2, pp.234-243,F
FEBRUARY 2007.
[20]] http://www.ni.coom
[21]] http://www.rale..ca
REFE
ERENCES
[1] T E Ayoob K
Khan, Dr. P Vijayyakumar, Separating Heart Sounnd from
L
Lung Sound Usiing LabVIEW, International Jouurnal of Computter and
E
Electrical Engineering, Vol. 2, No. 3, June, 2010 17793-8163
[2] V. Gross, A. Dittmar, T. Pennzel, F. Schuttler,, P. Von Wicherrt, The
rrelationship betw
ween normal lunng sounds, age aand gender, Am
merican
JJournal of Respiratory and Criticall care Medicine 2000;162: 905-9099.
D. Jones, K. Kwoong, Y. Burns, E
Effect of positionning on
[3] A. Jones, R.D
rrecorded lung sound intensitties in subjects without pulm
monary
ddysfunction, Phyysical Therapy 19999;79:7,682-690.
[4] F.Dalmay, M.T.Antonini, P.M
Maequet, R.Menierr,Acoustic propeerties of
tthe normal chest, European Respiiratory Journal 19995; 8:1761-1769.
[5] Z.Moussavi, Respiratory sound analysis, IE
EEE in Engineeering in
M
Medicine and Bioology Magazine, ppp15, January/Febbruary 2007.
[6] J.Gnitecki, Z.. Moussavi, Sepperating heart souunds from lung soounds,
IIEEE in Engineeering in Mediciine and Biologyy Magazine, pp 20-29,
JJanuary/Februaryy 2007.
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
95
SELF-T
TEST TEC
CHNIQU
UE FOR TWO
T
FISH
H ALGO
ORITHM
R
Rahul R Naiir
Deepartment of ECE
E
Kaarunya Univerrsity
Cooimbatore, Ind
dia
AbstractA
A
u
universal built-in self-test strrategy for devvices
implementing symmetric en
ncryption algo
orithms like T
Two
m is describeed in this paper.
p
Using the
fish algorithm
advantage of iinner iterative structures of the cryptograp
phic
cores testing ccan be easily setup
s
for circu
ular test of cryypto
cores. Since teesting strategyy based on scan chain is foound
liable to attacck of hackers, the importantt advantage off the
proposed imp
plementation is
i architecturee with no vissible
scan chain. Beecause the sam
me reason it willl be less amen
nable
to side chann
nel attack, an
nd 100% fau
ult coverage. The
recommended
d work can bee divided in to three main sub
blocks of LFS
SR based pseu
udorandom pa
attern generattion,
Two fish alggorithm and MISR based output respoonse
analyser. The coding is done in VHDL ussing Xilinx verrsion
nthesized by SYNOPSYS design comp
piler
9.2i and syn
version B-20088.09-SP3.
Keywords: Lin
near feedback shift register(L
LFSR), Maxim
mum
distance sep
parable(MDS),,Pseudo-hadam
mard transfform
(PHT) ,
G
Galois
field
(GF),Comb
binational
llogic
block(CLB)
I. INTR
RODUCTION
N
Nowadayss, secure circuuits are comm
monly adoptedd for
applications ssuch as e-bannking, pay TV
V, cell phone.. As
they hold ppersonal dataa and must process seccure
operations, ssecurity requiirements such
h as source/ssink
authenticationn, data integrrity, confidenttiality, or tam
mper
resistance aree maintained by
b means of several dedicaated
components. Confidentiaality is en
nsured throough
plemented onn cocryptographicc mechanismss generally imp
processors. These mechhanisms enco
ode or deccode
w the suppo
ort of secret kkeys
plaintexts or cipher texts with
m compromisee.
that must be ppreserved from
Through the core of an electronicc device offerring
digital securitty services is the cryptograaphic coproce ssor
that executes the cryptoographic fun
nction [1]. S
Such
crypto-coress provide seccurity servicess such as privaacy,
sincerity, andd authenticattion. Becausee weak cryp
yptoalgorithms, poor design of the device or hardw
ware
physical failuures can render the prod
duct delicate and
place highly ssensitive inforrmation or infr
frastructure at risk
[3], validatioon of cryptoo-algorithm and
a
test of the
hardware impplementing succh functions are
a essential.
OSED BIST ARCHITECTU
A
URE FOR TW
WO
II PROPO
FISH AL
LGORITHM
Figure. 1 A gen
neralized block diiagram for self teest architecture off
two fish alg
lgorithm
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
96
III
I IMPLIMEN
NTATION OFF BIST RCHIITECTURE
FOR
R TWO FISH ALGORITHM
M
A. 128 BIT LFSR
C. Decrypption
Decryptioon requires appplying sub keeys in the revverse
order and maaking a little modification
m
to
o the main cippher
structure.
The bits in th
he LFSR statee which influence the inpuut
aree called taps. A maximum
m-length LF
FSR produces
an m-sequence unless
u
it contaains all zeros, in which casee
it will
w never chaange. As an allternative to th
he XOR basedd
feeedback in an LFSR, one can also usse XNOR .Thee
feeedback poly
ynomial forr 128 bit LFSR is
X1227+X28+X26+X
X+1
B. TWO FIS
SH ALGORITH
HEM
Figure 3 Decryption
D
proceess
Fig
gure 5 Over view of two fish algorrithm
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
97
hree 8-by-8-biit
In Twofish, each S-boxx consists of th
fixed permutaations chosen from a set of two possible
permutations,, q0 and q1.
RMUTATIONSS
D. Q PER
Each q-peermutation reppresents a fixeed function [99]; it
is also descriibed by a reguular structure shown in Figgure
7. Main compponents of thee q-permutatio
ons are 4-by-44-bit
fixed S-boxess t0...t3. Bothh permutationss q0 and q1 hhave
the same innternal structuure, and difffer only in the
contents of thhe S-boxes t0....t3
Figure 7 q permutation
p
T
Table I
Fixxed table for q0 and
a q1 permutatio
on
MATRIX
E. MDS M
p
by
y this matrixx is
The transsformation performed
described by tthe formula give in matrix formula.
www.asdf.org.in
he input 32-biit
Here y3...y0 are consecutiive bytes of th
d z3...z0 form
m
word (y3 is the most significcant byte), and
thee output word
d. This matrixx multiplies a 32-bit inpuut
vallue by 8-bitt constants, with all multiplication
m
s
perrformed (bytee by byte) inn the Galois field [8]. Thee
prim
mitive polyno
omial is x8+ x66 + x5 + x3+ 1.
There are only
o
two diffferent multip
plications thaat
req
quire to be im
mplemented. Inn case of mu
ultiplication byy
5B16, every outtput dependss on at mostt four inputss.
Theerefore, this multiplicatiion consumees only fouur
parrallel CLBs see F Thhe multiplicaation by EF16
con
ntains two outtputs dependinng on five inp
put bits. Thesee
outtputs require an
a entire CLB
B each, thereffore the entiree
mu
ultiplication will take five pparallel CLBs. Neverthelesss,
any
y multiplicatio
on in GF can bbe implementted using up too
eig
ght parallel CLBs. As a reesult, the tim
me of a singlee
mu
ultiplication iss equal to thhe delay of one
o CLB .Thee
resu
ults of all multiplications
m
in each row
w of the MDS
S
maatrix are finallly XOR-ed bbit by bit. Such operationn
neeeds only four CLBs
C
for eachh row.
Figure 9 Multipplication by 5B
Figure 10 Mu
ultiplication by E
EF
F. GENERAT
TION OF KEYYS S0 AND S1
1
There are tw
wo different ssets of sub keeys. S and K.
K
Tw
wo sub keys S0 and S1 aare fixed during the entiree
enccryption and decryption pprocess. Both
h of them aree
obttained as a ressult of multipllying an appropriate part of
o
a global key by RS matrix [9]]. This matrix
x also performs
mu
ultiplication in
n the Galois ffield GF, butt the primitivee
pollynomial is different for thiis MDS matrix
x: x8 + x6 + x3
2
+ x + 1. The alg
gorithm used to compute S keys is givenn
by the matrix as given.
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
98
Fig
gure 13 Carry chaain in modulo add
dition
Figure 11 Generation of S0 ad S1
S keys
Heree index i iss from the range
r
0...1, and
indicates the appropriate key
k S0 or S1. Si,3...Si,0 arre 8bit parts of thhe 32-bit key Si (si,3 is thee most significcant
byte). M8i+77...M8i are 8--bit parts of the 128-bit uuser
supplied key M
M.
EY GENERAT
TION
G. SUBKE
Set of subb keys K is computed in a structure vvery
similar to thhat used forr encryption [10]. The oonly
difference is that there is no
n key addition after the P
PHT
transform, annd that the fiixed left rotattion by 8 bitts is
performed aft
fter instead off before the second h-funcction
[5]. This featuure enables coomputing
It is obviou
us that the titime of signaal propagationn
thro
ough the en
ntire carry chhain limits the speed of
o
add
dition. The lon
nger words arre being added
d, the longer it
i
tak
kes to computee the result.
I. THE PSEUDO
O-HADAMARD TRANSFORM
Figu
ure 14 The pseuddo-hadamard tran
nsform
www.asdf.org.in
Tabble II
Cipher text after encr
cryption
Plain
Serial
key
text
t
number
0
0
1
9F58
9F5CF6
122C32
B6BFEC
2F2AE8
C35A
9F58
9F5CF6
122C32
B6BFEC
2F2AE8
C35A
Serial
number
1
6078
8AA9F72
8AA798C
B882466
3FFD6E4
5BB82
Cipher
text
5AC3E8
2A2
2FECBF
B6322C12
F65C9F58
9F
64A438
765564AF
AF77CDB0
218E7698
9572
60788A
9F728A79
B82466
8CB
3FD
D6E45B
82
T
Table III
Plain textt after decryption
n
Ciphe
Key
Plain
r text
text
0
0
5AC3
E82A2F
ECBFB6
322C12
F65C9F
589F
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
99
Seria
l Number
1
64A4
387655
64AFAF
77CDB0
218E76
989572
6078
8A9F72
8A798C
B82466
3FD6E4
5B82
9F589F
5CF6122C
32B6BFEC
2F2AE8C3
5A
[10]
C. E. Shannona Mathematical Theory of Communication,
The Bell System Technical Journal,Vol. 27, pp. 379423, 623656,
July, October, 1948.
6078
8A9F72
8A798C
B82466
3FD6E4
5B82
9F589F
5CF6122C
32B6BFEC
2F2AE8C3
5A
Table IV
Analysis report of Logic Blocks
Logic
Cell Area
Power
Block
33.8986
LFSR
1805.0000
uw
m2
Two
Fish
Algorithm
MISR
4144.0000
m2
3.3892m
w
2816.0000
m2
35.3342
uw
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
100
Dr.R.Geetha Ramani
I.
INTRODUCTION
ACM #: dber.imera.10.73865
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
101
arohanam
S R1 G1 M1 P D1 N1 S
S R1 G1 M1 P D1 N2 S
S R1 G1 M1 P D1 N3 S
S R1 G1 M1 P D2 N2 S
S R1 G1 M1 P D2 N3 S
avarohanam
S N1 D1 P M1 G1 R1 S
S N2 D1 P M1 G1 R1 S
S N3 D1 P M1 G1 R1 S
S N2 D2 P M1 G1 R1 S
S N3 D2 P M1 G1 R1 S
Belongs to
melakartha
8
asAvEri
www.asdf.org.in
Arohana
Avarohana
S R1 S G3 M1 P D1
N2 S
S R1 M1 P D1 S
S N2 D1 P M1 G3
R1 S
bhUpALam
dhanyAsi
8
8
S R1 G2 P D1 S
S G2 M1 P N2 S
punnAgavarA
Li
N2 , S R1 G2 M1 P
D1 N2
SN2SPD1M1PR1G
2R1S
S D1 P G2 R1 S
S N2 D1 P M1 G2
R1 S
N2 D1 P M1 G2
R1 S N2 ,
Tala
Dhruva 11
14
17
23
29
Matya 8
10
12
16
20
Rupaka 5
11
Jhampa 6
10
12
Triputa 7
11
13
Ata
10
12
14
18
22
Eka
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
www.asdf.org.in
102
G1 G1 R1 G1 M1 M1 P D1 P D1 D1 P
P M1 M1 G1
Individual 2
D1 P M1 G1 R1 G1 M1 P
Individual 3
S G1 M1 R1 M1 P D1 N1 S N1 D1 P
M1 G1 R1 G1
Individual 4
S R1 G1 G1 M1 P P D1 N1 D1 P M1 G1
R1 S P G1 M1 P D1 N1 N1 N1 S N1 D1
P M1 G1 R1 S G1
The population is generated in accordance to required
raga and thala.
5.2 Fitness Function
The fitness function of an individual is assessed based on
their thala beat count, correctness of Arohana and
avarohana and number of incorrect swarams.
The fitness assessment is carried as follows.
F1+F2+F3 if F3=0
Fitness =
-(F1+F2+F3) if F3<0
The narration of F1, F2 AND F3 is presented below.
Individual
G1 G1 R1 G1 M1 M1 P D1 P
D1 D1 P P M1 M1 G1
D1 P M1 G1 R1 G1 M1 P
S G1 M1 R1 M1 P D1 N1 S N1
D1 P M1 G1 R1 G1
S R1 G1 G1 M1 P P D1 N1 D1
P M1 G1 R1 S P G1 M1 P D1
F1
2
1
2
4
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
N1 N1 N1 S N1 D1 P M1 G1
R1 S G1
Individual
G1 G1 R1 G1 M1 M1 P D1 P D1
D1 P P M1 M1 G1
D1 P M1 G1 R1 G1 M1 P
S G1 M1 R1 M1 P D1 N1 S N1
D1 P M1 G1 R1 G1
S R1 G1 G1 M1 P P D1 N1 D1 P
M1 G1 R1 S P G1 M1 P D1 N1
N1 N1 S N1 D1 P M1 G1 R1 S
G1
F2
1
1
0
0
Individual
F3
Individual 1
G1 G1 R1 G1 M1 M1 P D1 P D1
D1 P P M1 M1 G1
D1 P M1 G1 R1 G1 M1 P
S G1 M1 R1 M1 P D1 N1 S N1
D1 P M1 G1 R1 G1
S R1 G1 G1 M1 P P D1 N1 D1 P
M1 G1 R1 S P G1 M1 P D1 N1
N1 N1 S N1 D1 P M1 G1 R1 S
G1
Individual 2
Individual 3
Individual 4
0
-1
-1
Individual
G1 G1 R1 G1 M1 M1 P D1 P D1 D1
P P M1 M1 G1
D1 P M1 G1 R1 G1 M1 P
S G1 M1 R1 M1 P D1 N1 S N1 D1 P
M1 G1 R1 G1
S R1 G1 G1 M1 P P D1 N1 D1 P M1
G1 R1 S P G1 M1 P D1 N1 N1 N1 S
N1 D1 P M1 G1 R1 S G1
www.asdf.org.in
Fitness( F)
3
2
-1
-3
103
1. Selection Operator
In this work the individuals are randomly selected for
mutation and reproduction in accordance to probability of
selection. Cross over is not applied in this work.
2. Reproduction
Individual with highest fitness is considered as
best individual and considered for reproduction.
In the above fitness value highest value will be
considered as Best individual and the best
individual for above example is
Individual 1
G1 G1 R1 G1 M1 M1 P D1 P
D1 D1 P P M1 M1 G1
has the highest fitness value 3 which will be
considered for reproduction.
3.
Mutation
The fitness with least negation will be considered
for mutation in the above example as
Individual 4
S R1 G1 G1 M1 P P D1 N1 D1
P M1 G1 R1 S P G1 M1 P D1
N1 N1 N1 S N1 D1 P M1 G1
R1 S G1
If standard mutation operator is applied there is a
chance of fitness degradation and hence a new
operator viz. gene silencing operator is devised in
which the genes with incorrect Swarams alone
will participate in the mutation process. The genes
corresponding to the correct Swarams are silenced
thereby they will not participate in the mutation
process. The position of incorrect individuals is
taken from fitness 4 and only those part of
individuals are mutated randomly over multiple
points. Other parts are masked from mutation.
The sample scenario is given below considering above
generation
For individual 4 Fitness 4 = 2 so the genes in the 1,3,4
subsets are not mutated. Only the gene subset 2 alone is
mutated. In single point mutation only one point is mutated
randomly in 2nd subset and in multi point mutation more
than one point is mutated.
N1 D1 P M1 G1 R1 S P alone will be mutated because
of gene silencing operator in Individual 4.This will give
rise to next Generation of individuals as
Individual 1
Individual 2
Individual 3
Individual 4
G1 G1 R1 G1 M1 M1 P D1 P D1 D1 P
P M1 M1 G1
D1 P M1 G1 R1 G1 M1 P
S G1 M1 R1 M1 P D1 N1 S N1 D1 P
M1 G1 R1 S
S R1 G1 G1 M1 P D1 D1 N1 S P M1 G1
R1 S P G1 M1 P D1 N1 N1 N1 S N1 D1
P M1 G1 R1 S G1
F1
F2
F3
www.icca.org.in
fitne
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
G1 G1 R1 G1 M1 M1
P D1 P D1 D1 P P M1
M1 G1
D1 P M1 G1 R1 G1 M1
P
S G1 M1 R1 M1 P D1
N1 S N1 D1 P M1 G1
R1 S
S R1 G1 G1 M1 P P D1
N1 D1 P M1 G1 R1 S P
G1 M1 P D1 N1 N1 N1
S N1 D1 P M1 G1 R1 S
G1
4
0
ss
3
-1
-1
-2
-2
F1
2
F2
1
F3
0
F4
fitness
3
-1
-1
www.asdf.org.in
104
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
105
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
106
K.Balasubramanian
I. INTRODUCTION
Stereoscopic methods of displaying images require
viewing aids, such as color filters[1] or polarised filters[2],
for viewers to have an illusion of 3D vision. On the other
hand, techniques such as volumetric display tank, autostereoscopic technique employing lenticular lens and
holographic methods of displaying 3D images do not call
for any special viewing aids for depth perception[3].
Therefore, researches are progressing in these directions as
to contribute for future 3D television.
As computers have become important part of everyday
life, viewing television images in computer monitors is
preferred in several instances while working with computers
for other tasks. Internet TV is solution for watching
television images on the computers screen lively. The trend
on watching internet TV is increasing rapidly nowadays and
its importance is finding a momentum. As researches on 3D
TV transmission and display are progressing several
techniques are experimented to produce 3D display on TV
screen. It is worthwhile to consider extending the viable 3D
TV display techniques to internet TV as to watch in
computer screen with depth perception. This paper makes an
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
Internet
Polarizer
107
PC
Dsync
Identifier
Quarter Wave
Plate
Electro-optic
Drive
Fig.2. 10-Level Staircase Drive Pattern to Electrooptic Lensular Screen
Supporting Lens
www.asdf.org.in
Electro-optic
Lens
PC
Electro-optic
Drive
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
108
High Res
Video
Camera
Obj
Focal distance
Video Cameras
Video
Lenticular
Screen
Digitizing
Segments
making
16-Video
frame
Sequence
To
Internet
Fig.5.Auto-stereocopic Image Registration
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
Lenticular
Screen
From
Internet
PC
Image
De-segmentation
109
Video Storage
Server
Scalable H264/AVC
Coding
Fig.7 .Auto-stereocopic Image Reconstruction
Slices/Packets
Internet
Service Provider
Server
Scalable H264/AVC
Decoding
3D Display
installed PC
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
www.asdf.org.in
110
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
111
ACKNOWLEDGMENT
Authors express their sincere thanks to the Rector of the
University for granting financial support for the project.
[1]
[2]
[3]
[4]
[5]
REFERENCES
N.Nithiyanandam and K.P.Rajappan, Compatible 3-D TV,
Applied Optics, Vol 16, pp 2042, 1977.
Pieter J.H. Seuntiens, Visual Experience of 3D TV, Eindhoven
University Press, pp 1-135, 2006.
K.Balasubramanian, On the realization of constraint-free stereo
Television, IEEE Trans. on Cons. Electronics, Vol 50, No 3, pp
895-902, Aug 2004.
K.Balasubramanian,
S.Gunasekaran,
N.Nithiyanandam
and
K.P.Rajappan, "On the realization of 3-D color TV through
achromatic analyzers", Zeitchrift elektr Inform-u-energietechnique
(Germany), Leipzig 13, No 4, pp 329-338, 1983.
K.Balasubramanian
and
A.Cellatoglu,
Simplified
Video
Transmission of Stereo Images for 3D Image Reconstruction in TV,
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
112
I.
INTRODUCTION
In recent years, there has been increasing research
interests in video analysis due to its tremendous commercial
potentials, such as video indexing, retrieval, abstraction and
mining. In video analysis, shots are often basic processing
unit and give potential semantic hints. Video data can be
decomposed into several types of video shots which are
sequences of frames taken contiguously by a single camera.
Videos can be represented by a hierarchical structure
(Fig.1), while shots are the basis units for constructing high
level semantic scenes. Generally, the video data consists of
three basic units: frame, shot, and scene. A scene is a
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
www.asdf.org.in
113
Hard
Fades
Dissolve
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
Cuts
PROPOSED FRAMEWORK
114
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
115
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
x, y
and
s(K) - w(K) -1
, EC(K) [0, 2]
s(K) + w(K) +1
www.asdf.org.in
116
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
EXPERIMENTS
117
C
C+M
P=
C
C+F
F1 =
2* P* V
P+V
S.No
1
2
Video
Comedy
Video- 1
Comedy
Video -2
www.asdf.org.in
Total Number of
Transitions
Detected
Transitions (C)
Missed
Alarms
(M)
False
Alarms
(F)
Recall
(V)
Precision
(P)
F1
25
22
0.916
0.956
0.96
18
15
0.88
0.937
0.91
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
118
S.No
Video
Total number
of Key frames
Correct
Detection
Missed
alarms
False
Alarms
Recall
Precision
F1
Tennis
Video-1
16
12
0.857
0.857
0.86
Tennis
Video -2
14
11
0.917
0.846
0.88
CONCLUSION
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
119
Part II
Proceedings of the Second International Conference on
Computer Applications 2012
ICCA 12
Volume 2
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
120
I.
INTRODUCTION
www.asdf.org.in
R.S.Bhuvaneswaran
Ramanujan Computing Centre
Anna University Chennai
Chennai
This paper aims at combining two approaches of intrusion
detection: anomaly and specification based techniques.
Anomaly detection [1] recognizes deviations from
normalcy by building models of normal behaviour.
However, it is not able to detect unknown attacks.
Specification based detection detects attacks with use of a
set of constraints that define the correct operation of a
protocol. The main advantage of specification-based
methods is that it provides the capability to detect
previously unknown attacks. However the specifications
are usually derived manually from the descriptions of the
protocols. It is proposed to combine the above two
approaches and design a hybrid Intrusion Detection
System (IDS) in such a way that it reduces the false
positives.
This paper is organized as follows: Section II provides
an overview about IDS and its various types. A brief
discussion about AODV and its vulnerabilities are
provided in Section III. The routing layer attacks are
described in Section IV. A brief overview about the Fuzzy
Logic Control is provided in Section V. The design of
proposed system and its performance analysis is dealt in
detail in Section VI. Section VII briefs about the future
work and conclusion.
II. IDS AN OVERVIEW
An intrusion-detection system (IDS) can be defined as
the tools, methods, and resources to help identify, assess,
and report unauthorized or unapproved network activity.
Based on the techniques used, IDS can be classified into
three main categories as follows:
i. Misuse Detection: In misuse detection [2],
decisions are made on the basis of knowledge of a
model of the intrusive process and what traces it
might leave on the observed system. Such a system
tries to detect intrusion irrespective of any
knowledge regarding the background traffic. There
are several approaches in the signature detection,
which differ in representation and matching
algorithms employed to detect the intrusion
patterns.
ii. Anomaly detection: This technique establishes a
"normal activity profile" for a system and the states
varying from the established profile by statistically
significant amounts are identified as intrusion
attempts. It flags observed activities that
abnormally deviate from the recognized normal
usage as anomalies. It must first be trained using
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
d2
c2
B
a1
C
b1
D
c1
RREQ Broadcast
RREP Unicast
Fig. 1. AODV- Route Discovery Process
Fig. 1 illustrates the flow of the RREQ and RREP
messages in a scenario wherein a node A wants to find a
route to a node D. (Initially, nodes A, B, C and D do not
have routes to each other). Node A broadcasts a RREQ
message (a1), which reaches node B. Node B then
rebroadcast the request (b1). Node C receives the
messages and broadcasts the message (c1), which arrives
at the destination node D. Finally, node D unicasts back
the RREP message to node A. When node A receives the
RREP, a route is established. In case where node A
receives multiple RREP messages, it will select a RREP
message with the largest destination sequence number
value.
AODV is efficient and scalable in terms of network
performance, but it allows attackers to easily advertise
falsified route information to redirect routes and to launch
various kinds of attacks. In each AODV routing packet,
some critical fields such as hop count, sequence numbers
of source and destination, IP headers as well as IP
addresses of AODV source and destination, and RREQ
ID, are essential to the correct protocol execution. Any
misuse of these fields can cause AODV to malfunction.
Table 1 denotes several vulnerable fields in AODV
www.asdf.org.in
121
IP Headers As
well as Source and
Destination
IP
addresses
Sequence
number of Source
and Destination
Modifications
Increase to create a new
request
If sequence number is the
same, decrease it to update other
nodes forwarding tables or
increase it to invalidate the update
Replace it with another or
invalid IP address
Increase it to forward other
nodes forward route tables or
decrease it to suppress its update
SREP
DAT
D
E
In AODV, the black hole attack is performed as
follows: the malicious
node
M first detects the active
Fig. 2. Black
Hole
route in between the sender D and destination node
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
Fuzzification
Fuzzy Input
Fuzzy Logic
Fuzzy Output
De-Fuzzification
Crisp Output
www.asdf.org.in
122
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
Simulation Duration
Simulation Area
Application Type
200m/s & 2s
1,2,3 (For 15 node
Network)
1,2,5 (For 25 node
Network)
3,6,10 (For 50 node
Network)
500 s
1000 1000
CBR
140
120
Average Value
123
100
80
Parameter Avg
60
40
20
0
PD
SREP
RFR
Parameters
Fig. 5. FIS Parameters: Avg value and value in attacker node, for low traffic
250
200
150
Parameter Avg
Value in Black Hole Node
100
50
0
PD
SREP
RFR
Average Value
www.asdf.org.in
Value
15, 25, 50
Fig. 6. FIS Parameters: Avg value and value in attacker node, for medium traffic
It can be seen from Fig. 5 and Fig.6 that the black hole
nodes drop more number of Packets than that by the
genuine nodes. Also they do not forward any RREQ
packets. Moreover, it is inferred that the malicious nodes
send more fake RREPs to the source nodes to enable them
to be a part of communication path between source and
destination nodes.
Performance Analysis:
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
124
1.
2.
3.
1.6
Performance of nodes
1.4
1.2
1
0.8
0.6
No.of
Nodes
0.4
0.2
0
15
-0.2
10
15
No. of nodes
20
No.of
Black
Hole
Nodes
1
25
15
15
25
25
25
Traff
ic
TPR
Low
Med
High
Low
Med
High
Low
Med
High
Low
Med
High
Low
Med
High
Low
Med
High
100
66.7
100
66.67
50
100
33
44.33
67
100
100
100
83.33
100
100
86.67
100
100
FNR
0
33.3
0
33.33
50
0
67
55.7
33
0
0
0
16.67
0
0
13.3
0
0
FPR
6.667
7
7
7
7
7
7
7
7
15.33
13
13
13
13
13
13
13
13
Performance of nodes
1.5
-0.5
10
15
No. of nodes
20
25
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
125
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
126
Fuzzy
logic,
Morphology
I. INTRODUCTION
Fuzzy Logic (FL) is a convenient and early approach for
mapping an input space to the output space [1]. Here the
inputs could be the patters and output could be the classes
or some interfaces. Basically fuzzy logic is one of the
powerful components of artificially intelligence it has its
validity and high applicability in numbers of felids where
ever uncertainty of non-statistical kind in encountered.
The sole purpose applying fuzzy logic in image processing
is to identify the objects or the achieve clear persecution of
images to offer more realistic results in terms of image
clarity and information content typically specking image
clarity is critical in areas like medicine, security and
military application. The intent of this paper is to study as
how the concepts of fuzzy logic could be augmented and to
show the related applications in image processing this
paper is organized as follows
Section 2 explains the concepts of fuzzy logic, section 3
focuses on various application of fuzzy logic in different
tasks of image processing, and section 4 presents the
conclusion.
II. FUZZY LOGIC CONCEPTS
Fuzzy Logic is a means of dealing with information in the
same way that humans of animals do. Fuzzy Logic is built
around the concept of reasoning in degrees,
Proc. of the Intl. Conf. on Computer Applications
ISBN: 978-81-920575-5-2-::doi:10.73249/ISBN_0768
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
www.asdf.org.in
127
C. IMAGE SEGMENTATION
Image Segmentation is the process of dividing an image
into regions, each of which corresponds to homogenous
surfaces in a scene. Hence our goal is t o extract closed
boundaries around the surfaces. If complete edge
information can be extracted a reliable image segmentation
can be achieved using different types of edge maps has the
advantage of presenting most of the information needed in
the scene. By inspecting the segmented images, all the
major regions that are isolated and labeled can be seen. In
order to evaluate the segmentation process, results are
tested and compared against an ideal segmented image
which is synthetically generated. The evaluation criteria are
based on the degree of similarity between actual and ideal
segmented images. This degree of similarity may be
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
D. IMAGE DENOISING
A generalized fuzzy inference system (GFIS) in noise
image processing. The GFIS is a multi-layer neuro-fuzzy
structure which combines both Mamdani model and
Takagi-Sugeno (TS) fuzzy model to form a hybrid fuzzy
system. The GFIS can not only preserve the interpretability
property of the Mamdani model but also keep the robust
local stability criteria of the TS model. Simulation results
indicate that the proposed model shows a high-quality
restoration of filtered images for the noise model than those
using median filters or wiener filters, in terms of peak
signal-to-noise ratio (PSNR) [16].
Recently, application of fuzzy techniques in image noise
reduction processing is a promising research field [17].
Fuzzy techniques have already been applied in several
domains of image processing, e.g. filtering, interpolation,
and morphology, and have numerous practical applications
in industrial and medical image processing. These fuzzy
filters, including FIRE-filter [18], the weighted fuzzy mean
filter [19], and the iterative fuzzy control based filter [20],
are able to outperform rank-order filter schemes (such as
the median filter). Nevertheless, most fuzzy techniques are
not specifically designed for gaussian(-like) noise or do not
produce convincing results when applied to handle this
type of noise. The proposed a generalized fuzzy inference
mode, which is a hybridizations of the Mamdani and TS
models. The GFIS can be characterized by the neuro-fuzzy
spectrum, in light of linguistic transparency and inputoutput mapping accuracy [16].
REFERENCE
1.
2.
3.
4.
5.
6.
7.
E. EDGE DETECTION
Edge detection techniques transform images to edge
images benefiting from the changes of grey tones in the
images. Edges are the sign of lack of continuity, and
ending. As a result of this transformation, edge image is
obtained without encountering any changes in physical
qualities of the main image [12][13]. Objects consist of
numerous parts of different color levels. In an image with
different grey levels, despite an obvious change in the grey
levels of the object.
An Edge in an image is a significant local change in the
image intensity, usually associated with a is continuity in
either the image intensity or the first derivative of the
image intensity. Discontinuities in the image intensity can
be either Step edge, where the image intensity abruptly
changes from one value on one side of the discontinuity to
a different value on the opposite side, or Line Edges, where
the image intensity abruptly changes value but then returns
www.asdf.org.in
128
8.
9.
10.
11.
12.
13.
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
14. M. Abdulghafour, Image segmentation using Fuzzy logic and
genetic algorithms, Journal of WSCG, vol. 11, no.1, 2003.
15. Metin Kaya,Image Clustering and Compression Using an
Annealed Fuzzy Hopfield Neural Network, International
Journal of Signal Processing, 2005, pp.80-88.
16. Nguyen Minh Thanh and Mu-Song Chen Image Denoising
Using Adaptive Neuro-Fuzzy System IAENG International
Journal of Applied Mathematics, 36:1, IJAM_36_1_11
17. E. Kerre and M. Nachtegael, Eds., Fuzzy Techniques in Image
Processing. New York: Springer-Verlag, 2000, vol. 52, Studies
in Fuzziness and Soft Computing.
www.asdf.org.in
129
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
130
Distance based Data aggregation for Energy Efficiency in Wireless Sensor Networks
Kusuma S.M
P.I. Basarkod
Veena K.N.
Dept. of Electronics
&Communication Engg.,
REVA ITM, Banagalore
Dept. of Telecomm
Engineering , JNNCE.,
Shimoga, India
INTRODUCTION
ISBN: 978-81-920575-5-2-::doi:10.73263/ISBN_0768
www.asdf.org.in
Sensor Network
Cluster
Wireless Communication
Environment
Node
Figure1. Sensor network model
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
RELATED WORK
www.asdf.org.in
IV.
131
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
www.asdf.org.in
CLUSTERING IN WSN
132
Connection weights,
Input Layer
Neurons
B.
Learning Algorithm
The Neural network is presented with a set of training
input patterns corresponding to each sensor nodes. Let the
input pattern be: I = (I1, I2,.,I|V| ), where there are |V| input
neurons in the input layer. Now suppose there are Q neurons
in the output (competitive) layer, let Oj be the jth output
neuron. So the whole of the output layer will be: O= (O1, O2,
.,OQ). For each output neuron Oj there are |V| incoming
connections from the |V| input neurons. Each connection has
a weight value W. So, for any neuron Oj on the output layer
the set of incoming connection weights are
Wj = (Wj1, W j2, ..,Wj|V|).
The Euclidean distance value Dj of a neuron Oj in the
output layer, whenever an input pattern I is presented at the
input layer, is:
Dj=
| V |.
i 1
( I i - W ji ) 2
(1)
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
Begin
1. Assign random values to the connection weights, W in the
range (0, 1);
2. Select an input pattern ie., parameters of the
nodes.
sensor
PROPOSED MODEL
www.asdf.org.in
133
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
134
SIMULATION PARAMETERS
50000nJ
Area of deployment
Node distance from
environment
100 m 100 m
1 to 10
the
# Simulation event
Network life time
Neighbour distance
Tx energy
Rx energy
Sense energy
Network size (No. of nodes)
No. of hop distance
Neural network size
1000 to 5000
60% nodes are alive
10 to 20 m
500nJ
400nJ
100nJ
10 to 100
1, 2, 3
4 input, 3 to 10 output neurons
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
CONCLUSION
www.asdf.org.in
135
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
136
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
137
Sudipta Mondal
Tandra Pal
I.
INTRODUCTION
ISBN: 978-81-920575-5-2-::doi:10.73270/ISBN_0768
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
f(x) = 1/makespan
Operations routing
(processing time)
Job
1
1(3)
2(3)
3(3)
1(2)
3(3)
2(4)
2(3)
1(2)
3(1)
j31
j21
j22
j11
j12
j23
j32
j13
j33
m2
m1
m3
m1
m2
m2
m1
m3
m3
III.
TABLE I.
www.asdf.org.in
A 33 JSSP INSTANCE
138
GENETIC OPERATORS
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
A. Crossover
We have been inspired by the crossover technique proposed
by Sur-Kolay et al. [14] for Traveling Salesman Problem
(TSP), which is based on Order Based Crossover (OBC)
[15]. However, the concept of maintaining the order of the
operations of jobs in JSSP is more important than the order
of cities in TSP. We have modified their idea to make it
suitable for JSSP. The advantage of using this operator is
that it always generates valid schedules (as in TSP) keeping
the machine processing order of all jobs unchanged.
The operator is applied on each pair of parent
chromosomes after decoding the chromosomes, so each job
index with corresponding machine index is considered as a
decoded gene. A randomly chosen crossover point divides
the parent strings in left and right substrings. In the example,
given in Fig. 2, crossover point is considered at position 4.
The left substrings of parents S1 and S2 are copied to the left
substrings of the children C1 and C2 respectively. The
elements of the right substring of S1 are inserted in the right
substring of C1 in the order in which they occur in S2. Similarly
the right part of C2 is obtained by inserting the elements of the
139
Mutation
We first apply Simple Inverse Mutation (SIM) [16] and
then Swap Mutation [17] in the population generated after
S1:
Job index
Machine index
3 3 1 3|2 2 1 2 1
2 1 1 3|1 3 2 2 3
S2:
Job index
Machine index
2 1 1 3|2 3 3 2 1
1 1 2 2|3 1 3 2 3
Job index
Machine index
3 3 1 3|2 1 2 2 1
2 1 1 3|1 2 3 2 3
Job index
Machine index
2 1 1 3|3 3 2 2 1
1 1 2 2|1 3 3 2 3
C1:
C2:
begin
i) to select first operation of critical path, perform
a) find an operation ( ji, mx) with starting time (st) = 0 and end time (et) = maximum end time among all
active operations;
b) search for another operation ( jk, my) which has staring time (st) = et among all active operations;
c) add operation ( ji, mx) as first operation of critical path list and update starting time (st) = end time of
operation ( ji, mx);
ii) to select second operation onwards of critical path, do
a) find an operation (jk, my) such that its starting time = st;
[if more than one operation is found with starting time = st, then select the operation with least machine index]
b) add operation ( jk, my) in critical path list and update starting time(st) = end time of operation (jk, my);
c) if step ii)a) cant find an operation then no more operation is added to critical path and the procedure
ends;
end of do;
end;
Figure 3. Pseudo Code of Critical Path Heuristic
begin
for each chromosome in the population, do
i) apply Critical Path Heuristic to identify the critical path and then identify the first pair of consecutive
critical operations belonging to same critical block;
ii) a) swap between identified pair of critical operations in the chromosome if they are also in consecutive
positions in the chromosome;
b) if swapped, a new schedule is achieved; if makespan of the new schedule is less than that of old
schedule then replace the old chromosome by the new one; otherwise, restore the old one;
iii) if no swap in step ii)a) or if the old chromosome is restored in step ii)b), then identify next pair of
consecutive critical operations belonging to same critical block in the critical path and go back to step ii);
if no such pair is found, the Local Search ends;
iv) if the old schedule is replaced by the new schedule in step ii)b), then again perform step a) to step d);
end of do;
end;
Figure 4. Pseudo Code of Local Search
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
140
begin
i) create initial population randomly;
ii) generation-count = 1;
iii) while generation-count <= k do
/* k = maximum number of generations */
a) Roulette-wheel Selection with Elitism;
b) Local Search using Critical Path Heuristic;
c) Crossover: Produce children from the selected individuals;
d) Induced Mutation: Simple Inverse Mutation and Swap Mutation;
e) Diversity Mutation;
f) increment generation-count;
end of do;
iv) output the best individual found;
end;
Figure 5. Pseudo Code of the Proposed Hybrid Genetic Algorithm
VI.
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
Problem Size
Best Known
Solution
HGA
Iteration No.
SGA
RBT
GUT
GRASP
LSGA
Hybrid
LAS
SB I
SB II
Instances
TABLE II.
141
la01
la02
la03
la04
la05
la06
la07
la08
la09
la10
10 5
10 5
10 5
10 5
10 5
15 5
15 5
15 5
15 5
15 5
666
655
597
590
593
926
890
863
951
958
666
655
597
590
593
926
890
863
951
958
19
196
1428
179
4
9
68
44
24
5
666
655
605
607
593
926
890
863
951
958
667
655
617
607
593
926
890
863
951
958
666
655
597
590
593
926
890
863
951
958
666
655
604
590
593
926
890
863
951
958
666
655
597
590
593
926
890
863
951
958
666
666
666
926
-
666
720
623
597
593
926
890
868
951
959
669
605
593
863
-
la11
la12
la13
la14
la15
la16
la17
la18
la19
la20
la21
la22
la23
la24
la25
20 5
20 5
20 5
20 5
20 5
10 10
10 10
10 10
10 10
10 10
15 10
15 10
15 10
15 10
15 10
1222
1039
1150
1292
1207
945
784
848
842
902
1046
927
1032
935
977
1222
1039
1150
1292
1207
947
784
848
850
907
1079
946
1032
969
1012
26
24
18
5
425
612
441
723
583
205
2288
2568
948
7619
1623
1222
1039
1150
1292
1207
982
793
861
885
915
1114
993
1037
1022
1084
1222
1039
1150
1292
1207
994
785
861
881
915
1115
1021
1032
978
1066
1222
1039
1150
1292
1207
945
787
861
850
907
1091
970
1032
986
991
1222
1039
1150
1292
1207
946
784
848
842
907
1091
960
1032
978
1028
1222
1039
1150
1292
1207
1114
989
1035
1032
1047
959
792
857
860
907
1097
980
1032
1001
1031
1222
979
1097
-
1222
1039
1150
1292
1207
1021
796
891
875
924
1172
1040
1061
1000
1048
978
787
859
860
914
1084
944
1032
976
1017
la26
20 10
1218
la27
20 10
1235
la28
20 10
1216
la29
20 10
1157
la30
20 10
1355
la31
30 10
1784
la32
30 10
1850
la33
30 10
1719
la34
30 10
1721
la35
30 10
1888
No. of Optimal solutions
obtained (Total no. of
problems considered)
1235
1295
1248
1250
1362
1784
1850
1719
1721
1888
6679
6545
3793
8501
1661
1006
1365
1524
3577
2621
1305
1343
1316
1294
1469
1784
1850
1719
1744
1907
1301
1328
1311
1296
1454
1784
1855
1719
1747
1903
1226
1292
1260
1238
1355
1784
1850
1719
1721
1888
1271
1320
1293
1293
1368
1784
1850
1719
1753
1888
1307
1350
1312
1311
1451
1784
1850
1745
1784
1958
1295
1306
1302
1280
1406
1784
1850
1719
1758
1888
1231
1784
-
1304
1325
1256
1294
1403
1784
1850
1719
1721
1888
1224
1291
1250
1239
1355
-
23
(35)
16
(35)
15
(35)
23
(35)
22
(35)
17
(30)
5
(20)
4
(9)
16
(35)
3
(19)
VII. CONCLUSIONS
This paper presents a Hybrid Genetic Algorithm for JSSP
using Local Search based on Critical Path Heuristic. The
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
Algorithms
No. of Problems
Considered
Average of
Relative
Deviations
Standard
Deviation of
Relative
Deviations
TABLE III.
COMPARISON OF THE AVERAGE AND
STANDARD DEVIATION OF THE RELATIVE DEVIATIONS
HGA
SGA
RBT
GUT
GRASP
LSGA
Hybrid
LAS
SB I
SB II
35
35
35
35
35
30
20
9
35
19
0.009023
0.028125
0.026800
0.010040
0.014758
0.029861
0.032561
0.025309
0.031839
0.021833
0.018014
0.037925
0.035823
0.019105
0.027332
0.039164
0.031529
0.038179
0.040136
0.019411
142
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
B. Giffler and G. L. Thompson, Algorithms for solving productionscheduling problems, Operation Research, vol. 8, pp. 487-503, 1960.
J. Adams, E. Balas and D. Zawack, The shifting bottleneck
procedure for the job shop scheduling, INFORMS, vol. 34, pp. 391401, 1988.
J. Carlier and E. Pinson, An algorithm for solving the job-shop
problem, Management Science, vol. 35, pp. 164-176, Feb 1989.
P. Brucker, B. Jurisch and B. Sievers, A branch and bound algorithm
for the job-shop scheduling problem, Discrete Applied Mathematics,
Issues 1-3, vol. 49, pp. 107-127, 1994.
F. D. Croce, R. Tadei and G. Volta, A genetic algorithm for the job
shop problem, Computers and Operations Research, vol. 22, pp. 1524, 1995.
S. Binato, W. Hery, D. Loewenstern and M. Resende, A GRASP for
job shop scheduling, Kluwer Academic Publishers, 2000.
R. Nakano and T. Yamada, Conventional genetic algorithm for jobshop problems, In Proceedings of the 4th International Conference
on Genetic Algorithms and their Applications. San Diego, USA, pp.
474-479, 1991.
T. Yamada, Studies on metaheuristics for job shop and flow shop
scheduling problems, In Department of Applied Mathematics and
Physics, Doctor of Informatics Kyoto, Japan: Kyoto University, p.
120, 2003.
T. Yamada and R. Nakano, Genetic algorithms for job-shop
scheduling problems, In Proceedings of Modern Heuristic for
Decision Support, UNI-COM seminar, London, pp. 67-81, March,
1997.
M. O. Beatrice and V. Mario, Local search genetic algorithms for
the job shop scheduling problem, Kluwer Academic Publishers, vol.
21, pp. 99-109, 2004.
S. M. K. Hasan, R. Sarker and D. Cornforth, Modified genetic
algorithm for job-shop scheduling: a gap-utilization technique, In
IEEE congress on evolutionary computation. Singapore, pp. 38043811, 2007.
Y. Tsujimura, M. Gen and R. Cheng, Improved genetic algorithms
for solving job-shop scheduling problem, Engineering Design and
Automation, vol. 3, No. 2, pp.133-144, 1997.
D. E. Goldberg, Genetic algorithm in search, optimization and
machine learning, Addison-Wesley, Canada, 1989.
S. Sur-Kolay, S. Banerjee and C. A. Murthy, Flavours of traveling
salesman problem in VLSI design, In 1st Indian International
Conference on Artificial Intelligence, 2003.
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
143
I.
INTRODUCTION
R. Ponnusamy
Madha Engineering College
Affiliated to Anna University
Chennai, Tamil Nadu, India
ACM #: dber.imera.10. 73277
II. BAYES INFERENCE
Bayesian network models
support efficient
reasoning under uncertainty in a given domain.
Reasoning under uncertainty is the task of computing
our updated belief in events based on given
observations on other events .
2.1 Conditional probability
The basic concept in the Bayesian treatment of
uncertainty is that of conditional probability of event a
is x is written as P(a/b)=x (i.e) if event b is true and
everything else known is irrelevant for event a then
the probability of event a is x.
The following axiom gives the basis for Bayesian
probability
1. For any event a, 0p(a)1 p(a)=1if
and only if a occurs with certainty.
2. For mutually exclusive events a & b
the probability that either a or b occurs is
P(a or b)=P(a)+P(b).
3. Fundamental Rule of probability calculus
For any two event a and b the both a&b.
(i.e)P(a,b)=P(a/b)P(b)=P(b/a)P(a). P(a,b) is called
the joint probability of the event a & b.
2.2 Bayes Rule
Generalizing the above rule 3 to random variables X
and Y we get the fundamental rule of probability
P(X,Y)=P(X/Y)P(Y)=P(Y/X)P(X).
(1)
(2)
P(Y/X)=
(3)
That is , the denominator can be derived from the
numerator in (2) Furthermore, the denominator is
obviously the same for all states of Y.
III. Chain Rule
For a probability distribution, P(X), over a set of
variables X={x1,xn}, we can use the fundamental rule
repetitively to decompose it into a product of
conditional probabilities
ISBN: 978-81-920575-5-2::doi:10.73277/ISBN_0768
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
144
P( X ) P ( x1 | x2 ,...xn ) P ( x2 ,...xn )
Questionnaire to people
In this paper the loan prediction has been made with
Finding
the interest level of people in
variable are connected in the form of DAG, with each
availing the loan facility
node having a conditional probability table (CPT) that
3.3 Data Analysis
quantifies the effects that the parents have on the node.
The Data gathered in the above manner is subjected
The parents of a node X are all those nodes that have
to research with the help of this paper An Intelligent
arrows pointing to X. The same above process is
Loan Predication with Bayes Approach that is Belief
modified and adapted as described below.
network.
In this paper the attributes are classified into two
3.4 Research Methodology
major categories
The real time Datas are further analyzed and
1. Major nodes
statistically grouped with their relevant matching
2. Vital node
criteria and formed in the manner of a network called
The Major nodes:belief network.
Agriculture,Business,salaried and others are
considered as major attributes (hence termed as major
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
Figure 2
Table 1
A2
P(A9/A1A2)
T
T
F
F
T
F
T
F
0.7
0.5
0.4
0.002
3.
4.
www.asdf.org.in
145
5.
6.
7.
8.
9.
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
146
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
147
INTRODUCTION
www.asdf.org.in
N. Thangadurai
Department of Telecommunication Engineering,
SRM University,
Chennai, India.
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
Visual Image
Thermal Image
+
Pre processing
Fusion
Temporary
Storage
148
Similarity
calculation
Database
Output
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
149
mean
S=Data-Mn
[V D]=eig(s)
Lower Value
Higher Value
3
Matched
www.asdf.org.in
Matched
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
V. IMAGE MATCHING
150
m =(1/M)
xi
i=1
It has been shown that the eis and is are given by the
eigenvectors and eigenvalues of the covariance matrix
C = WWT
where W is a matrix composed of the column vectors wi
placed side by side. The size of C is N x N which could be
enormous. For example, images of size 64 x 64 create the
covariance matrix of size 4096x4096. It is not practical to
solve for the eigenvectors of C directly. A common theorem
in linear algebra states that the vectors ei and scalars i can
be obtained by solving for the eigenvectors and eigenvalues
of the M xM matrix WTW.
Let di and i be the eigenvectors and eigenvalues of
WTW, respectively.
WTWdi = idi
By multiplying left to both sides by W
WWT (Wdi) = i(Wdi)
which means that the first M - 1 eigenvectors ei and
eigenvalues i of WWT are given by Wdi and i, respectively.
Wdi needs to be normalized in order to be equal to ei. Since
we only sum up a finite number of image vectors, M, the
Figure 3. Screenshot 1
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
B. face recognition
151
Figure 5. Screenshot 3
VII. CONCLUSION
Our proposed model is totally viable and can be
implemented easily. The system is simple, user friendly and
reliable. The main disadvantage of the existing system is
that they either used the visual methodology or the thermal
methodology, both of which have their own disadvantages.
The visual methodology suffers from the inherent
disadvantages such as illumination variations, partial
occlusions, etc while the thermal methodology suffers from
effects such as the temperature variations, etc. The proposed
system overcomes all these disadvantages by combining the
features of both the systems.
VIII.
Figure 4. Screenshot 2
FUTURE WORK
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
152
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
153
I.
INTRODUCTION
novel
which
recognizes
in
next
section.
Conclusion
and
future
II.
PROPOSED ALGORITHM
A. In House Dataset
We have carried out our experiment on in-house image
dataset. We are using computer generated test images with
uni-font (Calibri) with various size and weight. We have
created 10 documents with varying text property.
B. Algorithm
English alphabet contains twenty six (26) letters. English
Preprocessing
www.asdf.org.in
algorithm,
Euler Number
Calculation
(L1)
Bottom Line
Left Edge
Scanning
Histogram
(L5)
(L4)
2012 :: Techno Forum Research and Development Centre, Pondicherry, India
Vertical
Symmetry
(L2)
Horizontal
Symmetry
(L3)
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
154
Digitization
Line
Segmentation
SEGMENTATION
Thresholding
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
155
1.
2.
1.
2.
3.
4.
end
Possible output characters: B
If character is other than B, then at next level we are
checking the vertical symmetry of the input character. In
level 2, any character is not recognized but input character is
placed in any one of the four group of level L2. For
checking the vertical symmetry of character, we are first
splitting the character from vertically middle, right half is
reflected around y axis and joined it with right half itself and
new character is generated. Euclidean distance is calculated
between this newly created character and original character.
If distance is less than predefined threshold than the input
character is vertical symmetric otherwise not.
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
156
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
A
D
O
P
Q
R
2.
EXPERIMENTAL RESULTS
Char
Freq
E
T
A
O
I
N
S
H
R
D
L
C
U
12.702
9.056
8.167
7.507
6.996
6.749
6.327
6.094
5.987
4.253
4.025
2.782
2.758
www.asdf.org.in
Detection
Level
L5
L6
L3
L3
L5
L5
L7
L5
L5
L3
L6
L4
L5
Char
Freq
M
W
F
G
Y
P
B
V
K
J
X
Q
Z
2.406
2.360
2.228
2.015
1.974
1.929
1.492
0.978
0.772
0.153
0.150
0.095
0.074
Detection
Level
L5
L5
L6
L8
L7
L5
L1
L7
L5
L8
L4
L4
L6
1.
157
L3
O
L4
L5
L6
L7
L8
A
D
D
P
Q
R
P
Q
R
P
R
P
R
Q
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Recognized
Characters
At each level
H
I
X
C
E
F
G
N
I
J
K
L
M
N
S
T
U
V
W
X
Y
Z
H
I
M
T
U
V
W
X
Y
H
I
I
H
X
M
U
M
T
U
V
W
Y
U
M
T
T
V
W
Y
T
V
Y
V
Y
Y
V
C
E
K
C
E
F
G
J
K
L
N
S
Z
E
K
E
K
F
G
J
L
N
S
Z
F
L
N
F
L
F
L
N
Z
G
J
S
Z
G
J
S
Z
10
S
G
J
S
G
J
3
G
J
2
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
Cumulative
17
21
24
26
Total
Characters
70
135
65
114
178
123
69
79
136
165
1134
Correct
Recognition
70
128
65
106
171
119
68
76
128
157
1088
Recognition
Rate
100.00
94.82
100.00
92.98
96.07
96.75
98.55
96.20
94.11
95.15
95.94
IV.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[7]
[8]
[9]
[10]
[12]
[13]
[14]
[15]
[16]
www.asdf.org.in
CONCLUSIONS
[6]
158
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
[17]
[18]
[19]
www.asdf.org.in
[20]
[21]
[22]
159
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
160
I.
INTRODUCTION
The data are in the form of graphics, audio, video and image.
These types of data have to be compressed during the
transmission process. Large amount of data cant be stored if
there is low storage capacity present. The compression offers
a means to reduce the cost of storage and increase the speed
of transmission. Image compression is used to minimize the
size in bytes of a graphics file without degrading the quality
of the image. There are two types of image compression is
present. They are lossy and lossless. Some of the
compression algorithms are used in the earlier days [3] and
[4] and it was one of the first to be proposed using wavelet
methods [2]. Over the past few years, a variety of powerful
and sophisticated wavelet based schemes for image
compression have been developed and implemented. The
coders provide a better quality in the pictures. Wavelet
based image compression based on set partitioning in
hierarchical trees (SPIHT) [5] and [6] is a powerful, efficient
and yet computationally simple image compression
algorithm. It provides a better performance when compared
to the Embedded Zero tree wavelet [7] transform.
The objective of this paper is twofold. First, the images
are compressed by using the techniques SPIHT and STW.
Second, the image quality is measured objectively, using
Peak Signal-to-Noise Ratio (PSNR) and Mean Squared Error
(MSE).
Proc. of the Intl. Conf. on Computer Applications Volume
1. Copyright 2012 Techno Forum Group, India.
ISBN: 978*81*920575*5*2*::doi:10.73291/ISBN_0768
ACM #: dber.imera.10. 73291
www.asdf.org.in
II.
SPITH ALGORITHM
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
161
III.
STW ALGORITHM
Now that we have laid the groundwork for the STW
algorithm, we can give its full description.
STW encoding
<T
Do
Get next index m in dominant list
Save old state Sold = S(m,Tk-1)
Find new state Snew = S(m, Tk) using (6)-(9)
Output code for state transition Sold -Snew
If Snew # Sold then do the following
If Sold # SR and Snew # IV then
Append index m to refinement list
Old/New
IR
IV
SR
SV
If Snew = SV then
IR
00
IV
SR
SV
www.asdf.org.in
01
10
11
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
If |w(m)|
Else if |w(m)|
Output bit 1
Replace value of wQ(m) by wQ(m) + Tk.
Step 5 (Loop). Repeat steps 2 through 4.
To see how STW works and how it improves the EZW
method it helps to reconsider, we show STW states for the
wavelet transform using the same two thresholds as we used
previously with EZW. It is important to compare the three
quad trees enclosed in the dashed boxes with the
corresponding quadtrees. There is a large savings in coding
output for STW represented by these quad trees. The EZW
symbols for these three quadtrees are +I I I I, -I I I I, and
+RRRR. For STW, however, they are described by the
symbols +SR, -SR, and +SR, which is a substantial
reduction in the information that STW needs to encode.
There is not much difference between STW and SPIHT. The
one thing that SPIHT does differently is to carefully
organize the output of bits in the encoding of state
transitions in Table 1, so that only one bit is output at a time.
For instance, for the transition IR SR, which is coded as 1
0 in Table 1, SPIHT outputs a 1 first and then (after further
processing) outputs a 0. Even if the bit budget is exhausted
before the second bit can be output, the first bit of 1
indicates that there is a new significant value.
The SPIHT encoding process, as described in [6], is phrased
in terms of pixel locations [i, j] rather than indices m in a
scan order. To avoid introducing new notation, and to
highlight the connections between SPIHT and the other
algorithms, EZW and STW, we shall rephrase the
description of SPIHT from [6] in term of scanning indices.
We shall also slightly modify the notation used in [6] in the
interests of clarity.
First, we need some preliminary definitions. For a given set
I of indices in the baseline scan order, the significance ST
[I] of I relative to a threshold
T is defined by
www.asdf.org.in
162
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
163
V.
EXPERIMENTAL RESULTS
The single images are used for the experiments. The results
of experiments are used to find the PSNR (Peak Signal to
noise Ratio) values and MSE (Mean Square Error) values
for the reconstructed images.
PSNR Values
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
164
VI.
PERFORMANCE ANALYSIS
Image/Method
SPITH
STW
Neural
1.jpg
136.5054
113.5719
110.2
2.jpg
56.1403
47.03213
46.02
3.jpg
54.32996
49.3481
49.2
Image Size,
Image/Method
SPITH
STW
Neural
1.jpg
26.7793
27.57809
28.28
2.jpg
30.63806
31.40686
31.50
3.jpg
30.78041
31.1981
31.20
STW
Neural
Table2 PSNR in db
www.asdf.org.in
Image/Method
SPITH
1.jpg
2.072271
3.002421
3.02
2.jpg
3.011831
4.389699
4.40
3.jpg
2.175776
3.147634
3.20
SPITH
STW
Neural
1.jpg
0.497345
0.720581
0.79
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
2.jpg
0.722839
1.053528
1.35
3.jpg
0.522186
0.755432
0.85
165
Table 4 BPP
Image/Method
SPITH
STW
Neural
1.jpg
33341
34300
34400
2.jpg
30378
31486
32000
3.jpg
22408
23498
23550
VII.
CONCLUSION
[2]
[3]
[4]
[5]
[6]
[7]
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
166
An ANN Based Movie Business Prediction Method using a Subset of Training Data
Debaditya Barman
I.
INTRODUCTION
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
PROPOSED METHOD
www.asdf.org.in
167
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
168
Output
20 movies which are similar to target movie
Step11. For each unit j in the hidden layers, from the last to
the first hidden layer
Method
Step1. For all movies in the data set , {
Step2. =| |=
| | ; // where
!
www.asdf.org.in
(1)
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
!
(2)
www.asdf.org.in
EXPERIMENTAL RESULT
169
Actual
Profit in
%(B)
Profit
%
predict
ed by
Experi
ment
1(C)
Blue
Valentine
1135.57
4
521.1
Case 39
4.408
Convictio
n
Error
Rate in
Experi
ment 1
(%)
=(ABS
(B3C)*100
)/ABS(
B)
54.112
Profit
predict
ed by
Experi
ment 2
(E)
Error
Rate in
Experim
ent 2
(%)=(A
BS(BE)*100)/
ABS(B)
1168.9
8
2.942
18.995
330.92
2
3.002
31.902
-22.32
-98.229
340.09
5
-14.199
36.385
Cyrus
41.77
48.412
15.902
43.189
3.398
Clash of
the Titans
294.572
263.58
5
10.52
306.39
5
4.014
Daybreak
ers
157.083
190.17
21.064
163.24
3.92
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
Dinner for
Schmucks
25.228
81.741
224.01
24.393
3.31
Due Date
225.716
290.06
28.507
221.86
1.709
Eat Pray
Love
240.991
212.72
11.732
218.15
9.478
Faster
48.096
49.728
3.394
52.779
9.737
Grown
Ups
239.288
242.89
1.506
236.55
1.145
Hereafter
162.995
164.8
1.108
172.45
5.801
Inception
415.958
338.02
18.737
356.52
14.29
Leap Year
71.618
65.626
8.367
144.42
101.654
V.
Faster
178.023
156.02
12.36
184.45
3.611
Megamin
d
147.304
158.99
7.934
139.03
5.617
My Soul
to Take
-16.095
21.854
35.782
-10.513
34.682
Salt
168.831
178.65
5.816
169.6
0.456
Tangled
127.201
122.32
3.838
131.65
3.498
The
Bounty
Hunter
240.805
269.06
11.734
250.57
4.056
The
Expendabl
es
243.086
238.58
1.854
238.87
1.735
The Kids
Are All
Right
767.647
805.31
4.907
749.96
2.305
The Next
Three
Days
109.163
117.83
7.94
109.55
0.355
The
Twilight
Saga:
Eclipse
927.194
835.12
9.931
927.52
0.036
Wall
Street:
Money
Never
Sleeps
92.498
80.096
13.408
89.561
3.176
Life as We
Know It
170
Error Rate in
Experiment 1
(%) (E1)
3.394
Error Rate in
Experiment 2
(%)(E2)
9.737
Difference
ABS(E1-E2)
6.343
Hereafter
1.108
5.801
4.693
Leap Year
8.367
101.654
93.287
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
[2] "Training back propagation neural networks with genetic algorithm for
weather forecasting" by Gill, J.; Singh, B.; Singh, S.; This paper appears
in: Intelligent Systems and Informatics (SISY), 2010 8th
International Symposium
[3] "Multispectral image-processing with a three-layer back propagation
network" by McClellan, G.E.; DeWitt, R.N.; Hemmer, T.H.; Matheson,
L.N.; Moe, G.O.; Pacific-Sierra Res. Corp., Arlington, VA This paper
appears in: Neural Networks, 1989. IJCNN., International Joint Conference
[4] http://en.wikipedia.org/wiki/Film
[5] http://www.the-numbers.com/glossary.php
[6] http://en.wikipedia.org/wiki/List_of_most_expensive_films
[7]http://en.wikipedia.org/wiki/List_of_highest-grossing_films
[8] http://en.wikipedia.org/wiki/City_Island_%28film%29
[9] http://en.wikipedia.org/wiki/Zyzzyx_Road
[10] Time Series Prediction and Neural Networks R.J.Frank, N.Davey,
S.P.Hunt Department of Computer Science, University of Hertfordshire,
Hatfield, UK.
[11] An Efficient Weather Forecasting System using Artificial Neural
Network Dr. S. Santhosh Baboo and I.Kadar Shereef
[12] http://en.wikipedia.org/wiki/Film_genre
[13] http://www.imdb.com/title/tt0499549/
[14]http://en.wikipedia.org/wiki/List_of_American_films_of_2010
[15] Data Mining: Concepts and Techniques, 2nd ed.Page 328 by Jiawei
Han and Micheline Kamber
[16] " Machine Learning " by Tom Mitchell page 81
[17] "Application of artificial neural networks in image
recognition and classification of crop and weeds" by C.C. YANG, S.O.
PRASHER, J.A. LANDRY, H.S. RAMASWAMY and A. DITOMMASO
[18] " Applications of Artificial Neural Networks to Facial Image
Processing " by Thai Hoang Le
[19] " THE APPLICATION OF NEURAL NETWORKS, IMAGE
PROCESSING AND CAD-BASED ENVIRONMENTS FACILITIES IN
AUTOMATIC ROAD EXTRACTION AND VECTORIZATION FROM
HIGH RESOLUTION SATELLITE IMAGES " by F. Farnood Ahmadia,
M. J. Valadan Zoeja, H. Ebadia, M. Mokhtarzadea
[20] " Cash Forecasting: An Application of Artificial
Neural Networks in Finance " by PremChand Kumar, Ekta Walia
[21] " Stock Market Prediction Using Artificial Neural Networks " by
Birgul Egeli, Meltem Ozturan, Bertan Badur
[22] " ARTIFICIAL NEURAL NETWORK MODELS FOR
FORECASTING AND DECISION MAKING " by Tim Hill, Leorey
Marquez, Marcus O'Connor, William Remus
[23] " Application of Artificial Neural Networks for
Temperature Forecasting " by Mohsen Hayati, and Zahra Mohebi
[24]" Atomic Mass Prediction with Articial Neural Networks " by xuru.org
[25] " Designing an Artificial Neural Network Model for the Prediction of
Thrombo-embolic Stroke " by D.Shanthi, Dr.G.Sahoo , Dr.N.Saravanan
[26] " Time Series Prediction and Neural Networks " by R.J.Frank,
N.Davey, S.P.Hunt
[27] " Forecasting groundwater level using artificial
neural networks " by P. D. Sreekanth, N. Geethanjali, P. D. Sreedevi,
Shakeel Ahmed, N. Ravi Kumar and P. D. Kamala Jayanthi
[28]http://en.wikipedia.org/wiki/Backpropagation
[29] " Image Compression with Back-Propagation
Neural Network using Cumulative Distribution
Function " by S. Anna Durai, and E. Anna Saro
[30] " Satellite Image Classification using the Back Propagation Algorithm
of Artificial Neural Network. " by Mrs. Ashwini T. Sapkal, Mr.
Chandraprakash Bokhare and Mr. N. Z. Tarapore
[31] " Irregular shapes classification by back-propagation
neural networks " by Shih-Wei Lin, Shuo-Yan Chou and Shih-Chieh Chen
[32] " Email Classification Using Back Propagation Technique " by Taiwo
Ayodele, Shikun Zhou, Rinat Khusainov
[33] "Parallel back-propagation for the prediction of time series " by Frank
M. Thiesing, Ulrich Middelberg and Oliver Vornberger
[34] " APPLYING BACKPROPAGATION NEURAL NETWORKS TO
BANKRUPTCY PREDICTION " by Yi-Chung Hu and Fang-Mei Tseng
[35] " An Efficient Weather Forecasting System using Artificial Neural
Network " by Dr. S. Santhosh Baboo and I.Kadar Shereef
[36] http://www.film-releases.com/film-release-schedule-2010.php
www.asdf.org.in
171
[37]http://www.imdb.com/title/tt1126591/
[38]http://www.imdb.com/title/tt1433108/
[39]http://www.imdb.com/title/tt0758752/
[40]http://en.wikipedia.org/wiki/Tron:_Legacy
[41]http://en.wikipedia.org/wiki/Tron_%28film%29
[42]http://www.imdb.com/title/tt1104001/
[43]http://www.imdb.com/title/tt0398286/
[44] http://en.wikipedia.org/wiki/List_of_American_films_of_2009
[45] http://en.wikipedia.org/wiki/Film_industry
[46]http://www.imdb.com/title/tt1041804/
[47] A Method of Movie Business Prediction using Artificial Neural
Network by Debaditya Barman and Dr. Nirmalaya Chowdhury published
in International Conference on Soft computing and Engineering
Application SEA 2011, page no. 54-59
[48]http://www.imdb.com/title/tt0433362/
[49]http://www.imdb.com/title/tt0403702/
[50]http://www.imdb.com/title/tt1212974/
[51]http://www.imdb.com/title/tt1196134/
[52]http://www.imdb.com/title/tt0896031/
[53]http://www.imdb.com/title/tt0857275/
[54]http://www.imdb.com/title/tt1216492/
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
172
I.
INTRODUCTION
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
Evolutionary Computing
= Genetic Programming +
Evolution Strategies
+Evolutionary programming
+
Genetic Algorithms
EV = GP + ES + EP + GA
"Artificial Neural Networks are massively parallel
interconnected networks of simple (usually adaptive) elements
and their hierarchical organizations which are intended to
interact with the objects of the real world in the same way as
biological nervous systems do. The biological neural systems
do not apply principles of digital or logic circuits [4]
1. Neither the neurons, nor the synapses are bistable
memory elements. Neurons seem to act as analogue
integrators and the efficacies of the synapses change
gradually without flipping back and forth.
2. No machine instructions or control codes occur in
neural computing.
3. The neural circuits do not implement recursive
computation using algorithms.
4. Even on the highest level, the nature of information
processing is different in the brain or neural networks
and in the digital computers.
2.1. Soft Computing : Neural Network
Neural Nets: Classification - Supervised Learning
Multilayer perceptrons
Radial basis function networks
Modular neural networks
LVQ (learning vector quantization)
Unsupervised Learning
Competitive learning networks
Kohonen self-organizing networks
ART (adaptive resonant theory)
Others
Hopfield networks
Supervised Neural Networks
2.2. General Networks
The structure ofthe process is built into NN; we can
obtain a particular state space structure asthe result of the
identification,
such
as
controllability
canonical,
observabilitycanonical forms, etc.
Self feedback
Output &
Internal
u1
Internal
&output
Known threshold
X1
y1
up
X2
yq
Input & output
connections
Input layer
neurons
xN
hidden layer
neurons
output layer
neurons
III.
173
LINEAR CLASSIFICATION
yk = f k (xi wi ) k
i =1
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
various
inputs,
which
arenot
in
the
174
training
X1
W1
Output
X2
W2
*
*
Wn
Xn
Error
Desired
Output
Fig:2 Adaline
i1
l
= ( d 0 ) f ' ( w 0 + W T I ) I j (7)
w j
Where f' (.) is derivative of activation function. To
minimize the error the weight changes should be in negative
gradient direction. Therefore we will have
W = e (8)
Where is a positive constant, called learning factor.
By Equations (6) and (7), the W is calculated as follows:
W = (d o) f ' (a)I (9)
For each weight j Equation (9) can be written as:
wj= (d o) f ' (a)I j j = 0,1,2,..., n (10)
Therefore we update the weights of the network as:
wj (new) = wj(old ) + wj j = 0,1,2,..., n (11)
Through generalization of Equation (11) for normalized error
and using Equation (10) for every neuron in output layer we
will have:
wj ( new) = wj (old) +
W j (new) = w j (old) +
W1 x1 +
W2
-
w2 x2 +
---+
f (-)
wn xn
Wn
W1
i2
in
(d j o j ) f `(a j )x j
X
W0
IO=1
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
0.1
0.5
j[0]
i1 =1
0[0]
0.6
0.6
0.3
i 2=0
0.2
0.7
0.8
0[1]
0.9
175
Wj10(new)
-0.3173
-0.4015
Wj 11(new)
0.3
0.3
Wj 12(new)
0.3827
0.2985
The weights after the two iterations of training of the network
can be calculated
J [0] = 0.5878
J [1] = 0.5257
O [0] = 0.4424
O [1] = 0.7005
j[1]
i3 =1
0.5
1
1 + ex
www.asdf.org.in
Iteration Number
1
Initialization
Forward
calculation
0.7109
0.7503
0.88066
0.80169
Step3:
-0.88066
0.19831
Step 4:
0.3694
0.56309
0.6301
0.5138
-0.2213
0.6
0.4787
Iteration Number
2:
New weight value
in Iteration 1
Previous Iteration
0.5640
0.5163
0.4991
0.6299
-0.4991
0.3701
0.3032
0.5025
0.6774
0.5751
-0.17248
0.6
0.5275
0.6
0.4
0.2
0
-0.2
-0.4
-0.6
-0.8
-1
Initial
Iteratio
n1
Iteratio
n2
Error Norm
0.9027
0.6213
0.5342
Output 2
0.1983
0.3701
0.2995
Output 1
-0.8807
-0.4991
-0.4424
APPLICATION of ANN
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
Sensitivity TPF=
176
Specificity TNF=
()
()(
)[
()
FPF =1-TNF
FNF =1 -TPF
= 93.55%
+ 4
PV
87.55%
www.asdf.org.in
= 84.21%
32 + 6
84 . 21 0 . 35
84 . 21 0 . 35 + (100 93 . 55 ) [1 0 . 35 ]
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
CONCLUSION
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
177
ACKNOWLEDGEMENT
I shall say my sincere thanks to my Guide Dr. C.
Vijayalakshmi to give the Great Support and valuable
suggestion to this work.
References
[1]
[2]
[3]
[4]
[5]
[6]
[7]
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
178
Part III
Proceedings of the Second International Conference on
Computer Applications 2012
ICCA 12
Volume 2
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
179
I.
Re-configurable
operative
INTRODUCTION
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
180
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
www.asdf.org.in
181
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
www.asdf.org.in
182
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
183
Application
Service A
Service B
Service
Migration
Service A
Service D
Service
Replacement
Service B
Service D
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
184
S1
S4
S4
S2
S1
S1
S3
S2
S2
S3
S5
S3
V.
FUTURE DIRECTIONS
CREDITS
VII. REFERENCES
www.asdf.org.in
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
185
I.
INTRODUCTION
www.asdf.org.in
Akshay Rashinkar
Symbiosis Institute of
Computer Studies and Research
1. IT Company Educomp has joined hands with
Great Lakes Institute of Management to provide e-learning
education. Great Lakes Institute of Management in
partnership with Educomp will start rolling out franchisees
to conduct higher education programme and training in
tier-II cities of India.
2. Harvard Business Publishings (HBP) is
launching an e-learning tool for managers in India.
3. A Jesuit-run media center in Kolkata is promoting
e-learning in schools using audio-visual material in a bid to
make lessons more interesting.
4. At the government level, The Indira Gandhi
National Open University (IGNOU) announced the details
of the virtual university for Africa on May 25, a day after
Prime Minister Manmohan Singh promised such an
institution at a summit in Addis Ababa, Ethiopia.
Moodle: An Open-Source e-learning tool.
Moodle is an acronym for Modular Object-Oriented
Dynamic Learning Environment. Moodle was developed
from a social constructivist perspective by Martin
Dougiamas at Curtin University in Western Australia
(Dougiamas &Taylor, 2003).
Moodle is a software package for producing Internetbased courses and web sites. It is a global development
project designed to support teaching and learning
management process through elearning. Moodle is
provided freely as Open Source software (under the GNU
Public License). Moodle can be installed on any computer
that can run PHP, and can support an SQL database (for
example MySQL). It can be run on Windows, Linux and
Mac operating systems.
Disk space of 160MB free (min) is required for
installation. More free space to store your teaching
materials and other materials. Memory of 256MB (min),
1GB is recommended. Basically Moodle can support 50
concurrent users for every 1GB of RAM, but this will vary
depending on your specific hardware and software
combination.
II. MOODLE
Features:
1.
Pedagogical Considerations:
Social constructivist pedagogy emphasizes social
interaction as a basis for knowledge construction. Social
interaction creates opportunities for exchange of thoughts,
ideas and skills.
Learning environments support interaction among
learners and trainers.
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
www.asdf.org.in
186
www.icca.org.in
Proc. of the Second International Conference on Computer Applications 2012 [ICCA 2012]
V. KEY BENEFITS
1.
Institute
Saves Institute paper and toner costs.
Saves Institute answer sheet costs.
Utilizes Institute's computers and intranet.
2.
Student
Instructors
No photocopying is required of question papers.
No answer sheets are required.
Don't have to carry the test around all the time.
187
REFERENCES
[1]
http://empresas.sence.cl/documentos/elearning/Elearning.%20Art%EDculo%20de%20Joanne%20Capper%20%28In
gl%E9s%29.pdf
[2] http://thor.info.uaic.ro/~mihaela/publications/articles/MBrutIE2005.pdf
[3] http://www.ascilite.org.au/conferences/brisbane05/blogs/proceeding
s/38_Kennedy.pdf
[4] http://dougiamas.com/writing/edmedia2003/
[5] http://www.business-standard.com/india/news/educomp-great-lakesto-invest-rs-150-cr-in-e-learning/134294/on
[6] http://articles.timesofindia.indiatimes.com/2011-05-07/indiabusiness/29519768_1_e-learning-mobile-devices-indian-managers
[7] http://www.cathnewsindia.com/2011/05/06/media-center-promotese-learning/
[8] http://indiaeducationdiary.in/Shownews.asp?newsid=9097
[9] http://e-learnindia.blogspot.com/
[10] http://dots.ecml.at/
[11] http://www.learningsolutionsmag.com/articles/71/moodle-a-lowcost-solution-for-successful-e-learning
[12] http://moodle.org/mod/forum/discuss.php?d=99961
VI. LIMITATIONS
www.asdf.org.in
www.icca.org.in