Time filter

Source Type

Shukla M.,RK University | Kosta Y.P.,Marwadi Education Foundation
Proceedings of the International Conference on Inventive Computation Technologies, ICICT 2016 | Year: 2017

Data mining has gained much importance in the field of research these days. It makes perfect blend for analyzing data of any fields and provide decision based output. Data generation and storage these days are done at high speed. Non stationary systems play holistic role in providing such data. Availability of such data creates scope of analysis for researchers. Such data which are continuous, unbounded, fast are termed as stream data. Clustering is the best method for analysis of stream data. As labeling of data is not possible for streams so clustering may assist this process. Also framing clusters digs out the points which do not seem to be part of cluster thus assisting outlier detection also. Different kinds of clustering algorithm exists but density based method helps in detecting clusters of arbitrary shape which other algorithm does not do. We have discussed an approach and presented its result in comparison of existing algorithm in this paper.


Popat J.,Marwadi Education Foundation | Mehta U.,Nirma University
2016 IEEE Annual India Conference, INDICON 2016 | Year: 2016

Traditionally, Hardware is considered as root of trust. Software generally builds on top of the hardware. By emerging Hardware Trojan attacks, this trust seems to be violated. Hardware Trojan is any addition or modification to a circuit or a system with malicious intention. Trojan can cause change or control over functionality in circuit or it may leak sensitive information from inside the chip and hence reduce circuit reliability. In this paper, we analyze threats caused by hardware Trojan attacks and type of hardware Trojans. We have discussed state-of-art hardware Trojan protection schemes. The limitations and challenges related to those trojan detection schemes are described. We also propose simple but effective probabilistic method to detect and find the location of hardware trojan in combinational circuits. The experimental results for a series of ISCAS85 benchmark circuits show that better trojan detection rate or coverage can be achieved with proposed technique. © 2016 IEEE.


Vekariya V.,Marwadi Education Foundation
2012 2nd International Conference on Digital Information and Communication Technology and its Applications, DICTAP 2012 | Year: 2012

Recommender systems represent user preferences for the purpose of suggesting items to purchase or examine. They have become fundamental applications in electronic commerce and information access, providing suggestions that effectively prune large information spaces so that users are directed toward those items that best meet their needs and preferences. A variety of techniques have been proposed for performing recommendation, including content-based, collaborative, knowledge-based and other techniques. To improve performance, these methods have sometimes been combined in hybrid recommenders. This paper surveys the landscape of actual and possible hybrid recommenders, and introduces a novel hybrid, system that combines content-based recommendation and collaborative filtering to recommend restaurants. © 2012 IEEE.


Bhatt N.,Veer Narmad South Gujarat University | Kosta Y.,Marwadi Education Foundation
International Journal of Speech Technology | Year: 2012

Today, the primary constrain in wireless communication system is limited bandwidth and power. Wireless systems involved in transmission of speech envisage that efficient and effective methods need to be developed for maintaining quality-of-speech, especially at the receiving end, with maximum saving of bandwidth and power. Amongst all elements of the communication system (transmitter, channel and receiver), transmission channel (carrier of information/data, also called the medium) is the most critical and plays a key role in the transmission and reception of information/data. Channel conditions decide the quality of speech at receiver. Modeling a channel is a complex task. Many techniques are adopted to mitigate the effect of the channel. AMR (Adaptive Multi Rate) is one such technique that counteracts the deleterious effect of the channel on speech. This technique employs variable bit rate that dynamically switches to specific modes of operation (switching bit rates-called modes of operation) depending upon the channel conditions. In this paper, the application of Code Excited Linear Prediction (CELP) source coder on speech followed by AMR codec is investigated and studied. An e-test bench using MATLAB is created to implement the CELP based AMR Codec scheme, and the same studied and investigated through a series of simulation. Here, both subjective and objective evaluations are carried out. Objective evaluations are categorized into waveform based, spectral based and perceptual based analysis. The results of the simulations are recorded and compared in various graphs and tables, which include calculation of various parameters like Absolute Error (ABS), Mean Square Error (MSE), Root Mean Square Error (RMSE), Signal to Noise Ratio (SNR), segmental SNR (segSNR) (Y. Hu and P. Loizou in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process., vol. 1, pp. 153-156, 2006a; Proc. Interspeech, pp. 1447-1450, 2006b), Weighted-Slope Spectral distance (WSS) (Y. Hu and P. Loizou in Speech Commun. 49, 588-601, 2007), Perceptual Evaluation of Speech Quality (PESQ) (ITU-T rec. P.862, 2000), Log-Likelihood Ratio (LLR), Itakura- Saito Distance measure (ISD), Cepstrum Distance Measures (CEP) (V. Turbin and N. Faucheur in Proc. OnlineWorkshop Meas. Speech Audio Quality Netw., pp. 81-84, 2005), Frequency Weighted Segmental SNR (fwSNRseg), Predicted rating of overall Quality (Covl), Rating of Speech Distortion (Csig), Rating of Background Distortion (Cbak) (ITU-T rec. P.835, 2003) and MeanOpinion Score (MOS). Simulation results clearly advocate that, it is possible to producevariable bitrates (tuning to channel conditions) in CELP coder by affecting coefficients of the coder while still maintaining a good quality of speech. Further, higher the bit-rate used, the better is the quality of speech (which can be verified from the results obtained with PESQ and MOS analysis) and at the same time offered simulation delay time also increases. © Springer Science+Business Media, LLC 2011.


Jadeja N.,Marwadi Education Foundation | Parmar V.,Marwadi Education Foundation
Procedia Computer Science | Year: 2016

Advances in computing technology is acquainting numerous colossal changes with individuals' way of life and working example as of late for its countless advantages. In any case, the security of cloud computing and server level technologies is dependably the center of various potential clients, and a major obstruction for its far-reaching applications. This paper introduces a novel approach of testing various tools that can be used to measure the potential helplessness of a digital system to particular sorts of assaults that uses lateral movement and privileged heightening, such as Pass The Hash. Earlier papers have only done the comparison at limited resources and have failed to show accurate result. While other papers and assets concentrate fundamentally on running the tools and in some cases contrasting them, this paper offers a top to bottom, orderly examination of the apparatuses over the different Windows stages, including AV discovery rates. It additionally gives broad counsel to moderate pass the hash assaults and talks about the upsides and downsides of a portion of the methodologies. © 2016 The Authors.


Savsani P.,PAHER University | Jhala R.L.,Marwadi Education Foundation | Savsani V.J.,Pandit Deendayal Petroleum University
SysCon 2013 - 7th Annual IEEE International Systems Conference, Proceedings | Year: 2013

In this paper, Teaching Learning Based Optimization (TLBO) algorithm, a recently developed advanced optimization technique, and Artificial Bee Colony (ABC) optimization techniques are applied to optimize the robot trajectory for a 3R robotic arm. The considered problem presents the multi-objective optimization with the objective to plan a trajectory which can minimize joint travelling time, joint travelling distance and total joint Cartesian lengths simultaneously. Six different design variables are considered for the joint angles, joint velocities and time from initial to intermediate and from intermediate to final positions. Results of TLBO and ABC are compared with the published results of Genetic Algorithm (GA). Comparison shows the better performance of TLBO and ABC over GA for the considered trajectory optimization problem. Moreover, experimentation is considered for different movement of robotic arm in the workspace by using TLBO and ABC. The result shows the better performance of TLBO over ABC in terms of best solutions, mean solutions, worst solutions and convergence. © 2013 IEEE.


Bhagat D.,Government Engineering College | Bhatt N.,Veer Narmad South Gujarat University | Kosta Y.,Marwadi Education Foundation
Proceedings - International Conference on Communication Systems and Network Technologies, CSNT 2012 | Year: 2012

This paper investigates application of Code Excited Linear Prediction algorithm on Adaptive Multi Rate Wideband coder. The proposed coder can adaptively change its bit-rate based on C/I ratio depending on channel conditions. The coder has nine bit-rates from 6.6 kbps to 23.85 kbps. An e-test bench using MATLAB is created to implement proposed coder and series of simulations are carried out to judge the performance of implemented coder using Subjective and Objective analysis. Simulation results clearly advocate that it is possible to produce variable bit rate (by tuning to channel conditions) in CELP coder by affecting coefficients of coder while still maintaining comparable speech quality with reference to AMR WB coder standardized by 3GPP and ITU-T [5]. It is also evident from the simulation results that Signal to Noise Ratio (SNR), Segmented SNR, Perceptual Evaluation of Speech Quality (PESQ) and Mean Opinion Score (MOS) increases with increase in bit rates of proposed coder and Absolute Error (Abs Err), Mean Square Error (MSE), Root Mean Square Error (RMSE) reduces with increase in bitrates. © 2012 IEEE.


Gajjar P.,Government Engineering College | Bhatt N.,Veer Narmad South Gujarat University | Kosta Y.,Marwadi Education Foundation
Proceedings - International Conference on Communication Systems and Network Technologies, CSNT 2012 | Year: 2012

In the recent scenario of wired and wireless communication systems, amongst many reasons for the overall degradation of recovered speech quality at receiver, one of the major reasons to be considered is utilization of Narrow Band (NB) end devices and NB transmission medium supporting bandwidth of 300 Hz-3400Hz. The inherent drawback of such NB speech signal is it sounds muffled and thin because of absence of High Band (HB) spectral components. With state of the art development of communication technologies and with increased availability of end terminals capable of transmitting and receiving Wide Band (WB) signals (having bandwidth from 50 Hz to 7000 Hz), end users prefer to listen to WB speech. In order to offer a fully WB communication over wired and wireless media, both end devices and network need to be made WB compatible. A long transition period has been elapsed for upgrading existing NB systems (both end terminals and network) to fully WB compatible systems. In-between new methods have been developed to artificially extend the bandwidth of NB telephonic speech at receiver for improving the quality of recovered speech. A major task of Artificial Bandwidth Extension (ABE) is to reconstruct missing WB spectral components at receiver with the use of available NB speech. This paper discusses motivation for developing ABE algorithm along with exhaustive comparative studies of implementing it with various approaches. Issues and limitations related to real time implementation of ABE algorithm are also addressed. Alternative approaches like usage of ABE with side information transmission along with coded NB speech are also demonstrated. Main objective of ABE with side information is to extract WB spectral components from WB input speech and to embed these derived spectral components into coded NB speech signal and finally transmit them onto a NB channel. Reverse procedure can be carried out at receiver to artificially produce WB speech. Here, it is to be noted that transmission channel is NB whereas end terminals are made WB compatible so this method provides alternative solution to coexisting state of the art WB coders (which require WB channels) while offering comparable speech quality and giving natural sounding in terms of intelligibility and naturalness. © 2012 IEEE.


Bhatt N.,Veer Narmad South Gujarat University | Kosta Y.,Marwadi Education Foundation
International Journal of Speech Technology | Year: 2011

Today, the primary constrain in wireless communication system is limited bandwidth and power. Wireless systems involved in transmission of speech envisage that efficient and effective methods be developed (bandwidth usage & power) to transmit and receive the same while maintaining quality-of-speech, especially at the receiving end. Speech coding is a technique, since the era of digitization (digital) and computerization (computational and processing horsepower-DSP) that has been a material-of-research for quite some time amongst the scientific and academic community. Amongst all elements of the communication system (transmitter, channel and receiver), transmission channel (carrier of information/data, also called the medium) is the most critical and plays a key role in the transmission and reception of information/data. This paper proposes some modifications in the selection process of grid positions in Regular Pulse Excitation section of 13 kbps ETSI GSM 06.10 Full Rate Speech coder so that there is an overall 1.8 kbps (36 bits / each 20 ms frame) reduction in bit-rate which can be utilized for either improving error detection and correction at channel coding or for hidden data embedding and transmission over wireless link. Both Standard GSM FR and proposed GSM FR are implemented in MATLAB. Here, Subjective and Objective analysis are carried out on a proposed system to evaluate its performance and the results obtained are then compared with the results of GSM 06.10 Full Rate coder using set of tables and graphs. As can be observed from obtained results that both PESQ and MOS scores are quite comparable for each wave files and marginal degradation of both can be witnessed with respect to decrease in codec bitrates. © 2011 Springer Science+Business Media, LLC.


Doshi K.J.,Marwadi Education Foundation
Proceedings of 2013 Science and Information Conference, SAI 2013 | Year: 2013

In Switched-capacitor (SC) filter circuits the accuracy of capacitance ratio is of prime importance. A slight variation in the capacitance ratios can affect the performance of filter greatly. The values of fabricated components depend on many fabrication processes. This tool calculates the dimensions of capacitor such that the ratio of capacitance remains nearly same even though there are fabrication errors in capacitances. The results are verified by the post layout SPICE simulations. © 2013 The Science and Information Organization.

Loading Marwadi Education Foundation collaborators
Loading Marwadi Education Foundation collaborators