Volume 3 Issue 5- May 2013


S.No Title Page
1. Improved XY cut Page Segmentation Algorithm for Border Noise
Sukhvir Kaur, Palvinder Singh Mann

Page segmentation is an important to analyse OCR Systems. In this paper we discussed page segmentation algorithms .We proposed new page segmentation algorithm for border noise .The implementation of the proposed algorithms is done and results are compared with the XY Cut page segmentation algorithm in case of border noise in OCR documents .

Keywords-OCR, Border, Noise, Preprocessing, Segmentation, Threshold, Skew

Full Text PDF
2. A Parallel Platform for Big Data Analytics : A Design Science Approach
Claudia Loebbecke, Joerg Bienert, Ali Sunyaev

Following a Design Science approach, at the core of this paper we propose a technically innovative parallel platform for Big Data analytics. The design of the proposed platform allows for analyzing and filtering billions of records, querying data structures with 1,000s of columns, getting answers in milliseconds without cubes, continuously importing data with low latency, and executing 1,000s of concurrent queries. Deploying the platform has empowered organizations across many industries to capture new business opportunities from better analytic quality of very large, close to real-time data. With our single platform design project, we hope to provide an interim attempt at theorizing [1] about achieving data quality and business opportunities from Big Data analytics.
Keywords— Big Data Analytics, Parallel Platform Design, Design Science.

Full Text PDF
3. A New Set of Bilinear Pairings and Their Applications in Diffie-Hellman Type Key Exchange and Threshold Cryptography
Shobana T.S , Bhaskara Rao N

This paper presents a new set of bilinear pairings which provide Diffie-Hellman type key exchange and are also used to generate secret key shares for a (t, n) threshold cryptography. The threshold scheme uses Lagrange interpolation formula.        
Keywords— Bilinear pairings, Diffie-Hellman type key exchange, Lagrange interpolation formula, threshold  cryptography.

Full Text PDF
4. PSF Estimation using Checkerboard Marker
Sanna sharanabasamma and Bhaskara Rao.N

A new algorithm for the estimation of centrally symmetric Gaussian point-spread function or PSF from a single blurred image is presented. A small sized, known black and white checkerboard marker is permanently installed at a corner of the camera view in the world scenario. The observed distortion of this marker in the target image is used to estimate the corresponding PSF.                                                                                                       
Keywords— point-spread function, PSF, checker board marker.

Full Text PDF
5. Two Out of Three Threshold Visual Cryptography Data Hiding Scheme for Block Truncation Coding
Ashwini N, Shreekanth T

For Image processing with low computational complexity Block truncation coding (BTC) is an efficient compression tool. However, it has some deficiencies like the blocking and false contour which may cause defective image reproduction. These defects may be improved with the use of error-diffused BTC but the security issues can limit its industrial application. To improve the security issue and to widen the scope of market application, a new method of embedding a secret binary data in the Block Truncation Coded image shares is presented in this paper. The proposed scheme implements two of three threshold visual encryption. Error reduction is achieved by Floyd-Steinberg Error diffusion.  The data hiding and recovery involves simple XOR operation which is a low complexity operation. In this scheme, the size of the shares is same as that of the original image. There is no expansion in the share size. The technique can be used with or without Error Diffusion.

 Keywords—Block Truncation Coding, Error Diffusion, Secret Sharing, Threshold Visual Cryptography.

Full Text PDF
6. Topologies and Metrics Relevant for Wireless Sensor Networks
Dr. Venkata Surya Narayana T

In this paper, A review of wireless data networks will be introduced. I will consider the physical arrangement which is used to interconnect nodes, that is known as the network topology and the process of determining a path between any two nodes over which traffic can pass which is called routing. Next is the switching techniques used in this work, which refers to the transfer method of how data is forwarded from the source to the destination in a network. In addition I will address medium access control protocols for wireless network system. And finally channel assignment strategies and wireless channel models will be reviewed.

Key words:  WSNs,WMNs, MANETs,VANETs, Ad-hoc Networks.

Full Text PDF
7. A Review of Online Rogue Access Point Detection
K.Tejaswi, Dr.Syed Umar, K.Bhavana

A rogue access point is a wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator or has been created to allow a hacker to conduct a man-in-the-middle attack. In this paper, we propose two online algorithms to detect rogue access points using sequential hypothesis tests applied to packet-header data collected passively at a monitoring point. One algorithm requires training sets, while the other does not. Both algorithms extend our earlier TCP ACK-pair technique to differentiate wired and wireless LAN TCP traffic, and exploit the fundamental properties of the 802.11 CSMA/CA MAC protocol and the half duplex nature of wireless channels.
Keywords—Rogue access point detection, Sequential hypothesis testing, TCP ACK-pairs.

Full Text PDF
8. Load Balancing Technique for Climate Data Analysis in Cloud Computing Environment
Jamuna Rani M R , K C Gouda , Nirmala H

Climate data analysis requires huge computing as the data are multi-dimensional and of large size. In this paper, we aim at developing a prototype for large climate data analysis in cloud computing environment. A utility is being developed for executing the climate models in a cloud computing system, also big climate data analysis are carried out using multi-source data like satellite observation and various climate model output data. On the growing importance of climate studies and High Performance Computing, different users starting from a farmer to a scientist to a policy maker needs to interact and make the outreach and network strongly.  Keeping this in mind a design is developed as cloud framework to provide cloud clustering, work flow scheduling, resource allocation & management of distributed data storage, data analytics and visualization service. The web contents have to dynamic and it has motivated large number of people to use it. Cloud’s elasticity has helped to provide service for users who work on climate models and also make the used applications scalable. To reduce communication overhead; an algorithm called Join-Idle-Queue(JIQ) is been implemented in the present study. This framework helps perform better understanding and performance on multi-scale and multi-dimensional climate data analysis..
Keywords— Cloud computing, climate data, load balancing, Join-Idle-Queue.

Full Text PDF
9. Secure E-Government Framework: Design and Implementation
Mahmood Khalel Ibrahim, Mohammed A. Jabbar Hamid

This paper suggests a security framework for e-government systems. The proposed system is a dynamic web application, represents a secure e-government model, provides the three main security services (authentication, confidentiality and integrity) and could be applied as a security reference model for e-government applications. National ID and password authentication scheme has been used in authenticating system's users. Advanced Encryption Standard (AES) have been used in encrypting citizen information and keyed massage authentication code algorithm (HMAC-MD5) has been used to guarantee the integrity of message contents and to authenticate the source of message. (RSA) algorithm has been used in (Digital Envelope) scheme for managing and distributing AES's key. RSA's private key, in turn, is encrypted by Triple Data Encryption Standard (3DES) using admin provided key .Three informational services were presented as e-services represented by (civil information system, passport issuance system and driving license issuance system). To prevent the backend sub-systems from attack, front-end sub-system (portal) was developed as a middleware system.
Keywordse-government, security framework, integrity, authentication, confidentiality, Portal, web application.

Full Text PDF
10. Content Based Image Retrieval Based On Shape Feature Using Accurate Legendre Moments And Support Vector Machines
Sarita Sharma, Avinash Dhole

Legendre moments are continuous moments, hence, when applied to discrete-space images, numerical approximation is involved and error occurs. This paper proposes a method to compute the exact values of the moments by mathematically integrating the Legendre polynomials over the corresponding intervals of the image pixels. Experimental results show that the values obtained match those calculated theoretically, and the image reconstructed from these moments have lower error than that of the conventional methods for the same order. Although the same set of exact Legendre moments can be obtained indirectly from the set of geometric moments, the computation time taken is much longer than the proposed method.

Content Based Image Retrieval is the application of computer techniques to solve the problem of searching for digital image in the large database. In Content Based Image Retrieval, images are retrieved based on color, texture and shape. The CBIR system uses these features for retrieval of images and the technique for getting these features is known as Feature Extraction. For image classification I have worked on the feature Shape.

Content Based Image Retrieval system using Accurate Legendre Moments (ALM) for gray scale images is proposed in my work. Further, the image classification efficiency is improved by employing Support Vector Machine (SVM) classifier.

Keywords- Content Based Image Retrieval, Legendre Moments, Accurate Legendre Moments, Gray images, Shape, Support Vector Machines.

Full Text PDF