Tuesday, 22 October 2013

An Efficient Fibonacci Based Content Distribution scheme for interactive VoD Streaming

Vol.2 No.2

Year: 2013

Issue: Mar-May

Title : An Efficient Fibonacci Based Content Distribution scheme for interactive VoD Streaming

Author Name : G.Kowsalya, T.Sudha , D.Jeeva , M.Parthiban

Synopsis :

One of the problems faced frequently by users in Video-on-Demand (VoD) streaming, is a long waiting time for multimedia streaming.  In Existing System, a network coding equivalent content distribution (NCECD) scheme [Yung-Cheng Kao, Chung-Nan Lee, Peng-Jung and Hui-Hsiang Kao,2012] is used to handle interactive video-on-demand (VoD) operations in peer-to-peer systems. Using  NCECD, videos are divided into equal sized segments that are then further divided into blocks. These blocks are encoded into independent blocks that are distributed to different peers for local storage. By this, a new client only needs to connect to a sufficient number of parent peers and able to view the whole video, and rarely needs to find new parents when performing random access operations.The proposed work focuses on Fibonacci Based Content Distribution (FBCD) scheme to efficiently handle interactive VoD operations in distributed systems. In FBCD, videos are divided into n number of variable size chunks. The chunk size is progressively increased to reduce delay improve performance and reduce the loading time.  Since the video data is divided into chunks and stored at peers’ local storage in a distributed manner, a peer can discover and access a neighbour quickly through the middleware. The streaming processes are handled by the middleware system. The middleware will monitor all the distribution server loads and client request. This may not allow direct communication between Client and Server and Server offline problem is also managed. The proposed scheme achieves low start-up and jump searching delays and requires fewer server resources.

Particle Swarm Optimization (PSO) Technique for Unit Commitment and Economic Dispatch Problem Solution

Vol.2 No.2

Year: 2013

Issue: Mar-May

Title : Particle Swarm Optimization (PSO) Technique for Unit Commitment and Economic Dispatch Problem Solution

Author Name : Shekhappa Ankaliki, Dr. A. D. Kulkarni , Sujata I. Katti

Synopsis :

This paper presents a new improved particle swarm optimization (PSO) algorithm based technique for solving the unit commitment and economic dispatch problem. The economic dispatch problem is solved by various traditional and non traditional techniques. The proposed algorithm is much simpler and efficient than traditional methods and is used to solve sample systems consisting up to 10 units and the results obtained are compared with Genetic Algorithm  method in terms of quality of solution and computational efficiency and the convergence performance is presented. Particle swarm optimization (PSO) is a population based stochastic optimization technique which can be applied for almost all non-linear complex optimization in power system. Many nonlinear characteristics of the generator, such as ramp rate limits, prohibited operating zone, and non-smooth cost functions are considered using the proposed method in practical generator operation. It was inspired by the social behavior of organism such as bird flocking and fish schooling and it utilizes a population based search procedure. According to the research results, birds find food by flocking. This assumption is a basic concept of PSO. In PSO each solution is a particle in search space. Each particle adjusts its flying speed according to its own flying experience and its companion’s flying experience. All the particles have fitness values, which are evaluated by the fitness function to be optimized and have velocity, which direct the flying of particles. So initialized with a group of random particles search for optima by updating generations. Improved unit commitment schedules may save the electrical utilities of  crores of rupees per year in production cost. To illustrate the proposed approach, 10-unit system is considered and results are compared with Genetic Algorithm.

Webpage Load Speed: ASP.net vs. PHP

Vol.2 No.2

Year: 2013

Issue: Mar-May

Title : Webpage Load Speed: ASP.net vs. PHP

Author Name : Timur Mirzoev, Lawton Sack

Synopsis :

As data transmission speeds over the Internet continue to increase, it is necessary to research and identify technologies that can take advantage of the increased speeds by enhancing the loading speed of web pages.  One area of consideration is found in the type of framework that is utilized for a website.  There are numerous frameworks that can be chosen from to be used to support a website, each with their distinctive advantages.  There are many differing opinions that have been proffered on which framework should be used to fully realize the optimization of page load speed.  This manuscript examines and implements testing methods for two popular frameworks, ASP.net and PHP, to make a final determination of which framework is most beneficial for webpage load speeds.

Mobile Banking using Android based Biometrics System

Vol.2 No.2

Year: 2013

Issue: Mar-May

Title : Mobile Banking using Android based Biometrics System

Author Name : Rajganesh N

Synopsis :

The objective of the proposed system is designed to perform mobile banking in a secured way. To achieve this, the concept of Biometric person recognition method is introduced through the mobile devices. Biometrics can be categorized into two categories, they are Physiological and Behavioral. Physiological is based upon the direct measurements of a part of the human body and Behavioral is based on the action performed by the user. So, I decided to use the face recognition method, which is purely based on the physiological characteristic of the human body. The Face recognition technique implementation is done with the two existing algorithms (i.e) Viola Jones and Principle Component Analysis(PCA).The Viola Jones method is mainly used to check whether the image is present in the frame or not. The PCA method is based on Eigen values and Eigen vectors and performs distance calculation based on features of the face. With this proposed idea, secured access to restricted data/services during a standard Web Session is possible with the small handheld devices. For the image capturing and forwarding process the Android mobile is used.

Biometric-Based Authentication and Key Management Scheme for WBANs

Vol.2 No.2

Year: 2013

Issue: Mar-May

Title : Biometric-Based Authentication and Key Management Scheme for WBANs

Author Name : Sufyan T. Faraj, Dr. Ali JbaeerDawood , Ekram Habeeb Hassan

Synopsis :

In recent years, the use of sensors to measure the biometrics and movements of human body has resulted in the design of wireless body area networks (WBANs). These consist of small, intelligent devices attached on or implanted in the body .The development of such networks is imperative for modern telemedicine and m-health. However, security remains a formidable challenge yet to be dealt with. WBANs have the advantage of the possibility of using random biometric measurements that use an intrinsic characteristic of the human body as the authentication identity or the means of securing the distribution of cipher keys.In this paper, the authors will begin by surveying the most recent research directions in the field. Then, a distributed key management scheme, which makes use of key refreshment schedules, will be proposed to fairly and securely distibute key management responsibility among all nodes. Our scheme supports the use of biometric measurements to generate symmetric keys in WBANs scenario.

Monday, 8 July 2013

Privacy Between Client And Service Providers

Vol.2 No.1

Year: 2013
 
Issue:
Dec-Feb

Title : Privacy Between Client And Service Providers 

Author Name : M.Ramesh Reddy, A.Ramkishore

Synopsis : A Web service is a web based application that can be easily reachable programmatically through the web. This web service is enabled by various efforts to discover, describe, advertise and invoke the web service. In this paper web services are generated for different services and that services are composed according to the user’s request. The composition of services is done dynamically to accomplish the users is preserved by using the filters. This privacy preservation is to secure the confidential information of the users from other service providers. All the web service transaction is to be done through mobile.

Open Proxy: A road block for Phishing investigations

Vol.2 No.1

Year: 2013
 
Issue:
Dec-Feb

Title: Open Proxy: A road block for Phishing investigations 
  
Author Name: Swapan Purkait

Synopsis:

When a hacker sends a phishing email or host a phishing website, investigators must locate the source of the communication, they must trace the electronic trail leading from the email or the web server back to the perpetrator. Traceability is a key to the investigation of the cyber crime such as phishing. It is impossible to prevent all internet misuse but may be possible to identify and trace the user, and take appropriate legal action. Different phishing detection mechanisms have been addressed in research papers, but with little being focused on open proxy usage rather, misusages. This paper addresses the security concern for mushrooming of open proxy servers in the globe. This work highlights how anonymity provided to the phisher by an open proxy is becoming a major roadblock for cyber crime investigating agencies in India. We conducted personal interviews with various law enforcement officers involved in Cyber crime cases mainly, Phishing and prepared a flow chart how all these cases getting stalemate because of the open proxy servers. Helpless condition of theses investigating agencies proves that easy availability of free and easy anonymous proxy servers motivates phisher to plan the attack knowing very well that they will not be traced back. In our solution framework we propose two dimensional approach combining technical solution and legal cooperation among international law enforcement agencies. Our technical solution will be able to flag all emails that are using an open proxy, also it will be able to locate any website usage or update through an open proxy.

Using Data Mining For Prediction: A Conceptual Analysis

Vol.2 No.1

Year: 2013
 
Issue:
Dec-Feb

Title : Using Data Mining For Prediction: A Conceptual Analysis
   
Author Name : Durgesh M. Sharma, Ashish K. Sharma, Sangita A. Sharma
  
Synopsis :

 In today's intensely competitive environment organizations must secure a high customer satisfaction in order to survive. This requires identifying customers and properly understanding their needs. However, targeting the customer is not that easy as the businesses have massive data and this requires properly analyzing and dealing with data. Moreover, old forecasting method appears to be no obvious advantage in try to find the individual for every item and no longer adaptable for any business condition. Data mining is powerful technique which can serve the purpose. Data mining is automated extraction of data from large databases. Data mining offers several techniques such as attribute relevance analysis, decision tree, clustering, prediction, etc for the task and thus to this end, this paper suggests the use of data mining techniques of attribute relevance analysis and decision tree for prediction.

Sap Hana And Its Performance Benefits

Vol.2 No.1

Year: 2013
 
Issue:
Dec-Feb

Title : Sap Hana And Its Performance Benefits
  
Author Name : Timur Mirzoev, Craig Brockman , Lockheed Martin
  
Synopsis :

In-memory computing has changed the landscape of database technology.  Within the database and technology field, advancements occur over the course of time that has had the capacity to transform some fundamental tenants of the technology and how it is applied.  The concept of database management systems (DBMS) was realized in industry during the 1960s, allowing users and developers to use a navigational model to access the data stored by the computers of that day as they grew in speed and capability.
This manuscript is specifically examines the SAPHigh Performance Analytics Appliance(HANA) approach, which is one of the commonly used technologies today. Additionally, this manuscript provides the analysis of the first two of the four common main usecases to utilize SAP HANA’s in-memory computing database technology. The performance benefits are important factors for DB calculations.Some of the benefits are quantified and the demonstrated by the defined sets of data. 

Principal neighborhood dictionary nonlocal means method for image enhancement and analysis

Vol.2 No.1

Year: 2013
 
Issue:
Dec-Feb

Title : Principal neighborhood dictionary nonlocal means method for image enhancement and analysis 
  
Author Name : Naga Raju C, U.RajyaLakshmi , A.S.Kavitha Bai
  
Synopsis :

In this paper a principal neighborhood dictionary nonlocal means method isproposed.As the computational power increases, data-driven descriptions of structure are becoming increasingly important in image processing. Traditionally, many models are used in applications such as denoising and segmentation have been based on the assumption of piecewise smoothness. Unfortunately, these models yields limited performance thus motivated for data driven strategies. One data-driven strategy is to use image neighborhoods for representing local structure and these are rich enough to capture the local structures of real images, but do not impose an explicit model. This representation has been used as a basis for image denoising and segmentation. But the drawback is it gives high computational cost. The motivation of our work is to reduce the computational complexity and higher the accuracy by using nonlocal means image denoising algorithm. This paper will present in-depth analysis of nonlocal means image denoising algorithm that uses principal component analysis to achieve a higher accuracy while reducing computational load. Image neighborhood vectors are projected onto a lower dimensional subspace using PCA. The dimensionality of this subspace is chosen automatically using parallel analysis. Consequently, neighborhood similarity weights for denoising are computed using distances in this subspace rather than the full space. The resulting algorithm is referred to as principal neighborhood dictionary nonlocal means. By implementing the algorithm we will investigateprincipal neighborhood dictionary nonlocal meansmethod’sandNonlocal Means method’s accuracy with respect to the image neighborhood and window sizes. Finally, we will present a quantitative and qualitative comparison of both methods.

Social media and the re-evaluation of the terms ‘community’, ‘virtual community’ and ‘virtual identity’ as concepts of analysis

Vol.1 No.4

Year: 2012
 
Issue:
Sep-Nov

Title : Social media and the re-evaluation of the terms ‘community’, ‘virtual community’ and ‘virtual identity’ as concepts of analysis 
  
Author Name : Udo Richard Averweg, Marcus Leaning
   
Synopsis :

In this article we examine the concepts of community, virtual community and virtual identity and consider if they have any continued relevancy as analytic terms in relation to social media. Firstly, we trace the origins of the term ‘community’ and contextualize its interpretation arguing that the term has political overtones. We then consider the notion of ‘virtual communities’ and suggest a working definition for this term. Thereafter we consider virtual identities. Finally, we contend that while the categories are deeply rooted in a particular understanding of communication, community and identity they do offer some very useful terms of analysis for social media.

Survey Of Existing Video Indexing Technique: An Overview

Vol.1 No.4

Year: 2012
 
Issue:
Sep-Nov

Title : Survey Of Existing Video Indexing Technique: An Overview
   
Author Name : DEVARAJ SARAVANAN, Dr.S.Srinivasan
  
Synopsis :

Data Mining is a   process of knowledge evaluation from large data sets. It is a very challenging  filed of research in the recent  past years. Extraction of knowledge is a critical issue for the researchers[1]. Many data mining tools currently fail to operate in extracting  the needed information from the collection of data set  it requires extra steps for extracting, and analyzing the data. Based on the type of extraction video is the particular media contains motion, sound, image, text and color information. Among these extracting the needed information is a challenging task. The usage of the image has been increasing day by day due to various factors. They are used not only for expressing knowledge and information but also used for the purpose of analyzing. For this purpose effective retrieval video dates are indexed. Here some of the existing indexing techniques are discussed. Based on the surveillance there may be a  need for improvement in video indexing.

 

Offline Signature Verification Using Neural Networks

Vol.1 No.4

Year: 2012
 
Issue:
Sep-Nov

Title : Offline Signature Verification Using Neural Networks
   
Author Name : Jyoti Singh, Manisha Sharma
  
Synopsis :

Signature has been a distinguishing biometric feature through ages. Signature verification finds application in a large number of fields starting from online banking, passport verification systems, online exams etc. Human signatures can be handled as an image and recognized using computer vision and neural network techniques. This paper, proposes an off-line signature verification system using neural network. The system consists of three stages: the first is preprocessing stage, second is feature extraction stage and the last is verification stage using neural network. The objective of the work is to reduce two critical parameters, False Acceptance Rate (FAR) and False Rejection Rate (FRR).

A 3.1-5GHz Low Power, High Gain and Improved Linearity Low Noise Amplifier (LNA) for Implantable Ultra Wideband Applications in CMOS Silicon-On- Sapphire (SOS) Process

Vol.1 No.4

Year: 2012
 
Issue:
Sep-Nov

Title : A 3.1-5GHz Low Power, High Gain and Improved Linearity Low Noise Amplifier (LNA) for Implantable Ultra Wideband Applications in CMOS Silicon-On- Sapphire (SOS) Process 
  
Author Name : Ayobami Iji, Xie Zhu
   
Synopsis :

High data rate implantable wireless systems come with many challenges, chief among them being low power operation and high path loss. LNAs designed for this application must include high gain, low noise figure (NF) and better linearity at low power consumption within the required frequency. In this paper, our design is based on Impulse Response (IR) Ultra Wide-Band (UWB) operating at (3.1 — 5) GHz. We report the design and measurement of an LNA with 2.4dB NF, 17.3dB of gain and input intercept point of 2dBm consuming 4mW, which make it suitable for implantable radio applications. The process technology used here is 0.25µm CMOS Silicon on Sapphire (SOS) process.


E-course: ICT Elements and Students' Thinking Dispositions

Vol.1 No.4
 
Year: 2012
 
Issue:
Sep-Nov

Title : E-course: ICT Elements and Students' Thinking Dispositions

Author Name: Dan Bouhnik, Carmi Golan

Synopsis: 
 
A students' prior technological background has an effect on his learning process and success in courses delivered in an online environment. The purpose of this paper is to examine the effect of three variables — previous computer knowledge & experience, internet skills and prior experience with online courses — on the improvement of thinking tendencies. The theoretical basis for this research relies on Perkins, Jay & Tishmans' tendency theory (1993). 285 bachelor and master students, studying in asynchronous and synchronous courses in the Fully On-line system, participated in the research. The research results show that previous personal computer knowledge & experience and internet skills affect thinking tendencies in varying positive degrees. However, no effect was found to be made by previous participation in on-line courses on thinking tendencies. The research conclusion shows that previous personal computer knowledge & experience and internet skills both contribute, separately and together, to the improvement of thinking tendencies, which form an important basis and a significant parameter for students' academic success.

Tuesday, 29 January 2013

An Approach To Enhance Level Of Security To The ATM Customers By Hiding Face Biometric Data Using Steganography

Vol.1 No.3

Year: 2012
Issue: Jun-Aug
Title: An Approach To Enhance Level Of Security To The ATM Customers By Hiding Face Biometric Data Using Steganography   
Author Name: K. Lavanya, C. Naga Raju   
Synopsis:   
Automated teller machine allows the banks customers to carry out banking transactions like, deposits, transfers, balance enquiries, and withdrawal. Criminal activities at ATM’s have become a nationwide issue. In order to certify safe and secure transactions banks has to meet certain standards. This paper focuses on preventing such activities and enhancing the level of security at ATMs. Biometric authentication technique is proven to address the problems of traditional methods which are presently used in ATMs. Face recognition has received substantial attention from researchers in biometrics. In this approach, a face recognition system for personal identification and verification can be done using Principal Component Analysis (PCA). To enhance the level of security user’s biometric data itself hidden with steganography measures. Spatial based LSB Steganography methods is used for hiding biometric data into another covered image  and then  receiver can detect the secret message.
  


 


Users Satisfaction in Library Services in Nehru Institute of Engineering and Technology (NIET) at Coimbatore: A study

Vol.1 No.3

Year: 2012
Issue: Jun-Aug
Title: Users Satisfaction in Library Services in Nehru Institute of Engineering and Technology (NIET) at Coimbatore: A study 
Author Name: C.S Chandra Mohan Kumar, J. Dominic   
Synopsis:   
The knowledge of information communication technology (ICT) facilities utilized to the e- resources at the Nehru institute of Technology. A questionnaire was prepared to elicit opinion from the (ICT) users. Response was gathered from 80 UG students form the engineering college. The availability of the right information at the right time and the right from all most importance to the users for their knowledge and development infrastructures activities. It has been in this study to know about the status of ICT infrastructure in the engineering college library in the Coimbatore region. The survey provides information about the resource users benefits of e-resources.



 


Moving Object Detection, Tracking and Classification Using Neural Networks

Vol.1 No.3

Year: 2012
Issue: Jun-Aug
Title : Moving Object Detection, Tracking and Classification Using Neural Networks   
Author Name: Hamsa A Abdullah   
Synopsis:   
Moving object detection and tracking (D&T) are important initial steps in object recognition, context analysis and indexing processes for visual surveillance systems. It is a big challenge for researchers to make a decision on which D&T algorithm is more suitable for which situation and/or environment and to determine how accurately object D&T (real-time or non-real-time) is made. There is a variety of object D&T algorithms (i.e. methods) and publications on their performance comparison and evaluation via performance metric. This paper discusses a hybrid technique for detecting and tracking moving pedestrians in a video sequence. The technique comprises two sub-systems: the first one for detecting and tracking moving objects in the visual field, and the second one for classifying the moving objects being tracked as human or cars by using MLP neural network. Experiments measuring the neural network s accuracy at classifying unseen computer generated and real moving objects are presented, along with potential applications of the technology.

.

Performance Analysis of Different MANET Specific TCP variants

Vol.1 No.3

Year: 2012
Issue: Jun-Aug
Title : Performance Analysis of Different MANET Specific TCP variants   
Author Name: Debajyoti Pal
Synopsis: 
Transmission Control Protocol (TCP) is implemented in the transport layer of a MANET, which enjoys the advantage of reliable data transmission over the Internet. However, due to certain unique characteristics of a MANET, modification of classical TCP has been done so as to improve its performance in such an environment. Accordingly, several MANET specific TCP versions like TCP Reno, TCP New Reno, TCP Tahoe and TCP Vegas have come into prominence. This paper evaluates the performance of the different TCP versions for the same network topology over certain fixed parameters like number of packets generated/node, average packet loss, average delay incurred by the packets while in transit from source to destination and the processing time taken by the intermediate nodes. For routing purpose, we have assumed Ad-Hoc On Demand Distance Vector Routing (AODV) as the standard. To address the common issues of congestion control as with TCP, the experiment has been carried out under different network loading conditions that have been achieved by slowly increasing the node density
.

A Module for Enhancing Recognition System for QR Code Scanned Image

Vol.1 No.3

Year: 2012
Issue: Jun-Aug
Title : A Module for Enhancing Recognition System for QR Code Scanned Image   
Author Name : Furat Nidhal, Mrs. Yasamine Mazin Tabra   
Synopsis :   
A QR code is a type of barcode that can hold more information than the familiar kind scanned at checkouts around the world. The “QR” stands for “quick response”, a reference to the speed at which the large amounts of information they contain can be decoded by scanners. They are being widely used for advertising campaigns, linking to company websites, contest sign-up pages and online menus. In this paper, we propose an efficient module to extract QR code from background and solve problem of rotation in case of inaccurate image taken from mobile camera.

Monday, 28 January 2013

Using Data Mining Concept Of Outlier Detection For Finding Disparity In Chhattisgarh Resource Envelop For Rural Development

Vol.1 No.2

Year: 2012
Issue: Mar-May
Title: Using Data Mining Concept Of Outlier Detection For Finding Disparity In Chhattisgarh Resource Envelop For Rural Development 
Author Name : Neeraj Dewangan, Siddharth Choubey   
Synopsis :   
ICT plays an indispensable role in the overall development of rural areas, especially in developing economies. There is an urgent need to bring the rural areas into the mainstream by providing them the research and findings which until now only the top level planners to some extent are using. The analysis of the Resource envelops of various department shows the gaps where a planner can pay attention and thus minimize the disparity of allocation. Outlier detection is a primary step in many data-mining applications. Outlier detection for data mining is often based on distance measures, clustering and spatial methods. In many data analysis tasks a large number of variables are being recorded or sampled. One of the first steps towards obtaining a coherent analysis is the detection of outlaying observations. Although outliers are often considered as an error or noise, they may carry important information. Detected outliers are candidates for aberrant data that may otherwise adversely lead to model misspecification, biased parameter estimation and incorrect results. It is therefore important to identify them prior to modeling and analysis.



 



 


Energy Efficient Scheme for Object –Tracking in Wireless Sensor Networks

Vol.1 No.2

Year: 2012
Issue: Mar-May
Title: Energy Efficient Scheme for Object –Tracking in Wireless Sensor Networks   
Author Name: S. Anandamurugan 
Synopsis: 
In recent years, we have witnessed an increasing interest in deploying wireless sensor networks (WSNs) for real-life applications. However, before WSNs become a commodity, several challenging issues remain to be resolved. Object-tracking sensor network (OTSN)-based applications are widely viewed as being among the most interesting applications of WSNs. OTSN is mainly used to track certain objects in a monitored area and to report their location to the application’s users. However, OTSNs are well known for their energy consumption when compared with other WSN applications. In this paper, we propose a prediction-based tracking technique using sequential patterns (PTSPs) de-signed to achieve signi?cant reductions in the energy dissipated by the OTSNs while maintaining acceptable missing rate levels. PTSP is tested against basic tracking techniques to determine the appropriateness of PTSP under various circumstances. Our experimental results have shown that PTSP outperforms all the other basic tracking techniques and exhibits signi?cant amounts of savings in terms of the entire network’s energy consumption.



 


An efficient technique for Iris recocognition based on ENI features

Vol.1 No.2

Year: 2012
Issue: Mar-May
Title  : An efficient technique for Iris recocognition based on ENI features   
Author Name  : K. Lavanya, K. Subba Rao , C. NagaRaju 
Synopsis  :   
Iris location estimation has been studied in numerous works in the literature. Previous research shows satisfactory result. However, in presence of non frontal faces, eye locators are not adequate to accurately locate the center of the eyes. The Iris location estimation techniques are able to deal with these conditions, hence they may be suited to enhance the accuracy.In this paper, a new method is proposed to obtain enhanced Iris location estimation. This  method  has three steps (1) enhance the accuracy of Iris location estimations (2) extend the operative range of the Iris locators with LBP and (3)  improve the accuracy of the Iris location. These enhanced estimations are used to obtain a novel visual Iris estimation system.
.