IOSR Journal of Computer Engineering (IOSR-JCE)

May – Jun 2016 Volume 18 - Issue 3

Version 1 Version 2 Version 3 Version 4 Version 5 Version 6

Paper Type : Research Paper
Title : A Variation of Layered STRIFA Pattern Matching for Intrusion Detection
Country : India
Authors : T.S. Urmila || Dr. R. Balasubramanian

Abstract: Intrusion Detection System (IDS) is an effective security tool that helps to prevent unauthorized access to network resources by analyzing the network traffic and classifying the records as either normal or anomalous. Developing rules manually through incorporation of attack signatures are used in the detection of attacks. Finite State Automata (FSA) are used by many network processing applications to match complex sets of regular expressions in network packets. In order to make FSA-based matching possible even at the ever increasing speed of modern networks, multi-striding has been introduced. Stride finite automata (StriFA) a new family of finite automata,............

Keyword: ........

[1]. G.V. Nadiammai, M.Hemalatha "Effective approach toward Intrusion Detection System using data mining techniques", Egyptian Informatics Journal (2014) 15, 37–50
[2]. P Prudhvi, H Venkateswara reddy "Pattern Matching using Layered STRIFA for Intrusion Detection", (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (5) , 2014, 6160-6164
[3]. P.Gifty Jeya, M.Ravichandran, C.S. Ravichandran "Efficient Classifier for R2L and U2R Attacks" International Journal of Computer Applications (0975 – 8887) Volume 45– No.21, May 2012
[4]. Safaa O. Al-mamory "Evaluation of Different Data Mining Algorithms with KDD CUP 99 Data Set" Journal of Babylon University/Pure and Applied Sciences/ No.(8)/ Vol.(21): 2013
[5]. Mr. Kamlesh Lahre Mr. Tarun dhar Diwan Suresh Kumar Kashyap Pooja Agrawal "Analyze Different approaches for IDS using KDD 99 Data Set" International Journal on Recent and Innovation Trends in Computing and Communication ISSN 2321 – 8169 Volume: 1 Issue: 8 645 – 651

Paper Type : Research Paper
Title : Vehicle Security System with Theft Identification and Accident Notification
Country : India
Authors : Anagha Kotre

Abstract: The rapid development of electronics provides secured environment to the human. As a part of this 'Vehicle Security System With Theft Identification And Accident Notification' is designed to reduce the risk involved in losing the vehicle and providing accident notification which will reduce the rate of deaths. This tracking system is composed of a GPS receiver, Microcontroller and a GSM Modem. GPS Receiver gets the location information from satellites in the form of latitude and longitude. This is an inexpensive device which reduces the problem associated with accident notification and antitheft control.

Keyword: PS receiver,Microcontroller GSM Modem

[1]. Wilbert O. Introduction to GPS: the Global Positioning System - Ahmed El-Rabbany
[2]. Fundamentals Of Microprocessors and Microcomputers-B.Ram
[3]. GSM: evolution towards 3rd generation systems - Zoran Zvonar, Peter Jung, Karl Kammerlander
[4]. Car Security and Tracking System with Position, Route, and Speed Calculation, EDP Topic VG06, 2011
[5]. Guochang Xu, "GPS Theory, Algorithms and Applications" Springer, 2007.
[6]. Muhammad Ali Mazidi, Janice

Paper Type : Research Paper
Title : Workflow Scheduling for Public Cloud Using Genetic Algorithm (WSGA)
Country : India
Authors : Dr. D. I. George Amalarethinam || T. Lucia Agnes Beena

Abstract: Workflow scheduling is a challenging issue in Cloud Computing. Though there are popular schedulers available for workflow scheduling in Grid and other distributed environments, they are not applicable to Cloud. Cloud differs from other distributed environments in resource pool and incurs less failure rate.Workflow scheduling in Cloud has to concentrate on the QoS parameters such as deadline and budget. Most heuristic algorithms are proposed in the literature. But the meta-heuristic algorithm like Genetic Algorithm approach for the workflow scheduling in Cloud is expected to yield optimal results..........

Keyword: Crossover, Fitness function, Genetic algorithm, Mutation, Selection, Workflow Scheduling

[1] Mohammad Masdari, SimaValiKardan, ZahraShahi, SonayImaniAzar, Towards workflow scheduling in cloud computing: A comprehensive analysis, Journal of Network and Computer Applications, Vol. 66, pp.64–82, 2016.
[2] Rahman M,etal. Adaptive workflow scheduling for dynamic grid and cloud computing environment. Concurr Comput: Pract Exp2013, Vol. 25, pp.1816–42, 2013.
[3] Weise, Thomas. "Global optimization algorithms-theory and application.", Self-Published, 2009.
[4] Alkhanak EN, Lee SP, Rezaei R, Parizi RM. Cost optimization approaches for scientific workflow scheduling in cloud and grid computing: A review, classifications, and open issues. Journal of Systems and Software, Vol.11, pp. 1-26, 2016.
[5] Sindhu, S., and Sayan Mukherjee. "A genetic algorithm based scheduler for cloud environment." In Computer and Communication Technology (ICCCT), 4th International Conference on IEEE, pp. 23-27, 2013.

Paper Type : Research Paper
Title : Using VT System for Automated Testing of ECU
Country : India
Authors : Shruthi T S || K H Naz Mufeeda

Abstract: This paper presents an automated method of testing an Electronic control unit (ECU) of a car headlamp by simulating the loads and sensors that the ECU is built to control. Testing of an ECU in every phase of development is very important as the ECU is produced for performing many complex and critical tasks related to particular loads and sensors. And it is cheaper and easier to correct errors detected in early stages than those detected in later stages of development. So the ECU must undergo in-depth and comprehensive testing. The simulation of the loads and sensors are done using a Vector tool called VT System...........

Keyword: CA Noe, ECU, loads & sensors, simulation, VT system

[1] P. E. Rieth, S. A. Drumm, and M. Harnishfeger, Electronic Stability Program: The Brake That Steers. Landsberg am Lech, Germany: Verlag Moderne Industries, 2002.
[2] F. Gustafsson, "Automotive safety systems, replacing costly sensors with software algorithms," IEEE Signal Processing Magazine ,vol. 26, pp. 32-47, 2009.
[3] Krisztian Enisz, Denes Fodor, Istvan Szalay, and Laszlo Kovacs, Reconfigurable Real-Time Hardware in-the-Loop Environment for Automotive Electronic Control Unit Testing and Verification, IEEE Instrumentation & Measurement Magazine, 2014.
[4] Florin Prutianu, Viorel Popescu, Pop Calimanu Ioana Monica, Validation System For Power Supply Module Part Of Automotive ECUs, IEEE, 2012.
[5] Xiaofeng Yin, Jingxing Tan, and Lei Li, Development of a Real-time Monitoring System for ECU based on CAN Bus, IEEE,2010

Paper Type : Research Paper
Title : Stationary Wavelet Transform Image Fusion and Optimization Using Particle Swarm Optimization
Country : India
Authors : Amandeep Kaur || Reecha Sharma

Abstract: The complementary nature of imaging sensors of different modalities all brought a great need of image fusion to extract relevant information images. Medical image fusion using Stationary wavelet transform (SWT) and optimize parameter using particle swarm optimization (PSO) has been implemented and demonstrated in PC MATLAB. In this paper selected images are fused and results obtained are tabulated. The objective of proposed algorithm was to maximize the total number of pixel in the edges to improve the resolution of edges details, thus being able to visualize more details in the images...........

Keyword: Image fusion, Particle Swarm optimization, peak signal to noise ratio, entropy, Stationary Wavelet Transform.

[1]. K. Rani, R.Sharma, Study of image fusion using discrete wavelet and multi wavelet transform, International Journal of Innovative Research in Computer and Communication Engineering, 1, 2013, 795-799.

[2]. Y.Zhang, Understanding image fusion, Photogrammetric engineering and remote sensing, 70, 2004, 657-661.
[3]. F.Abdullah Al-Wassai, N.V. Kalyankar and A. A Al-Zuky, The IHS transformation based image fusion, Computer Vision and Pattern Recognition, 2011.

[4]. Agarwal, Jyoti, and Sarabjeet Singh Bedi, Implementation of hybrid image fusion technique for feature enhancement in medical diagnosis, Human-centric Computing and Information Sciences, 5, 2015, 1-17.
[5]. R.Gupta, D. Awasthi, Wave-packet image fusion technique based on Genetic Algorithm, IEEE 5th International Conference on the Next Generation Information Technology Summit (Confluence), 2014, 280-285.

Paper Type : Research Paper
Title : Tool Support for the Service Oriented Modelling
Country : India
Authors : Mr.N.Ramkumar

Abstract: The Tool Support for the Service Orientated modelling is one of the technical project and to model the changes from the existing metamodel and to define the grammar for the internal policy and the coordination and to compile in the SRML editor. Some of the major components like the wires, business protocol, business role and the transition have already been implemented in the SRML model. The requirement is the existing metamodel: in the existing metamodel few components have not been implemented............

Keyword: SRML Editor, Metamodel

[1] Victoriya Dessler, , Service-Oriented Architecture for Smart Environments, IEEE ,6th International conference on service oriented computing and Applications , 2013,99-104.
[2] [W.Dai et al , Service oriented Architecture in Industrial Automation Systems, IEEE, VOL-11, 2015, 771-781

[3] [Abdelfattah El-Sharkawi, Ahmed Shouman, Sayed Lasheen, Service Oriented Architecture for Remote Sensing Satellite Telemetry Data Implemented on Cloud Computing, IJITCS Vol. 5, No. 7, June 2013, 12-26

[4] [Said Nabi, Saif Ur Rehman, Simon Fong, Kamran Aziz, A Model for Implementing Security at Application Level in Service Oriented Architecture, Journal of Emerging Technologies in Web Intelligence, Vol 6, No 1 ,(2014), 157-163,.

[5] Feng Wang, Liang Hu, Jin Zhou, and Kuo Zhao, A Data Processing Middleware Based on SOA for the Internet of Things, Journal of Sensors,Volume 2015 (2015), Article ID 827045, 8 pages

Paper Type : Research Paper
Title : A Review on Semantic Approach using Nearest Neighbor Search
Country : India
Authors : S. Haripriya || A. Brahmananda Reddy || A. Prashanth Rao

Abstract: Information retrieval (IR) of acquiring information sources relevant to an information sources from a group or unit. Ontology in IR field is used to represent an official domain description in addition a semantic layer is added to the IRS. The idea depicts in relating semantics on the concepts of ontology using query words. Semantic approach, focus to search effectively by assuming the searchers contextual meaning and purpose the way they occur in terms...........

Keyword: Context, Information Retrieval, Ontology, Semantic Approach, Spatial Inverted Index

[1] Rosslin, John Robles, Fast Nearest-Neighbor Search Algorithms Based on High Multidimensional Data, Asia-Pacific Journal of Multimedia Services Convergence with Art, Humanities and Sociology, Vol.3, No.1, 2013, pp. 17-24.

[2] K.Shiva Krishna, Fast Nearest Neighbor Search With Keywords, International journal of Computer Science and Mobile computing. Vol.3 Issue.9, 2015, pg.340-350.
[3] Cao, G. Cong, C.S. Jensen, and B.C. Ooi, Collective Spatial Keyword Querying, Proc. ACM SIGMOD Int'l Conf. Management of Data, 2011, pp. 373-384.
[4] J. Lu, Y. Lu, and G. Cong, Reverse Spatial and Textual k Nearest Neighbor Search, Proc. ACM SIGMOD Int'l Conf. Management of Data, 2011, pp. 349-360.

Paper Type : Research Paper
Title : Detection and Prevention of Selfish Attack in MANET using Dynamic Learning
Country : India
Authors : Ms. Lilu Odedra || Prof. Ashish Revar || Prof. Munindra H. Lunagaria

Abstract: In this paper we deal with misbehaving nodes in mobile ad hoc networks (MANETs) that drop packets supposed to be relayed, whose purpose may be either saving their resources or launching a DoS attack. We propose a new solution to monitor, detect, and safely isolate such misbehaving our approach watchdog method is used for observation of nodes behavior. And also varying threshold based policy is used for save nodes falsely accused in dense network. All strategies are described in detail in various paper sections with results.

Keyword: Network Security, MANET, Selfish attack, countermeasures, wireless security, Watchdog, threshold

[1] Shao, Baohua. "Performance of Ad Hoc on Demand Distance Vector Routing Protocol." In 2010 International Conference of Information Science and Management Engineering, pp. 420-421. IEEE, 2010.

[2] Mahdipour, Ebrahim, Amir Masoud Rahmani, and Ehsan Aminian. "Performance evaluation of destination-sequenced distance-vector (dsdv) routing protocol." In Future Networks, 2009 International Conference on, pp. 186-190. IEEE, 2009.

[3] J. Broch. D. B. Johnson, and D. A. Maltz, "The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks," IETF Internet draft, draft-ietf- manet-dsr-01 txt, Dec. 1998

[4] Hilippe Jacquet, Paul Muhlethaler, Amir Qayyum, Anis Laouiti, Laurent Viennot and Thomas Heide Clausen "Optimized Link-State Routing Protocol", draft-ieft-ols r-04.txt - March 2001

Paper Type : Research Paper
Title : Detection of Breast Cancer by the Identification of Circulating Tumor Cells Using Association Rule Mining
Country : India
Authors : R. Nedunchelian || S. Jananee

Abstract: Circulating Tumor Cells (CTCs) are cells that have shed into the vasculate from the primary tumor and circulate into the blood stream. In this proposed work, the major genes causing the breast cancer is identified by the principle of Association Rule. The trained set and training set is made to upload on the data store. By associating each row of a training set to all the rows of the trained data is done and the report is generated. The Baum Welch process is called for the estimation of actual probabilities and emission probabilities by calculating its log likelihood factor which gives the high Priority gene values that are responsible for the cause of cancer..........

Keyword: Circulating tumor cells, Association Rule, Cluster, Baum Welch, actual probabilities, emission probabilities, High Priority Genes

[1] Stelios Sfakianakis, Ekaterini S. Bei, Michalis Zervakis, Member, IEEE, Despoina Vassou, and Dimitrios Kafetzopoulos, "On the Identification of Circulating Tumor Cells in Breast Cancer" IEEE Journal Of Biomedical And Health Informatics, Vol. 18, No. 3, May 2014.
[2] Zehra Karapinar Senturk and Resul Kara , "Breast Cancer Diagnosis Via Data Mining: Performance Analysis of Seven Different Algorithms" vol. 4, no. 2, 2014.
[3] J. Barbaz´an, L. Alonso-Alconada, L. Muinelo-Romay, M. Vieito, A. Abalo, M. Alonso-Nocelo, S. Candamio, E. Gallardo, B. Fern´andez, I. Abdulkader, M. de Los A´ ngeles Casares, A. Go´mez-Tato, R. Lo´pez and M. Abal, "Molecular characterization of circulating tumor Cells in human metastatic colorectal cancer," PloS One, vol. 7, 2012.
[4] Timothy J. Molloy, Paul Roepman, Bjorn Naume, Laura J. vant Veer A Prognostic Gene Expression Profile That Predicts Circulating Tumor Cell Presence in Breast Cancer Patients, 2012.

Paper Type : Research Paper
Title : Energetic Hybrid Routing Protocol
Country : Morocco
Authors : Chahidi Badr || Ezzati Abdellah

Abstract: The networks of sensors are characterized by limited capacity especially at the level of energy saw that the components constitute the network to know the sensors are powered by batteries, which influence on the life of the network. During our work of research we tried to increase this metric by the proposal of a new hybrid routing protocol E-HRP (Energetic Hybrid Routing Protocol) which is based on the principle of the EC zone which reduces the number of packets exchanged

Keyword: Routing, E-HRP, Energy

[1] Layuan Chunlin, Li and Yaun Peiyan, "the evaluation of performance and simulations of routing protocols in ad hoc networks", Computer Communications, Elsevier, vol.30, pp.1890-1898, 2007.
[2] Gurpinder Singh and Jaswinder Singh": Issues and Manet behavior analysis of routing protocols," International Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, No. 4, pp. 219-227, 2012.
[3] Heinzelman, W. R., A. Chandrakasan, and H. Balakrishnan, "An architecture of specific protocol to the application of networks", microsensor wireless IEEE Tran.On Comm. Wireless, Vol. 1, No. 4, 660- 670, October 2002.
[4] D.B. Johnson and D.A. Maltz. The source routing dynamic in ad hoc wireless networks. Mobile computing, pages 153-181, 1996.
[5] E.M. Royer, P.M. Melliar-Smith, and L.E. Moser. An analysis of the density of optimal node for mobile ad-hoc networks. In the field of communications, 2001. Cci 2001. IEEE International Conference on, Volume 3, pages 857-861, Vol.3, 2001

Paper Type : Research Paper
Title : Associated Edge Weight Approach to Improve Personalized Ranking
Country : India
Authors : Ms. Pallavi G. Gaikwad || Mrs. M. A. Potey

Abstract: Search engine is most leading and valuable tool that collects the data which is extent and it objectives to offer rising data being reachable to the user. Objective of personalization ranking is to improve the tradition data search and retrieval procedure as per the user concern. Authority flow is the technique of conveying the rating of pages for each user. Authority flow approaches like PageRank and ObjectRank can deal personalized ranking of typed entity-relationship graphs...........

Keyword: Authority Flow, Edge based Personalization approach, Graph, Personalized ranking, ScaleRank

[1] Amjad, Tehmina, et al. "Topic-based heterogeneous rank." Scientometrics (2015): 1-22.
[2] Gupta, Manish, Amit Pathak, and Soumen Chakrabarti. "Fast algorithms for top k personalized page rank queries." Proceedings of the 17th international conference on World Wide Web. ACM, 2008.
[3] Haveliwala, Taher H. "Topic-sensitive pagerank: A context-sensitive ranking algorithm for web search." Knowledge and Data Engineering, IEEE Transactions on 15.4 (2003): 784-796.
[4] Hristidis, Vagelis, Heasoo Hwang, and Yannis Papakonstantinou. "Authority-based keyword search in databases." ACM Transactions on Database Systems (TODS) 33.1 (2008): 1.
[5] Hess, Claudia, and Klaus Stein. "Personalized document rankings by incorporating trust information from social network data into link-based measures." Proceedings of the IJCAI 2007 Workshop on Text Mining and Link Analysis.Vol. 103. 2007.

Paper Type : Research Paper
Title : Semantic Similarity Search Model for Obfuscated Plagiarism Detection in Marathi Language using Fuzzy and Naïve Bayes Approaches
Country : India
Authors : Ms. Nilam Shenoy || Mrs. M. A. Potey

Abstract: Plagiarism detection (PD) in natural language texts is an example of NLP applications that is linked with information retrieval (IR) and soft computing (SC) approaches. Obfuscated plagiarism cases contain invisible texts, which is difficult to find in existing plagiarism detection methods. In this paper fuzzy semantic-based similarity search model and Naïve Bayes model for uncovering obfuscated plagiarism for English and Marathi language are presented and compared with different state-of-the-art baselines (B1-W1G, B2- W3G, B3-W5G, B4-S2S)............

Keyword: Fuzzy, Naïve Bayes, Obfuscated, Plagiarism detection, Semantic similarity

[1] S. Alzahrani and N. Salim, "Fuzzy semantic-based string similarity for extrinsic plagiarism detection," Braschler and Harman, 2010.
[2] S. M. Alzahrani, N. Salim, and V. Palade, "Uncovering highly obfuscated plagiarism cases using fuzzy semantic-based similarity model," Journal of King Saud University-Computer and Information Sciences, vol. 27, no. 3, pp. 248–268, 2015.
[3] S. M. Alzahrani, N. Salim, and A. Abraham, "Understanding plagiarism linguistic patterns, textual features, and detection methods," Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, vol. 42, no. 2, pp. 133–149, 2012.
[4] Z. Wu and M. Palmer, "Verbs semantics and lexical selection," in Proceedings of the 32nd annual meeting on Association for Computational Linguistics, pp. 133– 138, Association for Computational Linguistics, 1994.

Paper Type : Research Paper
Title : Design of Layers in Knowledgebase for Expert Systems
Country : India
Authors : Yugandhara A. Nimbalkar || Dr. Justus S

Abstract: In any Expert System, Knowledge is the basic functional unit for building a knowledgebase[1]. Hence, Expert Systems are totally/partially depended on Knowledgebases for its intelligent functionality. In our proposed design of Knowledgebase, we have divided it into 3 layers: Logical or Design Layer, Knowledge Layer and Storage Layer. In Logical layer or Design layer a high-level statement or a file is the input, which is processed, and clauses (functional & predicate symbols) are extracted [3]. These will form the basic unit for designing a knowledge unit (KU)............

Keyword: ......................

[1]. 1.Ronak Kharadkar and Justus S," Analytical Validation of 3 layer knowledgebase design", Conference on Science Engineering and Technology, VIT University,2014.
[2]. RonakKharadkar and Justus S," Designing Knowledge Representation Framework for ICD-10", 1st International conference on futuristic trend in computational analysis and knowledge management (ABLAZE 2015),2015
[3]. Ronald J. Brachman and Hector Levesque," Knowledge Representation and Reasoning",1st Edition May,2004
[4]. Wei-Tek, Rama Vishnuvajjala and Du ZhangYan, "Verification and Validation of Knowledge Based Systems," IEEE Transactions on Knowledge and Data Engineering, vol. 11, no.1, January 1999
[5]. Amar Arbouh, Mohamed Menacer and Yasser M. Alginahi, "Design Concepts of a KnowledgeBase System for Research and Studies in Quran and Its Science",2013 Taibah University International Conference, December 2013

Paper Type : Research Paper
Title : Service Level Management For it Ser-Vices in Small Settings: A Systematic Review
Country : Mexico
Authors : Calvo-Manzano Jose || Cuevas Gonzalo || Gómez Gerzon || Mejía Jezreel || Muñoz Mirna || Rabbi Md Forhad || San Feliu Tomás

Abstract: This work presents the application of a systematic review protocol for Software Engineering. This protocol is used as a formal model by applying systematic review to Service Level Man-agement. The objective is to search for papers related to Service Level Management for IT Services in small settings (including small and medium enterprises). Results obtained show that Service Level Management area is an increasing research field and there is a need for more in-depth studies.

Keyword: Slm, Itsm, Small Settings, Systematic Review, IT Services.

[1]. NeilMcBride, "Exploring service issues within the IT organization: Four mini-case studies", International Journal of Information Management, 2009
[2]. Stefan Thanheiser, Lei Liu, HartmutSchmeck: "Sim-SOA: an approach for agent-based simulation and design-
time assessment of SOC-based IT systems", Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), Honolulu, Hawaii, USA, March 9-12, 2009
[3]. CMMI Product Team, "CMMI® for Services, Version 1.2", Technical Report CMU/SEI-2009-TR-001, Software Engineering Institute, USA, March, 2009
[4]. Mira Kajko-Mattsson and Christos Makridis, "Evaluating SLA Management Process Model within Four Companies", The Third International Conference on Software Enginee-ring Advances, Sliema, Malta, 2008

Paper Type : Research Paper
Title : Various Methods for Object Tracking- A Review
Country : India
Authors : Bindu Sharma || Navpreet Kaur

Abstract: The object tracking is the technique which is used to track object from the image or from the video. The video consists of multiple frames and in each frame location of that object had been predicted. To predict location of the object technique of probability has been applied and this technique works on single object. In this paper, improvement has been proposed in probability based technique to track multiple objects from the video. The proposed technique had been implemented in MATLAB. The graphical results show that proposed technique works well in terms of detection rate

Keyword: object classification, object detection, object tracking, probabilistic

[1]. Deori, Barga, and Dalton Meitei Thounaojam. "A survey on moving object tracking in video." International Journal on Information Theory (IJIT) 3.3 (2014).
[2]. A.Hema,S.Vanathi , "A Survey on Moving Object Detection Using Image Processing Techniques ",International Journal of Innovative Research in Computer and Communication Engineering ,volume. 3 Issue 7, 2015
[3]. Kiran .S. Khandare and Nilima R. Kharsan, "Digital Image Processing Techniques for Object Tracking System Using Kalman Filter", International Journal of Scientific Engineering and Research ISSN (Online):2347‐3878 Volume 2 Issue 6, 2014
[4]. Catak, Muammer. "A probabilistic object tracking model based on condensation algorithm." Soft Computing 18.12 (2014): 2425-2430.

Paper Type : Research Paper
Title : Using Artificial Intelligence Techniques For Epilepsy Treatment
Country : Egypt
Authors : Raneen Ali || Wessam H. El-Behaidy || Atef Z. Ghalwash

Abstract: Epilepsy is a combination of neurological disorders that causes people to have seizure. Immediate seizures occurring might cause injuries of the patients or other. Recent studies of epilepsy are based on two approaches. The first one is detecting and predicting epilepsy using algorithms based on EEG Analysis. The second approach is implanted devices for seizure. In this paper, we propose an algorithm for advanced seizure prediction. The approach can predict up to 5 minutes in advance. We combine the two approaches (Computer modeling and Advanced Prediction Algorithm) by proposing an algorithm that illuminates...........

Keyword: Computer Modeling, EEG, Implanted device, RNS, SVM

[1]. Guez A, Vincent RD, Avoli M, Pineau J. Adaptive Treatment of Epilepsy via Batch-mode Reinforcement Learning. InAAAI 2008 Jul 13 (pp. 1671-1678).

[2]. Teixeira CA, Direito B, Bandarabadi M, Le Van Quyen M, Valderrama M, Schelter B, Schulze-Bonhage A, Navarro V, Sales F, Dourado A. Epileptic seizure predictors based on computational intelligence techniques: A comparative study with 278 patients. Computer methods and programs in biomedicine. 2014 May 31;114(3):324-36.

[3]. Navakatikyan MA, Colditz PB, Burke CJ, Inder TE, Richmond J, Williams CE. Seizure detection algorithm for neonates based on wave-sequence analysis. Clinical Neurophysiology. 2006 Jun 30;117(6):1190-203.

[4]. Markram H. The blue brain project. Nature Reviews Neuroscience. 2006 Feb 1;7(2):153-60.

[5]. Frégnac Y, Laurent G. Neuroscience: Where is the brain in the Human Brain Project. Nature. 2014 Sep 4;513(7516):27-9.

Paper Type : Research Paper
Title : Object Detection & Tracking in Moving Background Under Different Environmental Conditions
Country : India
Authors : Nandita Singh || Manoj Sabnis

Abstract: Object detection and tracking has been a widely studied research problem in recent years. Currently system architectures are service oriented i.e. they offer number of services. All such common services are grouped together and are available as a domain called as service domain. One such service domain of our interest is LBS (location based service). The service of our interest is tracking. Tracking of moving objects is done in applications like surveillance systems, human computer interactions, object recognition, navigation systems etc. In real world, 3D, the object which we want to track is called as object of interest (OOI)............

Keyword: Multiple moving object tracking; background modeling; morphology; target localization and representation.

[1]. Shivam Mittal"Object Tracking Using Adaptive Frame Differencing And Dynamic Template Matching Method", 2013.
[2]. Luka Cehovin ; University of Ljubljana, Ljubljana ; Matej Kristan ; Ales Leonardis 'Robust Visual Tracking Using an Adaptive Coupled-Layer Visual Model'IEEE Transactions on Pattern Analysis and Machine Intelligence (Volume:35 , Issue: 4 ) 2012.
[3]. Bao,'Real Time Robust L1 Tracker Using Accelerated Proximal Gradient Approach'Computer Vision and Pattern Recognition (CVPR), 2012 IEEE Conference on 16-21 June 2012.
[4]. Black, M., Jepson, A.: Eigentracking: Robust matching and tracking of articulated objects using a view-based representation. IJCV 38, 63–84 (1998)
[5]. Hare, S., Saffari, A., Torr, P.: Struck: structured output tracking with kernels. In: ICCV, pp. 263–270 (2011)

Paper Type : Research Paper
Title : Big Data Implementation Challenges and Solutions
Country : India
Authors : G.Narendra || Dr.B.V. Ramana Reddy || M.Jeevan Kumar

Abstract: Big Data – Adoption challenges and solutions Enterprises are encumbered by certain challenges in their Big Data adoption journey. Some of these challenges are: Inhibition in making the first move for a particular use case Reluctance towards making Big Data strategy investment in the current financial year Absence of any single Big Data vendor and Integration of already available traditional data with Big Data q and Scarcity of combined Big Data and domain skills Our research indicates that the biggest challenges while deriving business value from Big Data are as much cultural as technological..........

Keyword: Big data, velocity, volume, secondary node, data node

[1]. Garlasu,D.Sandulescu,V.; Halcu,I.;Neculoiu,G.; Grigoriu,O.; Marinescu,M.; Marinescu, V., " A big dat a implement at ion based on Grid comput ing" , Roedunet Internat ional Conference (RoEduNet), 2013
[2]. C.Chandhini, MeganaL.P , "Grid Comput ing-A Next Level Challenge wit h Big Dat a" , Internat ional Journal of Scient ific & Engineering Research , Issue3, Mar-2013
[3]. A big data implementation using gridcomputing", .php
[4]. An Oracle White Paper March 2013 , " Big Data analytics : Advanced analytics in oracle dat abase"
[5]. "Ideas Economy: Finding Value In Big Dat A",

Researcher can also search IOSR published article contents through

IOSR Xplore