IOSR Journal of Computer Engineering (IOSR-JCE)

May - June 2014Volume 16 - Issue 3

Version 1 Version 2 Version 3 Version 4 Version 5 6 7 8 9

Paper Type : Research Paper
Title : Gender related differences in the use of the Internet by university academics
Country : India
Authors : Maria Tsvere , Srikanta Swamy , Leonorah Tendayi Nyaruwata
: 10.9790/0661-16310108    logo
Abstract: This paper reports in part some of the findings of a PhD study regarding visibility of gender issues in the use of the internet in university contexts. The study adopted a cross sectional descriptive survey research design and collected data using a structured questionnaire. Data were obtained from 440 full time university academics that were selected using simple random sampling technique. Data were analysed quantitatively using descriptive and inferential statistics using SPSS version 17. This study revealed a significant relationship between gender and internet usage in favour of males. While both male and female academics were not fully utilizing the internet for university teaching, more male academics used the internet for research more than female academics did. The study concluded that gender is a key factor in the discourse concerning internet and university academic practice. Internet usage differences have serious implications on mainstreaming ICT in higher education curricula as both female and male academics are expected to mentor students and participate in virtual co-construction of knowledge. The study recommended that university management should develop gender sensitive information technology learning environments and targeted training programmes. Female lecturers should be encouraged to be proactive and participate in global developmental initiatives.
Keywords: Gender, academics, Internet usage, Search engines, university teaching. users.
[1] B.T.S. Kumar, and G. Manjunath, Internet use and its impact on the academic performance of university teachers and researchers: A comparative study, Higher Education, Skills and Work-based Learning, 3(3), 2013, 219-238.
[2] M. Tsvere, S. Swamy, and L.T. Nyaruwata, Perceived competencies of university academics in the use of information and communication technology in university academic business, International Journal of Science and Research, 2(8), 2013, 284-289.
[3] E. Schmidt, and J. Cohen, The new digital age: reshaping the future of people, nations and business (London: John Murray, 2013).
[4] A. Gurumurthy, Gender and ICTs: an overview report (Institute of Development Studies: Bridge, 2004).
[5] S. Downes, The role of educator in a PLE world, Stephen's Web, 2010, http://www.downes.ca/post/54321.

Paper Type : Research Paper
Title : GPRS Based LAN Monitoring and Controlling
Country : India
Authors : Meghana Sapkal, 2Shekhar Patil, Leesensa Vispute, Santosh Jagtap.
Guided by Prof. S.C. Chaudhari
: 10.9790/0661-16310915    logo
Abstract: The GPRS based LAN monitoring and controlling system is mainly developed to focus on expansion of various networks services or facilities which are essential for brilliantly monitoring a LAN network. In this system, workstations are collected to arrange them in a network. Managing and regulating the activities in the network while at the workplace is an easy task. But, while you are outstation it becomes difficult to monitor and control. You can always have your smart handset or GPRS enable device of any type which will fulfill this purpose. The interface between the clients and the remote administrator is achieved via the central monitoring server through sending and receiving email only. The project targets to develop an integrated software solution also this permits a network supervisor to distantly monitor the LAN. This is done by his email compatible devices and can see tasks on the client side. This project is developed for giving out the best particulars about a network to its administrator, on his GPRS enable device, when he is at a remote location.
Keywords: LAN, GSM, GPRS, Remote Monitoring & Control, Desktop.
[1]. HamitErdem and Armaganner," A Multi-Channel Remote Controller For Home and Office Appliances ", IEEE Transactions on Consumer Electronics, Vol. 55, No. 4, November 2009.
[2]. Amol Poman , Mahesh Gundras, Prashant Pujari Department Of Computer Engineering GHRCEM, University of Pune," GSM Based LAN Monitoring System", Amol Poman et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (3) , 2012 ,3848-3851.
[3]. Mamata Bhamare, Tejashree Malshikare, Renuka Salunke, Priyanka Waghmare Department of computer engineering, MIT pune-411038, India, "GSM Based LAN Monitoring and Controlling ", International Journal of Modern Engineering Research (IJMER) Vol.2, Issue.2, Mar-Apr 2012 pp-387-389
[4]. A. R. Al-Ali, Imran A. Zualkernan, Assia Lasfer, Alaa Chreide, and Hadel Abu Ouda," GRPS-Based Distributed Home-Monitoring Using Internet-Based Geographical Information System" , IEEE Transactions on Consumer Electronics,vol.57 ,no 4,November 2011.
[5]. Wente Zeng, Student Member, IEEE, and Mo-Yuen Chow, Fellow, IEEE," Optimal Trade-off Between Performance and Security in Networked Control Systems Based on Co evolutionary Algorithms ", IEEE transactions on industrial electronics, vol. 59, no. 7, July 2012.

Paper Type : Research Paper
Title : Mutual Trust to Provide Data Security in Cloud Environment
Country : India
Authors : Srinivas Kolli , Ch.Sravan Kumar , Dr P.Chenna Reddy,
: 10.9790/0661-16311618   logo
Abstract: We introduce a model for provable data possession (PDP) that allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it. The model generates probabilistic proofs of possession by sampling random sets of blocks from the server, which drastically reduces I/O costs. The client maintains a constant amount of metadata to verify the proof. The challenge/response protocol transmits a small, constant amount of data, which minimizes network communication. Thus, the PDP model for remote data checking supports large data sets in widely-distributed storage systems. It is also superior in performance by minimizing the use of expensive public-key cryptography in metadata management. We present the architecture and implementation of various SHAROES com- ponents and our experiments demonstrate performance superior to other proposals by over 40% on a number of benchmarks.
Index Terms: Cloud Computing, Trust ability.
[1]. A. Singh and L. Liu, "Sharoes: A data sharing platform for outsourced enterprise storage environments," in Proceedings of the 24th International Conference on Data Engineering, ICDE. IEEE, 2008, pp. 993–1002.
[2]. 104th United States Congress, "Health Insurance Portability and Accountability Act of 1996 (HIPAA)," Online at http://aspe. hhs.gov/admnsimp/pl104191.htm, 1996.
[3]. R. ıdane, "Remote integrity checking," in 6th Working Conference on Integrity and Internal Control in Information Systems (IICIS), S. J. L. Strous, Ed., 2003, pp. 1–11..
[4]. B. e, J. Domingo-Ferrer, A. Martinez-Balleste, Y. Deswarte, and J.-J. Quisquater, "Efficient remote data possession checking in critical information infrastructures," IEEE Trans. on Knowl. and Data Eng., vol. 20, no. 8, 2008..
[5]. M. A. Shah, R. Swaminathan, and M. Baker, "Privacy-preserving audit and extraction of digital contents," Cryptology ePrint Archive, Report 2008/186, 2008..

Paper Type : Research Paper
Title : Effects of Social Networking by Influencers [Beware and Stay Safe]
Country : India
Authors : P. Adarsha. Dr. N. Chandra Sekhar Reddy. S. Srinivas
: 10.9790/0661-16311922    logo

Abstract: A short time agone, social spam and on-line abuse were much non-existent. As email spam filters became simpler, catching over ninety fifth of those messages, spammers have moved to a replacement target – the social net. Over ninetieth of social network users have knowledgeable about social spam in some kind.Those doing the "spamming" is automatic spam-bots, fault accounts, or real individuals.. during this paper we have a tendency to investigate strategies for exploiting such community feedback to mechanically determine prime quality content. As a action at law, we have a tendency to specialise in Yahoo! Answers, an oversized community question/answering portal that\'s significantly made within the quantity and kinds of content and social interactions accessible in it. we have a custom to introduce a general classification framework for merging the proof from totally differential sources of knowledge, which will be tuned automatically for a given social media sort and quality definition. above all, for the community question/answering domain, we have a custom to show that our system is in a position to separate high-quality things from the remainder with accuracy near that of humans

Keywords: social net ,spamming ,fault accounts, social media, passwords ,intruders attacks.

[1]. Hila Becker_y, Dan Itery,"Identifying Content for Planned Events Across Social Media Sites"Proceedings of the National Academy of Sciences,105(41):15649{15653, 2008.
[2]. D. A. Shamma, L. Kennedy, and E. Churchill. Statler: Summarizing media through short-message services. In Proceedings of the 2010 ACM Conference on Computer Supported Cooperative Work (CSCW '10), 2010.
[3]. M. Naaman, H. Becker, and L. Gravano. Hip and trendy: Characterizing emerging trends on Twitter. Journal of the American Society for Information Science and Technology,62(5):902{918, 2011.
[4]. L. Liu, L. Sun, Y. Rui, Y. Shi, and S. Yang. Web video topic discovery and tracking via bipartite graph reinforcement model. In Proceedings of the 17th International World Wide Web Conference (WWW '08), 2008.
[5]. H. Kwak, C. Lee, H. Park, and S. Moon. What is Twitter, a social network or a news media? In Proceedings of the19thInternational World Wide Web Conference (WWW '10), 2010.

Paper Type : Research Paper
Title :

Wireless Controlling Of Remote Electrical Device Using Android Smartphone

Country : India
Authors : Omar Abdulraheem Mahdi. Bhavya Alankar
: 10.9790/0661-16312327    logo
Abstract: Controlling the home appliances and electronics gadgets wirelessly through SmartPhone technology can be more easy. That is, through this paper, we target to control a light emitting device (LED) from any place in the world and the unique concept within our application is, utilizing the data channels of GSM technology and not the voice channels. In other words, the SmartPhone application's interface will enable the user to control that device using GPRS.The SmartPhone application will connect to an electronic chip(Arduino) to which an LED will be connected. The mode of connection will be GPRS which we have planned to use.
Keywords: Smartphone, LED, GPRS, GSM, Arduino.
[1] Prakash Kumar, Pradeep Kumar, Arduino Based Wireless Intrusion Detection Using IR Sensor and GSM,, International Journal of Computer Science and Mobile Computing, 2(5), 2013, 417-424.
[2] Vini Madan , S.R.N. Reddy, "GSM-Bluetooth based Remote Monitoring and Control System with automatic Light Controller", International Journal of Computer applications ,46(1), 2012, 20-28.
[3] G. Aranguren, L. Nozal, A. Blazquez, and J. Arias, "Remote control of Sensors and actuators by GSM", IEEE 2002 28th Annual Conference of The Industrial Electronics Society IECON 02, vol. 3, 2002, pp.2306 - 2310.
[4] Arnaud Henry-Labordere, Virtual Roaming Systems for GSM, GPRS and UMTS (John Wiley & Sons Ltd, 2009).
[5] John Boxall, Arduino Workshop: A Hands-On Introduction With 65 Projects (Copy Right Materiel, 2013).

Paper Type : Research Paper
Title :

RFID based protection to newborns in the hospitals

Country : India
Authors : Ahmed Qasim Abd Alhasan . Syed Imtiyaz Hassan
: 10.9790/0661-16312832    logo
Abstract: Many hospitals, these days depend on the Information Technology (IT) to achieve perfection in the health services and operation management. The said dependency is because of the ability of emerging technologies to solve the problem of different nature. One of the problems where applicability of the IT can produce revolutionary solution is the cradle kidnapping and swapping of newborns in hospitals. It can be achieved with proper usage of the Radio frequency identification (RFID) technology. The present work is an attempt to explore and then utilize RFID technology in healthcare to protect the newborns in the hospitals from kidnapping and swapping. Apart from implementing a sample case the present work also characterize the RFID system in terms of the different elements that it constitutes (readers, tags, software, and security programs).
Keywords: RFID, Hospital management, Cradle Swapping, Cradle kidnapping.
[1] BlueBean, (2007), The Benefits of RFID in the Healthcare Organization, RFID Solutions for the Healthcare Industry, [Available:Online] URL: http://www.rfidhealthcare.com/ .
[2] Klaus Finkenzeller.(2010), RFID Handbook, Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-Field Communication, 3rd Edition .
[3] Shrikant Tiwari, Aruni Singh and Sanjay Kumar Singh,( 2013), Multimodal Database of Newborns for Biometric Recognition, International Journal of Bio-Science and Bio-Technology, Vol. 5, No. 2, April, 2013.
[4] J. E. Gray, G. Suresh, R. Ursprung, W. H. Edwards, J. Nickerson and P. H.Shinno, (2006), Patient Misidentification in the neonatal intensive care unit: Quantification of risk, Pediatrics, vol. 11, pp. 46–e47.
[5] A. K. Jain, A. Ross and S. Prabhakar, (2004), An introduction to biometric recognition, IEEE Trans. Circuits and Systems for Video Technology, vol. 14, no. 1, pp. 4–20.

Paper Type : Research Paper
Title : Driving Simulator
Country : India
Authors : Ambar Yadav. Arti Singh
: 10.9790/0661-16313338    logo

Abstract: Simulators which are developed by suppliers individually for specific application purpose are known as Driving Simulator. Most of the conventional driving simulators provide some flexibility for constructing new test scenarios, but do not allow users to change system arrangement. Driving simulator structure are rather complex but it provide user friendly environment. This paper describes the concept and main idea of about driving simulator. Some common DS like CAR SIM and Truck SIM and their Mathematical models. What about Virtual Environment in DS and finally the advantages and disadvantages of DS.

Keywords: CAR SIM, TRUCKSIM, DS, Advance driving assistance system

[1] Mohd Khalid Mokhtar and Mohd Shahrizal Sunar "3D GRAPHIC SCENE MANAGEMENT IN DRIVING SIMULATOR
[2] Moore, G. E. (1965).Cramming more components onto integrated circuits. Electron 38, 114-117.
[3] Generating dynamic scenarios in a driving simulator. IEEE Intelligent Systems 21, 28-32.
[4] Godley, S. T., Triggs, T.J., Fildes, B.N. (2002). Driving simulator validation for speed research. Accident Analysis and Prevention 34, 589-600.
[5] Roskam, A.J., Brookhuis, K.A., De Waard, D., Carsten, O.M.J., Read, L., Jamson, S., … Victor, T. (2002). HASTE Deliverable 1: Development of experimental protocol. Retrieved from <http://ec.europa.eu/transport/roadsafety_library/publications/haste_deliverable_1_v1_1.pdf>

Paper Type : Research Paper
Title : Image Security With Different Techniques Of Cryptography And Coding: A Survey
Country : Egypt
Authors : Mona F. M. Mursi. Hossam Eldin H. Ahmed. Fathi E. Abd El-samie.
Ayman H. Abd El-aziem
: 10.9790/0661-16313945    logo
Abstract: Due to the growth of multimedia applications, the protection of this multimedia data becomes a very important issue of communication and storage; especially when it is transferred over an insecure channel, where apart from preventing illegal data access, images are used in many fields such as medical science and military. The protection of images can be done with image encryption. The majority of encrypted image transmission schemes does not adequately take into account the effect of bit errors occurring during transmission and this issue is considered a problem that should be handled by an efficient coding scheme. Hence, error correction code should be applied after encryption to protect encrypted images against channel errors. In this paper, we present a survey of image encryption techniques and channel coding techniques.
Keywords: Image Encryption, Channel coding, chaotic theory..
[1] Komal D Patel, Sonal Belani "Image Encryption Using Different Techniques: A Review" International Journal of Emerging Technology and Advanced Engineering www.ijetae.com (ISSN 2250-2459, Volume 1, Issue 1, November 2011).
[2] Varsha S. Nemade, R. B.Wagh "Review of different image encryption techniques" National Conference on Emerging Trends in Computer Technology (NCETCT-2012).
[3] Mrinal K. Manual, GourabD. Banik, DebasishChattopadhyay and DebashisNandi"An Image Encryption Process based on Chaotic Logistic Map " IETE Technical Review Vol 29 ISSUE 5 - SEP- OCT 2012.
[4] Yaobin Mao and Guanrong Chen" Chaos-Based Image Encryption"
[5] Shubo Liu, Jing Sun, ZhengquanXu"An Improved Image Encryption Algorithm Based on Chaotic System" 1100 Journal Of Computer, VOL. 4, NO. 11, November 2009.

Paper Type : Research Paper
Title : Load Rebalancing Algorithm for Distributed File System In Clouds
Country : India
Authors : Prof. V.R.Ghule . Miss. Gayatri B. Pawar. Mr. Abhijit Shinde
: 10.9790/0661-16314649    logo
Abstract: The rapid growth of the World Wide Web has brought huge increase in traffic to popular web sites. As a consequence, end users often experience poor response time or denial of service. A cluster of multiple servers that behaves like a single host can be used to improve the throughput and alleviate the server bottlenecks. To achieve such a cluster, we need robust routing algorithms that provide scalability, effective load balancing and high availability in a constantly changing environment. Due to an ever-increasing diversity of workloads and cluster configurations, it is very difficult to propose a single algorithm that performs best under all conditions. In this paper, we review a number of proposed load balancing algorithms for clusters of web servers. We focus on an experimental analysis of the performance under a number of well-known load balancing algorithms. We study the performance of the algorithms through a simulation to evaluate their performance under different conditions and workloads. The results of our study are reported in the paper.
Keywords: Load rebalance, Distributed file system, clouds, Hash table, Algorithms.
[1]. L. M. Ni and K. Hwang, "Optimal Load Balancing in a Multiple Processor System with Many Job Classes," IEEETrans.SoftwareEng., vol. 11, no. 5, pp. 491–496, May 1985.
[2]. L. M. Ni, C.-W. Xu, and T. B. Gendreau, "A Distributed Drafting Algorithm for Load Balancing," IEEETrans.SoftwareEng., vol. 11, no. 10, pp. 1153–1161, Oct. 1985.
[3]. S. Ghemawat, H. Gobioff, and S.-T. Leung, "The Google File System," in Proc.19thACMSymp.OperatingSystemsPrinciples(SOSP'03), Oct. 2003, pp. 29–43.
[4]. Hadoop Distributed File System, http://hadoop.apache.org/hdfs/.
[5]. G. Copeland, W. Alexander, E. Boughter, and T. Keller, "Data Placement in Bubba," in Proc.ACMSIGMOD'88, June 1988, pp. 99–108.

Paper Type : Research Paper
Title : Analyzing Process Behavior to Predict Resource Allocation in Distributed Environment by Using Time Series and Online Predictive Approach Algorithm
Country : India
Authors : Rucha Ravindra Galgali. Prof. S. G. Vaidya. Prof. S. M. Tidke
: 10.9790/0661-16315055    logo
Abstract: A distributed system is a collection of different computers to handle large amount of data, the connected computers can share and coordinate their data on network. It is very difficult to for server to handle, analyze & process such a large amount of data, so that the performance of operations performed by these systems is reduced and they will produce inefficient data as a result. To handle this problem this paper has implemented the online predictive approach algorithm which uses time series to monitor process behavior, analyze it and predict the future observations to determine the resources required by the process in future.The resource prediction is used to optimize the data access operations like read, write, uploading and downloading the file to and from distributed system & which will improve the performance of distributed system. Time series is generated for every operation so that client will get performance chart.
Index terms: Application analysis, Application prediction, Distributed system, Time series ,Time series analysis.
[1] Renato Porfirio Ishii and Rodrigo Fernades de Mello, "An Online Data Access Prediction and Optimization Approach for Distributed Systems", vol.23, no. 06, June 2012.
[2] R. M. Rahman,, K. Barker and R. Alhajj, "APredictiveTechniqueforReplicaSelectioninGridEnvironment",Proc. IEEE Seventh Int'l Symp. Cluster Computing and Grid, pp. 163-170, May 2007.
[3] A.L. Chervenak, R. Schuler, M. Ripeanu, M.A. Amer, S. Bharathi, I. Foster, A. Iamnitchi, and C. Kesselman, "The Globus Replica Location Service: Design and Experience," IEEE Trans. Parallel Distributed Systems, vol. 20, no. 9, pp. 1260-1272, Sept. 2009.
[4] H.H.E. AL-Mistarihi and C.H. Yong, "On Fairness, Optimizing Replica Selection in Data Grids," IEEE Trans. Parallel Distributed Systems, vol. 20, no. 8, pp. 1102-1111, Aug. 2009.
[5] M. Devarakonda and R. Iyer, "Predictability of Process Resource Usage: A Measurement- Based Study on Unix," IEEE Trans. Software Eng., vol. 15, no. 2, pp. 1579-1586, http://dx.doi.org/ 10.1109/32.58769, Dec. 1989.

Paper Type : Research Paper
Title : A Novel Approach to Design a Customized Image Editor and Real-Time Control of Hand-Gesture Mimicking Robotic Movements on an I-Robot Create
Country : India
Authors : Soumyajit Ganguly . Satyajit Bhowmick. Arnab Pal. Sauvik Das Gupta
: 10.9790/0661-16315663    logo
Abstract: Image processing and computer vision are considered as one of the most promising as well as exciting domains of modern day engineering. Equipped with concepts of artificial intelligence and some very advanced algorithms and functions to deal with challenges of processing of images as well as to mimic gestures, these domains of engineering prove to be one of the star attractions of highest level engineering and technology. This paper deals with some very basic image processing functions and algorithms and the concept of gesture mimicking robots. Matlab based customized image editor can be made quite easily by enthusiasts of image processing and a robotic platform called 'iRobot Create' can be used to perform gesture imitations.
Keywords: Image editor, gesture recognition, MATLAB, iRobot Create.
[1]. Rafael C. Gonzalez, Richard E. Woods and Steven L, Eddins, "Digital Image Processing using MATLAB", (2004).
[2]. Liming Wang, Jianbosh Shi, Gang Song, I-fan Shen, "Object Detection Combining recognition and Segmentation", Fudan University, Shanghai, PRC, 200433.
[3]. R. Fisher , K Dawson-Howe, A. Fitzgibbon, C.Robertson, E. Trucco, John Wiley, "Dictionary of Computer Vision and Image Processing", 2005.
[4]. H.D. Cheng and X.J. Shi, "A simple and effective histogram equalization approach to image enhancement", Digital Signal Processing 14 (2004) 158–170.
[5]. T. Alan Keahey, Edward L.Robertson, "Techniques for non linear magnification transformations", Department of Computer Science, Indiana University

Paper Type : Research Paper
Title : An Overview of Spectrum Sensing and its Techniques
Country : India
Authors : Munpreet Kaur Raina. Gagangeet Singh Aujla
: 10.9790/0661-16316473    logo
Abstract: Cognitive radio networks provide high bandwidth to mobile users via heterogeneous wireless architectures and dynamic spectrum access techniques. It basically avoids congestion in wireless communication by exploiting unused radio spectrum that is not significantly engaged through a licensed user. This is the most promising and efficient technique for the proper utilization of each and every frequency band.In this paper a brief introduction of different sensing techniques has been given and also the various aspects related to these techniques. Different issues related to spectrum sensing techniques and their comparison hasbeen done in the paper.
Index Terms: Cognitive radio, Primary user, Secondary user, Spectrum sensing, Signal processing
techniques..
[1]. J. Mitola III, "Cognitive Radio for Flexible Multimedia Communications", Mobile Multimedia Communications, 1999, IEEE
International Workshop on, pp. 3 –10, 1999.
[2]. Ekram Hossain, Dusit Niyato Zhu Han, "Dynamic Spectrum Access and Management in Cognitive Radio Networks", Cambridge
University Press, 2009.
[3]. Tevfik Yucek and Huseyin Arslan (2009), "A Survey of Spectrum Sensing Algorithms for Cognitive Radio Applications", IEEE
Communication Surveys & Tutorials, Vol.11, No.1, First Quarter 2009, pp 116-130.
[4]. Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran and Shantidev Mohanty, "A Survey on Spectrum Management in Cognitive
Radio Networks", Georgia Institute of Technology, pp. 1-2.
[5]. Y. Yuan, P. Bahl, R. Chandra, P. A. Chou, J. I. Ferrell, T. Moscibroda, S. Narlanka, and Y. Wu, "Cognitive Radio Networks Over
White Spaces", in Proc. IEEE Int. Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2007, Dublin, Ireland, pp
416-427.

Paper Type : Research Paper
Title : A Review on Speckle Noise Reduction Techniques
Country : India
Authors : Er. Kritika Bansal. Er. Akwinder kaur
: 10.9790/0661-16317477    logo
Abstract: In medical image processing, Image denoising plays a very important role in diagnosis. Medical images are very much inconsistent. In medical imaging, Ultrasound is very popular due to its low cost, least harmful to human body, real time system and small in size. Besides its advantage, It suffers from a major problem i.e. speckle noise which reduces the diagnosis ability. Speckle noise is the result of diffuse scattering, which occurs when the sound waves (ultrasound) randomly interferes with a small particle or object on a scale comparable to small wavelength. Speckle Noise is an inherent property of SAR and ultrasound images. As Speckle noise is multiplicative in nature which is very much difficult to remove. So this paper presents a review on different spatial and transform methods such as spatial domain technique and wavelet domain techniques which are already proposed for filtering speckle noise in ultrasound images
Keywords: Speckle Noise, Ultrasound images, Multiplicative noise.
[1] Adib Akl, Charles Yaacoub "A hybrid filters for image despeckling with wavelet-based denoising and spatial filtering" IEEE International Conference on Communication Systems and Network Technologies, 2013.
[2] O.V. Michailovich, A. Tannenbaum, "Despeckling of medical ultrasound images", IEEE Transactions on Ultrasonic's, Ferroelectrics and Frequency Control, pp. 64-78, Jan. 2006.
[3] D.H.H. Santosh, V. N. L. Kumar, D. R. Ramesh, P. S. Prasad, "Efficient Techniques for Denoising of Speckle and Highly Corrupted Impulse Noise Images", IEEE Transactions on Electronics and Computer Technology (ICECT), Vol.3, pp 253-257, 2011.
[4] R. Ahirwar and A. Choubey, "A Novel Wavelet-based Denoising Method of SAR Image Using Interscale Dependency", 2011 International Conference on Computational Intelligence and Communication Systems, Gwalior, India, Oct. 2011.
[5] Inderjeet Singh, Er.Lal Chand "Speckle Noise Reduction based on Discrete Wavelet Transform" International Journal of Computer Trends and Technology IJCTT 2013.

Paper Type : Research Paper
Title : Low selectivity problem using the concept of sampling
Country : India
Authors : Mr. Y. P. Murumakar. Prof. Y.B.Gurav
: 10.9790/0661-16317882    logo
Abstract: There is an increase in the interest to utilize various available network structures and also the available information on social peers for improving the information needs of a user or node, this is because of the birth of online social networks. In this paper, the focus is on improvement of the performance of collecting information from the neighborhood of a user or a node in a dynamic social network. To explore user's or node's social network correctly we have introduced sampling based algorithms by keeping in mind the structure of social network and to approximate the quantities of interest in short time. By showing correlations across our samples we have introduced and also analyzed variants of basic sampling scheme. Here, the models of distributed and centralized network are considered. Assuming that information for each user or node is available we have showed that our algorithms can be utilized to rank nodes which are neighbor to the user. We demonstrate the working of our algorithms for approximation of various quantities of interest and validate analysis results. This is done using real and synthetic data. The methods we describe can be possibly easily adopted in verities of strategies which aim to collect information efficiently from a social graph.
Index Terms: Protecting privacy; secure communication; online social networking
[1]. C. Gkantsidis, M. Mihail, and A. Saberi,"Random Walks in Peer-to-Peer Networks: Algorithms and Evaluation,"Performance
Evaluation, vol. 63, n o . 3, pp. 241-263, 2006.
[2]. D. Gillman, "A Chernoff Bound for Random Walks on Expander Graphs," SIAM J. Computing, vol. 27, no. 4,pp. 1203-1220, 1998.
[3]. G. Das, N. Koudas, M. Papagelis, and S.Puttaswamy, "Efficient Sampling of Information in Social Networks," Proc. ACM
Workshop Search in Social Media (SSM), 2008.
[4]. L. Katzir, E. Liberty, and O. Somekh,"Estimating Sizes of Social Networks via Biased Sampling," Proc. 20th Int'l Conf. World
Wide Web (WWW), 2011.
[5]. M. Ajtai, J. Komlos, and E. Szemeredi "Deterministic Simulation inLogspace," Proc. 19th Ann. ACM Symp. Theory of Computing
(STOC), 1987.

Paper Type : Research Paper
Title : Minimization Of Side Effects Of Knowledge Hiding Based On Association Rule Mining
Country : India
Authors : Ms. Snehal V. Waghchaure . Mr. Nitin J. Khapale. ,Ms.Badhitala Thulasi
: 10.9790/0661-16318390    logo
Abstract: Privacy is very important in Data Mining. Association rule mining, is a important technique, has already been applied in a wide range of areas. Large databases cannot be secured by encryption or other techniques because of complexities. These security issues can be divided into two categories: data hiding and knowledge hiding. This paper deals with the problem of association rule mining which preserves the confidentiality of each database i.e. Knowledge hiding. Knowledge hiding is concerned with the sanitization of confidential knowledge from the data. There are many methods to solve this problem. The one, presented in the paper is called support-based and confidence-based blocking schemes. Apriori algorithm is used for mining rule from database. Knowledge hiding is achieved using ISL and DSR. The improvement over sensitive rule hiding is proposed to offer more accuracy and security with smaller negative impact.
Keywords: Association rule mining, rule hiding with minimum side effects, ISL, DSR.
[1] Tinghuai Ma, Sainan Wang, Zhong Liu, "Privacy Pre serving Based on Association Rule Mining", 3rd Inter- national Conference on Advanced Computer Theory and Engineering, 2010
[2] S.L.Wang and A. Jafari. "Hiding informative association rule sets". Expert Systems with Applications 33 (2007) 316-323
[3] Y Saygin, V. S. Verykios, and A. K. Elmagarmid. "Privacy preserving association rule mining". In Proceedings of the 2002 International Workshop on Research Issues in Data Engineering: Engineering Ecommerce E-Business Systems (RIDE 2002).
[4] V.S.Verykios, A.K. Elmagarmid, E.Bertino,Y. Saygin and E. Dasseni, "Association Rule Hiding", Jan 7, 2003.
[5] J.Han, M. Camber, "Data Mining Concepts and Techinques", Morgan Kaufmann Publishers, 2001.

Paper Type : Research Paper
Title : An Overview of Localization for Wireless Sensor Networks
Country : India
Authors : Vadivukkarasi. K . R. Kumar
: 10.9790/0661-16319199   logo
Abstract: Localization is an important issue for location-dependent applications of wireless sensor networks. In Sensor networks, data collected by sensor nodes need to be tagged with time and location information. Localization techniques are used to determine the location information of a sensor node. It enables efficient routing, provides power saving, assists in the applications like target tracking, useful in locating the source of the data. The localization can be categorized as range-free or range-based schemes based on whether the range information is used among the localization process. Because of the hardware limitations of the network devices, solutions in range-free localization are being pursued as a cost-effective alternative to more expensive range-based approaches. In this paper described recent techniques used for localization.
Keywords: Wireless sensor networks, localization, anchor, multi hop, range free and range based.
[1]. J. C. Navas and T. Imielinski, "Geographic Addressing and Routing," In Proc. Of the ACM MobiCom, Budapest Hungary, September 1997.
[2]. R. Burne, et. al, "A Self-Organizing, Cooperative UGS Network for Target Tracking," in the Proceedings of the SHE Conferenc Unattended Ground Sensor Technologies mid Applications II, Orlando Florida, April 2000.
[3]. N. Bulusu, J. Heidemann, and D. Estrin, "GPS-less Low-cost Outdoor Localization for Very Small Devices," ZEEE Personal Corizmruiicatiuns, 7(5):2&34, October 2000.
[4]. S. Capkun, M. Hamdi, and J.-P. Hubaux, "GPS-free Positioning in Mobile Adhoc Networks," in Hawaii International Conference on System Sciences (HICSS-34), pages 3481-3490, Maui, Hawaii, January 2001.
[5]. L. Doherty, K. Pister, and L. El Ghaoui, "Convex Position Estimation in Wireless Sensor Networks," in the Proceedings of lEEE Conference on Computer communication (iNFOCOM), Anchorage, Alaska, April 2001,

Paper Type : Research Paper
Title : Semantic Based Amalgamation of Pulverized Components Using Ontology
Country : India
Authors : Mr. Susheel George Joseph M.C.A, M.Tech. M.Phil(CS)
: 10.9790/0661-1631100105    logo
Abstract: The problem faced by both software developers and user in development environment and user environment is finding compatible and complementary components in large set of different applications. Different application built in different environment, at different time, by different technology creates a chaotic situation for user and developer to select a required component from vast variety of applications. The problem can be solved by applying technologies related to semantic web. Ontology is created which relates pulverized components based on requirements.
Keyword: Semantic Web, Ontology, Pulverization and amalgamation.
[1] H. Peter, H. Sack, C. Beckstein ―SMARTINDEXER – Amalgamating Ontologies and Lexical Resources for Document Indexing‖.
[2] Martin Hitz, Behzad Montazeri ―Measuring Coupling and Cohesion in Object-Oriented Systems‖.
[3] Timothy A. Budd ―An Introduction to object-oriented Programming‖.
[4] Shymam R.Chidamber, Chris F.Kemerer ―Towards a metric Suite for Object-oriented Design‖.
[5] Johann Eder, Gerti Kappel, Michael Sc hrefl ―Coupling and Cohesion in Object-Oriented Systems‖.

Paper Type : Research Paper
Title : A Study on Relational Semantic Video Content Extraction Using Bayesian Network Classifier
Country : India
Authors : S.Rajarajeshwari. G.Kalaimathi Priya. S.Grace Mary. Dr.V.Sambath kumar
: 10.9790/0661-1631106109    logo
Abstract: Multimedia data mining is an emergent field, which consists of image mining, video data mining etc. The content based extraction in videos is an important application due to the rapid growth in the video based application. Semantic content is the high level concepts that is the objects and events, for example in a basketball game, the player, a ball are all consider to be an object and the actions takes place throughout the game is consider to be the events. In concept extraction the events and objects are extracted, and it is not that much efficient for the user because the relationship between the objects are missing. Therefore the Bayesian network classifier is used to extract the relationship between the objects. It allows the user to extract the semantic video content more efficiently. The Bayesian network classifier uses an ontology which includes the construction of domain ontology. The VISCOM is used to construct ontology for a given domain and the rule based model is used to define some complex situation more effectively. Using Bayesian Network Classifier improves the extraction process by providing the semantic content with relation between the object.
Index terms: Multimedia mining, Video data mining, Semantic content, Domain ontology, Bayesian network classifier.

[1]. L.S. Davis, S. Fejes, D. Harwood, Y. Yacoob, I. Haratoglu, and M.J. Black, "Visual Surveillance of Human Activity," Proc. Third Asian Conf. Computer Vision (ACCV), vol. 2, pp. 267-274, 1998.
[2]. M. Petkovic and W. Jonker, "Content-Based Video Retrieval by Integrating Spatio-Temporal and Stochastic Recognition of Events," Proc. IEEE Int'l Workshop Detection and Recognition of Events in Video, pp. 75-82, 2001. 60 IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 25, NO. 1, JANUARY 2013

[3]. L.S. Davis, S. Fejes, D. Harwood, Y. Yacoob, I. Haratoglu, and M.J. Black, "Visual Surveillance of Human Activity," Proc. Third Asian Conf. Computer Vision (ACCV), vol. 2, pp. 267-274, 1998.
[4]. G.G. Medioni, I. Cohen, F. Bre´mond, S. Hongeng, and R. Nevatia, "Event Detection and Analysis from Video Streams," IEEE Trans. Pattern Analysis Machine Intelligence, vol. 23, no. 8, pp. 873-889, Aug. 2001.
[5]. S. Hongeng, R. Nevatia, and F. Bre´mond, "Video-Based Event Recognition: Activity Representation and Probabilistic Recognition Methods," Computer Vision and Image Understanding, vol. 96, no. 2, pp. 129-162, 2004


Paper Type : Research Paper
Title : A new F-shaped XOR gate and its implementations as novel adder circuits based Quantum-dot cellular Automata (QCA)
Country : India
Authors : Peer Zahoor Ahmad. Firdous Ahmad. Hilal Ahmad Khan
: 10.9790/0661-1631110117    logo
Abstract: Quantum-dot cellular automata (QCA) is a novel nanotechnology that promises smaller size, lower power consumption, with faster speed and is considered as a solution to the scaling problems in complementary metal oxide semiconductor technology. We propose a novel QCA F-shaped XOR gate. The proposed gate is simple in structure and powerful in terms of implementing digital circuits. We implement novel adder circuits like half adders and half subtractors by introducing the proposed XOR gate. The proposed adder circuits are simple in design and occupy a fraction of area, as compared to previous designs. These circuits are suitable for optimizing the complex structures. Simulation results demonstrate that the new structures have achieved significant improvements in terms of circuit complexity. The functionality of proposed structures have been checked by QCADesigner tool.
Key words: Nanotechnology, Quantum Dot Cellular Automata (QCA), F-shaped XOR gate, Half-adder, Half-subtractor
[1] R.Compano, L.Molenkamp, D.J.Paul, Technology roadmap for nano electronics. in: Proceeding of the European Commission IST Programme, Future and Emerging Technologies, Conference 1999.
[2] S. Timarchi, K. Navi, IEEE Trans. On Instrumentation and Measurement, Vol. 58 Issue: 9, PP-2959-2968 2009.
[3] W. Wang, K. Walus, G.A. Jullien, Quantum-Dot Cellular Automata Adders, Proceedings of third IEEE Conference Nanotechnology. 461–464, 2003.
[4] Sen. Wang, Li. Cai, Novel exclusive-OR gate and full adder implementation using quantum cellular automata, Solid-state phenomenon. 565–569, 2007.
[5] V. Vankamamidi, M. Ottavi, F. Lombardi, Two-dimensional schemes for clocking/timing of QCA circuits, IEEE Transactions on Computer-aided Design of Integrated Circuits and Systems 27 (1), 34–44, 2008.


Researcher can also search IOSR published article contents through

IOSR Xplore