IOSR Journal of Computer Engineering (IOSR-JCE)

Jan - Feb 2014Volume 16 ~ Issue 1

Version 1 Version 2 Version 3 Version 4 Version 5 6 7 8 9

Paper Type : Research Paper
Title : Data Gathering Mechanisms with Multiple Mobile Collectors in Wireless Sensor Network
Country : India
Authors : Ramarajan C, Ajitha P
: 10.9790/0661-16190105    logo

Abstract: Energy consumption becomes a primary concern in a Wireless Sensor Network. It have emerged as an effective solution for a wide range of applications. Introduced a new data-gathering mechanism for large-scale wireless sensor network by introducing mobility into the network. An M-Collector(mobile data collector) starts the data-gathering tour periodically from the static data sink, polls each sensor while traversing its transmission range. It directly collects data from the sensor in single-hop communications, and finally transports the data to the static sink. We propose a data-gathering algorithm where multiple mobile collectors traverse through several shorter sub tours concurrently to satisfy the distance/time constraints. To pursue high energy saving at sensor nodes, a mobile collector should traverse the transmission range of each sensor in the field such that each data packet can be directly transmitted to the mobile collector without any relay. Also it minimize the delay caused by the Mobile Collector to connect with the base station.

Keywords: Wireless Sensor Network, Data Transmission, Mobile Collector

[1]. Ossaiiia Younis and Sonia Fahmy,"Distributed Clustering in Ad-hoc Sensor networks: A Hybrid, Energy-Efficient Approach", 2004.
[2]. HuiTian, Hong Shen and Matthew Roughan ,"Maximizing Networking Lifetime in Wireless Sensor Networks with Regular Topologies", 2008.
[3]. R. Shah, S. Roy, S. Jain, and W. Brunette ,"Modeling a Three-Tier Architecture for Sparse Sensor Networks" ,Sept. 2003.
[4]. C.Xiaorui Wang, Yuanfang Zhang, Chenyang Lu, Robert Pless, and Christopher Gill, "Integrated Coverage and Connectivity Configuration for Energy Conservation in Sensor Networks", 2005.
[5]. Maxim A. Batalin, Mohammad Rahimi1, Yan Yu ,"Call and Response: Experiments in Sampling the Environment",2004.
[6]. Z. Zhang, M. Ma, and Y. Yang, "Energy efficient multi-hop polling in cluster of two –layered heterogeneous sensor networks," IEEE Trans. Comput., vol. 57,no. 2, pp. 1-9.

Paper Type : Research Paper
Title : Comparison and Enhancement of Digital Image by Using Canny Filter and Sobel Filter
Country : India
Authors : Rupika Rana, Ashish Verma
: 10.9790/0661-16190610    logo

Abstract: In this research paper we have defining two different edge detection methods i.e canny edge detection and Sobel edge detection and we are also discussing some image quality parameters like PSNR, SNR, MSE, RMSE, UQI and MAE. Edge detection is a technique that is used to identifying points in a digital image at which the image brightness changes sharply or, more formally, has discontinuities. The points at which image brightness changes sharply are typically organized into a set of curved line segments termed edges. Results shows that our strategy on the nature of comparison between canny and sobel edge detection methods by using image quality parameters on Medical images [ MRI and CT Scan] and to further finding a better and more accurate edge detection method .The values of these methods are interpreted and illustrated in results section .

Keywords: Canny, Sobel, Edge Detection, Medical Images, Quality Measurement, MRI, CT scan.

[1] Rafael C. Gonzalez, Richard Eugene Woods, "Digital image processing".
[2] Muthukrishnan.R and M.Radha of Edge Detection Techniques for image Segmentation, International Journal of Computer Science & Information Technology (IJCSIT), Dec 2011.
[3] A Study on Image Edge Detection Using the Gradients, International Journal of Scientific and Research Publications, December 2012.
[4] A Brief, Early History of Computer Graphics in Film (Larry Yeager, 16 August 2002 (last update), retrieved 24 March 2010).
[5] Edge Xiangjian, Jianmin Li, Darning wer', Wenjing Jia 2 and Qiang Wu2, Canny Detection on a Virtual Hexagonal Image Structure.

Paper Type : Research Paper
Title : Effect of Gamma Irradiation on the Structural and Optical Properties of ZnO Thin Films
Country : Iraq
Authors : Najiba A. Al- Hamdani Ramla D. Al-Alawy Saba J. Hassan
: 10.9790/0661-16191116    logo

Abstract: Zinc oxide (ZnO) thin films were prepared by DC- magnetron sputtering technique on glass at 500 0C substrates temperature. The effect of γ-irradiation on the structure and optical properties of the films was investigated. The crystal structure and orientation of the films were studded by XRD pattern. The deposited film is polycrystalline and the dependence of preferred orientation, peak intensities and grain size on the gamma (γ)-irradiation are investigated. The absorption and transmission spectra recorded in the UV/VIS/NIR region for the as deposited and irradiated films The absorption coefficient, optical energy gap, Urbach energy, optical constants (refractive index, extinction coefficient, dielectric constant) and dispersion parameters, such as single-oscillator energy, dispersive energy were determined of irradiated and un- irradiated samples and analyzed.

Keywords: Zinc oxide (ZnO), thin film, γ- irradiation, optical properties, Structural properties, DC- magnetron sputtering.

[1] Y. Jin, J. Wang, B. Sun, J.C. Blakesley and N. C. Greenham, "Nano Lett.", 8 (2008) 1649.
[2] Y. J. Lee, D.S. Ruby, D. W. Peters, B. B. Mckenzie and J. W. P. Hsu," Nano Lett.", 8 (2008) 1501.
[3] J. J. Schneider, R. C. Hoffmann, J. Engstler, O. Soffke, W. Jaegermann, A. Issanin and A. Klyszcz, "Advan. Mater.", 20 (2008) 3383.
[4] A. M. Ibrahim and L. I. Soliman," Rad. Phys. & Chem.", 53 (1998) 469
[5] E. Atanassova, A. Pasksleva, R. Konakova, D. Spassov and V. F. Mitin ,"Microelectronics J.", 32 (2001)553
[6]

Paper Type : Research Paper
Title : A Quantitative Measurement Methodology for calculating Risk related to Information Security.
Country : India
Authors : Abhishek kumar srivastav, Irman Ali, Shani Fatema
: 10.9790/0661-16191720    logo

Abstract: Nowadays, technology increases, so the risk related to technology is also increasing. Risk is the possibility of suffering loss. Therefore, we have to adopt some risk management methodology to reduce the number of risks. There are many risks are present in the organization. So it is the primary concern in risk management which risk we have to deal with because reducing every risk is not possible in any way. There is some risk that is always present, which is known as residual risk. Risk Assessment is the part of risk management. In this paper, we are focusing on quantitative approaches for risk assessment related to information security.

Keyword: Risk, information security, risk assessment, quantitative approach.

[1]. http://blog.simplilearn.com/it-security-management/qualitative-risk-analysis, date accessed Jan 26. [2]. http://www.coursehero.com/flashcards/431914/CISSP-Glossary/ data accessed Jan 26.
Paper Type : Research Paper
Title : Security Measures in Aodv for Ad Hoc Network
Country : India
Authors : Nidhi Gour, Monika Agarwal, Heena Singh, Ajay Kumar
: 10.9790/0661-16192133    logo
Abstract: Mobile ad hoc network (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. In either case, the proliferation of MANET-based applications depends on a multitude of factors, with trustworthiness being one of the primary challenges to be met. Despite the existence of well-known security mechanisms, additional vulnerabilities and features pertinent to this new networking paradigm might render such traditional solutions inapplicable. In particular, the absence of a central authorization facility in an open and distributed communication environment is a major challenge, especially due to the need for cooperative network operation. In this paper
[1] Tahira Farid_ and Anitha Prahladachar Secure Routing with AODV Protocol for Mobile Ad Hoc Networks University of Windsor.
[2] Preeti Bathla, Bhawna Gupta "Security Enhancements in AODV Routing Protocol" International Journal of Computer Sci ence and Technology Vol. 2,page no 295-298,june 2011
[3] Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay Shields, Elizabeth M. Belding-Royer "A Secure Routing Protocol for Ad Hoc Networks" http:/www.aran.icnp02.pdf
[4] Yih-Chun Hu, Adrian Perrig, David B. Johnson "A Secure On-Demand Routing Protocol for Ad Hoc Networks" Springer,11,page no 21-38,2005
[5] Rajendra Prasad Mahapatra "Taxonomy of Routing Security for Ad-Hoc Network" International Journal of Computer Theory and Engineering, Vol. 2, No. 2 April, 2010

Paper Type : Research Paper
Title : Empirical Evaluation of machine learning techniques for software effort estimation
Country : India
Authors : NehaSaini ,Bushra Khalid
: 10.9790/0661-16193438    logo

Abstract: Accurate estimation of software development effort is a very difficult job.Both under estimation as well as over estimation can lead to serious consequences. So its very important to find a technique which can yield accurate results for software effort estimation. Here in our paper we have evaluated various machine learning techniques for software effort estimation like bagging, decision trees, decision tables, multilayer perceptron and RBF networks. Two different datasets i.e. heiatheiat dataset and miyazaki94 dataset have been used in our research. Decision trees outperform all other models in term of MMRE value. Results of machine learning algorithms can be different from dataset to dataset.

Keywords: bagging, decision trees, decision table ,effort estimation, , multilayer perceptron, Radial basis function.

[1] A. Albert and J.E. Gaffney, "Software Function Source Lines of Code and Development Effort Prediction: A Software Science Validation", IEEE Trans. Software Engineering, vol. 9, pp. 639-648, 1983.
[2] A.L.I. Oliveira,"Estimation of software effort with support vector regression Neurocomputing", vol. 69, pp. 1749-1753, Aug. 2006.
[3] C.J. Burgess and M.Lefley, "Can genetic programming improve software effort estimation? A comparative evaluation, Information and Software Technology", vol. 43, pp. 863-873, 2001.
[4] G.R. Finnie and G.E. Wittig, "A Comparison of Software Effort Estimation Techniques: Using Function Points with Neural Networks, Case-Based Reasoning and Regression Models",Journal of Systems and Software, vol. 39, pp. 281-289, 1997.
[5] G.R. Finnie and G.E. Wittig, "AI Tools for Software Development Effort Estimation", in Proc. SEEP '96 , 1996, International Conference on Software Engineering: Education and Practice (SE:EP '96).
[6] M.O. Elish,"Improved estimation of software project effort using multiple additive regression trees",Expert Systems with Applications, vol. 36, pp. 10774-10778, 2009.

Paper Type : Research Paper
Title : Effective utilisation of ICT the key to Business success: Case Study of SMEs in Zimbabwe
Country : Zimbabwe
Authors : Caroline Ruvinga, Munyaradzi Zhou
: 10.9790/0661-1619455    logo

Abstract: The focus of this paper is to analyse the utilisation of information communication technology (ICT) among small and medium enterprises (SMEs) in Zimbabwe, as one of the major factors contributing to their limited growth. The data was collected using interviews, questionnaires and observations. The findings revealed that most SMEs have and are still increasingly acquiring state of the art information communication technologies but are not fully utilising the technology which has a negative impact on profit margins, market share and overall business effectiveness. The research paper recommends intensive training programs and workshops for SME owners on effective utilisation of ICT for them to experience business growth and success. The findings avail valuable information to both the Zimbabwean SME community and the entire business community in the country in terms of development of economy and creation of employment opportunities.

Keywords: acquisition, information communication technology, small and medium enterprises, utilization

[1] L. X. Cunningham, SMEs as motor of growth: A review of China's SMEs development in thirty years (1978–2008), Human Systems Management. 30(1/2), 2011, 39-54.
[2] M. Ayyagari, T. Beck and A.D. Kunt, Small and medium enterprises across the globe: A new database, 3127, 2003. World Bank Publications.
[3] I. Elmazi, H. Vukaj, E, Gega and L. Elmazi, Information technology and its effects in SME. The case of Albania. International Journal of Management Cases, 13, 2011. 291-298.
[4] C. Kowalkowski, D. Kindström and H. Gebauer, ICT as a catalyst for service business orientation. Journal of Business & Industrial Marketing, 28, 2013, 506-513.
[5] A. Bharadwaj, O.A.E. Sawy, P.A. Pavlou and N. Venkatraman , Digital business strategy: Toward a next generation of insights, MIS Quarterly, 37, 2013, 471-482.

Paper Type : Research Paper
Title : Probabilistic Model for Single and Multi-Sensing Intrusion Detection in Wireless Sensor Networks
Country : India
Authors : Shaila K, Sajitha M, Tejaswi V, S H Manjula, Venugopal K R, L M Patnaik
: 10.9790/0661-16195166    logo

Abstract: Wireless Sensor Networks consists of tiny devices capable of processing, routing the sensed data and are capable of detecting the intruders. The process of detecting any suspected(anomalous) moving object(attacker) within the reach of a Wireless Sensor Network area is referred to as intrusion detection. In this paper, we propose an algorithm to detect the intruder by the cluster heads in a 2D and 3D homogeneous Wireless Sensor Networks. This algorithm overcomes the attacks on implementation and also, reduces the energy consumption.n

[1] Ian F Akyildiz, Weilian Su, YogeshSankarasubramaniam and ErdalCayirci, A Survey on Sensor Networks, in IEEE Communications Magazine, 40(8), August 2002, 102-114.
[2] Perrig A, Robert S, J D Tygar, Victor W and David C, SPINS: Security Protocols for Sensor Networks, in Journal on Wireless Networks, 8(5), September 2002, 521-534.
[3] S Zhu, S Setia and S Jajodia, LEAP: Efficient Security Mechanisms for Large-scale Distributed Sensor Networks, in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), October 2003, 62-72.
[4] Yang Xia Luo and Ye Guo, A Survey on Intrusion Detection of Wireless Sensor Network, in Proceedings of the Second International Conference on Information Science and Engineering(ICISE), 2010, 1798-1802.
[5] William Stallings, Cryptography and Network Security, in 3rd Edition, (Singapore: Prentice Hall, Pearson Education, 2004).
[6] SutharshanRajasegarar, Christopher Leckie and MarimuthuPalaniswami, Anomaly Detection in Wireless Sensor Networks, in IEEE Wireless Communications, 2008, 34-40.

Paper Type : Research Paper
Title : Client-Server Model
Country : Malaysia
Authors : Haroon Shakirat Oluwatosin
: 10.9790/0661-16195771    logo

Abstract: Client- server is a system that performs both the functions of client and server so as to promote the sharing of information between them. It allows many users to have access to the same database at the same time, and the database will store much information. This paper will provide information about client-server model in terms of its introduction, architecture, recent development and issues. Keywords: client-server, 2-tier, 3-tier, Interprocess communication, thick client, middleware SaaS, PaaS, IaaS.

[1]. Zhang, H. (2013). Architecture of Network and Client-Server model. arXiv preprint arXiv:1307.6665. [2]. Kambalyal, C. (2010). 3-tier architecture. Retrieved On, 2.

[3]. Kratky, S., & Reichenberger, C. (2013). Client/Server Development based on the Apple Event Object Model. Atlanta. [4]. Dewire, D. T. (1993). Client/server computing. McGraw-Hill, Singapore

[5]. Jenkins, N. (1996). Client/server Unleashed. Sams, USA

[6]. Davis, P.T.(Editor) (1996). Securing Client/Server Computer Networks. McGraw-Hill, USA

[7]. Cloud Computing – Issues, Research and Implementations" by Mladen A. Vouk, Journal of Computing and Information Technology - CIT 16, (2008), 4, 235–246 doi:10.2498/cit.1001391


Paper Type : Research Paper
Title : Service Cost Estimation in Cloud Environment Using a Third Party Web Server: A Comparative Analysis With and Without Using Cloud Computing
Country : India
Authors : Rashmi Ranjan Dhal & B V A N S S Prabhakar Rao
: 10.9790/0661-16197277    logo

Abstract: This paper maps the idea of software maintenance cost estimation process onto cloud computing service cost. We have many models for effort estimation in maintenance. Here we implement any cost estimation model to calculate the service cost in cloud computing. As in cost model there are 14 major cost drivers, in cloud environment there are also cost drivers which hold major expenditure. Considering cloud environment cost drives, an effort estimating equation is developed which can be implemented for finding the service cost. Using that service cost a third party server gives back pre-deployment maintenance estimation to the cloud user on request. There is also an analysis of data sets from different organizations which shows the comparative cost involved in cloud services and in traditional services.

Keywords: Cloud, Total Bandwidth Cost, Total Instance Cost, Total Storage Cost, Total Cost Ownership

[1] Juan Carlos Granja-Alvarez and Manuel Jose Barranco-Garcia, Software Maintenance:Research and Practice,1997, Vol. 9, 161–175
[2] Pragya Siddhi, Varun Kumar Rajpoot, A Cost Estimation of Maintenance Phase for Component Based Software, IOSR Journal of Computer Engineering,ISSN : 2278-0661 Volume 1, Issue 3 (May-June 2012), PP 01-08
[3] Sugandha Chakraverti, Prof Sheo Kumar, Dr. S.C. Agarwal , Ashish Kumar Chakraver, Modified Cocomo Model For Maintenance cost Estimation of Real Time System Software ,,IJCSN ,Volume 1, Issue 1, February 2012
[4] Yi-Kuei Lin 1, and Ping-Chen Chang , Estimation of Maintenance Reliability for a Cloud Computing Network, International Journal of Operations Research Vol,2010. 7, No. 1, pp 53-60
[5] Yunsik Ahn, Jungseok Suh, Seungryeol Kim and Hyunsoo Kim, Journal of Software Maintenance and Evolution: Research and Practice,2002;15:71-85.

Paper Type : Research Paper
Title : A Survey on Visual Search Reranking
Country : India
Authors : Thalla Shankar, Lalitha Manglaram, Murali Sadak
: 10.9790/0661-16197881    logo

Abstract: Search reranking is considered as a best and common way to improves retrieval precision. However the problem is not trivial especially when we are considering multiple features or modalities for search in image and video retrieval. This paper suggests a new kind of reranking algorithm, the circular reranking, that supports the mutual exchange of information across multiple modalities for improving search performance, and follows the philosophy of strong performing modality could learn from weaker ones, and weaker modality does benefit by interacting with stronger modalities.

[1] P. K. Atrey, M. A. Hossain, A. E. Saddik, and M. S. Kankanhalli. "Multimodal fusion for multimedia analysis: A survey," Springer Multimedia Syst. J., vol. 16, no. 6, pp. 345–379, 2010.
[2] C. A. Bhatt and M. S. Kankanhalli, "Multimedia data mining: State of the art and challenges," Multimedia Tools Appl., vol. 51, no. 1, pp. 35–76, 2011.
[3] K. M. Donald and A. F. Smeaton, "A comparison of score, rank and probability-based fusion methods for video shot retrieval," in Proc. ACM Int. Conf. Image Video Retr., Jul. 2005, pp. 61–70.
[4] R. Fergus, L. Fei-Fei, P. Perona, and A. Zisserman, "Learning object categories from google's image search," in Proc. IEEE Int. Conf. Comput. Vis., Oct. 2005, pp. 1816–1823.
[5] W. Hsu, L. Kennedy, and S.-F. Chang, "Video search reranking via information bottleneck principle," in Proc. ACM Int. Conf. Multimedia, 2006, pp. 35–44.
[6] W. Hsu, L. Kennedy, and S.-F. Chang, "Reranking methods for visual search," IEEE Multimedia, vol. 14, no. 3, pp. 14–22, Jul.–Sep. 2007.

Paper Type : Research Paper
Title : Automatic Face Recognition Using Gabor Wavelet and Robust Structured Spares Representation
Country : India
Authors : R.Madhura, P.Suthanthira Devi
: 10.9790/0661-16198285    logo

Abstract: Automatically facial recognition has become more and more important today. But FR still remains a challenge problem in computer vision .so in this paper we proposed a new approach that use Gabor wavelet for facial feature extraction and robust structured sparse representation for classification. Gabor wavelet has beenwidely used in the face recognition task because it's good imitation of human visual. The structured sparse representation based classification (SSRC) is used for classifying the test images robustly. Unlike sparse representation based classification (SRC),the SSRC explicitly takes structure of the dictionary into account for a better classification.

Keywords: Gabor Wavelet, Structured sparse representation classification,Face Recognition.

[1] D. Hoiem, A. N. Stein, A. A. Efros, and M. Hebert (2011), "Recovering occlusion boundaries from a single image" IEEE Int. ConfComput. pg no. 1–8.
[2] H. Jia and A. M. Martinez, (2010) "Face recognition with occlusions in the training and testing sets" IEEE Int. Conf. Autom. Face Gesture Recognit, pg no. 1–6.
[3] J. Wright, A. Yang, A. Ganesh, S. Sastry, and Y. Ma, (2009) "Robust face recognition via sparse representation", IEEE Trans. Pattern Anal. Mach Intell, pg no. 210–227.
[4] M. Yang, L. Zhang, J. Yang, and D. Zhang, (2011) "Robust sparse coding for face recognition", IEEE Int. Conf. Comput. Vis. Pattern Recognit, pg no. 625–632.
[5] Y. C. Eldar and M. Mishali, (2009)"Robust recovery of signals from a structured union of subspaces", IEEE Trans. Inf. Theory.
[6] Jing Wang and ChenganGuo,(2012) "Face Recognition based on Sparse Representation and Error Correction SVM", IEEE Trans. Conf Computational Intelligence, pg no. 10-15
[7] Zhao Lihong, Yang Caikun, Pan Feng and Wang Jiahe, (2012) "Face recoginition based on gabor with 2DPCP and PCA" 24th Chinese Control and Decision Conference no. 1–6.

Paper Type : Research Paper
Title : Video Transmission over Mobile Adhoc Network Using WEAC Protocol with Zone Routing Algorithm
Country : India
Authors : A. Kamatchi, Dr. Annasaro Vijendran
: 10.9790/0661-16198694    logo

Abstract: In mobile adhoc network (MANET), a node communicates directly with the nodes within wireless range and indirectly with other nodes using a dynamically computed, multi-hop route via the other nodes of the manet. In order to facilitate communication within the network, a routing protocol is used to discover routes between nodes. The primary goal of such an adhoc network routing protocol is correct and efficient route establishment between a pair of nodes so that messages may be delivered in a timely manner. Zone Routing based on Zone Routing Protocol (ZRP) is the famous techniques which is used to provide better result in Video transmission. Video transmission in this area is became popular and useful technique. This paper introduces WEAC-VBS-O Protocol with Zone Routing Algorithm. In this work WEAC Protocol with Zone Routing algorithm is discussed. It provides better result for video transmission. Keywords: MANET, Video Transmission, Zone Routing algorithm, WEAC Protocol.

[1] Tapaswini Dash et al. Zone Routing Protocol Using Anycast Addressing For Ad-Hoc Network International Journal on Computer
Science and Engineering (IJCSE) june 2012.
[2] V. D. Park and M. S. Corson, "A highly adaptive distributed routing algorithm for mobile wireless networks, " presented at the
IEEE INFOCOM, Kobe, Japan, Apr. 1997.
[3] B. Bellur and R. G. Ogier,"A reliable, efficient topology broadcast protocol for dynamic networks," presented at the IEEE
INFOCOM, Mar. 1999.
[4] Z. J. Haas and M. R. Pearlman, "The performance of query control schemes for the zone routing protocol," IEEE/ACM Trans.
Networking, vol. 9, pp. 427,438, Aug. 2001.
[5] Z. J. Haas, M. R. Pearlman, and P. Samar, "The bordercast resolution protocol (BRP) for ad hoc networks," IETF, MANET Internet
Draft, July 2002. [6]"The interzone routing protocol (IERP) for ad hoc networks," IETF, MANET Internet Draft, July 2002.
[7] A. Iwata, C.-C.Chiang, G. Pei, M. Gerla, and T.-W. Chen, "Scalablerouting strategies for ad hoc wireless networks," IEEE J.
Select. Areas Commun., vol. 17, pp. 1369–1379, Aug. 1999.

Paper Type : Research Paper
Title : Applying Linear Wavelet Transforms and Statistical feature Analysis for Digital Tongue Image
Country : India
Authors : M. Dhanalakshmi, P. Premchand , A.Goverdhan
: 10.9790/0661-161995102    logo

Abstract: The present paper proposes a novel scheme of application of linear wavelets in Digital image processing and statistical evaluation of tongue image for diagnosis in Ayurvedic medical system. The proposed method attempts to differentiate the tongue of a person with healthy or unhealthy conditions. It consists of two techniques applied sequentially: first, enhancement of the tongue image for extracting the true nature of colors and textures on different parts of the tongue and applying wavelets transform; second, computing the statistical features to identify, whether the tongue image belongs to a healthy or unhealthy person. The scheme is implemented on a database including images from internet and selected college hostel students. The analysis of the results reveals that our method can significantly assist in the tongue diagnosis. This proposed method helps in expanding the scope of tongue diagnosis system in Ayurvedic medical system towards reliable and computationally inexpensive diagnostic model.

Keywords : Ayurvedic Tongue diagnosis, Digital Image Processing, Wavelets, Statistical Features.

1] "Nutrition Central, informed, involved and inspired‟ by: Edward Thompson, Issue: Autumn, Year of publication by Institute of Optimum Nutrition: 2001.
[2] "Introduction About Traditional Tongue Diagnosis With Scientific Value Addition‟, Dr. Debasis Bakshi, Dr Sujata Pal, Proceedings of 2010 International Conference on Systems in Medicine and Biology, 16-18 December 2010, IIT Kharagpur, India.
[3] "Ayurvedic Tongue Diagnosis‟ by Walter‟ Shantree "Kasera, Eddition 2007, Mothilal Banarsidass publishers, No. 3, June 2012.
[4] Wangmeng Zuo, Kuanquan Wang, David Zhang, and Hongzhi Zhang, "Combination of Polar Edge Detection and Active Contour Model for Automated Tongue Segmentation", In Proceedings of the Third International Conference on Image and Graphics, pp: 270-273, 2004.
[5] Bo Pang, David Zhang, Kuanquan Wang, "Tongue image analysis forappendicitis diagnosis", Transactions on Information Sciences, Vol. 175, No. 3, pp: 169-176, 2005.

Paper Type : Research Paper
Title : Review of Ensemble Based Classification Algorithms for Non-stationary and Imbalanced Data
Country : India
Authors : Meenakshi A.Thalor, Dr.S.T.Patil
: 10.9790/0661-161910310    logo

Abstract: Learning data samples from a non-stationary distribution has been shown to be a very challenging problem in machine learning, because the joint probability distribution between the data and classes changes over time. Most real time problems as they change with time can suffer concept drift. For example, a recommender or advertising system, in which customer's behavior may change depending on the time of the year, on the inflation and on new products made available. An additional challenge arises when the classes to be learned are not represented equally in the training data i.e. classes are imbalanced, as most machine learning algorithms work well only when the class distributions are balanced. The objective of this paper is to review the ensemble classification algorithms on the framework of non-stationary and imbalanced dataset, with focus on two-class problems. In addition, we develop a thorough comparison of these algorithms by the consideration of the most significant published approaches.

Keywords: Concept Drift, Ensemble, Imbalanced Data, Incremental Learning, Non-stationary Data

[1] Tsymbal A.,The problem of concept drift: definitions and related work, Technical Report TCD-CS-2004-15, Department of Computer Science, Trinity College,2004.
[2] L. Rokach, Ensemble-based Classifiers, Artif. Intell. Rev.,vol. 33, pp. 1–39, 2010
[3] R. Polikar ,Ensemble Based Systems in Decision Making, IEEE Circuits and Systems Magazine, Vol. 6, No. 3, pp. 21-45, 2006
[4] G. Widmer and M. Kubat, Learning in the presence of concept drift and hidden contexts, Machine Learning, vol. 23, no. 1, pp. 69-101, 1996.
[5] Martin Scholz, Ralf Klinkenberg, An Ensemble Classifier for Drifting Concepts, Second International Workshop on Knowledge Discovery in Data Streams, pp. 53-64 , Vol. 11 ,2005.

Paper Type : Research Paper
Title : Intrusion Detection system: A Review of the state of the art
Country : India
Authors : Ajay kaurav, S.Sibi Chakkaravarthy, Pravin R.Patil, M.Vimal Karthik
: 10.9790/0661-1619108112    logo

Abstract: Intrusion detection system is a software which is used to monitor network for anyintrusion .There are various types of IDS which are stated as Anomaly based, Host based, Network based and Signature based. In this paper, a review is made on various intrusion detection systems. The review analysis the whole active intrusion detection system. Through the extensive survey we analysed the whole pose of the active intrusion detection system. We employed the survey towards overall IDS not only for the specific. Since the security threats are in increased level, hence the study and survey about IDS has paid a lot of attentions.

Keywords:IDS, IPS, Intrusion, WSN

[1] S. Jacobs, S. Glass, T. Hiller, and C. Perkins, "Mobile IP authentication, authorization, and accounting requirements," Request for Comments 2977, Internet Engineering Task Force, October 2000.
[2] K. Sanzgiri, B. Dahill, B. N. Levine, E. B. Royer, and C. Shields, "A Secure Routing Protocol for Ad-hoc Networks," in the Proceedings of International Conference on Network Protocols (ICNP), 2002.
[3] Yih-Chun Hu, Adrian Perrig, and David Johnson. Ariadne: "A Secure On-Demand Routing Protocol for ad hoc Networks," in the Proceedings of MobiCom, 2002.
[4] Y. Zhang, W. Lee, and Y.-A. Huang, "Intrusion Detection Techniques for Mobile Wireless Networks," ACM J. Wireless Networks, pp. 545-556, 2003.
[5] A. Mishra, K. Nadkarni, and A. Patcha, "Intrusion Detection in Wireless Ad-Hoc Networks," in IEEE Wireless Communications, pp. 48-60, February 2004.

Paper Type : Research Paper
Title : Best Practices in Implementation of Cloud
Country : India
Authors : Navjot Kaur
: 10.9790/0661-1619113119    logo

Abstract: Cloud computing is one of the latest developments in the IT industry also known as on-demand computing. It provides the full scalability, reliability, high performance and relatively low cost feasible solution as compared to dedicated infrastructures. This technology has the capacity to admittance a common collection of resources on request. It is proving extremely striking to cash-strapped IT departments that are wanted to deliver better services under pressure. The hype around Cloud Computing is undeniable, especially regarding how it can result in huge savings in terms of I.T. costs for an enterprise. This has persuaded many enterprises to shift to cloud based software services.

[1] M. Vouk. Cloud Computing – Issues, Research and Implementations, Journal of Computing and Information Technology – CIT 16(4), 235 – 246, 2008.
[2] L.R.Rewatkar and U.A.Lanjewar, Implementation of Cloud Computing on Web Application, International Journal of Computer Applications (0975-8887), Volume 2 -No.8, June2012, pp 28-32
[3] J. Varia, ―Architecting for the cloud: Best practices‖, May 2010
[4] M.Sharma, A.Mehra, H.Jola, A.Kumar, M.Misra and V.Tiwari, Scope of cloud computing for SMEs in India, Journal of Computing, Volume 2, Issue 5, May 2010, ISSN 2151-9617.
[5] B.D. Payne, M. Carbone, M. Sharif, and W. Lee. Lares: An architecture for secure active monitoring using virtualization. Security and Privacy, IEEE Symposium , 0:233-247, 2008

IOSR Journals are published both in online and print versions.