IOSR Journal of Computer Engineering (IOSR-JCE)

Mar. - Apr. 2017 Volume 19 - Issue 2

Version 1 Version 2 Version 3 Version 4 Version 5

Paper Type : Research Paper
Title : Detection of Bacterial Canker Disease In Mango Using Image Processing
Country : India
Authors : Amritha S Nadarajan || Prof.Thamizharasi A
: 10.9790/0661-1902050108     logo

Abstract: Mango is considered as the king of fruit. It is a leading fruit in our country. It is considered as the national fruit of India. It has good flavour and also provide vitamin C. Mangoes are considered as to be the king of the fruit. India has the richest collection of mango cultivars. This work detects the external bacterial disease in Alphonso mango using image processing technique. The detection of diseases in mango is very difficult by our human naked eyes. It needs more time and cost. The manual detection of bacterial fruit disease is not simple and not accurate. The paper proposes a digital image processing method for the detection of external bacterial disease in Alphonso mango..............

Keywords: Bacterial canker disease detection, segmentation, feature extraction, classification, mango, preprocessing.

[1]. Pushpa B R, MeghanaT K, TripullaK H(2015)"Detection and classification of fungal disease in fruits using imageprocessing technique"in International journalof applied engineering research(IJAER), Vol 10, number 55.
[2]. Shiv Ram Dubey, Anand Singh Jalal (2012) "Adapted Approach for Fruit disease Identification using Images", in International Journal of computer vision and image processing (IJCVIP) Vol 2, no. 3:44-58.


Paper Type : Research Paper
Title : Intelligent Home Using Internet of Things
Country : India
Authors : Zeba Sheikh || Abhishek Kommera || Sana Quazi
: 10.9790/0661-1902050913     logo

Abstract: Intelligent home minimizes user's involvement in monitoring home and controlling home appliances with the help of Internet of Things. This paper proposes the advancement of an intelligent home application by integrating Internet of things (IOT) with web services and cloud computing. Our approach is to focus on entrenching intelligence into sensors using software and network connectivity. It facilitates interactions with smart things using cloud services. Our approach is more feasible and efficient i.e. it measures the home conditions and monitors the home appliances and controls the Home access.

Keywords: Internet of Things, Cloud, sensors, Intelligent home.

[1]. Diksha Jizilwar, Abhishek Kommera, Ashwini Gaddalwar , A Review on Intelligent Home Using Internet of Things, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 5, Issue 1, January 2017
Links
[2]. https://www.programmableweb.com/api/ubidots
[3]. https://en.wikipedia.org/wiki/Internet_of_things
[4]. https://www.rs-online.com/designspark/thingspeak-a-free-internet-of-things-iot-platform http://www.ebay.com.au/itm/DHT11-TEMPERATURE-AND-RELATIVE-HUMIDITY-SENSOR-TRANSDUCER-MODULE-/131606921333
[5]. http://www.skybitz.com/Portals/0/Documents/DoorSensor-Description.pdf


Paper Type : Research Paper
Title : A Generic Meta-Model for a BIG ERP
Country : Morocco
Authors : Mustapha Hain || Hicham Moutachaouik || Abdelali Zakrani
: 10.9790/0661-1902051419     logo

Abstract: Enterprise Resource Planning (ERP) is business process management software that integrates all facets of an operation, including product planning, development, manufacturing, sales and marketing. The basic goal of using an ERP system is to provide one central repository for all information that is shared by all the various ERP facets to improve the flow of data across the organization. In contrast, the quality of making decision remains limited by the fact that this central repository is based the transactional and restricted data. In the paper, we propose to enhance this data by using the concept of the technologies.............

Keywords: ERP; Big Data; decision-making; Meta-Model; decision process.

[1]. Akkermans, H., & Van Helden, K. (2002). Vicious and virtuous cycles in ERP implementation: A case study of interrelations between critical success factors. European Journal of Information Systems, 11(1), 35–46.
[2]. Helena Kościelniak (2015), Agnieszka Puto, BIG DATA in decision making processes of enterprises, International Conference on Communication, Management and Information Technology (ICCMIT 2015), © 2015 The Authors. Published by Elsevier B.V.
[3]. Klaus, H., Rosemann, M., & Gable, G. G. (2000). What is ERP? Information Systems Frontiers,2(2), 141–162.
[4]. Moon, Y. B. (2007). Enterprise resource planning (ERP): A review of the literature. International Journal of Management and Enterprise Development, 4(3), 235–264.
[5]. Hong, K. K., & Kim, Y. G. (2002). The critical success factors for ERP implementation: An organizational fit perspective. Information and Management, 40(1), 25–40.


Paper Type : Research Paper
Title : An Introduction to Error Detection and Correction
Country : India
Authors : Mr. Nagesh Salimath || Dr. Jitendra Sheetlani
: 10.9790/0661-1902052027     logo

Abstract: In most correspondence framework whether wired or remote convolutional encoders are utilized and AWGN presents blunders amid transmission. Different blunder adjusting and controlling instruments are available. In this paper all components are contemplated and best system on the premise of exactness, many-sided quality and power utilization is chosen. There ought to be exchange off between many-sided quality of equipment and power utilization in decoder.

Keywords: FEC, Block Codes, Convolutional Codes, ARQ, HARQ, Viterbi Mechanism.

[1]. Sklar, B., 2001. Digital Communications –Fundamentals and Applications. 2nd ed. New Jersey: Prentice Hall
[2]. C. E. Shannon, ―A mathematical theory of –communicat423,623–656, Jul./Oct. 1948.
[3]. T. Richardson and R. Urbanke, Modern Coding Theory. Cambridge University Press, 2007.
[4]. Z. Zhang, V. Anantharam, M. Wainwright,-Tethernet LDPCanddecoderB .designNikol with low error floors,‖-StateCircuits,IEEEvol.45,no . Journal4,pp.843–855,Aprof.2010Solid.
[5]. P. Grover, K. Woyach, and A. Sahai, ―Towards-levelpowera com consumption,‖ IEEE J. Select. –1755,AreasSept.2011Commun.., vol. 29


Paper Type : Research Paper
Title : Optimization of Wired Genetic Antenna Using Genetic Algorithm
Country : India
Authors : Renu Kumari || Tarak Nath Paul
: 10.9790/0661-1902052835     logo

Abstract: The essence of the paper is to optimize wired antenna with the help of Genetic Algorithm. Genetic algorithm helps to design new antennas which are in great demand for wireless applications and also used to optimize different parameters of traditional antennas. The new wired antenna has been designed with the concept of self similar geometry of fractal antenna. A self similar geometry provides configuring the whole antenna figure as copies of a specific part of antenna. Due to this geometry, the resultant structures have elevated the characteristics like small size, space filling and multiband.............

Keywords: Wire Antenna, Fractal antenna, Scattering Parameter and Genetic Algorithm.

[1]. Linden D. S., Antenna Design Using Genetic Algorithms, Ph. D Thesis, Ashburn VA , AFIT, 1997.
[2]. Kumari Renu, K. Mamta, Singh R. K., Gain & Bandwidth Enhancement Of Antenna Using Numerical Experimentation, International journal of research science and management, 3(2), 2016, 56-60.
[3]. Kumari Renu, K. Mamta, Network Analysis Of Antenna Based On Scattering Parameters, International Journal of Industrial Electronics and Electrical Engineering, 3(2), 2015, 1-5.
[4]. Paul, T. N., Studies on Shortest Path Using Genetic Algorithm, Ph. D Thesis, University of Burdwan, West Bengal, INDIA, 2014.
[5]. Saxena, N. K., Khan, A., Pourush, P. K. S, Kumar, N., Application of genetic algorithm for optimization of important parameters of magnetically biased microstrip circular patch Antenn, International Journal of Software Engineering and Applications, vol. 4, 2011,129-13.,


Paper Type : Research Paper
Title : The Vulnerabilities of Cloud Computing: Security Threats
Country : India
Authors : Mr. Nagesh Salimath || Dr. Jitendra Sheetlani
: 10.9790/0661-1902053643     logo

Abstract: Clouds give an intense figuring stage that empowers people and associations to perform assortment levels of undertakings, for example, utilization of online storage room, selection of business applications, improvement of tweaked PC programming, and formation of a "practical" system condition. In earlier years, the quantity of individuals utilizing cloud administrations has drastically expanded and loads of information has been put away in Cloud computing situations.............

Keywords: Cloud computing, cloud security threats and countermeasures, cloud service models

[1]. DataLossDB Open Security Foundation. http://datalossdb.org/statistics
[2]. Sophos Security Threat Report 2012. http://www.sophos.com/
[3]. Amazon.com Server Said to Have Been Used in Sony Attack, May 2011. http://www.bloomberg.com/news/2011-05-13/sony-network-said-to-have-been-invaded-by-hackers-using-amazon-com-server.html
[4]. D. Jamil and H. Zaki, "Security Issues in Cloud Computing and Countermeasures," International Journal of Engineering Science and Technology, Vol. 3 No. 4, pp. 2672-2676, April 2011.
[5]. K. Zunnurhain and S. Vrbsky, "Security Attacks and Solutions in Clouds," 2nd IEEE International Conference on Cloud Computing Technology and Science, Indianapolis, December 2010.


Paper Type : Research Paper
Title : Grid Based Sensor Deployment Technique for Localization in WSN
Country : India
Authors : Priyanka Rajput || Prof. Madhukar Dubey
: 10.9790/0661-1902054450     logo

Abstract: Localization is broadly exploited in wireless sensor networks (WSNs) to recognize the existing locality of the sensor nodes. A WSN include to multiple nodes which create the installation GPS on all sensor node costly and furthermore GPS will not confer exact localization outcome in an indoor atmosphere. Manually configuring location reference on all sensor nodes is not likely in the case dense network. This gives grow to an issue where the sensor nodes must identify its existing locality without exploiting any special h/w like GPS and without the aid of manual configuration..............

Keywords: WSN;Localization

[1] RavichanderJanapati, Ch. Balaswamy ,K.Soundararajan, U.Venkanna4, "Indoor Localization Of Cooperative WSN Using PSO
Assisted AKF With Optimum References"Doi: 10.1016/J.Procs.2016.07.357/ 2016 Published By Elsevier.
[2] G. Karthiga, C. Preethi, R. DelshiHowsalya Devi, "Localization In Wireless Sensor Network Based On Mobile Anchor And Chord
Selection", 978-1-4799-6266-2/14 © 2014 IEEE.
[3] Youngbae Kong, Younggoo Kwon, Jeungwon Choi, JonghwanKo, Gwitae Park, "Density Adaptive Localization For Irregularly
Deployed Wireless Sensor Networks", Http://Dx.Doi.Org/10.1016/J.Aeue.2012.05.006 © 2012 Elsevier.
[4] Ronald Beaubrun, Methods For Node Localization In Wireless Sensor Networks", 978-1-4799-6036-1/14 © 2014 IEEE
[5] HaidarSafa, "A Novel Localization Algorithm For Large Scale Wireless
SensorNetworks",Http://Dx.Doi.Org/10.1016/J.Comcom.2014.03.020/17 March 2014


Paper Type : Research Paper
Title : A Parallel Algorithm for Factorization of Big Odd Numbers
Country : China
Authors : Dongbo FU
: 10.9790/0661-1902055154     logo

Abstract: The article puts forward an algorithm to factorize a big odd number by means of subdividing the searching interval into finite independent subintervals. A divisor of a big odd number can be found in one of the subintervals. Owing to the independency of the subintervals, the algorithm can be performed in either sequential computing or parallel computing. Experiment shows that the algorithm is valid and practically applicable.

Keywords: Subdivision, Parallel, Searching Algorithm, Factorization

[1]. Sonal Sarnaik, Dinesh Gadekarand Umesh Gaikwad, An overview to Integer factorization and RSA in Cryptography, International Journal for Advance Research in Engineering and technoloy,2014,2(9):21-26
[2]. Jianhui LI, Algorithm Design and Implementation for a Mathematical Model of Factoring Integers,IOSR Journal of Mathematics,2017,13(I Ver. VI):37-41
[3]. Aldrin W, Wanambisi Shem Aywa, Cleophas Maende, etc, Factorization of Large Integers, International Journal of Mathematics and Statistics Studies,2013,1(1):39-44
[4]. Xingbo WANG, Genetic Traits of Odd Numbers With Applications in Factorization of Integers, Global Journal of Pure and Applied Mathematics,2017,13(2) 493-517
[5]. Ulrich H Kurziweg,Factoring Large Composite Numbers, http://www2.mae.ufl.edu/~uhk/ FACTORING-LARGE-COMPOSITE-NUMBERS.pdf


Paper Type : Research Paper
Title : Requirement Driven Proactive Verifiable Limited Disclosure: Handling Digital Evidence of Crimes in Social Media
Country : Bangladesh
Authors : Rejwana Haque
: 10.9790/0661-1902055557     logo

Abstract: A digital forensics process aims to analyze digital evidence of storage unit of computer or other storage devices. But when a crime is committed is a social media the social media platform holds the evidence not necessarily the storage device used by the victim of the criminal. Moreover, the extensive use of social media and the huge amount of data shared through the social media has made the traditional investigation process gradually made it ineffective. Though the 'verifiable limited disclosure' protocol addresses this problem, it is also a reactive approach. Here we introduce 'proactive verifiable limited disclosure' for handling and investigating digital evidence in police investigation. This protocol also uses the storage of social media for storing evidence of crimes occurred in the social media, which minimize the problem of 'resource overhead'.[1]

Keywords: Digital Forensics, Proactive Investigation, Digital Privacy, Cyber Crime, Adaptive Forensics, Social Media

[1] R. E. Overill, J. A. Silomon, and K. A. Roscoe, "Triage template pipelines in digital forensic investigations," Digital Investigation, vol. 10, no. 2, pp. 168 – 174, 2013.
[2] G. Palmer, "A Road Map for Digital Forensic Research," Air Force Research Lab, Rome, DFRWS Technical Report DTR-T001-01, 2001.
[3] Thein Tun, Blaine Price, Arosha Bandara, Yijun Yu and Bashar Nuseibeh, "Verifiable Limited Disclosure: Reporting and Handling Digital Evidence in Police Investigations", 1st International Workshop on Requirements Engineering for Investigating and Countering Crime, 12th September 2016, Beijing, China.
[4] L. Pasquale, Y. Yu, M. Salehie, L. Cavallaro, T. T. Tun, and B. Nuseibeh, "Requirements-driven adaptive digital forensics", 21st IEEE International Requirements Engineering Conference. IEEE Computer Society, 2013, pp. 340–341.
[5] S.Y. Willassen, "Using Simplified Event Calculus in Digital Investigation," in Proc. of the Symp. on Applied Computing, 2008, pp. 1438–1442.


Paper Type : Research Paper
Title : A Non Conventional Energy Based Mobile Charger towards Green Computing
Country : India
Authors : Kaushik Kumar || Shrabanti Saha || Aniket Kumar || Sudipta Sahana
: 10.9790/0661-1902055865     logo

Abstract: Conventional energy are tapped and used abundantly at present. Keeping in observance a way of precaution is taken to upturn the use of non-conventional energy. Decreasing the use of conventional energy, a two way (or twin) hybrid mobile charger is taken in consideration for implementing both solar energy and wind energy, as the renewable sources of energy. The proposed innovative two way hybrid mobile charger can be used both all through day time and night time, while travelling by possessing the device near the vehicle window panel or motorcycle handle. Energy harvesting is explored, with a device relying on the solar panel........

Keywords: Wind energy, Solar energy, Rechargeable battery, Energy harvesting, Green computing.

[1]. Shafiur Rahman, Dr.M.G.Patil, "Development of wind powered mobile charger", International Journal of Research in Aeronautical and Mechanical Engineering, ISSN (Online): 2321-3501, Vol. 3, Issue 11, November 2015, Pages: 26-39.
[2]. Saikumar.P, Thamaraikannan.D, Yuvaraj.G, Yuvaraj.C, "Wind Energy Based Mobile Battery Charging and Battery Applications", International Journal for Research and Development in Engineering (IJRDE), ISSN: 2279-0500 Special Issue: pp- 006-011.
[3]. Pawan Vijay, Tanuj Manglani, Pankaj Kumar, Ramkishan Meena, Anita Khedia, "Wind And Solar Mobile Charger", International Journal of Recent Research and Review, Vol. VII, Issue 4, December 2014, ISSN 2277 – 8322.
[4]. Kharudin Ali, Wan Syahidah Wan Mohd, Damhuji Rifai, Muaz Ishtiyaq Ahmed, Asyraf Muzzakir and Tg Ammar Asyraf, "Design And Implementation of Portable Mobile Phone Charger using Multi-directional Wind Turbine Extract", International Journal of Science and Technology, Vol. 9(9), DOI: 10.17485/ijst/2016/v9i9/88711, March 2016, ISSN(Print): 0974-6846, ISSN(Online):0974-5645.
[5]. N Raghu Ram Reddy, Yeshala Sreekanth, Dr.M.Narayana, "Mechanical and Electrical Mobile Charger", N Raghu Ram Reddy al. Int. Journal of Engineering Research and Applications, ISSN: 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1705-1708.


Paper Type : Research Paper
Title : Effect of Ca EDTA and Fe EDTA on Micro and Macro Nutrients uptake by Black gram
Country : India
Authors : A.A. Jilani
: 10.9790/0661-1902056669     logo

Abstract: Chelates such as EDTA and DTPA are often used to increase micronutrient solubility, but micronutrients complexed by these chelates are not readily taken up by plants. A field experiment was conducted to assess the effect of the application of EDTA on black gram crop. The aim of this study was to identify the interaction of Na, Ca, Mg, Fe, Cu and Zn when the black gram was planted on the test soil and to evaluate the effect of Ca EDTA and Fe EDTA of these metals. It was found from the study that by applying increased the organic carbon, organic matter, micronutrient i.e. Fe, Ca and Zn in the soil............

Keywords: Ca EDTA, Fe EDTA, Interaction, Fe, Ca, Zn, Micronutrients

[1]. Aleksandra Sobkowska, Maria Basińska, Flame photometry determination of Na, K, Li, and Ca traces in Cr-Ni steel, Microchimica Acta, 64,1975,227-234
[2]. Gupta, A.P., Neue, H.U. and Singh, V.P. Phosphorus determination in rice plants containing variable manganese content by the phospho‐molybdo‐vanadate (yellow) and phosphomolybdate (blue) colorimetric methods, Communications in Soil Science and plant Analysis (11-12), 1993, 1309-1318
[3]. Blaylock, M.J., Dushenkov, D.E., Zakharova, S., Gussman, O., Kapulnik, C.,Ensley, Y. Raskin, B.D., Enhanced accumulation of Pb in Indian mustard by soil-applied chelating agents. Environmental Science and Technology, 64, 1997, 489–496
[4]. Bucheli-Witschel, M., Egli, T., Environmental fate and microbial degradation of aminopolycarboxylic acids. FEMS Microbiol. Rev.2001, 25, 69–106.
[5]. Cakmak, I,Enrichment of cereal grains with zinc: Agronomic or genetic biofortification Plant and Soil 302, 2008, 1-17


Paper Type : Research Paper
Title : Big Data Analysis on Heterogeneous Distributed Systems using Remote Method Invocation
Country : India
Authors : Dr. Mamta C. Padole
: 10.9790/0661-1902057075     logo

Abstract: Big Data Analysis has become very essential for organizations to arrive at timely decisions, for progressive growth and keeping with the competition. To analyse huge amount of data generated through various business processes, require High Performance Computing machines. But, owning HPC machines and maintaining them, requires large investment and experienced skill set. Moreover, it is difficult to install any proprietary and customized software, on special purpose HPC machines............

Keywords: Big Data Analysis, Heterogeneous Distributed Systems, Remote Method Invocation, Java RMI

[1] Turn Big Data into Big Value, A Practical Strategy, Intel White Paper, 2013.
[2] A. Garg, M. Padole, Big Data: A Stimulus in Business Analytics, IOSR Journal of Computer Engineering (IOSR-JCE), 18(5), 2016, 61-67
[3] M. Schroeck, R. Shockley, J. Smart, D. Romero-Morales, and P. Tufano, Analytics: the real-world use of big data: How innovative enterprises extract value from uncertain data, Executive Report, IBM Institute for Business Value and Said Business School at the University of Oxford, 2012.
[4] Topcuoglu, S. Hariri, and M.Y. Wu., Performance-Effective and Low – Complexity Task Scheduling for Heterogeneous Computing, IEEE Trans. Parallel and Distributed Systems, 13(3), 2002, 260 – 274
[5] M. C. Padole, Distributed Computing for Structured Storage, Retrieval and Processing of DNA Sequencing Data, International Journal of Internet and Web Technology, 38(1), 2013, 1113-1118


Paper Type : Research Paper
Title : Secure Payment Solutions Fully Off-Line Functions on Frodo
Country : India
Authors : Zubair Ahmad || S.Kusumesh || M.N.M.Shree Charan || M.Narendran
: 10.9790/0661-1902057679     logo

Abstract: Online shopping payment scheme is one of the popular in recent years. During payment process the attackers aim to stealing the customer data by targeting the Point of Sale (PoS) system. Increasing malware that can steal card data as soon as they are read by the device. As such, in cases where customer and vendor are steadily or intermittently disconnected from the network and there is no secure during on-line payment. We proposed work is to provide secure fully off-line work is interactivity between multiple client - server. This server is identified from legal to illegal control is provided to customer key approach............

Keywords: Secure payments, PoS system, erasable PUFs, fraud resilience, cybercrime.

[1]. Vanesa Daza, Roberto Di Pietro, Flavio Lombardi, And Matteo Signorini "Frodo: Fraud Resilient Device For Off-Linmicro-Payments", Dependable And Secure Computing, IEEE Transactions On (Volume:PP , Issue: 99 ), 12 June 2015
[2]. R. L. Rivest, "Payword and micromint: two simple micropayment schemes," in CryptoBytes, 1996, pp. 69–87.
[3]. W. Chen,G. Hancke,K. Mayes,Y. Lien, and J.-H. Chiu,"Using 3G network components to enable NFC mobile transactions and authentication," in IEEE PIC '10, vol. 1, Dec 2010, pp. 441 –448.
[4]. T. Nishide and K. Sakurai, "Security of offline anonymous electronic cash systems against insider attacks by untrusted authorities revisited,"ser. INCOS'11.Washington, DC, USA: IEEE Comp. Soc., 2011, pp.656–661.
[5]. M. A. Salama, N. El-Bendary, and A. E. Hassanien, "Towards secure mobile agent based e-cash system," in Intl. Workshop on Security and Privacy Preserving in e-Societies. New York, NY, USA: ACM, 2011, pp. 1–6.


Paper Type : Research Paper
Title : Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
Country : India
Authors : Radhika Shetty D. S || Roopa G K
: 10.9790/0661-1902058083     logo

Abstract: While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such contextual information can be exploited by an adversary to derive sensitive information such as the locations of monitored objects and data sinks in the field. Attacks on these components can significantly undermine any network application. Existing techniques defend the leakage of location information from a limited adversary who can only observe network traffic in a small region. However, a stronger adversary, the global eavesdropper, is realistic and can defeat these existing techniques.............

Keywords: Global Eavesdroppers, Location Privacy, Protection in WSN,WSN

[1]. Kiran Mehta, Donggang Liu, Member, IEEE, and Matthew Wright, "Protecting Location Privacy In Sensor Networks Against A Global Eavesdropper", IEEE Transactions On Mobile Computing, Vol. 11, February 2012.
[2]. T. Wang, "Supporting Anonymous Location Queries in Mobile Environments with Privacygrid," Proc. Int'l Conf. World Wide Web (WWW '08), 2008.
[3]. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, "Enhancing source-location privacy in sensor network routing" in Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS), June 2005.
[4]. C. Ozturk, Y. Zhang, and W. Trappe, "Source-location privacy in energy constrained sensor network routing," in Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks (SASN), October 2004.
[5]. Y. Ouyang, Z. Le, G. Chen, J. Ford, and F. Makedon, "Entrapping Adversaries for Source Protection in Sensor Networks," Proc. Int'l Conf. World of Wireless, Mobile, and Multimedia Networking (WoWMoM '06), June 2006.


Paper Type : Research Paper
Title : Automatic Identification of Spoken Language
Country : India
Authors : Tanusree Sadhukhan || Shweta Bansal || Atul Kumar
: 10.9790/0661-1902058489     logo

Abstract: Spoken language identification is the process of mapping continuous speech to the language itbelongs to. Applications of spoken language identification include front-ends for multilingual speech recognition systems, retrieval of web data, automatic customer routing in call centers.This paper present the development of spoken language identification system for under resource Indian languages i.e Hindi and Manipuri.The system which has been designed is able to identify the languages with a great accuracy.

[1]. Comparison of :Four Approaches to Automatic Language Identification of Telephone Speech,IMarc A. Zissman, Member, IEEE.[ 1, JANUARY 1996]
[2]. AUTOMATIC SPOKEN LANGUAGE IDENTIFICATION, Liang Wang [2008]
[3]. Automatic Language dentification for Natural Speech Processing Systems Student Research Paper of Michael Heck At the Department of Informatics Institute of Anthropomatics (IFA) Interactive Systems Laboratories (ISL) Supervisors: Prof. Dr. Alex WaibelDr. Sebastian Stüker Duration: 01. June 2011 – 01. September 2011.
[4]. A Vector Space Modeling Approach to Spoken Language Identification Haizhou Li, Senior Member, IEEE, Bin Ma, Senior Member, IEEE, and Chin-Hui Lee, Fellow, IEEE
[5]. http://practicalcryptography.com/miscellaneous/machine-learning/guide-mel-frequency-cepstral-coefficients-mfccs/


Paper Type : Research Paper
Title : Multiband Common Spatial Pattern based EEG Classification for Brain-Computer Interface
Country : Bangladesh
Authors : Md. Sujan Ali || Mst. Jannatul Ferdous
: 10.9790/0661-1902059099     logo

Abstract: Thispaper presents a novel method for electroencephalography (EEG) based motor imagery classification for brain computer interface (BCI) implementation using the potential features extracted band-specific common spatial pattern (CSP). The recorded EEG signal is bandpass-filtered into multiple subbands to capture the related rhythmic components of brain signals. The CSP features are then extracted from each of these bands. The linear discriminant analysis (LDA) based classifier is subsequently used to classify the relevant subband of EEG using the features extracted by CSP. Then the highest discrimination score among all the subbands is used as the norm for overall EEG classification. The experimental results show that the proposed method yields comparatively superiorclassification performance compared to prevailing methods.

Keywords: Brain computer interface (BCI), electroencephalography, common spatial pattern, filterbank.

[1]. B. Rebsamen, E. Burdet, C. Guan, H. Zhang, C. L. Teo, Q.Zeng, C.Laugier, and M. H. Ang Jr., "Controlling a Wheelchair Indoors UsingThought," IEEE IntelligentSystems, vol. 22, no. 2, pp. 18-24, 2007.
[2]. N. Birbaumer, "Brain-computer-interface research: Coming of age," Clin. Neurophysiol., vol. 117, no. 3, pp. 479-483, 2006.
[3]. J. R. Wolpaw, N. Birbaumer, D. J. McFarland, G. Pfurtscheller and T. M. Vaughan, "Brain-computer interfaces for communication andcontrol,"Clin. Neurophys., vol. 113, pp. 767-791, 2002.
[4]. E. Niredermeyer and F. Lopes da Silva, Electroencephalography: BasicPrinciples, Clinical Applications and Related Fields, 5th ed., Baltimore,MD, USA: Lippincott Williams Wilkins, 2004.
[5]. G. Pfurtscheller, C. Neuper, D. Flotzinger, andM.Pregenzer, "EEG baseddiscrimination between imagination of right and left hand movement,"Electroencephalography Clin. Neurophysiol., vol. 103, pp. 642–651, Dec.1997.