IOSR Journal of Computer Engineering (IOSR-JCE)

Nov – Dec 2014 Volume 16 - Issue 6

Version 1 Version 2 Version 3 Version 4 Version 5 Version 6 Version 7 Version 8

Paper Type : Research Paper
Title : A Survey on: Stratified mapping of Microarray Gene Expression datasets to decision tree algorithm aided through Evolutionary Design
Country : India
Authors : Ms. Neha V.Bhatambarekar || Prof. Payal S. Kulkarni
: 10.9790/0661-16650106    logo

Abstract: Analyzing gene expression data is a challenging task since the large number of features against the shortage of available examples can be prone to over fitting. In order to avoid this pitfall and achieve high performance, some approaches construct complex classifiers, using new or well-established strategies. In medical decision making (classification, diagnosing) there are many situations where decision must be made effectively and reliably.

[1]. Schena, M., Shalon, D., Davis, R.W., and Brown, P. O. (1995).Quantitative monitoring of gene expression patterns with a complementary DNA microarray. Science, 270(5235):467–470.
[2]. Golub, T. R., Slonim, D. K., Tamayo, P., Huard, C., Gaasenbeek, M.Mesirov, J. P., Coller, H., Loh, M., Downing, J. R., Caligiuri, M. A., Bloomfield,C. D., and Lander, E. S. (1999). Molecular classification of cancer: class discovery and class prediction by gene expression monitoring. Science, 286:531–537.
[3]. J. Han, Data Mining: Concepts and Techniques. San Francisco, CA, USA: Morgan Kaufmann Publishers Inc., 2001.
[4]. P.-N. Tan, M. Steinbach, and V. Kumar, Introduction to Data Mining,(First Edition). Boston, MA, USA: Addison-Wesley Longman Publishing Co., Inc. 2005.
[5]. J. R. Quinlan, "Induction of decision trees," Mach. Learn., vol. 1, no. 1, pp. 81–106, 1986

Paper Type : Research Paper
Title : High Performance Data Encryption based on Advanced Encryption Standard using FPGA
Country : Egypt
Authors : M. Amr Mokhtar
: 10.9790/0661-16650713    logo

Abstract: Many digital services, such as confidential video conferencing, medical, military imaging systems and the rapid progress of Internet, require reliable security and encryption in real time to store and transmit these digital images/videos.In this paper, a parallel implementation of the advanced encryption standard (AES) using pipelining technique is proposed. For more security, a pseudo random sequence generator (PRSG) is used in advance. The goal is to achieve a high-speed reliable security system for real time application. The parallel architecture is implemented on Field Programmable Gate Arrays (FPGA) family of Spartan_6 (XC6SLX16) using Very high speed Hardware Description Language (VHDL). An image encryption is taken as a case study. The system is capable to process image (256*256) in (0.00053) seconds;consequentially the real time requirement is achieved.

Keywords: Image encryption, FPGA, Pipeline design, AES.

[1] Fatimah, Sh., "On the security of Bitmap Images using Scrambling based EncryptionMethod", Journal of Engineering and Development, Vol. 13, No. 3, September (2009) ISSN 1813-7822.

[2] Hanna, R., "Efficiency of AES finalist candidate algorithms", Al-Nahrain University, 10th Scientific Conference 24-25 Oct.2009.

[3] H.K.Reshma R., Dr. N. Na., "Fault Detection Scheme for AES Using Optimization forMix Column", IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 3, July 2012. [4] Sliman, A. , A., AbderrahimTragha , alaheddineKhamlich , "Design and Implementation A different Architectures of mixcolumn in FPGA", International Journal of VLSI design & Communication Systems (VLSICS), Vol.3, No.4, August 2012.

[5] Bahram, R., Bahman, R., "FPGA Based A New Low Power and Self-Timed AES 128-bit Encryption Algorithm for Encryption Audio Signal", I. J. Computer Network and Information Security, 2013, 2, 10-20.

[6] Bin Liu, Bevan M. Baas, "Parallel AES Encryption Engines for Many-Core Processor Arrays", IEEE TRANSACTIONS ON COMPUTERS, VOL. 62, NO. 3, MARCH 2013.

Paper Type : Research Paper
Title : Efficient Techniques for Unauthorized Attacks with Time-Stamp
Country : India
Authors : R.Swathi
: 10.9790/0661-16651415    logo

Abstract: In many applications it is very useful to identify the unexpected activities on data with respect to time. Cyber security is one of the application area in which we are using intrusion detection system to monitor the network traffic for unauthorized activities and it generates alerts for different types of attacks. For this we propose Efficient algorithm named as Top-k PUS which identifies unexplained sequences and for alerts generation we are using GM Approach which consists of probabilistic methods. Finally experimental results Show that those are efficient with detection accuracy and time.

This paper addresses finding subsequences that are not explained by the activities.

For this We propose a Top-k PUS and GM Approach with probabilistic model for alert generation.

Paper Type : Research Paper
Title : A Survey of Recommendation Algorithms
Country : India
Authors : Ruchita V. Tatiya || Prof. Archana S. Vaidya
: 10.9790/0661-16651619    logo

Abstract: Recommender system can be defined as the subclass of information filtering system which attempts to give the guidance to the users regarding the useful services based on their personalized preferences, past behavior or based on their similar likings with other users. The various approaches of recommendation systems, like content-based, collaborative filtering, hybrid, etc, can further be classified according to their algorithmic technique as memory-based (heuristic) or model-based recommendation algorithms.

[1]. Recommendation system:
[2]. Michael J. Pazzani and Daniel Billsus, "Content-based Recommendation Systems".
[3]. Content based Recommendations:
[4]. Collaborative Filtering:
[5]. SongJie Gong, "A Collaborative Filtering Recommendation Algorithm Based on User Clustering and Item Clustering," journal of software, vol. 5, no. 7, july 2010

Paper Type : Research Paper
Title : The Design and Implementation of On-Line Examination Using Firewall security
Country : India
Authors : V.Selvi || R.Sankar || R.Umarani
: 10.9790/0661-16652024    logo

Abstract: Online Examination System is a software solution, which allows a company or institute to arrange, conduct and manage examinations via an online environment. This can be done through the Internet, Intranet and/or Local Area Network environments. In this paper propose a system that provides security to improve on-line Examination by utilizing DMZ Concept in firewall technology. This research paper, discuss the performance of online exam with respect to the security provided by the firewall technology.

[2] Chi-Chien Pan et al, Secure online examination architecture based on distributed firewall , e-Technology, e-Commerce and e-Service, 2004 IEEE International Conference on , 28-31 March 2004 ,533 - 536 .
[5] Bhagyashri Kaiche et al , Online Descriptive Examination and Assessment System, International Journal of Emerging Technology and Advanced Engineering, Volume 4, Issue 3, March 2014.

Paper Type : Research Paper
Title : "An efficient IP trace back using packetizing logging and pre shared key exchange"
Country : India
Authors : Narendra Pradhan || Rajesh Kumar Sahu || Kamlesh kumar pandey.
: 10.9790/0661-16652528    logo

Abstract: Here in this work we presented a hybrid model of packet marking and logging for the IP trace back for the node that wants to attack any node in the network. The main idea is to detect the DOS attacks in the network by employing the ip of the attacker node. Here we are implementing the packet marking and the logging for the homogenous and the heterogeneous network. Also here we are integrating the concept of pre shared key exchange on the routers to make the marking of the packets is easy and can increase the efficiency of detecting attacks in the network.

Keywords: Ip, Packetizing, Shared Key Exchange, Logging, Trace.

1]. Al-Duwairi,, and G. Manimaran," Novel Hybrid Schemes Employing Packet Marking and Logging for IP Traceback Bashee "IEEE. Volume 17, Issue 5, May 2006, Pages: 403 - 418.
[2]. Arbor Networks Inc., "2010 worldwide infrastructure security report," [EB/OL], http: //
[3]. C. Gong and K. Sarac, "A more practical approach for single-packet IP trace back using packet logging and marking," IEEE Transactions on Parallel and Distributed Systems, Vol. 19 , pp. 1310-1324, 2008.
[4]. Dong yan, yulong wang, sen su and fangchun yang. "A Precise and Practical IP Trace back Technique based on packet marking and logging", published journal of information science and engineering 28, 453-470, 2012.

Paper Type : Research Paper
Title : A Survey Report on the Novel Approach on Use of Recommendation Outline in Query Recommender System
Country : India
Authors : Pooja K. Akulwar || Disha Deotale
: 10.9790/0661-16652934    logo

Abstract: The DBMS applications are becoming increasingly popular in the scientific community to support the interactive exploration of huge data. A result of heavy usage has also lead to a lot of tavles generated in the warehouse. This has tremendously increased the need for recommendation system & various tools for the user as user is not capable to explore such huge data by using Structured Query language. This motivates to turn towards the idea of query recommendation system which will assist the technical & non-technical users to generate top-N query recommendations as per their needs. In this survey paper, the focus is given on opportunities that exist in domain of query recommendation, brief description of recommendation outline and techniques. Along with this, the terminology to identify the similarity and comparison of fragment based approach & matrix factorization approach is also explored.

Keywords: Database Management System, Query Recommendation, Recommendation techniques.

[1]. M. Eririnaki, S. Abraham, N. Polyzotis, and N. Shaikh,"QueRIE: Collaborative Database Exploration", IEEE Transaction on Knowledge and Data Engineering, 2013.
[2]. X. Su, and T. M. Khoshgoftarr, Review Article-"A Survey of Collaborative Filtering Techniques", in Advances in Artificial Intelligence", vol. 2009, Article Id 421425, Aug 3, 2009.
[3]. Christopher Miles, "More like This: Query Recommendation for SQL".
[4]. Y. Koren, Yahoo Research, and R. Bell, C. Volinsky, "Matrix factorization techniques for recommender system", in IEEE Computer Society, AT & T Labs, 2009.
[5]. L. Lu, M. Medo, C.H. Yeung, Yi-Cheng Zhang, Zi-Ke Zhang, and T. Zhou,"Recommender System", Feb 7,

Paper Type : Research Paper
Title : Component Based Representation Using Probabilistic Neural Network Classifier
Country : India
Authors : Anjali G.
: 10.9790/0661-16653539    logo

Abstract: The law enforcement agency make use of face recognition system for the identification of criminals. In some cases, the photograph of criminals is not available. In this situation,sketch is drawn by the information provided by the eyewitness. In the early stages sketches are drawn by the artist by the information provided by the eyewitness. Sometimes the witness does not recall the exact apperance of the suspect. In that case,sketch drawn is not helpfull for investigation. In this networked world, the sketch construction with the help of computer generated software arises. The computer generated composite sketch is constructed by selecting the facial components provided in the system database. The composite sketch construction gives more faster results for the law enforcement agency. The component based approach for face recognition using probabilistic neural network classifier gives more accurate result in photo to sketch matching. The proposed approach performs facial decomposition, some transformations and feature extraction for photo to composite matching. The use of classifier is helpfull for comparing the features of face images and gives the degree of match to make a decision. The advantage of using Probabilisitic Neural Network( PNN) classifier is that it requires only short training time.
Keywords: Composite based approach, composite sketch , PNN.

[1]. D. Mcquiston, L. Topp, and R. Malpass, "Use of facial composite systemsin US law enforcement agencies," Psychology, Crime and Law,vol. 12, no. 5, pp. 505–517, 2006.
[2] A. K. Jain, B.Klare, andU. Park, "Face matching and retrieval in forensicsapplications," IEEE Multimedia, vol. 19, no. 1, p. 20, Jan. 2012.
[3] B. Klare, Z. Li, and A. Jain, "Matching forensic sketches to mug shotphotos," IEEE Trans. Pattern Anal. Mach. Intell., vol. 33, no. 3, pp.639–646, Mar. 2011
[4] H. A. Rowley,"Neural Network Based Face Detection, Neural network BasedFace Detection", School of Computer Science, Computer Science Department, Carnegie Mellon University, Pittsburgh, Pa, USA, 1999.
[5] Topi Maenpaa and Matti Pietikainen." Multi-scale binary patterns for texture analysis". In SCIA, pages , 2003.

Paper Type : Research Paper
Title : Mean shift segmentation on Enhanced Color image
Country : India
Authors : Poonam Chauhan || R. V. Shahabade
: 10.9790/0661-16654044    logo

Abstract: This paper proposed the method of mean shift segmentation on Enhanced color image . The method applies the modified histogram equalization technique for enhancement of under illuminated color image and then mean shift segmentation is applied on this enhanced image. This technique uses the lightness component in YIQ color space is transformed using sigmoid function, then the traditional histogram equalization (HE) method is applied on Y component. Once the image is enhanced mean shift segmentation is applied to the enhanced image due to which we get good segmentation results as compared to without enhanced image. Experiments on natural color images show promising results.
Keywords: YIQ, RGB, Histogram Equalization, Sigmoid function, Mean shift Segmentation

[1]. D.Jabson, Z.Rahman, and G.A. Woodel,"A multi-scale retinex for bridging the gap between color images and the human observation of scenes," IEEE Trans. Image Process. 6, pp. 965-976, July 1997.
[2]. Z. Rahman, G. A. Woodell, and D. J. Jobson, "A Comparison of the Multiscale Retinex with Other Image EnhancementTechniques,'' Proceedings of the IS&T 50th Anniversary Conference, May 1997.
[3]. D. J. Jobson, Z. Rahman, and G. A. Woodell, "Properties and performance of a center/surround retinex," IEEE Trans. On Image Processing 6, pp. 451–462, March 1996.
[4]. B. V. Funt, K. Barnard, M. Brockington, and V.Cardei, "Luminance-based multiscale Retinex",Proceedings AIC Color 97, Kyoto, Japan, 1997 .
[5]. K. Barnard and B. Funt, "Analysis and Improvement of Multi-ScaleRetinex" In Proceedings of the IS&T/SID Fifth Color Imaging Conference: Color Science, Systems and Applications, Scottsdale, Arizona, pp. 221-226,November 17-20, 1997.

Paper Type : Research Paper
Title : Things on which a computer science engineer should focus on
Country : India
Authors : Divya || P. Deepthi
: 10.9790/0661-16654546    logo

Abstract: One of the evergreen course in engineering is the computer science engineering .It is the one which is ruling the entire world. To continue its journey successfully in future generations ,the present generation students should play a major role by developing good softwares , by focusing on some of the important and necessary skills which leads to the success.


Paper Type : Research Paper
Title : Clustering Engine for Desktop Usability
Country : India
Authors : Prajakta Sharmao Pawar || Sushopti Gawade
: 10.9790/0661-16654749    logo

Abstract: The increased capacity and lower prices of computer hard drives led to a new universe of knowledge. Although search and information retrieval techniques are already widely used in the Internet, its application in personal computers is still incipient. The management of information is relatively difficult when it comes to large size of data lying in the machine. There is a need to manage the number of documents and the data retrieval is difficult when the number of files is too many. This project proposes an approach of document clustering as user need to retrieve information from set of documents. [1]Document clustering is one of the approach in clustering method which is specifically used for management and retrieval of documents. [2]The clustering engine intelligently works towards providing user with document as input, the specific documents with output.

[1]. Intelligent Clustering Engine: A clustering gadget for Google Desktop, 2012 Lando M. di Carlantonio a,⇑, Bruno A. Osiek a, Geraldo B. Xerox a, Rosa Maria E.M. da Costa
[2]. Web Clustering Engine based on Wikipedia, Yuvarani Meiyappan1, N. Ch. S. Narayana Iyengar2 and A. Kannan3 1Lead, Infosys Limited, Bangalore, Karnataka, India 560100
[3]. A Survey of Web Clustering Engines CLAUDIO CARPINETO, STANISlAW OSIN´ SKI-2012
[4]. Carrot2 s.c.t. Clustering Framework, Dawid Weiss, Pozna´n University of Technology, Pozna´n, Poland and Stanisław Osi´nski
[5]. A Document Clustering Approach for Search Engines Chun-Wei Tsai, Ting-Wen Liang, Jiun-Huei Ho, Chu-Sing Yang and Ming-Chao Chiang.

Paper Type : Research Paper
Title : Unique Identity / Unique Human Identity / Unique World Identity / Unique Citizen Identity / Human Identity / Citizen Identity – Number
Country : Bangladesh
Authors : Ziaur Rahman
: 10.9790/0661-16655052    logo

Abstract: Unique Identity for every human and non-human entity on the earth is the crucial issue for the time being. Unique Identity means assigning numeric identity number to every human aged greater or equal to 0 day, each shop/institute/organization/farm/company and other like entities within countries and international organizations/bodies from now/floating date. It is envisaged for peace and security of the mankind, simplifying complicated public systems within country and in the international arena, to expedite building global village and increasing cultural, economic/business relation and amity with trust among people beyond the border. This will bring discipline in human life in the world. It will substantially reduce militancy and other minor or major criminal incidents. In this system I recommend to keep an entity profile against each entity of the country in a government database. And this will facilitate people home and abroad manifold.
Keywords: Account security, citizen identity, citizen safety, human identity, information security, internet security, public discipline, public security, safe communication, security, security rules, security system, unique citizen identity, unique human identity, unique identity, unique identity number, unique people identity, unique world identity.


Paper Type : Research Paper
Title : ComparativeAnalysis of Automated Image-Tagging Techniques
Country : India
Authors : Mayuresh Jakhotia || Dheeraj Agarwal || Mithun Sanghvi || Shubham Shah
: 10.9790/0661-16655356    logo

Abstract: Smart phones with cameras having powerful built-in sensors tend to meet at a point towards the problem of automatic image-tagging. So such an out-of-band approach is valuable, especially with increasing device density and greater sophistication in sensing and learning algorithms. This paper shows that automatic tagging of images with relevant tags is possible by using a combination of the capture of location, the date/time when the image was captured, and an image category. Comparison of various automatic image-tagging approaches has been done so as to develop a new system with a dynamic approach for using multiple images when possible, and fewer images when not many relevant images are found.
Keywords: Annotation, context, digital images, image tagging, sensing.

[1] Moxley, E., J. Kleban, and B.S. Manjunath,"SpiritTagger: A geo-aware tagsuggestion tool mined from flickr, in Proc.1st ACM international conference on Multimedia information retrieval. 2008, ACM: Vancouver, British Columbia, Canada. p. 24-30.
[2] Popescu, A., et al., "MonuAnno: Automatic annotation of geo-referenced landmarks images", in Proc.ACM International Conference onImage and Video Retrieval. 2009, ACM: Santorini, Fira, Greece. p. 1-8.
[3] Ahern, S., et al., "ZoneTag: Designing Context-Aware Mobile Media Capture to Increase Participation, Pervasive Image Capture and Sharing", in Proc.Eight International Conference on Ubiquitous Computing (UbiComp2006), 2006.
[4] Wang, X.-J., et al., "AnnoSearch: Image Auto-Annotation by Search", in Proc.2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition - Volume 2. 2006, IEEE Computer Society.p.1483-1490.
[5] Rattenbury, T., N. Good, and M. Naaman, "Towards automatic extraction of event and place semantics from flickr tags", in Proc. 30th annualinternational ACM SIGIR Conference on Research and Development in Information Retrieval. 2007, ACM: Amsterdam, The Netherlands. p. 103-110.

Paper Type : Research Paper
Title : Latest development of cloud computing technology, characteristics, challenge, services & applications
Country : India
Authors : Sushil kumar Choudhary || R.S Jadoun || H.L. Mandoriya || Ashok Kumar
: 10.9790/0661-16655768    logo

Abstract: Cloud computing is a network-based environment that focuses on sharing computations, Cloud computing networks access to a shared pool of configurable networks, servers, storage, service, applications & other important Computing resources. In modern era of Information Technology, the accesses to all information about the important activities of the related fields. In this paper discuss the advantages, disadvantages, characteristics, challenge, deployment model, cloud service model, cloud service provider & various applications areas of cloud computing such as small & large scale (manufacturing, automation, television, broadcast, constructions industries), Geographical Information system (GIS), Military intelligence fusion (MIS), business management, banking, Education, healthcare, Agriculture sector, E-Governance, project planning, cloud computing in family etc.

Keywords: Cloud computing, community model, hybrid model, Public model, private model

[1]. Eviwiekpaefe, A.E. & Ajakaiye,F., (2014), ―The trend and challenges of cloud computing: a literature review‖, International Letters of Social and Humanistic Sciences5,pp.13-20.
[2]. I. Foster, Y. Zhao, I. Raicu, and S. Lu, Cloud Computing and Grid Computing 360‐Degree Compared,[Accessed May 19, 2012].
[3]. S. Biswas, "Where Is Cloud Computing Going? Up, Up And Away!" January 25, 2011, is cloud computing going up up and away [Accessed May 19, 2012].
[4]. Bhushan Lal Sahu,Rajesh Tiwari, Journal of Advanced Research in Computer Science and Software Engineering 2(9) (2012) 33-37.
[5]. U. Oktay, U.& Sahingoz, O.K.(2013) ―Attack Types and Intrusion Detection Systems in Cloud Computing‖ 6th international information security & cryptology conference, pp.71-76.
[6]. Security for Cloud Computing 10 Steps to Ensure Success, 2012 Cloud Standards Customer Council
[7]. Pawar A,. ; Shingavi, A.; Pabale, S.; Chahyal G. (2014) ―Reliability security for cloud computing‖ International Journal of Emerging Technology and Advanced Engineering. Vol.4.N0.8, pp.757-759.

Paper Type : Research Paper
Title : Voltage Control Of Three Phase Ac/Dc Pwm Converters Using Feedback Linearisation
Country : India
Authors : Ancha.Sadhana || K.Bhavana
: 10.9790/0661-16656977    logo

Abstract: This paper proposes a voltage control strategy for a three level PWM converter based on feedback linearization in order to control dc bus voltage. Incorporating the power balance of the input and output sides in system modeling, a nonlinear model of the PWM converter is derived with state variables such as ac input currents and dc output voltage. Feedback linearization transforms a nonlinear system into a linear system. Then by input–output feedback linearization, the system is linearized and a state feedback control law is obtained by pole placement. For robust control to parameter variations, integrators are added to the exact feedback control law. Since the fast voltage control is feasible for load changes, it is shown that the capacitor size can be reduced remarkably. The input current is regulated to be sinusoidal and the source power factor can be controlled at unity. This feedback linearization technique can be extended for permanent magnet synchronous generator wind power system at the grid voltage sag. The proposed method is tested and the results of simulation are observed using MATLAB/SIMULINK.

Keywords: AC/DC pulse width modulation converter, DC-link voltage, feedback linearization, permanent magnet synchronous generator (PMSG), wind power, matlab/simulink.

[1]. Ki-Hong Kim,Yoon-Cheul Jeung, Dong-Choon Lee and Heung-Geun Kim "LVRT Scheme of PSMG wind power system based on feedback linearization", IEEE Transactions on Power Electronics, vol.27,no.5,may2012.
[2]. Dai, D. Xu, B.Wu, and N. R. Zargari, "Unified DC-link current control for low-voltage ride-through in current-source-converter-based wind energy conversion systems," IEEE Trans. Power Electron., vol. 26, no. 1, pp. 288–297, Jan. 2011.
[3]. D.-E. Kim and D.-C. Lee, "Feedback linearization control of three-phase UPS inverter systems," IEEE Trans. Ind. Electron., vol. 57, no. 3, pp. 963– 968, Mar. 2010.
[4]. G. Foo and M. F. Rahman, "Sensorless direct torque and flux-controlled IPM synchronous motor drive at very low speed without signal injection," IEEE Trans. Power Electron., vol. 57, no. 1, pp. 395–403, Jan. 2010.
[5]. A.Vladan Stankovic, and K. Chen, "A New Control Method for Input-Output Harmonic Elimination of the PWM Boost Rectifier under Extreme Unbalanced Oper-ating Conditions," IEEE Transactions on Industrial Elec-tronics, Vol. 56, No. 7, 2009, pp. 2420-2430. Doi:10.1109/TIE.2009.2017550
[6]. X. H. Wu, S. K. Panda and J. X. Xu, "Analysis of the Instantaneous Power Flow for Three-Phase Boost Recti-fier under Unbalanced Supply Voltage Conditions," IEEE Transactions on Power Electronics, Vol. 23, No. 4, 2008, pp. 1679-1691. Doi:10.1109/TPEL.2008.925158

Paper Type : Research Paper
Title : Secure Intranet Voting System for Students' Union Elections in Nigerian Tertiary Institutions
Country : Nigeria
Authors : Bonaventure C. Molokwu || Monica N. Agu
: 10.9790/0661-16657889    logo

Abstract: In virtually all tertiary institutions of Nigeria, electronic voting technologies for the conduct of students' union elections are yet to be implemented as a replacement for the existent manual voting technologies. Manual voting systems are primarily characterized by high incidences of electoral malpractices and irregularities. In this era of rapid globalization, the impact of information and communications technology (ICT) advancement in Nigeria is having numerous positive implications on students and their communities.

[1]. P. Dempsey, Student Elections Online (Carlisle, England: Dickinson College, 2000).
[2]. B. C. Molokwu and M. N. Agu, Students‟ Information-exchange and Repository System for Nigerian Tertiary Institutions, African Journal of Computing & ICT, 7(3), 2014, 53-60.
[3]. B. Oxendine, Electronic Elections ( Student Leader, 1999).
[4]. B. Jones, A Report on the Feasibility of Internet Voting, California Secretary of State, Sacramento, California, USA, 2000.
[5]. L. F. Cranor and R. K. Cytron, Design and Implementation of a Practical Security - Conscious Electronic Polling System, Department of Computer Science, University St. Louis, Washington, USA, 1996.
[6]. V. Kalaichelvi and R.M. Chandrasekaran, Design and Analysis of Secured Electronic Voting Protocol, Asian Journal of Information Technology, 11(2), 2012, 50-55.

Paper Type : Research Paper
Title : Quality enhancement of video denoising algorithm with combined effect of different views
Country : India
Authors : Er. Snehal Ambulkar || Er. Priti Golar
: 10.9790/0661-16659097    logo

Abstract: An unwanted factor in digital images and videos called as Noise is responsible for hiding the details and destroying image information. Hence denoising has great importance in the detail restoration and to improve the quality measures. A simple adaptive median filter (SAMF) is one of the most promising algorithm capable of denoising the videos to better extent, but incapable to use all the neighboring pixel information while noise processing. And hence quality of the denoised video can be further improved if all neighboring pixel information is considered. To make this possible the SAMF is combined with the multi-view denoising and then a fusion strategy is used to generate enhanced denoised video sequence. The performance of the combined system is measured through the image quality matrix called as Pick Signal to Noise Ratio (PSNR) at different noise contamination level.

Keywords: simple adaptive median filter (SAMF), Multiview Fusion (MVF), Adaptive Filter, Denoising, Impulse noise, Median filter, Salt-and–pepper, Switching Median Filter.

1] Vladimir Zlokolica, Aleksandra Pizurica, and Wilfried Philips, "Video denoising using multiple class averaging with Multiresolution",University of Ghent, Sint-Pietersnieuwstraat 41, 9000 Ghent, Belgium,VLBV2003,LNCS 2849,PP. 172-179,2003, Springer verlog berlin Heidelberg 2003.
[2] Bovik, Alan C.: Handbook of Image and Video Processing (Communications, Networking and Multimedia). Academic Press, Inc., Orlando, FL, USA, (2005).
[3] Rafael C. Gonzalez, Richard E. Woods, Book on "Digital Image Processing", third edition, Pearson Education, pp.156-157,326,332-335,369©2008.
[4] Kai Zeng, and Zhou Wang; Polyview Fusion: A Strategy to Enhance Video-Denoising Algorithms; IEEE Transactions On Image Processing, Vol. 21, No. 4, APRIL (2012).
[5] Sung-JeaKo, and YoogHoon Lee, ''Center weighted median filters and their application to image enhancement'', IEEE Trans. Circuits and System, vol. 38, no. 9, pp. 984-993, September 1991.

Researcher can also search IOSR published article contents through

IOSR Xplore