Abstract: | In this paper, we have evolved a generic software architecture for a domain specific distributed embedded system. The system under consideration belongs to the Command, Control and Communication systems domain. The systems in such domain have very long operational lifetime. The quality attributes of these systems are equally important as the functional requirements. The main guiding principle followed in this paper for evolving the software architecture has been functional independence of the modules. The quality attributes considered most important for the system are maintainability and modifiability. Architectural styles best suited for the functionally independent modules are proposed with focus on these quality attributes. The software architecture for the system is envisioned as a collection of architecture styles of the functionally independent modules identified |
Description: | 2007 international conference on software emgineering theory and practice(SETP-07) |
URI: | http://dyuthi.cusat.ac.in/purl/4177 |
Files | Size |
---|---|
A Generic Softw ... ibuted Embedded System.pdf | (473.8Kb) |
Abstract: | Statistical Machine Translation (SMT) is one of the potential applications in the field of Natural Language Processing. The translation process in SMT is carried out by acquiring translation rules automatically from the parallel corpora. However, for many language pairs (e.g. Malayalam- English), they are available only in very limited quantities. Therefore, for these language pairs a huge portion of phrases encountered at run-time will be unknown. This paper focuses on methods for handling such out-of-vocabulary (OOV) words in Malayalam that cannot be translated to English using conventional phrase-based statistical machine translation systems. The OOV words in the source sentence are pre-processed to obtain the root word and its suffix. Different inflected forms of the OOV root are generated and a match is looked up for the word variants in the phrase translation table of the translation model. A Vocabulary filter is used to choose the best among the translations of these word variants by finding the unigram count. A match for the OOV suffix is also looked up in the phrase entries and the target translations are filtered out. Structuring of the filtered phrases is done and SMT translation model is extended by adding OOV with its new phrase translations. By the results of the manual evaluation done it is observed that amount of OOV words in the input has been reduced considerably |
URI: | http://dyuthi.cusat.ac.in/purl/4157 |
Files | Size |
---|---|
Handling OOV Wo ... nslation for Malayalam.pdf | (261.3Kb) |
Abstract: | Decimal multiplication is an integral part of financial, commercial, and internet-based computations. This paper presents a novel double digit decimal multiplication (DDDM) technique that offers low latency and high throughput. This design performs two digit multiplications simultaneously in one clock cycle. Double digit fixed point decimal multipliers for 7digit, 16 digit and 34 digit are simulated using Leonardo Spectrum from Mentor Graphics Corporation using ASIC Library. The paper also presents area and delay comparisons for these fixed point multipliers on Xilinx, Altera, Actel and Quick logic FPGAs. This multiplier design can be extended to support decimal floating point multiplication for IEEE 754- 2008 standard. |
Description: | Nature & Biologically Inspired Computing, 2009. NaBIC 2009. World Congress on |
URI: | http://dyuthi.cusat.ac.in/purl/3873 |
Files | Size |
---|---|
High Performanc ... Multiplier on ASIC and.pdf | (164.5Kb) |
Abstract: | Page 1. Dr. G Santhosh Kumar Cochin University Page 2. Who wants to be successful in life? Page 3. What can we do to become more successful? Page 4. Hare and Tortoise retold Page 5. What can we do to become more successful? Page 6. What can we do to become more successful? A good leader will lead quietly and subtly, from the rear, without fuss, without fanfare Page 7. What can we do to become more successful? Life is always moving – either we are moving forward, growing, or - we are moving back, dying Don't fear failure |
URI: | http://dyuthi.cusat.ac.in/purl/4153 |
Files | Size |
---|---|
How to become successful.pdf | (5.634Mb) |
Abstract: | The role of the supervisor• agree a timetable of meetings at the start of your project and stick to it;• make sure that each meeting has a focus eg “setting a research problem”,“analysing the data”;• send something that can form the basis of a discussion about your progress to your supervisor before each meeting. This could include your research plan, early results of your data collection or draft chapters;• turn up on time to each meeting you have arranged. Do not assume that your supervisor is available at all times to see you;• at the end of each |
URI: | http://dyuthi.cusat.ac.in/purl/4154 |
Files | Size |
---|---|
How to do a dissertation.pdf | (1.214Mb) |
Abstract: | Detection of Objects in Video is a highly demanding area of research. The Background Subtraction Algorithms can yield better results in Foreground Object Detection. This work presents a Hybrid CodeBook based Background Subtraction to extract the foreground ROI from the background. Codebooks are used to store compressed information by demanding lesser memory usage and high speedy processing. This Hybrid method which uses Block-Based and Pixel-Based Codebooks provide efficient detection results; the high speed processing capability of block based background subtraction as well as high Precision Rate of pixel based background subtraction are exploited to yield an efficient Background Subtraction System. The Block stage produces a coarse foreground area, which is then refined by the Pixel stage. The system’s performance is evaluated with different block sizes and with different block descriptors like 2D-DCT, FFT etc. The Experimental analysis based on statistical measurements yields precision, recall, similarity and F measure of the hybrid system as 88.74%, 91.09%, 81.66% and 89.90% respectively, and thus proves the efficiency of the novel system. |
Description: | Applications of Digital Information and Web Technologies (ICADIWT), 2014 Fifth International Conference on the |
URI: | http://dyuthi.cusat.ac.in/purl/4315 |
Files | Size |
---|---|
Hybrid Backgrou ... i-level CodeBook Model.pdf | (248.8Kb) |
Abstract: | Page 1. ICT Tools for Teaching & Learning G Santhosh Kumar Cochin University Page 2. Agenda • What is ICT? • Why integrate ICT in Education? • What are the Challenges? • What are the good resources? Page 3. Questions # “Despite the increasing use of ICT, the need for teachers is as great as ever” # “Placing ICT in schools will automatically improve the quality of education that children receive” #”The Internet is unsafe for children to use because there is so much dangerous material available on it” Page 4. What is ICT? • ICT is short for .. |
URI: | http://dyuthi.cusat.ac.in/purl/4168 |
Files | Size |
---|---|
ICT Tools for Teaching &.pdf | (1.077Mb) |
Abstract: | This paper presents a writer identification scheme for Malayalam documents. As the accomplishment rate of a scheme is highly dependent on the features extracted from the documents, the process of feature selection and extraction is highly relevant. The paper describes a set of novel features exclusively for Malayalam language. The features were studied in detail which resulted in a comparative study of all the features. The features are fused to form the feature vector or knowledge vector. This knowledge vector is then used in all the phases of the writer identification scheme. The scheme has been tested on a test bed of 280 writers of which 50 writers having only one page, 215 writers with at least 2 pages and 15 writers with at least 4 pages. To perform a comparative evaluation of the scheme the test is conducted using WD-LBP method also. A recognition rate of around 95% was obtained for the proposed approach |
Description: | IMACST: VOLUME 2 NUMBER 1 MAY 2011 |
URI: | http://dyuthi.cusat.ac.in/purl/4312 |
Files | Size |
---|---|
Identifying Dec ... Writings in Malayalam.pdf | (535.8Kb) |
Abstract: | Wireless sensor networks monitor their surrounding environment for the occurrence of some anticipated phenomenon. Most of the research related to sensor networks considers the static deployment of sensor nodes. Mobility of sensor node can be considered as an extra dimension of complexity, which poses interesting and challenging problems. Node mobility is a very important aspect in the design of effective routing algorithm for mobile wireless networks. In this work we intent to present the impact of different mobility models on the performance of the wireless sensor networks. Routing characteristics of various routing protocols for ad-hoc network were studied considering different mobility models. Performance metrics such as end-to-end delay, throughput and routing load were considered and their variations in the case of mobility models like Freeway, RPGM were studied. This work will be useful to figure out the characteristics of routing protocols depending on the mobility patterns of sensors |
Description: | International Conference on Sensors and Related Networks (SENNET’07), VIT University, Vellore, India. Dec. 12-14, 2007. pp.480-485. |
URI: | http://dyuthi.cusat.ac.in/purl/4176 |
Files | Size |
---|---|
Impact of Node ... reless Sensor Networks.pdf | (147.2Kb) |
Abstract: | Extending IPv6 to IEEE 802.15.4-based Low power Wireless Personal Area Networks requires efficient header compression mechanisms to adapt to their limited bandwidth, memory and energy constraints. This paper presents an experimental evaluation of an improved header compression scheme which provides better compression of IPv6 multicast addresses and UDP port numbers compared to existing mechanisms. This scheme outperforms the existing compression mechanism in terms of data throughput of the network and energy consumption of nodes. It enhances throughput by up to 8% and reduces transmission energy of nodes by about 5%. |
Description: | India Conference (INDICON), 2012 Annual IEEE |
URI: | http://dyuthi.cusat.ac.in/purl/4158 |
Files | Size |
---|---|
Implementation ... ompression for 6LoWPAN.pdf | (957.6Kb) |
Abstract: | An improved color video super-resolution technique using kernel regression and fuzzy enhancement is presented in this paper. A high resolution frame is computed from a set of low resolution video frames by kernel regression using an adaptive Gaussian kernel. A fuzzy smoothing filter is proposed to enhance the regression output. The proposed technique is a low cost software solution to resolution enhancement of color video in multimedia applications. The performance of the proposed technique is evaluated using several color videos and it is found to be better than other techniques in producing high quality high resolution color videos |
Description: | 2012 International Conference on Advances in Computing and Communications |
URI: | http://dyuthi.cusat.ac.in/purl/4161 |
Files | Size |
---|---|
An Improved Col ... n and FuzzyEnhancement.pdf | (333.1Kb) |
Abstract: | The telemetry data processing operation intended for a given mission are pre-defined by an onboard telemetry configuration, mission trajectory and overall telemetry methodology have stabilized lately for ISRO vehicles. The given problem on telemetry data processing is reduced through hierarchical problem reduction whereby the sequencing of operations evolves as the control task and operations on data as the function task. The function task Input, Output and execution criteria are captured into tables which are examined by the control task and then schedules when the function task when the criteria is being met. |
Description: | 2012 International Conference on Data Science & Engineering (ICDSE) |
URI: | http://dyuthi.cusat.ac.in/purl/4163 |
Files | Size |
---|---|
Integrated Envi ... emetry Data Management.pdf | (171.7Kb) |
Abstract: | The goal of this work is to develop an Open Agent Architecture for Multilingual information retrieval from Relational Database. The query for information retrieval can be given in plain Hindi or Malayalam; two prominent regional languages of India. The system supports distributed processing of user requests through collaborating agents. Natural language processing techniques are used for meaning extraction from the plain query and information is given back to the user in his/ her native language. The system architecture is designed in a structured way so that it can be adapted to other regional languages of India |
Description: | 3rd International CALIBER - 2005, Cochin, 2-4 February, 2005 |
URI: | http://dyuthi.cusat.ac.in/purl/4096 |
Files | Size |
---|---|
Intelligent Age ... ation Retrieval System.pdf | (583.0Kb) |
Abstract: | Biometrics has become important in security applications. In comparison with many other biometric features, iris recognition has very high recognition accuracy because it depends on iris which is located in a place that still stable throughout human life and the probability to find two identical iris's is close to zero. The identification system consists of several stages including segmentation stage which is the most serious and critical one. The current segmentation methods still have limitation in localizing the iris due to circular shape consideration of the pupil. In this research, Daugman method is done to investigate the segmentation techniques. Eyelid detection is another step that has been included in this study as a part of segmentation stage to localize the iris accurately and remove unwanted area that might be included. The obtained iris region is encoded using haar wavelets to construct the iris code, which contains the most discriminating feature in the iris pattern. Hamming distance is used for comparison of iris templates in the recognition stage. The dataset which is used for the study is UBIRIS database. A comparative study of different edge detector operator is performed. It is observed that canny operator is best suited to extract most of the edges to generate the iris code for comparison. Recognition rate of 89% and rejection rate of 95% is achieved |
Description: | Computer Science & Information Technology (CS & IT) |
URI: | http://dyuthi.cusat.ac.in/purl/3906 |
Files | Size |
---|---|
IRIS BIOMETRIC ... PLOYING CANNY OPERATOR.pdf | (667.4Kb) |
Abstract: | This paper describes JERIM-320, a new 320-bit hash function used for ensuring message integrity and details a comparison with popular hash functions of similar design. JERIM-320 and FORK -256 operate on four parallel lines of message processing while RIPEMD-320 operates on two parallel lines. Popular hash functions like MD5 and SHA-1 use serial successive iteration for designing compression functions and hence are less secure. The parallel branches help JERIM-320 to achieve higher level of security using multiple iterations and processing on the message blocks. The focus of this work is to prove the ability of JERIM 320 in ensuring the integrity of messages to a higher degree to suit the fast growing internet applications |
Description: | International Journal of Computer Science and Applications, Vol. 5, No. 4, pp 11 - 25, 2008 |
URI: | http://dyuthi.cusat.ac.in/purl/4021 |
Files | Size |
---|---|
Jerim-320 A New ... With Parallel Branches.pdf | (96.80Kb) |
Abstract: | Cooperative caching in mobile ad hoc networks aims at improving the efficiency of information access by reducing access latency and bandwidth usage. Cache replacement policy plays a vital role in improving the performance of a cache in a mobile node since it has limited memory. In this paper we propose a new key based cache replacement policy called E-LRU for cooperative caching in ad hoc networks. The proposed scheme for replacement considers the time interval between the recent references, size and consistency as key factors for replacement. Simulation study shows that the proposed replacement policy can significantly improve the cache performance in terms of cache hit ratio and query delay |
Description: | Advance Computing Conference (IACC), 2013 IEEE 3rd International |
URI: | http://dyuthi.cusat.ac.in/purl/3885 |
Files | Size |
---|---|
A key based cac ... mobile ad hoc networks.pdf | (177.3Kb) |
Abstract: | On-line handwriting recognition has been a frontier area of research for the last few decades under the purview of pattern recognition. Word processing turns to be a vexing experience even if it is with the assistance of an alphanumeric keyboard in Indian languages. A natural solution for this problem is offered through online character recognition. There is abundant literature on the handwriting recognition of western, Chinese and Japanese scripts, but there are very few related to the recognition of Indic script such as Malayalam. This paper presents an efficient Online Handwritten character Recognition System for Malayalam Characters (OHR-M) using K-NN algorithm. It would help in recognizing Malayalam text entered using pen-like devices. A novel feature extraction method, a combination of time domain features and dynamic representation of writing direction along with its curvature is used for recognizing Malayalam characters. This writer independent system gives an excellent accuracy of 98.125% with recognition time of 15-30 milliseconds |
Description: | 2010 First International Conference on Integrated Intelligent Computing |
URI: | http://dyuthi.cusat.ac.in/purl/4095 |
Files | Size |
---|---|
k-NN based On-L ... cterrecognition system.pdf | (577.8Kb) |
Abstract: | Cooperative caching is an attractive solution for reducing bandwidth demands and network latency in mobile ad hoc networks. Deploying caches in mobile nodes can reduce the overall traffic considerably. Cache hits eliminate the need to contact the data source frequently, which avoids additional network overhead. In this paper we propose a data discovery and cache management policy for cooperative caching, which reduces the caching overhead and delay by reducing the number of control messages flooded in to the network. A cache discovery process based on location of neighboring nodes is developed for this. The cache replacement policy we propose aims at increasing the cache hit ratio. The simulation results gives a promising result based on the metrics of studies |
Description: | Advanced Infocomm Technology (ICAIT), 2013 6th International Conference on |
URI: | http://dyuthi.cusat.ac.in/purl/3900 |
Files | Size |
---|---|
A Location Aide ... Mobile Ad hoc Networks.pdf | (254.6Kb) |
Abstract: | The focus of this work is to provide authentication and confidentiality of messages in a swift and cost effective manner to suit the fast growing Internet applications. A nested hash function with lower computational and storage demands is designed with a view to providing authentication as also to encrypt the message as well as the hash code using a fast stream cipher MAJE4 with a variable key size of 128-bit or 256-bit for achieving confidentiality. Both nested Hash function and MAJE4 stream cipher algorithm use primitive computational operators commonly found in microprocessors; this makes the method simple and fast to implement both in hardware and software. Since the memory requirement is less, it can be used for handheld devices for security purposes. |
Description: | Advanced Computing and Communications, 2006. ADCOM 2006. International Conference on |
URI: | http://dyuthi.cusat.ac.in/purl/3881 |
Files | Size |
---|---|
Message Integri ... d a Fast Stream Cipher.pdf | (1.288Mb) |
Abstract: | MicroRNAs are short non-coding RNAs that can regulate gene expression during various crucial cell processes such as differentiation, proliferation and apoptosis. Changes in expression profiles of miRNA play an important role in the development of many cancers, including CRC. Therefore, the identification of cancer related miRNAs and their target genes are important for cancer biology research. In this paper, we applied TSK-type recurrent neural fuzzy network (TRNFN) to infer miRNA–mRNA association network from paired miRNA, mRNA expression profiles of CRC patients. We demonstrated that the method we proposed achieved good performance in recovering known experimentally verified miRNA–mRNA associations. Moreover, our approach proved successful in identifying 17 validated cancer miRNAs which are directly involved in the CRC related pathways. Targeting such miRNAs may help not only to prevent the recurrence of disease but also to control the growth of advanced metastatic tumors. Our regulatory modules provide valuable insights into the pathogenesis of cancer |
Description: | Gene 515 (2013) 385–390 |
URI: | http://dyuthi.cusat.ac.in/purl/4097 |
Files | Size |
---|---|
MicroRNA–mRNA i ... t neural fuzzy network.pdf | (862.0Kb) |
Dyuthi Digital Repository Copyright © 2007-2011 Cochin University of Science and Technology. Items in Dyuthi are protected by copyright, with all rights reserved, unless otherwise indicated.