IOSR Journal of Computer Engineering (IOSR-JCE)

Sep. - Oct. 2016 Volume 18 - Issue 5

Version 1 Version 2 Version 3 Version 4 Version 5 Version 6

Paper Type : Research Paper
Title : MANETs as propellant in the growth of the Internet of Things
Country : India
Authors : Aniket Deshpande

Abstract: As we fast forward towards 2020 world is technologically moving towards the digital life where almost any and every device or object could get some for of IP connectivity and in turn possibly to the Internet. IDC is anticipating more than 28 billion devices on the Internet. With this evolution, Mobile Ad Hoc Networks (MANETs) have now become more critical than ever before – be it the public Wi-Fi hotspots, mobile Internet or simply smart homes. This technology has thus now gathered the attention in this newly emerging digital..........

Keyword: Mobile Ad-Hoc Networks, Internet of Things, TCP, Smart Devices, TCP

1] Butt, Talal A., Provision of adaptive and context-aware service discovery for the Internet of Things, Doctoral diss., Loughborough University, Leicestershire, U.K. Ph. D., 2014
[2] Markmann, T., Securing Communications in the Internet of Things using ID-based Cryptography and Modern Elliptic Curves, Master thesis, Hamburg University of Applied Sciences, M.S., 2015
[3] Qadir, J., Ali, A., Yau, K.L.A., Sathiaseelan, A. and Crowcroft, J., Exploiting the power of multiplicity: a holistic survey of network-layer multipath, IEEE Communications Surveys & Tutorials, 17(4), 2015, 2176-2213.
[4] Cordero, J., Yi, J., Clausen, T. and Baccelli, E., Enabling multihop communication in spontaneous wireless networks, in H. Haddadi, O. Bonaventure (Ed.), Recent Advances in Networking, (ACM SIGCOMM eBook 1 - 2013) 413-457.
[5] Detti, A., Tassetto, D., Melazzi, N.B. and Fedi, F., Exploiting content centric networking to develop topic-based, publish–subscribe MANET systems, Ad Hoc Networks, 24, 2014, 115-133.


Paper Type : Research Paper
Title : Steady State Analysis Of The Power System Of A Building Incorporating A 6kw Photovoltaic System Interconnected To The Grid
Country : Colombia
Authors : C.A. Páez || A.J. Aristizábal

Abstract: This work describesasteady state analysis of a building with a 6 kW photovoltaic system interconnected to the grid. Thebuilding is"Centro de Investigación de los Programas de Ingeniería – CIPI" at Universidad de Bogotá Jorge Tadeo Lozano, in Bogotá, Colombia. The photovoltaic system is installed on the building's roof and it has been operating properly since the month of January 2015. Steady state analysis is performed using the ETAP™ software..........

Keyword: Power system analysis, simulation, photovoltaic system.

[1]. Dongli, X., Meng, X., & Song, S. (2011). Study on technology system of self-healing control in smart distribution grid. In International conference on advanced power system automation and protection (pp. 1–5).
[2]. Gungor, V. C., Sahin, D. Kocak, T., Ergut, S., Buccella, C., Cecati, C., &Hancke, G. P. (2011). Smart grid technologies: communication technologies and standards. IEEE Transactions on Industrial Informatics, 7 (4), 529–540.
[3]. F. Lima, M. Lopez, A, Lotufo and C. Minussi. An artificial immune system with continuous learning for voltage disturbance diagnosis in electrical distribution systems. Expertsystemswithapplications, 56 (2016), 131-142.
[4]. Santacana E, Rackliff G, Tang L, Feng X. Getting smart. IEEE Power &EnergyMagazine 2010;8(2):41–8.
[5]. Ou TC. Ground fault current analysis with a direct building algorithm formicrogrid distribution. Int J Electr Power EnergSyst 2013;53(11):867–75.


Paper Type : Research Paper
Title : Reliable Multicast Routing Protocol For DTN Based Vehicular Ad Hoc Networks
Country : India
Authors : A.Malathi || Dr. N. Sreenath

Abstract: Vehicular Ad Hoc Networks (VANET) are unique in their characteristics. Most of the VANET applications request one-to-many (group) communications. In this paper we discuss routing in DTN based VANET application. In our study we consider only the non-safety applications in the VANET environment. These applications request multicast routing. However the existing routing approaches which are mainly designed for safety application are not suitable..........

Keyword: Vehicular ad hoc networks, multicasting, DTN

[1] A. Vinel, E. Belyaev, K. Egiazarian, and Y. Koucheryavy, "An Overtaking Assistance System Based on Joint Beaconing and Real-Time VideoTransmission," IEEE Transactions on Vehicular Technology, Vol. 61, No.5, pp. 2319-2329, Jun. 2012.
[2] B. Bellalta, E. Belyaev, M. Jonsson, and A. Vinel, "Performance Evaluation of IEEE 802.11p-Enabled Vehicular Video Surveillance System, IEEE Communications Letters, Vol. 18, No. 4, pp. 708-711, Apr. 2014.
[3] 3}Paulo Rog´erio Pereira, Augusto Casaca, Joel J. P. C. Rodrigues, Vasco N. G. J. Soares, Joan Triay, and Cristina Cervell´o-Pastor, "From Delay-Tolerant Networks to Vehicular Delay-Tolerant Networks ", 2011 IEEE.
[4] A. Sebastian, M. Tang, Y. Feng, and M. Looi, "Context-Aware Multicast Protocol for Emergency Message Dissemination in Vehicular Networks," International Journal of Vehicular Technology, Article ID 905396, 14pages, 2012


Paper Type : Research Paper
Title : Handling Toll Traffic Using Rfid In Highway Scenario Environment
Country : India
Authors : Rupendra kumar || Awadhesh Kumar

Abstract: In this research paper, we consider the wireless sensor networks (WSNs) in toll road using RFID. Sensor network are collection of sensor node and they co-operatively send sensed data to base station. In a real time scenario all the nodes follow the traditional toll tax rule and payment done manually. Therefore, we try to create a system for radio frequency identification (RFID) technology for electronic toll collections (ETC) system for online payment and provide a smooth run through...........

Keyword: RFID, Tags, Antennae, WSNs

[1]. CHALUVADI.VENKATESWARLU, A.RAGHU RAM "Safer Cards Enhancing RFID Security and Privacy via Location Sensing" International Journal of Research In Advanced Engineering Technologies, vol.3, pp.31-37, 2014.
[2]. Mr. R. M. Hushangabade, Prof. S.V. Dhopte "Implementation Of Rats For The Purpose Of Vehicle Tracking & Toll Tax Collection" International Journal Of Computer Science And Applications, Vol. 6, pp.92-96 , 2013.
[3]. Asif Ali Laghari, M. Sulleman Memon and Agha Sheraz Pathan "RFID Based Toll Deduction System" Information Technology and Computer Science, Vol 4, pp.40-46 , 2012.
[4]. S.Nandhini, P.Premkumar, "Automatic Toll Gate System Using Advanced RFID And GSM Technology" International Journal of Advanced Research in Electrical,Electronics and Instrumentation Engineering, Vol.3, pp.13002-13006 , 2014.
[5]. Divya Sharma , Kamal Kant " Design Analysis of RFID Automotive Traffic Security System Using ARM Platform", International Journal of VLSI and Embedded Systems-IJVES, Vol.04 pp.357-363 , 2013.


Paper Type : Research Paper
Title : Big Data on Content Credibility of Social Networking Sites and Instant Messaging Applications
Country : India
Authors : Anurag Kumar || Monica Mishra || Rinkita Mittal

Abstract: The quantity of unstructured and structured data from social networking platforms and mobile phone instant messaging applications is massive and is produced at an exponential rate yet there is no mechanism to verify the content's truthfulness and trustworthiness. In this paper we have proposed a theory of how Big Data technology can be employed to validate the credibility of the vastly diffused data. Using technologies like Hadoop to analytically process the fast paced incoming data and measure the reliability of the content. To verify the integrity, the processed data must be inspected against entrusted sources...........

Keyword: Big Data Definition, Content Credibility, Hadoop, Instant Messaging Applications, Social Networking Sites

[1] Meira, "Exploring Big Data in Social Networks" INWEB – National Science and Technology Institute for Web Federal University of Minas Gerais – UFMG May 2013
[2] R.D.Schneider, "Hadoop for Dummies", John Wiley, Mississauga, 2012
[3] K, Chitharanjan, and Kala Karun A. ―A review on Hadoop — HDFS infrastructure extensions.‖ JeJu Island: 2013, pp. 132-137, 11-12 Apr. 2013
[4] Lukoianova T., & Rubin, V. "Veracity Roadmap: Is Big Data Objective, Truthful and Credible?" Advances In Classification Research Online, 2014
[5] O. Liu, K.L. Man, W. Chong, and C.O. Chan. "Social Network Analysis Using Big Data". Proceedings of the International MultiConference of Engineers and Computer Scientists 2016 Vol II, IMECS 2016, March 16-18,2016


Paper Type : Research Paper
Title : Prevention and Detection of Wormhole Attack in Mobile Adhoc Network Using Clustering and RTT
Country : India
Authors : Reena Shakya || Nitesh Gupta

Abstract: A security constraint in mobile adhoc network is very critical task. Some critical security issue such as black hole attack, wormhole attack, sinkhole attack, prevention and detection of attack is major challenge. For the detection of wormhole attack various authors used various technique such as clock synchronization, threshold based technique, nearest neighbor node selection method. In this dissertation modified the IMAODV protocol in terms of IMAODV protocol.In this paper modified the AODV routing protocol for the detection of wormhole attack...........

Keyword: MANET, AODV, IMAODV

[1]. Amrit Suman, Praneet Saurabh and BhupendraVerma. A Behavioral Study of Wormhole Attack in Routing for MANET. International Journal of Computer Applications, 2011.
[2]. YANZHI REN, MOOI CHOO CHUAH, JIE YANG and YINGYING CHEN. DETECTING WORMHOLE ATTACKS IN DELAY-TOLERANT NETWORKS, IEEE, 2010.
[3]. Sweety Goyal and Harish Rohil. Securing MANET against Wormhole Attack using Neighbor Node Analysis. International Journal of Computer Applications. 2013.
[4]. Anil Kumar Fatehpuria and Sandeep Raghuwanshi. An Efficient Wormhole Prevention in MANET Through Digital Signature. International Journal of Emerging Technology and Advanced Engineering. 2013.
[5]. Priyanka Goyal, VintiParmar and Rahul Rishi, MANET: Vulnerabilities, Challenges, Attacks, Application, IJCEM, 2011.


Paper Type : Research Paper
Title : Heuristic Function Influence to the Global Optimum Value in Shortest Path Problem
Country : Indonesia
Authors : Andysah Putera Utama Siahaan

Abstract: Determination of the optimum route is often encountered in daily life. The purpose of the optimum route itself is to find the best trajectory of the two pairs of vertices contained in a map or graph. The search algorithm applied is A*. This algorithm has the evaluation function to assist the search. The function is called heuristic. Two methods which have been introduced as a step to obtain the value of heuristic function are by using Euclidean and Manhattan distance...........

Keyword: Shortest Path, Artificial Intelligence, A

[1]. L. Biacino and G. Gerla, "Fuzzy Logic, Continuity and Effectiveness," Mathematical Logic, vol. 41, p. 643–667, 2002.
[2]. G. Gerla, "Effectiveness and Multivalued Logics," The Journal of Symbolic Logic, vol. 71, pp. 137-162, 2006.
[3]. H. J. Cho and C. L. Lan, "Hybrid Shortest Path Algorithm For Vehicle Navigation," Journals Springer Science, vol. 10, no. 49, pp. 234-247, 2008.
[4]. F. Lam and A. Newman, "Travelling Salesman Path Problems," Journal Math Program, vol. 10, no. 113, pp. 39-59, 2005.
[5]. R. Adipranata, "Aplikasi Pencari Rute Optimum Pada Peta Guna Meningkatkan Efisiensi Waktu Tempuh Pengguna Jalan Dengan Metode A* dan Best First Search," Jurnal Teknik Informatika, vol. 8, no. 2, pp. 100-108, 2007.


Paper Type : Research Paper
Title : Pi-calculus based Bayesian Trust Web Service Composition
Country : China
Authors : Bensheng Yun || Yaguan Qian

Abstract: To enhance the reliability of trust Web service composition, Pi-calculus based formal verification of trust Web service composition is proposed. Bayesian trust Web service composition is firstly defined abstractly; then Pi-calculus is used to describe its composition structure and internal interaction, the mapping relation between trust entity and Pi-calculus is provided. The automatic reasoner MWB is adopted to manipulate and analyze the composition system, which is aimed at finding and correcting the faults before the implementation.

Keyword: Formal verification, Pi-calculus, trust web service composition, MWB

[1] C.X. Shen, H.G. Zhang, D.G. Feng, et al, Survey of information security, SCIENCE CHINA Information Sciences, 50(3), 2007, 273~298.
[2] W. Wang, G.S. Zeng, Bayesian cognitive trust model based self-clustering Algorithm for MANETs, SCIENCE CHINA Information Sciences, 53(3), 2010, 494~505.
[3] B.S. Yun, J.W. Yan, M. Liu, Method to optimize Web service composition based on bayes trust model, Computer Integrated Manufacturing System, 16(5), 2010, 1104-1111.
[4] B.S. Yun, A trust value computing approach for Web service, Applied Mechanics and Materials, 263-266, 2013, 3151-3154.
[5] T. Ayman, K. Ayman, C. Ali, et al, Fuzzy reputation-based trust model, Applied soft computing, 11(1), 2011, 345-355.


Paper Type : Research Paper
Title : Optimal Seeding And Self-Reproduction From A Mathematical Point of View.
Country : USA
Authors : Rita Gitik

Abstract: P. Kabamba developed generation theory as a tool for studying self-reproducing systems. We provide an alternative definition of a generation system and give a complete solution to the problem of finding optimal seeds for a finite self-replicating system. We also exhibit examples illustrating a connection between self-replication and fixed-point theory.

Keyword: Algorithm, directed labeled graph, fixed point, generation theory, optimization, seed, self-replication, space robotics

....


Paper Type : Research Paper
Title : A Novel User Revocation And Secure Multi Keyword Ranked Search Scheme Over Encrypted Data
Country : India
Authors : Beulah Rani Gorremuchu || Naga Sriharsha Mulugu

Abstract: Cloud Computing is an emerging technology now days in this connection in order to store and share huge volume of data over internet we required Cloud Services like IaaS (Infrastructure as a Service) where it can manage storage and share data securely with reduced cost thus sensitive data should be encrypted before outsource onto public cloud for the sake of users data privacy. As our existing system we noticed some of the privacy challenges over multi-keyword ranked search from the cloud server............

Keyword: Trusted Key manager(TKM), Ciphertext-Policy Attribute-based Encryption (CP-ABE),

[1]. Zhihua Xia, Member et.l" A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data" DOI 10.1109/TPDS.2015.2401003, IEEE Transactions on Parallel and Distributed Systems
[2]. D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search," in Advances in CryptologyEurocrypt 2004. Springer, 2004, pp. 506–522
[3]. Dawn Xiaoding Song; Wagner, D.; Perrig, A., "Practical techniques for searches on encrypted data,‟ Security and Privacy, 2000. S&P 2000. Proceedings. 2000 IEEE Symposium on ,doi: 10.1109/SECPRI.2000.848445 vol., no., pp.44,55, 2000
[4]. Cloud Security Alliance, "Security Guidance for Critical Areas of Focus in Cloud Computing,‟ http:// www. cloudsecurityalliance.org, 2009.
[5]. R. Brinkman, "Searching in encrypted data,‟ in University of Twente, PhD thesis, 2007.


Paper Type : Research Paper
Title : Combining Arabic Nested Noun Compound and Collocation Extraction Using Linguistic and Statistical Approach
Country : Iraq
Authors : Maryam Yaseen Al-Mashhadani || Luma Adnan Al-Sagban

Abstract: Arabic multi-word expressions are the combinations of two or more terms that associated with each other as one concept. The process of extracting such expressions is challenging especially when the length of the combination is getting longer. Recently, researchers attempted to extract nested noun compounds which consists of two or more combinations of nouns. Such extraction process requires comprehensive analysis using linguistic and statistical approaches. However, the process of extraction in the state of the art have extended to include 4-gra and 5-gram candidates. This paper aims to combine the extraction of nested noun compound and collocation in order to extend the process of extraction to include 6-gram and 7-gram. For this manner,

Keyword: Multi-Word Expressions, Nested Noun Compound, Collocation, Linguistic Patterns, Statistical measures

[1] Dhekra Najar, Slim Mesfar, and Henda Ben Ghezela, "A Large Terminological Dictionary of Arabic Compound Words," in International NooJ Conference, 2015, pp. 16-28.doi.

[2] N Ababou and A Mazroui, "A hybrid Arabic POS tagging for simple and compound morphosyntactic tags," International Journal of Speech Technology, vol. 19, pp. 289-302, 2016.

[3] Abdulgabbar M Saif and Mohd JA Aziz, "An automatic collocation extraction from Arabic corpus," Journal of Computer Science, vol. 7, p. 6, 2010.doi:10.3844/jcssp.2011.6.11.
[4] Mohammed Attia, Lamia Tounsi, Pavel Pecina, Josef van Genabith, and Antonio Toral, "Automatic extraction of Arabic multiword expressions," in In Proceedings of the 7th Conference on Language Resources and Evaluation, LREC-2010, 2010 http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.187.575&rep=rep1&type=pdf.

[5] Khalid Al Khatib and Amer Badarneh, "Automatic extraction of arabic multi-word terms," in Computer Science and Information Technology (IMCSIT), Proceedings of the 2010 International Multiconference on, 2010, pp. 411-418.doi..


Paper Type : Research Paper
Title : Correlation of NOSQL & SQL Database
Country : India
Authors : Divya Kumawat || Aruna Pavate

Abstract: Now a day's technologies are moving towards motion user interface, Internet of things, Browser based IDEs etc. These technologies require real time response and large data store. Traditional SQL retrieves and manages database in a tabular form, but in current scenario of distributed large scale database SQL does not perform well. NoSql provides a better solution in this situation. This paper presents survey on NoSQL database; its classification on the basis of CAP theorem and different types of the NoSql databases with their properties. It also performs comparative study of SQL and NoSQL databases.

Keyword: Nosql, SQL, CAP theorem, NoSql DB

[1] Cai, L and Zhu, "The Challenges of Data Quality and Data Quality Assessment in the Big Data Era", Data Science Journal, 14: 2, pp. 1-10, 2015
[2] L. Davidson, K. Kline & K. Windisch, "Pro SQL Server 2005 Database Design and Optimization", 2006, p.47.
[3] H. M. L. Dharmasiri , M. D. J. S. Goonetillake,,A Federated Approach on Heterogeneous NoSQL Data Stores, International Conference on Advances in ICT for Emerging Regions (ICTer): IEEE Computer Society 234 – 239 , 2013
[4] NOSQL: Your Ultimate Guide to the Non-Relational Universe! [online] Available at http://nosql-database.org/ [Accessed: 02 Oct 2016].
[5] Jaroslav, NoSQL databases: a step to database scalability in web environment ", International Journal of Web Information Systems, Vol. 9 Iss: 1, pp.69 – 82,2013


Paper Type : Research Paper
Title : Fundamental Research on Sorting Algorithms for Numeric Arrays in Animated Examples
Country : Romania
Authors : Lupu Costică

Abstract: Data structures and manipulation algorithms are found in every branch of computer science. Although implementations are virtually everywhere, few students fully understand their execution on the proposed data structures. The importance of understanding these algorithms is not related only to their use, but also to the parallel development of other, more complex algorithms, depending on customer requirements............

Keyword: animating arrays, application development, animating the algorithms, fundamental research, JavaScript, sort algorithm, system of animation

[1] D. Petcu, Parallel algorithms, Printing UVT, Timisoara, 1994.
[2] R. Andonie, I. Garbacea, C ++ Algorithms fundamental perspective, Libris Publishing House, Cluj-Napoca, 1995. .
[3] C. Lupu, The Importance of New Technologies in Learning Mathematics, Social Media Academy in: Research and Teaching, Pages: 197-200, 2013, http://apps.webofknowledge.com/full_record.do?.
[4] C. Lupu, The Efficiency of Computers with Maple Software in the Teaching and Learning of Plane Geometry, Social Media Academy in: Research and Teaching, Pages: 215-221, 2015. http:// apps. webofknowledge. com/full_ record.do? product= WOS&search_mode=GeneralSearch&qid=3&SID=Z1nSEtoQZRKMmNUqHjk&page=2&doc=19
[5] C. Lupu, The Role of the Computer in Learning Mathematics Through Numerical Methods, Science Journal of Education, Volume 4, Issue 2, Pag: 32-38, 2016.


Paper Type : Research Paper
Title : Comprehensive Survey on Automatic Embedded Attendance System
Country : India
Authors : Miss. Ashwini C. Ingle || Ishwar S. Jadhav || S.R.Pachpande || Dr.J.P.Chaudhari

Abstract: Keeping up the participation is vital in every one of the organizations for checking the execution of workers. Each foundation has its own particular strategy in and collecting attendance specific manner. Some are taking participation physically utilizing the old paper or record based methodology and some have embraced strategies for programmed participation utilizing some biometric systems. A participation recording framework's essential capacity is to keep a record of the time at which the representatives of a specific firm answer to work and leave from work. It is a standout amongst the most broadly utilized occasion recording application as a part of the business today............

Keyword: RFID, Biometrics, Student's attendance, Fingerprint recognize, Biometric

[1]. Jainet "A Large-Scale Investigation into the Relationship between Attendance and Attainment: A Study Using an Innovative, Electronic Attendance Monitoring System", Studies in Higher Education, 33(6), pp. 699-717, 2001
[2]. Marr, Liz & Lancaster, Guy, "Attendance System", Learning and Teaching in Action, 4 (1), pp. 21-26, 2002
[3]. Mazza, R. & Dimitrova, V., "Visualising student tracking data to support instructors in web-based distance education", Proceedings of 13th International World Wide Web Conference on Alternate Track Papers & Posters Press, pp.154-161, New York: USA, 2003
[4]. Vishal Bhalla, Sayedali Mousavi, "An Automated Attendance Monitoring and Registration System for EMU's SPIKE Seminar Series," Proceedings in Academia Edu, 2004.
[5]. Anugerah Ayu ; Huei Chen, K, "E-Visitor Information management System(E-VIMS) using MyKad," Applications of Digital Information and Web Technologies First International Conference on the, 4-6 Aug. 2013, Pages 44-49.


Paper Type : Research Paper
Title : Social Engineering: Hacking a Human Being through Technology
Country : India
Authors : Akshat Jain || Harshita Tailang || Harsh Goswami || Soumiya Dutta || Mahipal Singh Sankhla || Rajeev Kumar

Abstract: Social engineering is the art of extracting classified information by psychological manipulation. It is a strategical attack that depends on human interaction, a complex fraud system, tricking individuals into giving their password and bank information. It is a simple preference of criminals to exploit peoples trust rather than technology, since it is easier to exploithumans' natural inclination to trust. Lack of awareness has caused for such social engineering crimes to have been overlooked and not treated as a major threat. The objective of this review paper is to lay emphasize............

Keyword: Social Engineering, Psychology, Attacks, Human, Cyber-crime, Security etc.

[1]. Huber M., Kowalski S., Nohlberg M., Tjoa S., ―Towards Automating Social Engineering Using Social Networking Sites,‖ Computational Science and Engineering, 2009, Volume: 3, Digital Object Identifier: 10.1109/CSE.2009.205, Publication Year: 2009, Page(s): 117 – 124.
[2]. Xin (Robert) Luo,Richard Brody, Alessandro Seazzu, Stephen Burd, ―Social Engineering: The Neglected Human Factor for Information Security Management‖, Information Resources Management Journal, 24(3), 1-8, July-September 2011
[3]. Mitnick, K., & Simon, W. (2002). The Art of Deception: Controlling the Human Element of Security. New York, NY: John Wiley & Sons.
[4]. J W Scheeres, R F Mills, and M R Grimaila, "Establishing the human firewall: reducing an individual's vulnerability to social engineering attacks," in 3rd Internation Conference on Information Warfare and Security, April 2008.
[5]. K D Mitnick and William L Simon, The art of intrustion: the real stories behind the exploits of hackers, intruders and deceivers. Indianapolis: Wiley Publishing, 2005.


Paper Type : Research Paper
Title : A Proposed System for Tracking Invaded from the Crisis Zone Using RFID and Sensors
Country :  
Authors : Nur-a Nusrat Nazmi || Md. Wafi Islam Omi

Abstract: This study is to show how sensors can help rescuing affected people from the casualty area caused by natural or human caused disaster. Sensors that will use Radio Frequency Identification to transmit the data to the recipient to know the existence of the living creatures that are stuck in the casualty area. Here the sensors would use the temperature of the invaded to determine the existence of the Pulsation of life. The proposed technology could potentially save the life of the invaded as it will help finding them and rescuing them from the crisis zone by using Radio Frequency Identification for transmitting the signals to the recipient which will coming from the sensors.

[1] Botao Shao, Doctoral Thesis, "Fully Printed Chip less RFID Tags towards Item-Level Tracking Applications", Stockholm, Sweden, 2014
[2] Antonio Ferrer-Vidal, Amin Rida, Serkan Basat, Li Yang, and Manos M. Tentzeris: "Integration of Sensors and RFID's on Ultra-low-cost Paper-based Substrates for Wireless Sensor Networks Applications", IEEE, 2006
[3] William Frey III, "APPLICATION OF INERTIAL SENSORS AND FLUX-GATE MAGNETOMETERTOREAL-TIME HUMAN BODY", NAVAL POSTGRADUATE SCHOOL, Monterey, California, September 1996
[4] Rong Zhu and Zhaoying Zhou, "A Real-Time Articulated Human Motion Tracking Using Tri-Axis Inertial/Magnetic Sensors Package", IEEE Transactions on Neutral Systems and Rehabilitation Engineering, Vol. 12, No. 2, June 2004


Paper Type : Research Paper
Title : Selection of Legendre Moments for Content Based Image Retrieval Using ACO Based Algorithm
Country : Iran
Authors : Habibollah Agh Atabay

Abstract: TFeature selection is an important step in Content Based Image Retrieval (CBIR) which has a great impact on reducing complexity and increasing efficiency of CBIR frameworks. Swarm Intelligence (SI) methods, as effective optimization techniques, has been used to solve variety of problems. In this paper, a CBIR framework is established to retrieve grayscale shape images of Coil-20 object image dataset where Legendre moments are used as image features, calculated by Exact Legendre Moments (ELM) approach, and Ant Colony Optimization (ACO) algorithm is applied as the feature selection method. Finally, the selected features is feed into Support Vector Machine (SVM) classifier to categorize images. The classification accuracy are compared with the results of the system without feature selection and the results of selection using ReliefF feature weighting method. The results show that, utilizing ACO as a feature selection method can be effective to achieve higher precision in image classification and better reduce the dimensionality of moment based feature vectors.

Keywords – Content Based Image Retrieval, Feature Selection, Exact Legendre Moments, Ant Colony Optimization

[1]. M. Rehman, M. Iqbal, M. Sharif, M. Raza, World Applied Sciences Journal, 19(3), 2012, 404-412.
[2]. F. Rajam, S. Valli, Life Science Journal, 10(2), 2013, 2475-2487.
[3]. G. Chandrashekar, F. Sahin, Computers & Electrical Engineering, 40(1), 2014, 16-28.
[4]. M. Dorigo, M. Birattari, T. Stutzle, IEEE Computational Intelligence Magazine, 1(4), 2006, 28-39.
[5]. Y. Yao, Q. Ni, Q. Lv, K. Huang, A novel heterogeneous feature ant colony optimization and its application on robot path planning, 2015 IEEE Congress on Evolutionary Computation (CEC), IEEE, 2015, 522-528.


Paper Type : Research Paper
Title : A Parallel Hybrid Technique for Multi-Noise Removal from Grayscale Medical Images
Country : Egypt
Authors : Nora Youssef || Abeer M. Mahmoud || El-Sayed M. El-Horbaty

Abstract: Medical imaging is the technique used to create images of the human body or parts of it for clinical purposes. Medical images always have large sizes and they are commonly corrupted by single or multiple noise type at the same time, due to various reasons, these two reasons are the triggers for moving toward parallel image processing to find alternatives of image de-noising techniques. This paper presents a parallel hybrid filter implementation for gray scale medical image de-noising. The hybridization is between adaptive median and wiener filters. Parallelization is implemented on the adaptive median filter to overcome the latency of neighborhood operation, parfor implicit parallelism powered by MatLab 2013a is used

Keywords -De-Noising, Gaussian and Salt & Pepper, Hybrid Filter, Medical Images, Parallel Algorithms

[1]. Salem S. Al-amri, Dr. N.V. Kalyankar, and Dr. Khamitkar S.D, A comparative study of removal noise from remote sensing image, IJCSI, Vol. 7, No. 1, 2010, 32 - 35.
[2]. Muhammad Sharif, AyyazHussain, Muhammad ArfanJaffar and Tae-Sun Choi, Fuzzy-based hybrid filter for Rician noise removal, J. Signal, Image and Video Processing, Springer, London, 2015, 1-10.
[3]. Ankita D. and Archana S., An advanced filter for image enhancement and restoration, OJAET, Vol.1, No. 1, 2013, 7-10.
[4]. Zhou W. Alan C. Bovik, Hamid R. Sheikh and Eero P. Simoncelli, Image quality assessment: from error visibility to structural similarity, IEEE Transactions On Image Processing, Vol. 13, No. 4, 2004, 600 - 605.
[5]. Nora Youssef, Abeer M. Mahmoud and El-Sayed M. El-Horbaty,Gaussian de-noising techniques in spatial domain for gray scale medical images, ITK, Vol. 8, No.3, 2014, 90-100.



Researcher can also search IOSR published article contents through

IOSR Xplore