Abstract: | Decimal multiplication is an integral part of financial, commercial, and internet-based computations. A novel design for single digit decimal multiplication that reduces the critical path delay and area for an iterative multiplier is proposed in this research. The partial products are generated using single digit multipliers, and are accumulated based on a novel RPS algorithm. This design uses n single digit multipliers for an n × n multiplication. The latency for the multiplication of two n-digit Binary Coded Decimal (BCD) operands is (n + 1) cycles and a new multiplication can begin every n cycle. The accumulation of final partial products and the first iteration of partial product generation for next set of inputs are done simultaneously. This iterative decimal multiplier offers low latency and high throughput, and can be extended for decimal floating-point multiplication. |
Description: | Parallel and Distributed Processing with Applications, 2008. ISPA'08. International Symposium on |
URI: | http://dyuthi.cusat.ac.in/purl/3874 |
Files | Size |
---|---|
Fixed Point Dec ... on using RPS Algorithm.pdf | (424.3Kb) |
Abstract: | A methodology for translating text from English into the Dravidian language, Malayalam using statistical models is discussed in this paper. The translator utilizes a monolingual Malayalam corpus and a bilingual English/Malayalam corpus in the training phase and generates automatically the Malayalam translation of an unseen English sentence. Various techniques to improve the alignment model by incorporating the morphological inputs into the bilingual corpus are discussed. Removing the insignificant alignments from the sentence pairs by this approach has ensured better training results. Pre-processing techniques like suffix separation from the Malayalam corpus and stop word elimination from the bilingual corpus also proved to be effective in producing better alignments. Difficulties in translation process that arise due to the structural difference between the English Malayalam pair is resolved in the decoding phase by applying the order conversion rules. The handcrafted rules designed for the suffix separation process which can be used as a guideline in implementing suffix separation in Malayalam language are also presented in this paper. Experiments conducted on a sample corpus have generated reasonably good Malayalam translations and the results are verified with F measure, BLEU and WER evaluation metrics |
Description: | Procedia Technology 00 (2011) 000–000,2nd International Conference on Communication, Computing & Security |
URI: | http://dyuthi.cusat.ac.in/purl/4150 |
Files | Size |
---|---|
A framework for ... ing statistical models.pdf | (592.6Kb) |
Abstract: | In this paper we describe the methodology and the structural design of a system that translates English into Malayalam using statistical models. A monolingual Malayalam corpus and a bilingual English/Malayalam corpus are the main resource in building this Statistical Machine Translator. Training strategy adopted has been enhanced by PoS tagging which helps to get rid of the insignificant alignments. Moreover, incorporating units like suffix separator and the stop word eliminator has proven to be effective in bringing about better training results. In the decoder, order conversion rules are applied to reduce the structural difference between the language pair. The quality of statistical outcome of the decoder is further improved by applying mending rules. Experiments conducted on a sample corpus have generated reasonably good Malayalam translations and the results are verified with F measure, BLEU and WER evaluation metrics |
Description: | Proceedings of Fourth International Conference on Information Processing, Bangalore, India |
URI: | http://dyuthi.cusat.ac.in/purl/4138 |
Files | Size |
---|---|
A Framework of ... m English to Malayalam.pdf | (363.2Kb) |
Abstract: | Free/Open Source Software (FOSS) concept is very important in the academic community. The open philosophy of FOSS is consistent with academic freedom and the open dissemination of knowledge and information in academia. FOSS can lower the barriers to access of ICTs by reducing the cost of the software. This article discusses the success story of CUSAT's adoption of Free/Open Source Software |
Description: | National Conference on Free Software |
URI: | http://dyuthi.cusat.ac.in/purl/4166 |
Files | Size |
---|---|
FreeOpen Source ... CUSAT A Success Story.pdf | (202.2Kb) |
Abstract: | In this paper, we have evolved a generic software architecture for a domain specific distributed embedded system. The system under consideration belongs to the Command, Control and Communication systems domain. The systems in such domain have very long operational lifetime. The quality attributes of these systems are equally important as the functional requirements. The main guiding principle followed in this paper for evolving the software architecture has been functional independence of the modules. The quality attributes considered most important for the system are maintainability and modifiability. Architectural styles best suited for the functionally independent modules are proposed with focus on these quality attributes. The software architecture for the system is envisioned as a collection of architecture styles of the functionally independent modules identified |
Description: | 2007 international conference on software emgineering theory and practice(SETP-07) |
URI: | http://dyuthi.cusat.ac.in/purl/4177 |
Files | Size |
---|---|
A Generic Softw ... ibuted Embedded System.pdf | (473.8Kb) |
Abstract: | Statistical Machine Translation (SMT) is one of the potential applications in the field of Natural Language Processing. The translation process in SMT is carried out by acquiring translation rules automatically from the parallel corpora. However, for many language pairs (e.g. Malayalam- English), they are available only in very limited quantities. Therefore, for these language pairs a huge portion of phrases encountered at run-time will be unknown. This paper focuses on methods for handling such out-of-vocabulary (OOV) words in Malayalam that cannot be translated to English using conventional phrase-based statistical machine translation systems. The OOV words in the source sentence are pre-processed to obtain the root word and its suffix. Different inflected forms of the OOV root are generated and a match is looked up for the word variants in the phrase translation table of the translation model. A Vocabulary filter is used to choose the best among the translations of these word variants by finding the unigram count. A match for the OOV suffix is also looked up in the phrase entries and the target translations are filtered out. Structuring of the filtered phrases is done and SMT translation model is extended by adding OOV with its new phrase translations. By the results of the manual evaluation done it is observed that amount of OOV words in the input has been reduced considerably |
URI: | http://dyuthi.cusat.ac.in/purl/4157 |
Files | Size |
---|---|
Handling OOV Wo ... nslation for Malayalam.pdf | (261.3Kb) |
Abstract: | Decimal multiplication is an integral part of financial, commercial, and internet-based computations. This paper presents a novel double digit decimal multiplication (DDDM) technique that offers low latency and high throughput. This design performs two digit multiplications simultaneously in one clock cycle. Double digit fixed point decimal multipliers for 7digit, 16 digit and 34 digit are simulated using Leonardo Spectrum from Mentor Graphics Corporation using ASIC Library. The paper also presents area and delay comparisons for these fixed point multipliers on Xilinx, Altera, Actel and Quick logic FPGAs. This multiplier design can be extended to support decimal floating point multiplication for IEEE 754- 2008 standard. |
Description: | Nature & Biologically Inspired Computing, 2009. NaBIC 2009. World Congress on |
URI: | http://dyuthi.cusat.ac.in/purl/3873 |
Files | Size |
---|---|
High Performanc ... Multiplier on ASIC and.pdf | (164.5Kb) |
Abstract: | Page 1. Dr. G Santhosh Kumar Cochin University Page 2. Who wants to be successful in life? Page 3. What can we do to become more successful? Page 4. Hare and Tortoise retold Page 5. What can we do to become more successful? Page 6. What can we do to become more successful? A good leader will lead quietly and subtly, from the rear, without fuss, without fanfare Page 7. What can we do to become more successful? Life is always moving – either we are moving forward, growing, or - we are moving back, dying Don't fear failure |
URI: | http://dyuthi.cusat.ac.in/purl/4153 |
Files | Size |
---|---|
How to become successful.pdf | (5.634Mb) |
Abstract: | The role of the supervisor• agree a timetable of meetings at the start of your project and stick to it;• make sure that each meeting has a focus eg “setting a research problem”,“analysing the data”;• send something that can form the basis of a discussion about your progress to your supervisor before each meeting. This could include your research plan, early results of your data collection or draft chapters;• turn up on time to each meeting you have arranged. Do not assume that your supervisor is available at all times to see you;• at the end of each |
URI: | http://dyuthi.cusat.ac.in/purl/4154 |
Files | Size |
---|---|
How to do a dissertation.pdf | (1.214Mb) |
Abstract: | Detection of Objects in Video is a highly demanding area of research. The Background Subtraction Algorithms can yield better results in Foreground Object Detection. This work presents a Hybrid CodeBook based Background Subtraction to extract the foreground ROI from the background. Codebooks are used to store compressed information by demanding lesser memory usage and high speedy processing. This Hybrid method which uses Block-Based and Pixel-Based Codebooks provide efficient detection results; the high speed processing capability of block based background subtraction as well as high Precision Rate of pixel based background subtraction are exploited to yield an efficient Background Subtraction System. The Block stage produces a coarse foreground area, which is then refined by the Pixel stage. The system’s performance is evaluated with different block sizes and with different block descriptors like 2D-DCT, FFT etc. The Experimental analysis based on statistical measurements yields precision, recall, similarity and F measure of the hybrid system as 88.74%, 91.09%, 81.66% and 89.90% respectively, and thus proves the efficiency of the novel system. |
Description: | Applications of Digital Information and Web Technologies (ICADIWT), 2014 Fifth International Conference on the |
URI: | http://dyuthi.cusat.ac.in/purl/4315 |
Files | Size |
---|---|
Hybrid Backgrou ... i-level CodeBook Model.pdf | (248.8Kb) |
Abstract: | Page 1. ICT Tools for Teaching & Learning G Santhosh Kumar Cochin University Page 2. Agenda • What is ICT? • Why integrate ICT in Education? • What are the Challenges? • What are the good resources? Page 3. Questions # “Despite the increasing use of ICT, the need for teachers is as great as ever” # “Placing ICT in schools will automatically improve the quality of education that children receive” #”The Internet is unsafe for children to use because there is so much dangerous material available on it” Page 4. What is ICT? • ICT is short for .. |
URI: | http://dyuthi.cusat.ac.in/purl/4168 |
Files | Size |
---|---|
ICT Tools for Teaching &.pdf | (1.077Mb) |
Abstract: | This paper presents a writer identification scheme for Malayalam documents. As the accomplishment rate of a scheme is highly dependent on the features extracted from the documents, the process of feature selection and extraction is highly relevant. The paper describes a set of novel features exclusively for Malayalam language. The features were studied in detail which resulted in a comparative study of all the features. The features are fused to form the feature vector or knowledge vector. This knowledge vector is then used in all the phases of the writer identification scheme. The scheme has been tested on a test bed of 280 writers of which 50 writers having only one page, 215 writers with at least 2 pages and 15 writers with at least 4 pages. To perform a comparative evaluation of the scheme the test is conducted using WD-LBP method also. A recognition rate of around 95% was obtained for the proposed approach |
Description: | IMACST: VOLUME 2 NUMBER 1 MAY 2011 |
URI: | http://dyuthi.cusat.ac.in/purl/4312 |
Files | Size |
---|---|
Identifying Dec ... Writings in Malayalam.pdf | (535.8Kb) |
Abstract: | Wireless sensor networks monitor their surrounding environment for the occurrence of some anticipated phenomenon. Most of the research related to sensor networks considers the static deployment of sensor nodes. Mobility of sensor node can be considered as an extra dimension of complexity, which poses interesting and challenging problems. Node mobility is a very important aspect in the design of effective routing algorithm for mobile wireless networks. In this work we intent to present the impact of different mobility models on the performance of the wireless sensor networks. Routing characteristics of various routing protocols for ad-hoc network were studied considering different mobility models. Performance metrics such as end-to-end delay, throughput and routing load were considered and their variations in the case of mobility models like Freeway, RPGM were studied. This work will be useful to figure out the characteristics of routing protocols depending on the mobility patterns of sensors |
Description: | International Conference on Sensors and Related Networks (SENNET’07), VIT University, Vellore, India. Dec. 12-14, 2007. pp.480-485. |
URI: | http://dyuthi.cusat.ac.in/purl/4176 |
Files | Size |
---|---|
Impact of Node ... reless Sensor Networks.pdf | (147.2Kb) |
Abstract: | Extending IPv6 to IEEE 802.15.4-based Low power Wireless Personal Area Networks requires efficient header compression mechanisms to adapt to their limited bandwidth, memory and energy constraints. This paper presents an experimental evaluation of an improved header compression scheme which provides better compression of IPv6 multicast addresses and UDP port numbers compared to existing mechanisms. This scheme outperforms the existing compression mechanism in terms of data throughput of the network and energy consumption of nodes. It enhances throughput by up to 8% and reduces transmission energy of nodes by about 5%. |
Description: | India Conference (INDICON), 2012 Annual IEEE |
URI: | http://dyuthi.cusat.ac.in/purl/4158 |
Files | Size |
---|---|
Implementation ... ompression for 6LoWPAN.pdf | (957.6Kb) |
Abstract: | An improved color video super-resolution technique using kernel regression and fuzzy enhancement is presented in this paper. A high resolution frame is computed from a set of low resolution video frames by kernel regression using an adaptive Gaussian kernel. A fuzzy smoothing filter is proposed to enhance the regression output. The proposed technique is a low cost software solution to resolution enhancement of color video in multimedia applications. The performance of the proposed technique is evaluated using several color videos and it is found to be better than other techniques in producing high quality high resolution color videos |
Description: | 2012 International Conference on Advances in Computing and Communications |
URI: | http://dyuthi.cusat.ac.in/purl/4161 |
Files | Size |
---|---|
An Improved Col ... n and FuzzyEnhancement.pdf | (333.1Kb) |
Abstract: | The telemetry data processing operation intended for a given mission are pre-defined by an onboard telemetry configuration, mission trajectory and overall telemetry methodology have stabilized lately for ISRO vehicles. The given problem on telemetry data processing is reduced through hierarchical problem reduction whereby the sequencing of operations evolves as the control task and operations on data as the function task. The function task Input, Output and execution criteria are captured into tables which are examined by the control task and then schedules when the function task when the criteria is being met. |
Description: | 2012 International Conference on Data Science & Engineering (ICDSE) |
URI: | http://dyuthi.cusat.ac.in/purl/4163 |
Files | Size |
---|---|
Integrated Envi ... emetry Data Management.pdf | (171.7Kb) |
Abstract: | The goal of this work is to develop an Open Agent Architecture for Multilingual information retrieval from Relational Database. The query for information retrieval can be given in plain Hindi or Malayalam; two prominent regional languages of India. The system supports distributed processing of user requests through collaborating agents. Natural language processing techniques are used for meaning extraction from the plain query and information is given back to the user in his/ her native language. The system architecture is designed in a structured way so that it can be adapted to other regional languages of India |
Description: | 3rd International CALIBER - 2005, Cochin, 2-4 February, 2005 |
URI: | http://dyuthi.cusat.ac.in/purl/4096 |
Files | Size |
---|---|
Intelligent Age ... ation Retrieval System.pdf | (583.0Kb) |
Abstract: | Biometrics has become important in security applications. In comparison with many other biometric features, iris recognition has very high recognition accuracy because it depends on iris which is located in a place that still stable throughout human life and the probability to find two identical iris's is close to zero. The identification system consists of several stages including segmentation stage which is the most serious and critical one. The current segmentation methods still have limitation in localizing the iris due to circular shape consideration of the pupil. In this research, Daugman method is done to investigate the segmentation techniques. Eyelid detection is another step that has been included in this study as a part of segmentation stage to localize the iris accurately and remove unwanted area that might be included. The obtained iris region is encoded using haar wavelets to construct the iris code, which contains the most discriminating feature in the iris pattern. Hamming distance is used for comparison of iris templates in the recognition stage. The dataset which is used for the study is UBIRIS database. A comparative study of different edge detector operator is performed. It is observed that canny operator is best suited to extract most of the edges to generate the iris code for comparison. Recognition rate of 89% and rejection rate of 95% is achieved |
Description: | Computer Science & Information Technology (CS & IT) |
URI: | http://dyuthi.cusat.ac.in/purl/3906 |
Files | Size |
---|---|
IRIS BIOMETRIC ... PLOYING CANNY OPERATOR.pdf | (667.4Kb) |
Abstract: | This paper describes JERIM-320, a new 320-bit hash function used for ensuring message integrity and details a comparison with popular hash functions of similar design. JERIM-320 and FORK -256 operate on four parallel lines of message processing while RIPEMD-320 operates on two parallel lines. Popular hash functions like MD5 and SHA-1 use serial successive iteration for designing compression functions and hence are less secure. The parallel branches help JERIM-320 to achieve higher level of security using multiple iterations and processing on the message blocks. The focus of this work is to prove the ability of JERIM 320 in ensuring the integrity of messages to a higher degree to suit the fast growing internet applications |
Description: | International Journal of Computer Science and Applications, Vol. 5, No. 4, pp 11 - 25, 2008 |
URI: | http://dyuthi.cusat.ac.in/purl/4021 |
Files | Size |
---|---|
Jerim-320 A New ... With Parallel Branches.pdf | (96.80Kb) |
Abstract: | Cooperative caching in mobile ad hoc networks aims at improving the efficiency of information access by reducing access latency and bandwidth usage. Cache replacement policy plays a vital role in improving the performance of a cache in a mobile node since it has limited memory. In this paper we propose a new key based cache replacement policy called E-LRU for cooperative caching in ad hoc networks. The proposed scheme for replacement considers the time interval between the recent references, size and consistency as key factors for replacement. Simulation study shows that the proposed replacement policy can significantly improve the cache performance in terms of cache hit ratio and query delay |
Description: | Advance Computing Conference (IACC), 2013 IEEE 3rd International |
URI: | http://dyuthi.cusat.ac.in/purl/3885 |
Files | Size |
---|---|
A key based cac ... mobile ad hoc networks.pdf | (177.3Kb) |
Dyuthi Digital Repository Copyright © 2007-2011 Cochin University of Science and Technology. Items in Dyuthi are protected by copyright, with all rights reserved, unless otherwise indicated.