Volume 3 Issue 5- May 2013
S.No | Title | Page |
---|---|---|
1. | Improved XY cut Page Segmentation Algorithm for
Border Noise Sukhvir Kaur, Palvinder Singh Mann Abstract
Page segmentation is an important to analyse OCR Systems. In this paper we discussed page segmentation algorithms .We proposed new page segmentation algorithm for border noise .The implementation of the proposed algorithms is done and results are compared with the XY Cut page segmentation algorithm in case of border noise in OCR documents . Keywords-OCR, Border, Noise, Preprocessing, Segmentation, Threshold, Skew |
149-151 Full Text PDF |
2. | A Parallel Platform for Big Data Analytics
: A Design Science Approach Claudia Loebbecke, Joerg Bienert, Ali Sunyaev Abstract
Following a Design Science approach, at the core of this paper we propose a technically innovative parallel platform for Big Data analytics. The design of the proposed platform allows for analyzing and filtering billions of records, querying data structures with 1,000s of columns, getting answers in milliseconds without cubes, continuously importing data with low latency, and executing 1,000s of concurrent queries. Deploying the platform has empowered organizations across many industries to capture new business opportunities from better analytic quality of very large, close to real-time data. With our single platform design project, we hope to provide an interim attempt at theorizing [1] about achieving data quality and business opportunities from Big Data analytics. |
152-156 Full Text PDF |
3. | A New Set of Bilinear Pairings and Their
Applications in Diffie-Hellman Type Key
Exchange and Threshold Cryptography Shobana T.S , Bhaskara Rao N Abstract
This paper presents a new set of bilinear pairings which provide Diffie-Hellman type key exchange and are also used to generate secret key shares for a (t, n) threshold cryptography. The threshold scheme uses Lagrange interpolation formula. |
157-160 Full Text PDF |
4. | PSF Estimation using Checkerboard Marker Sanna sharanabasamma and Bhaskara Rao.N Abstract
A new algorithm for the estimation of centrally symmetric Gaussian point-spread function or PSF from a single blurred image is presented. A small sized, known black and white checkerboard marker is permanently installed at a corner of the camera view in the world scenario. The observed distortion of this marker in the target image is used to estimate the corresponding PSF. |
161-165 Full Text PDF |
5. | Two Out of Three Threshold Visual Cryptography
Data Hiding Scheme for Block Truncation Coding Ashwini N, Shreekanth T Abstract
For Image processing with low computational complexity Block truncation coding (BTC) is an efficient compression tool. However, it has some deficiencies like the blocking and false contour which may cause defective image reproduction. These defects may be improved with the use of error-diffused BTC but the security issues can limit its industrial application. To improve the security issue and to widen the scope of market application, a new method of embedding a secret binary data in the Block Truncation Coded image shares is presented in this paper. The proposed scheme implements two of three threshold visual encryption. Error reduction is achieved by Floyd-Steinberg Error diffusion. The data hiding and recovery involves simple XOR operation which is a low complexity operation. In this scheme, the size of the shares is same as that of the original image. There is no expansion in the share size. The technique can be used with or without Error Diffusion. Keywords—Block Truncation Coding, Error Diffusion, Secret Sharing, Threshold Visual Cryptography. |
166-172 Full Text PDF |
6. | Topologies and Metrics Relevant for Wireless
Sensor Networks Dr. Venkata Surya Narayana T Abstract
In this paper, A review of wireless data networks will be introduced. I will consider the physical arrangement which is used to interconnect nodes, that is known as the network topology and the process of determining a path between any two nodes over which traffic can pass which is called routing. Next is the switching techniques used in this work, which refers to the transfer method of how data is forwarded from the source to the destination in a network. In addition I will address medium access control protocols for wireless network system. And finally channel assignment strategies and wireless channel models will be reviewed. Key words: WSNs,WMNs, MANETs,VANETs, Ad-hoc Networks. |
173-176 Full Text PDF |
7. | A Review of Online Rogue Access Point Detection K.Tejaswi, Dr.Syed Umar, K.Bhavana Abstract
A rogue access point is a wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator or has been created to allow a hacker to conduct a man-in-the-middle attack. In this paper, we propose two online algorithms to detect rogue access points using sequential hypothesis tests applied to packet-header data collected passively at a monitoring point. One algorithm requires training sets, while the other does not. Both algorithms extend our earlier TCP ACK-pair technique to differentiate wired and wireless LAN TCP traffic, and exploit the fundamental properties of the 802.11 CSMA/CA MAC protocol and the half duplex nature of wireless channels. |
177-182 Full Text PDF |
8. | Load Balancing Technique for Climate Data
Analysis in Cloud Computing Environment Jamuna Rani M R , K C Gouda , Nirmala H Abstract
Climate data analysis requires huge computing as the data are multi-dimensional and of large size. In this paper, we aim at developing a prototype for large climate data analysis in cloud computing environment. A utility is being developed for executing the climate models in a cloud computing system, also big climate data analysis are carried out using multi-source data like satellite observation and various climate model output data. On the growing importance of climate studies and High Performance Computing, different users starting from a farmer to a scientist to a policy maker needs to interact and make the outreach and network strongly. Keeping this in mind a design is developed as cloud framework to provide cloud clustering, work flow scheduling, resource allocation & management of distributed data storage, data analytics and visualization service. The web contents have to dynamic and it has motivated large number of people to use it. Cloud’s elasticity has helped to provide service for users who work on climate models and also make the used applications scalable. To reduce communication overhead; an algorithm called Join-Idle-Queue(JIQ) is been implemented in the present study. This framework helps perform better understanding and performance on multi-scale and multi-dimensional climate data analysis.. |
183-185 Full Text PDF |
9. | Secure E-Government Framework: Design and
Implementation Mahmood Khalel Ibrahim, Mohammed A. Jabbar Hamid Abstract
This paper suggests a security framework for e-government systems. The proposed system is a dynamic web application, represents a secure e-government model, provides the three main security services (authentication, confidentiality and integrity) and could be applied as a security reference model for e-government applications. National ID and password authentication scheme has been used in authenticating system's users. Advanced Encryption Standard (AES) have been used in encrypting citizen information and keyed massage authentication code algorithm (HMAC-MD5) has been used to guarantee the integrity of message contents and to authenticate the source of message. (RSA) algorithm has been used in (Digital Envelope) scheme for managing and distributing AES's key. RSA's private key, in turn, is encrypted by Triple Data Encryption Standard (3DES) using admin provided key .Three informational services were presented as e-services represented by (civil information system, passport issuance system and driving license issuance system). To prevent the backend sub-systems from attack, front-end sub-system (portal) was developed as a middleware system. |
186-193 Full Text PDF |
10. | Content Based Image Retrieval Based On Shape
Feature Using Accurate Legendre Moments And
Support Vector Machines Sarita Sharma, Avinash Dhole Abstract
Legendre moments are continuous moments, hence, when applied to discrete-space images, numerical approximation is involved and error occurs. This paper proposes a method to compute the exact values of the moments by mathematically integrating the Legendre polynomials over the corresponding intervals of the image pixels. Experimental results show that the values obtained match those calculated theoretically, and the image reconstructed from these moments have lower error than that of the conventional methods for the same order. Although the same set of exact Legendre moments can be obtained indirectly from the set of geometric moments, the computation time taken is much longer than the proposed method. Content Based Image Retrieval system using Accurate Legendre Moments (ALM) for gray scale images is proposed in my work. Further, the image classification efficiency is improved by employing Support Vector Machine (SVM) classifier. Keywords- Content Based Image Retrieval, Legendre Moments, Accurate Legendre Moments, Gray images, Shape, Support Vector Machines. |
194-199 Full Text PDF |
- Home
- Author Instruction
- Editorial Board
- Call for Paper
- Current volume
- Archives
- Indexing
- FAQ
- Publication Fees
- Contact
- Citation Index 0.47
Email: ijcsetonline@gmail.com / editor@ijcset.net