Joshi J.,Vishwakarma Institute of Information Technology |
Mundada G.,Pune Institute of Computer Technology
Proceedings of the 2010 5th International Conference on Information and Automation for Sustainability, ICIAfS 2010 | Year: 2010
In wireless mobile communication systems, the radio spectrum is limited resource. However, efficient use of such limited spectrum becomes more important when the two, three or more cells in the network become hot-spot. The use of available channels has been shown to improve the system capacity. The role of channel assignment scheme is to allocate channels to cells in such way as to minimize call-blocking probability or call dropping probability and also maximize the quality of service. In this paper attempts are made to reduce call-blocking probability by designing hybrid channel allocation (HCA) which is the combination of fixed channel allocation (FCA) and dynamic channel allocation (DCA). A cell becomes hot-spot when the bandwidth available in that cell is not enough to sustain the users demand and call will be blocked or dropped. A simulation result shows that HCA scheme significantly reduces call-blocking probability in hot-spot scenario and compared with cold-spot cell. This hot-spot notification will request more than one channel be assigned to the requesting cell, proportional to the current hot-spot level of the cell. Furthermore, all channels will be placed in a central pool and on demand will be assigned to the base station. That will be helpful to reduce call-blocking probability when cell becomes hot-spot. When a call using such a borrowed channel terminates, the cell may retain the channel depending upon its current hot-spot level therefore HCA has comparatively much smaller number of reallocations than other schemes. It also shows that it behaves similar to the FCA at high traffic and to the DCA at low traffic loads as it is designed to meet the advantages of both. © 2010 IEEE.
Hiray S.,NBN Sinhgad Technical Institute Campus |
Ingle R.,Pune Institute of Computer Technology
Proceedings - 2013 International Conference on Cloud and Ubiquitous Computing and Emerging Technologies, CUBE 2013 | Year: 2013
Cyber Physical Cloud (CPC) is a ubiquitous environment with tight integration of physical & environmental parameters in computation. It is real time heterogeneous computation. In addition to cloud hypervisor and other cloud enabled technologies there is need of middleware which will easily integrate this computational algorithms in cloud environment. Mobile sensor virtualization, 'Bigdata' analysis and QoS are important concerns for CPC. Security is most important QoS which can be achieved with proven Role based access control. Context-aware algorithms help to achieve QoS due to pervasive nature of CPC. Role Based access control is simple security mechanism used at application level. This paper describes first concept of cyber physical cloud and context- Aware middleware and then discuss Context aware Role based access Control. The novel framework with CRBAC (Context- Aware Role Based Access Control) model can be used for controllability, traceability and authorized access to system resources. Our Experimentation is to give support to our thought process and can be extended for future research. © 2013 IEEE.
Jayadevan R.,Pune Institute of Computer Technology |
Kolhe S.R.,North Maharashta University |
Patil P.M.,Vishwakarma Institute of Technology |
Pal U.,Indian Statistical Institute
IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews | Year: 2011
In India, more than 300 million people use Devanagari script for documentation. There has been a significant improvement in the research related to the recognition of printed as well as handwritten Devanagari text in the past few years. State of the art from 1970s of machine printed and handwritten Devanagari optical character recognition (OCR) is discussed in this paper. All feature-extraction techniques as well as training, classification and matching techniques useful for the recognition are discussed in various sections of the paper. An attempt is made to address the most important results reported so far and it is also tried to highlight the beneficial directions of the research till date. Moreover, the paper also contains a comprehensive bibliography of many selected papers appeared in reputed journals and conference proceedings as an aid for the researchers working in the field of Devanagari OCR. © 2011 IEEE.
Pal U.,Indian Statistical Institute |
Jayadevan R.,Pune Institute of Computer Technology |
Sharma N.,Indian Statistical Institute
ACM Transactions on Asian Language Information Processing | Year: 2012
Offline handwriting recognition in Indian regional scripts is an interesting area of research as almost 460 million people in India use regional scripts. The nine major Indian regional scripts are Bangla (for Bengali and Assamese languages), Gujarati, Kannada, Malayalam, Oriya, Gurumukhi (for Punjabi language), Tamil, Telugu, and Nastaliq (for Urdu language). A state-of-the-art survey about the techniques available in the area of offline handwriting recognition (OHR) in Indian regional scripts will be of a great aid to the researchers in the subcontinent and hence a sincere attempt is made in this article to discuss the advancements reported in this regard during the last few decades. The survey is organized into different sections. A brief introduction is given initially about automatic recognition of handwriting and official regional scripts in India. The nine regional scripts are then categorized into four subgroups based on their similarity and evolution information. The first group contains Bangla, Oriya, Gujarati and Gurumukhi scripts. The second group contains Kannada and Telugu scripts and the third group contains Tamil and Malayalam scripts. The fourth group contains only Nastaliq script (Perso-Arabic script for Urdu), which is not an Indo-Aryan script. Various feature extraction and classification techniques associated with the offline handwriting recognition of the regional scripts are discussed in this survey. As it is important to identify the script before the recognition step, a section is dedicated to handwritten script identification techniques. A benchmarking database is very important for any pattern recognition related research. The details of the datasets available in different Indian regional scripts are also mentioned in the article. A separate section is dedicated to the observations made, future scope, and existing difficulties related to handwriting recognition in Indian regional scripts. We hope that this survey will serve as a compendium not only for researchers in India, but also for policymakers and practitioners in India. It will also help to accomplish a target of bringing the researchers working on different Indian scripts together. Looking at the recent developments in OHR of Indian regional scripts, this article will provide a better platform for future research activities. © 2012 ACM.
Ambudkar B.,Padmashree Drdypatil Institute Of Engineering And Technology |
Dhande A.,Pune Institute of Computer Technology
Proceedings - 2013 International Conference on Communication Systems and Network Technologies, CSNT 2013 | Year: 2013
The increasing demand of mobile communication is moving towards seamless communication. This had led to the revolution called Next Generation Networks (NGN). In this network to have seamless communication vertical handover plays a crucial role. Handover is a process which keeps continuity of the communication inspite of the coverage area of the present network. To have continuity amongst heterogeneous networks vertical handover takes place. The vertical handover is carried out at the mobile terminal. Hence the mobile node has to have various interfaces compatible with heterogeneous networks. Vertical handover is done with considering few parameters related with Quality of Service (QoS) and Authentication. In this paper we have tried to look into the application perspective during this handovers along with the consideration of various QoS parameters. A specific vertical handover between WiFi and WiMax is simulated. © 2013 IEEE.
Shelke S.,Pune Institute of Computer Technology |
Apte S.,Pune Institute of Computer Technology
ICCSP 2011 - 2011 International Conference on Communications and Signal Processing | Year: 2011
This paper presents a novel approach for recognition of unconstrained handwritten Marathi compound characters. The recognition is carried out using multistage feature extraction and classification scheme. The initial stages of feature extraction are based upon the structural features and the classification of the characters is done according to their parameters. The final stage of feature extraction employs generation of kernels using Wavelet transform. A single level Wavelet decomposition is used to generate the approximation coefficients. These coefficients are stored as kernels for matching. A modified wavelet based kernel generation method is also implemented. The recognition is done by template matching in both the cases. The results are analyzed using both the kernel generation techniques for varying resize factors. The recognition rate achieved from the proposed method is 95.89% and 96.00% for 1616 and 3232 resize factors respectively with wavelet based kernels and 96.41% and 97.94% for 1616 and 3232 resize factors respectively with modified wavelet based kernels. © 2011 IEEE.
Shirsat N.,Pune Institute of Computer Technology |
Game P.,Pune Institute of Computer Technology
Advances in Intelligent and Soft Computing | Year: 2012
This paper deals with the various roles that can be recognized in self organized wireless devices. Wireless network which demands for a higher level of self organization, proposes strategies of creating backbone, requires identifying various roles which each participating device is playing. In this approach the efficient way to identify the roles and devices that can perform appropriate roles suitably is identified to yield a complex global emergent behavior. Various roles are identified like agents, willingness to act as a gateway, gateways etc. A minimum connection in backbone of self organized network avoids unnecessary broadcasting and in turn energy savings can be achieved. Proposed strategy assigns roles to devices by identifying inconsistency in duplicate gateways and tries to minimize unnecessary broadcast with effective connections. © 2012 Springer-Verlag GmbH Berlin Heidelberg.
Darshakar A.,Pune Institute of Computer Technology
2015 International Conference on Pervasive Computing: Advance Communication Technology and Application for Society, ICPC 2015 | Year: 2015
This paper presents a study conducted on intelligent crawlers used in search engines, competitive intelligence etc. Data mining algorithms identified by IEEE International Conference on Data Mining (ICDM) were used to aid machine learning and introduce intelligence into the crawler. A statistical analysis of performance of intelligent crawler is presented in this paper. Further in this paper the data mining algorithms are compared on basis of usability in crawlers. © 2015 IEEE.
Solapurkar P.,Pune Institute of Computer Technology
Proceedings - IEEE International Conference on Information Processing, ICIP 2015 | Year: 2015
In modern health care environments, personal health record (PHR) owners store and share their PHR data via a cloud because of its on-demand resource access, measured service and rapid elasticity. To enable secure and flexible data sharing in the cloud, efficient management of encryption keys is required. Selective data sharing requires different documents to be encrypted with different keys, which implies data users like doctors to securely store the received keys and submit an equal number of keyword trapdoors (encrypted queries) to the cloud server to perform a keyword search over authorized encrypted files. The current work focuses on reducing key-size by generating a single aggregate key, but does not provide searchable encryption, which is required for flexible data sharing. Our proposed scheme addresses this issue by enabling a patient to distribute a single constant-size aggregate key to a data user for sharing a large number of documents and then user submits a single aggregate trapdoor to the cloud for searching over authorized encrypted documents. The novelty of this scheme lies in submitting a single trapdoor for keyword search over documents encrypted with different keys as opposed to traditional methods requiring submission of multiple trapdoors. Performance evaluation confirms that our proposed scheme is practically efficient and also reduces storage overhead by reducing both the number of keys and key-size without affecting security-level, which is highly desired in the resource constraint devices like smartphones. © 2015 IEEE.
Kulkarni A.,Pune Institute of Computer Technology
Proceedings - 2013 IEEE 7th International Conference on Semantic Computing, ICSC 2013 | Year: 2013
Graphics Processing Units (GPU)s have become an integral part for high-end applications. The paper proposes a solution to leverage the GPU driver developer to identify regressions when upgrading driver features and an automatic testing infrastructure to identify compatibility problems. © 2013 IEEE.