IOSR Journal of Computer Engineering (IOSR-JCE)

May – Jun. 2015 Volume 17 - Issue 3

Version 1 Version 2 Version 3 Version 4 Version 5 Version 6 Version 7

Paper Type : Research Paper
Title : Creating a Bicycle Design Approach Model Based on Fashion Styles
Country : Japan
Authors : Shuntaro Toyoda || Kaori Koizumi || Kakuro Amasaka

Abstract: The authors created a Bicycle Design Approach Model Based on Fashion Styles as a means of supporting idea generation for product development that takes into account customer sensibilities, and the effectiveness of this model was then verified. Specifically, an eye-tracking camera was used to analyze line of sight and discover the areas of a bicycle's exterior design that caught customers' attention. Next, preference studies were conducted and the results were analyzed using statistical science to identify subjective words that match four fashion styles. Rough Set Analysis and Quantification Theory Type I were used to analyze the findings and determine the extent of influence of each design element with respect to the subjective words, thus making it possible to create bicycle designs that match the preferences of each fashion group. The effectiveness of the proposed model in supporting idea generation during actual bicycle design and development was then verified.

Keywords: bicycle exterior design, Bicycle Design Approach Model, Fashion Styles

[1]. K. Amasaka, (1997), ―A Study on ―Science SQC‖ by Utilizing ―Management SQC‖ -A Demonstrative Study on A New SQC Concept and Procedure in the Manufacturing Industry-,‖ Journal of Production Economics, Vol. 60-61.
[2]. K. Amasaka, (1998), ―Application of Classification and Related Methods to SQC Renaissance in Toyota Motor,‖ Data Science, Classification, and Related Methods, pp. 684-695, Springer.
[3]. Nagamachi, S. (2010), ―Product development and innovation Kansei Engineering‖, Color Science Association of Japan Journal, Volume 34, No. 3.
[4]. S. Takebuchi, H. Asami, T. Nakamura and K. Amasaka (2010), ‗Creation of Automobile Exterior Color Design Approach Model ―A-ACAM‖', Proc. of the 40th International Conference on Computers & Industrial Engineering, pp.1-5.

Paper Type : Research Paper
Title : Security based Clock Synchronization technique in Wireless Sensor Network for Event Driven Measurement Applications
Country : India
Authors : Mrs .Mary Cherian || Latha M

Abstract: In this paper, secure based novel clock synchronization in wireless sensor network for event driven measurement application is proposed with security. The main objectives are 1) To provide high accuracy in the area where an event is detected 2) To ensure long network lifetime 3) To ensure security based packet transmission. The complexity of a problem arises from first two properties that usually in clash. To increase the synchronization accuracy, the nodes are required to transfer synchronization packets at higher rate thus impacting the network lifetime.

[1]. A. Colombo, D. Fontanelli, D. Macii, and L. Palopoli, "Flexible indoor localization and tracking based on a wearable platform and sensor data fusion," IEEE Trans. Instrum. Meas., doi: 10.1109/TIM.2013.2283546.
[2]. A. Gasparri and F. Pascucci, "An interlaced extended information filter for self-localization in sensor networks," IEEE Trans. Mobile Comput., vol. 9, no. 10, pp. 1491–1504, Oct. 2010.
[3]. B. Li, Y. He, F. Guo, and L. Zuo, "A novel localization algorithm based on isomap and partial least squares for wireless sensor networks," IEEE Trans. Instrum. Meas., vol. 62, no. 2, pp. 304–314, Feb. 2013.
[4]. L. Fanucci, S. Saponara, T. Bacchillone, M. Donati, P. Barba, I. Sanchez-Tato, et al., "Sensing devices and sensor signal processing for remote monitoring of vital signs in CHF patients," IEEE Trans. Instrum. Meas., vol. 62, no. 3, pp. 553–569, Mar. 2013

Paper Type : Research Paper
Title : Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Country : India
Authors : Raghavendra L A || Dayananda Lal.N || Karthik D U

Abstract: The improvement of wireless sensor network has offered move to public sensing as it is vibrant sharing model. This creative energy can be clarified under the Internet of Things (IoT) to adopt different information sources inside shrewd urban areas, such as sensors on roads, buildings, radio frequency identifier tags (RFID), cell phones and living spots. Sensor system incorporated with enormous number of nodes where every nodes need to communicate with other node at whenever state of the link changes. Link state (LS) routing protocol directly floods announcement of change in any join's status to each router in the network and Distant Vector (DS) routing uses ceaseless appropriation of current guide of whole system's topology for all switches.

[1]. Ashraf E, Al- Fagih (member, IEEE) Fadi M. Al-Turaman (member, IEEE), Waleed M, Alsalih and Hossam S, Hassanein (senior member IEEE): A priced public sensing for heterogeneous IOT Architecture.
[2]. Sivashakthi, Dr. N Prabakaran (2013): A Survey on Storage Techniques in Cloud Computing, Volume 3, Issue 12.
[3]. Kumaraswamy Krishnakumar, Ling wan: University of Melbourne: .A Framework for IoT Sensor Data Analytics and Visualization in Cloud Computing Environments.
[4]. Brad Karp Harvard University / ACIRI, H. T. Kung Harvard University: GPSR: Greedy Perimeter Stateless Routing for Wireless Networks.
[5]. JOHNSON, D. B.AND MALTZ, D. B: Dynamic source routing in ad hoc wireless networks. In Mobile Computing, T. Imielinski and H. Korth, Eds. Kluwer Academic Publishers, 1996, ch. 5, pp. 153–181.
[6]. Pradeep Kumar Tiwari, Dr. Bharat Mishra: Cloud Computing Security Issues, Challenges and Solution (ISSN 2250-2459, Volume 2, Issue 8, August 2012).

Paper Type : Research Paper
Title : A Generic Open Source Framework for Auto Generation of Data Manipulation Commands
Country : India
Authors : Dr. Poornima.G. Naik || Dr. Kavita.S.Oza

Abstract: Free and open source technology has gained a tremendous importance in software development due to its low cost and holds numerous other compelling advantages both from the perspective of software user and software developer. J2EE and PHP technologies have availed a highest market share. All types of web sites ranging from medium to large sized applications employing these technologies include ample master tables for storing data which are subject to seldom changes. In application development, there is a lot of code repetition in manipulation of data stored in these tables.

[2]. Ivan Ruiz-Rube , Juan Manuel Dodero, Ricardo Colomo-Palacios, A framework for software process deployment and evaluation, Information and Software Technology 59 (2015) 205–221, Elsevier
[3]. Selic, B, A generic framework for modeling resources with UML, Computer, volume:33, Issue: 6, Page no. 64 – 69, 06 August 2002, IEEE

Paper Type : Research Paper
Title : Semi-Supervised Discriminant Analysis Based On Data Structure
Country : China
Authors : Xuesong Yin || Rongrong Jiang || Lifei Jiang

Abstract: Dimensionality reduction is a key data-analytic technique for mining high-dimensional data. In this paper, we consider a general problem of learning from pairwise constraints in the form of must-link and cannot-link. As one kind of side information, the must-link constraints imply that a pair of instances belongs to the same class, while the cannot-link constraints compel them to be different classes. Given must-link and cannot-link information, the goal of this paper is learn a smooth and discriminative subspace.

[1]. D. Zhou, O. Bousquet, T.N. Lal, J. Weston, and B. Scholkopf. Learning with local and global consistency. In Advances in Neural Information Processing Systems 16, 2003, pp. 321-328.
[2]. P. Garcia-Laencina, G. Rodriguez-Bermudez, J. Roca-Dorda. Exploring dimensionality reduction of EEG features in motor imagery task classification, Expert Systems with Applications, 41 (11) (2014)5285-5295.
[3]. Y. Lin, T. Liu, C. Fuh Dimensionality Reduction for Data in Multiple Feature Representations. In Advances in Neural Information Processing Systems 21, 2008, pp. 961-968.
[4]. X. Zhu, Z. Ghahramani, and J. Lafferty. Semi-Supervised Learning using Gaussian Fields and Harmonic Functions, Proc. Twentieth Int'l Conf. Machine Learning, 2003, pp. 912-919.
[5]. X. He, S. Yan, Y. Hu, P. Niyogi, H. Zhang, Face recognition using laplacianfaces, IEEE Trans. Pattern Anal. Mach. Intell. 27 (3) (2005) 328-340.

Paper Type : Research Paper
Title : Passive Image Forensic Method to Detect Resampling Forgery in Digital Images
Country : India
Authors : Amaninder Kaur || Sheenam Malhotra

Abstract: The digital images are becoming important part in the field of information forensics and security, because of the popularity of image editing tools, digital images can be tampered in a very efficient manner without leaving any visual clue. As a consequence, the content of digital images cannot be taken as for granted. Therefore it is must to create forensic techniques which is capable of detecting tampering in image. In general, the image forgery technologies often utilizes the scaling, rotation or skewing operations to tamper some regions in the image, in which the resampling is demanded. Forged area is often resized & rotated to make it proportional with respect to neighboring unforged area. This is called as resampling operation which changes certain characteristics of the pasted portion.

[1]. P. Sabeena Burvin, P.G. Scholar and J. Monica Esther, "Analysis Of Digital Image Splicing Detection," IOSR Journal Of Computer Engineering (IOSR-JCE), ISSN: 2278-0661, Vol. 16, pp.: 10-13, Issue No. 2, Ver. Xi, April 2014.
[2]. P. Subathra, A. Baskar and D. Senthil Kumar, "Detecting Image Forgeries Using Re-Sampling By Automatic Region Of Interest (ROI)," Ictact Journal On Image And Video Processing, ISSN: 0976-9102, Vol. 02, pp.: 405-409, Issue No. 04, May 2014.
[3]. P.G. Gomase and N.R. Wankhade "Advanced Image Forgery Detection," IOSR Journal of Computer Science (IOSR-JCE), ISSN: 2278-8727, pp.: 80-83, April 2014.
[4]. Sanawer Alam and Deepti Ojha, "A Literature Study on Image Forgery," International Journal of Advance Research in Computer Science and Management Studies, ISSN: 2321-7782, Vol. 2, pp.: 182-190, Issue No.10, October 2014.
[5]. Kusam, Pawanesh Abrol and Devanand, "Digital Tampering Detection," Bijit - Bvicam's International Journal of Information Technology and Bharati Vidyapeeth's Institute Of Computer Applications and Management (BVICAM), ISSN: 0973 – 5658, Vol. 01, pp.: 125-132, Issue No. 2, December 2009.

Paper Type : Research Paper
Title : Stock Market Prediction and Investment Portfolio Selection Using Computational Approach
Country : India
Authors : Keerti. S.Mahajan || Dr. R .V. Kulkarni

Abstract: Stock Market is considered as one of the fundamental pillars of national economy, as the important purpose of stock market in the economy is to raise capital and also to transfer funds to the most profitable opportunities, Therefore Predicting Stock Price, Predicting Timing and Selection of Portfolio are considered as several extremely complex situations in stock market. because, they are affected by many interrelated economic, social, political and even psychological factors at both local and global levels and all these factors are interrelated with each other in a very critical manner, These makes use of Mathematical Approaches & Soft Computing techniques combinely.

[1]. Market
[3]. State of the Art in Stock Prediction Techniques by J.G.Agrawal , Dr. V.S. Chourasia, Dr,A.K.Mittra ,April 2013
[4]. Role of soft computing techniques in predicting stock market direction by panchal Amitkumar Mansukhbhai and Patel , December 2012
[6]. Jin-Cherng Linet. al.

Paper Type : Research Paper
Title : A New Classifier Based onRecurrent Neural Network Using Multiple Binary-Output Networks
Country : Iran
Authors : Mohammad Fazel Younessy || Ehsanolah Kabir

Abstract: Conventional classifiers have several outputs equal to the number of classes (N) which imposes so much complexityto the classifiers,both in training and testing stages. Instead of using one extra-large and complicated classifier, we created N number of simple binary Recurrent Neural Network with true/false outputs. Each network is responsible of recognizing its own trained class.We also proposed adecision layer added to each network, making a final decision from a sequence of outputs. We test our system on features extracted from Iranshahr database, which is a set of 17,000 black-and-white handwritten images of Iranian city names. Experimental results authenticate the effectiveness of the proposed method.

Keywords: Recurrent Neural Network,RNN, Classifier, Binary Network

[1] Kumawat, P.; Khatri, A.; Nagaria, B., "Comparative Analysis of Offline Handwriting Recognition Using Invariant Moments with HMM and Combined SVM-HMM Classifier," Communication Systems and Network Technologies (CSNT), 2013 International Conference on , vol., no., pp.140,143, 6-8 April 2013.
[2] Maqqor, A.; Halli, A.; Satori, K.; Tairi, H., "Off-line recognition handwriting Arabic words using combination of multiple classifiers," Information Science and Technology (CIST), 2014 Third IEEE International Colloquium in , vol., no., pp.260,265, 20-22 Oct. 2014
[3] Wu Wei; Gao Guanglai, "Online Handwriting Mongolia words recognition based on HMM classifier," Control and Decision Conference, 2009. CCDC '09. Chinese , vol., no., pp.3912,3914, 17-19 June 2009.
[4] Al-Hajj Mohamad, R.; Likforman-Sulem, L.; Mokbel, C., "Combining Slanted-Frame Classifiers for Improved HMM-Based Arabic Handwriting Recognition," Pattern Analysis and Machine Intelligence, IEEE Transactions on , vol.31, no.7, pp.1165,1177, July 2009
[5] Chung-Hsien Wu; Wei-Bin Liang, "Emotion Recognition of Affective Speech Based on Multiple Classifiers Using Acoustic-Prosodic Information and Semantic Labels," Affective Computing, IEEE Transactions on , vol.2, no.1, pp.10,21, Jan.-June 2011.

Paper Type : Research Paper
Title : A Comparative Result Analysis of Text Based Steganographic Approaches
Country : India
Authors : K.Aditya Kumar || Prof.Suresh Pabboju

Abstract: Today in this digital era everything (data) can be digitized and can be transmitted over the communication networks. But not withstanding with this advantage it also has a downside i.e. the digitized data can be easily accessed illegally, it can be tampered with and copy. The issue of providing security to the information has become increasingly important with the development of computer and expanding its use in different areas of one's life and work[4]. One of the grounds discussed in information security is the exchange of information through the cover media. In this, different methods such as cryptography, steganography, etc., have been used. Many approaches were introduced for making the data secure. But the efficient utilization of those approaches isn't defined i.e. which approach to be used according to the situations.

[1]. Monika Agarwal "Text Steganographic Approaches: A Comparison" of International Journal of Network Security and its Appications ,Vol.5.No.1,Janauary 2013.
[2]. F.A.P.Petitcolas R.J.Anderson, and M.G.Kuhn, "Informatio Hiding -A Survey", In proceedings of IEEE, Vol 87,pp.1062-1078,1999.
[3]. S.Changder, D.Ghosh, and N.C.Debnath, "Linguistic approachfor text steganography through India text", 2012 2nd Int.Conf. on Computer Technology and Development,2010,pp. 318-322.
[4]. R.J.Anderson, and F.A.P. Petitcolas, "On the limits of Steganography", IEEE Journal of Selected Areas in Communication, vol. 16, pp. 474-481,1998.
[5]. I. Banerjee, S. Bhattacharyya, and G. Sanyal, "Novel text steganography through special code generation," Int. Conf. on Systemics, Cybernetics and Informatics, 2011, pp. 298-303.

Paper Type : Research Paper
Title : Real-time Moving Object Detection using SURF
Country : India
Authors : Helly M. Desai || Vaibhav Gandhi

Abstract: Tracking and traffic monitoring are main application of moving Object detection in video. This paper presents SURF (Speed-Up Robust Features) algorithm and real-time detection of objects using frame difference. The main purpose of this proposed work is to solve the difficulty of modeling background and its update rate in background subtraction method. SURF is having fast processing technique to find features of an object image in real-time and then by using this algorithm we will compare object image features with our real-time object image features. After that match object image features and real-time features.

Keywords: Background subtraction, Feature Extraction, SURF algorithm

[1]. Wren C, Azarbayejani A, Darrell T, et al. Pfinder: Real-Time Tracking of the Human Body[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1997, 19(7): 780-785.
[2]. Ridder C, Munkelt 0, Kirchner H. Adaptive Background Estimation and Foreground Detection Using Kalman-Filtering[A]. In: Proceedings of the Int'l Conference on Recent Advances Sin-mechatronics[C]. Istanbul, Turkey, 1995: 193-199.
[3]. Friedman N, Russell S. Image Segmentation in Video Sequences: A Probabilistic Approach[A]. In: Proceedings of the 13th Conference on Uncertainty in Artificial Intelligence[C]. Rhode Island,USA,1997: 175- 181.
[4]. Shih - Chia Huang. An Advanced Motion Detection Algodthm with Video Quality Analysis for Video Surveillance Systems [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2011,21(1): 1- 14.
[5]. Du- Ming Tsai, Shia- Chih Lai. Independent Component AnalysisBased Background Subtraction for Indoor Surveillance[J]. IEEE Transations on Image Processing, 2009, 18(1): 158-160.
[6]. BAY H,TUVTELLARS T, GOOL L Van. SURF:speeded up robust features[C]IIProceedings of the European Conference on Computer Vision, 2006: 404-417.

Researcher can also search IOSR published article contents through

IOSR Xplore