Volume 6 Issue 1- January 2016
Page | Title | Full Text |
---|---|---|
01-08 | Specifying Uncertainties in Inter-Agent Dependencies
using Rough Sets and Decision Table Anuja Soni, Vibha Gaur Abstract
In Multi-Agent System (MAS), tasks are disseminated and delegated to other agents with a rationale of sharing mutual expertise. The inter-agent dependency signifies a compliance that facilitates a depender agent to accomplish a goal through the Service Provider Agents (SPAs) in a distributed environment. A number of uncertainties and ambiguities are involved with inter-agent dependencies. The inter-agent goal, soft goal or task dependencies ambiguously assist in the selection of appropriate service provider agents that would complicate the design of the system. Therefore, to reduce the complexity of the final system, it is essential to specify these uncertainties at requirements engineering phase so that coordination issues among agents could be resolved in a cooperative environment. This paper employs the decision table and the fundamental concepts of rough sets viz. indiscernible relation, approximations and boundary regions to specify ambiguities in the selection of appropriate SPAs that would assist the developer in deciding future course of action to resolve the uncertainties in framing an unambiguous Software Requirements Specification (SRS). Keywords |
Full Text PDF |
09-13 | Using K-means clustering algorithm with Power
Efficient Gathering in Sensor Information Systems
Protocol Talib M. Jawad and Noor A. Ali Abstract
Power-Efficient Gathering in Sensor Information Systems (PEGASIS) protocol is energy efficient protocols designed to prolong the lifetime of the network by reduction of energy consumption. In this paper a modification is proposed to the PEGASIS algorithm where sensor nodes are clustered in groups, clustering is done by k-means algorithm, and each group is treated as PEGASIS. In addition the proposed algorithm used rechargeable sensor nodes. Two parameters are searched to select chain leader: Euclidean distance of sensor node to the base station and residual energy of sensor node. Each cluster head data is transmitted directly to the base station. Simulation results showed the proposed algorithms improved in comparison with original PEGASIS. |
Full Text PDF |
14-18 | Feature Selection in Session Matrix Using
Enhanced ICA Dr. V. Chitraa Abstract
User behavior analysis helps the visitors browsing work more effective and simple and is an important research area in this internet scenario. It is used to analyze a new user and study their present behavior and classify them in a group of similar users. The group consists of user navigation patterns which are used for many applications like personalization, site improvement, business intelligence, and web page recommender system. The navigation pattern consists of features which are both relevant and irrelevant for mining process. To improve the overall clustering and classification results only important features have to be discovered in user navigation matrix. This work analyzes each and every feature and selects the relevant and important features for mining by using enhanced Independent Component Analysis. The experimental results shows that the proposed method selects more relevant features in lesser time. Keywords - Feature Selection, ICA, Navigation Patterns, Preprocessing, Web Usage Mining |
Full Text PDF |
19-23 | A Survey on Recognition and Analysis of
Handwritten Document Remya Vinayakumar, Vince Paul Abstract
Handwriting differs from person to person. Some may be legible while some others are difficult to read or understand. Hence this project aims at recognizing the handwritten text and understanding what it is with the help of a neural network and fuzzy logic. It involves segmentation, feature extraction and classification.Here the method used is Canny Edge Detection Algorithm and the Histogram Of Gradients for the feature extraction. The neural network is trained on to a 50 set samples for each of the 26 alphabets and 10 numbers for recognition. The fuzzification can be applied along with this inorder to get more accurate results by giving the questionnaires, ie, by giving the conditions to check if it satisfies a particular character which is to be determined. This would thus yield 80 percentage accuracy and reliability in recognition Keywords— Neural network, Histogram of Gradients, Canny algorithm, fuzzy logic |
Full Text PDF |
24-26 | Conspiring Open Source Technologies Dr.Aruna Varanasi, S Manminder Kaur, T.Venkat Narayana Rao Abstract
OpenDaylight is a new, ambitious and a pioneering project of the Linux Foundation which deals with the progress of the Linux kernel. Its main objective is to work with the Software-Defined Networking (SDN) that can take the virtualization to a next level by providing network architecture of virtualized network nodes. It is an approach towards computer networking, which is aimed at developing an improved way of networking among the computer devices. It is set to develop a framework that allows beneficial and robust networking, which will replace the current networking model with various virtualization technologies. OpenDaylight provides a platform that will link the traditional networking technologies with the future networking technologies. This paper states the importance of how the OpenDaylight can be collaborated with advance Software-defined Networking (SDN) that supports the emerging community led technologies and with its evolution. Keywords:OpenDaylight, Software-defined network (SDN), virtualization of network function (NFV), OpenFlow. |
Full Text PDF |
27-32 | A Survey On Steganographic Methods Used in
Information Hiding Anju PS, Bineeth Kuriakose, Vince Paul Abstract
Due to Exponential growth in the internet technology, there are large amounts of images are available on the internet. Nowadays transmission of data is a daily routine and protection of such transmitted data is a big problem. Protection can be done with encryption of data or by using data hiding algorithms. Hiding techniques can be used in the environment where steganographic techniques fail. There are many different protocols and embedding techniques allows us to hide data in a given image. In this paper we have analyzed various information hiding techniques. Keywords— DCT, DWT, LSB, Information hiding.
|
Full Text PDF |
33-39 | Survey on Multimodal Medical Image Fusion
Techniques Swathi.P.S, Sheethal.M.S, Vince Paul Abstract
An Image fusion is the development of amalgamating two or more image of common characteristic to form a single image which acquires all the essential features of original image. Nowadays lots of work is going to be done on the field of image fusion and also used in various application such as medical imaging and multi spectra sensor image fusing etc. For fusing the image various techniques has been proposed by different author such as wavelet transform, IHS and PCA based methods etc.The key objective of vision fusion would be to merging information from multiple images of exactly the same view in order to deliver only the useful information. This paper has centred on the many image fusion techniques. The review has shown that the still much research is needed to improve the image fusion technique further. Keywords— Multimodal medical image fusion, Medical image, PCA, Wavelet Transform,Non subsampled contourlet Transform |
Full Text PDF |
40-42 | A Survey of Encryption then Compression using
Auxillary Information Cinu Joseph, Jasmy Davies , Vince Paul Abstract
Most commonly, image encryption has to be conducted prior to image compression. This has led to the problem of how to design a pair of image encryption and compression algorithms such that compressing the encrypted images can still be efficiently performed. is a highly efficient image encryption-then-compression (ETC) system. The proposed image encryption scheme operated in the prediction error domain can able to provide a high level of security. An arithmetic coding-based approach can be used to efficiently compress the encrypted images. Most of the existing ETC solutions induce significant penalty on the compression efficiency. Image hiding approach after the encryption phase is also used for getting more security. Gradient Adjusted Predictor (GAP) is used to find predicted values of the image. Keywords— Gradient Adjusted Predictor, Encryption then Compression, Compression then Encryption |
Full Text PDF |
43-47 | Face Recognition through Different Facial
Expressions for Women Security: A Survey Soumya Xavier,Jasmine Jolly,Vince Paul Abstract
Face is an essential part of our daily life. It is a complex multidimensional structure and needs a good computing technique for recognition. Face recognition has been a fast growing, challenging and interesting area in real time applications. A large number of face recognition algorithms have been developed in last decades. In this paper an attempt is made to review a wide range of methods used for face recognition comprehensively. While using automatic system for face recognition, computers are easily confused by changes in illumination, variation in poses and change in angles of faces. A numerous techniques are being used for security and authentication purposes which includes areas in detective agencies and military purpose. These surveys give the existing methods in automatic face recognition and formulate the way to still increase the performance. Keywords— Face Recognition, Illumination, Authentication, Security
|
Full Text PDF |
48-52 | A Survey on Object Recognition Methods Sukanya C.M, Roopa Gokul, Vince Paul Abstract
The Recognition of Objects is considered as difficult one in Image Processing. Object recognition is an important part of computer vision because it is closely related to the success of many computer vision applications. A number of object recognition algorithms and systems have been proposed for a long time in order to address this problem. This paper presents a survey of different techniques in the field of computer vision and object recognition. Mainly this paper is to review and study of the different methods of object detection. In this survey we discuss background subtraction, optical flow, point detector, frame differencing to detect objects. We also compared accuracy and limitations of these methods. The research paper includes various approaches that have been used by different researchers for object detection. Keywords— Object detection, object classification, Background subtraction. |
Full Text PDF |
53-56 | A Survey on Enhanced Vision of Hazy Images Magniya Davis, Bineeth Kuriakose ,Vince Paul Abstract
Image processing techniques improve the quality of an image or enhance the maximum information from the degraded image. Image Dehazing is a technique of enhancing the quality of image from given hazy image. It is the process of converting hazy image into a haze free image. Then the resulting image will be more clear and enhanced from the prior. Many development and research is being done in these field areas of Computer Vision, Automatic object detection, Image processing, parallel and distributed processing, Robotics and remote sensing. This thesis reports a detailed study performed over a set of image Dehazing algorithms regarding their implementation. The thesis demonstrates the utility and effectiveness of a dehazing techniques. Keywords— Dehazing,Restoration,DCP,IDCP |
Full Text PDF |
57-61 | Survey on SLA for PaaS Clouds Minnu Moothedan, Christina Joseph Abstract
Cloud Computing is one of the biggest buzzwords in the field of information technology today. Due to its wide popularity most of the organizations started shifting their business to cloud. Cloud provides flexible and reliable services to its users. However, this new technology has also created many challenges for service providers and customers, especially for those users who already own complicated legacy systems. Service Level Agreements (SLAs) are the means through which the provision of infrastructure, platform, and software services in Cloud Computing is regulated, along with functional and non-functional specifications of services. SLAs are intended to set a framework for the provision of services and for the cooperation between service providers and service consumers. Currently, Cloud SLAs are usually drafted by Cloud providers and do not allow much negotiation. Keywords— Cloud Computing, Service Level Agreements, PaaS |
Full Text PDF |
62-65 | Establishing Stable and Reliable Routes for
Heterogeneous Multihop Wireless Networks Pavithra . N, Nija Shining Gold. T.L Abstract
We propose E-STAR for establishing stable and reliable routes in heterogeneous multihop wireless networks. E-STAR combines payment and trust systems with a trust-based and energy-aware routing protocol. The payment system rewards the nodes that relay other’s packets and charges those that send packets. The trust system evaluates the node’s competence and reliability in relaying packets in terms of multi-dimensional trust values. The trust values are attached to the node’s public-key certificates to be used in making routing decisions. We develop two routing protocols to direct traffic through those highly-trusted nodes having sufficient energy to minimize the probability of breaking the route. By this way, E-STAR can stimulate the nodes not only to relay packets, but also to maintain route stability and report correct battery energy capability. This is because any loss of trust will result in loss of future earnings. Moreover, an efficient anonymous communication protocol, called MANET Anonymous Peer-to-peer Communication Protocol (MAPCP), for P2P applications over MANET was proposed. MAPCP also maintains high packet delivery fraction even under selective attacks. The efficient implementation of the trust system, the trust values are computed by processing the payment receipts. |
Full Text PDF |
66-69 | Survey on Mining Educational Data and
Recommending Best Engineering College Lavannya Varghese,Christina Joseph,Vince Paul Abstract
In this present era, Engineering colleges are increasing day by day. Good education comes from good colleges and everyone is in search of the best to enhance their future and to live the best of it. Thus finding out one from a 1000 is a difficult task.In India itself around 1077 engineering colleges and in Kerala 145 engineering colleges. So selecting one engineering college is very difficult task.In this project, using data mining techniques and neural network, it help to predict the best engineering college on the basis of the number of students with highest passing out rate and also an account to placement happening in each college and that would definitely help the student community to get the best education and make the life worth living. Using c4.5 algorithm,student performance of different colleges will predict and using that pass/fail ratio and all other attributes like placement rate, rank holders etc recommending the best engineering college. This web application enables the colleges to enter their details. And also it can shows the analysis of their own college. Then each colleges see other registered colleges analysis based on above mentioned factors. This will help the college to improve on their facilities to become best among all. Keywords— c4.5,neural network,datamining
|
Full Text PDF |
70-74 | A Survey on Color Transfer Methods Evline J Alappatt, Vince Paul Abstract
Color mapping or color transfer methods aim to recolor a given image or video by deriving a mapping between that image and another image serving as a reference. This class of methods has received considerable attention in recent years, both in academic literature and in industrial applications. Methods for recoloring images have often appeared under the labels of color correction, color transfer or color balancing, to name a few, but their goal is always the same: mapping the colors of one image to another. In this report, we present a comprehensive overview of these methods and offer a classification of current solutions. Keywords- Colortransfer, edgepreserving smoothing, image manipulation.
|
Full Text PDF |
75-77 | Converging Technologies of Cloud and Big Data K. Kala Bharathi Abstract
Cloud technology is playing a vital role in present era to store and process massive amount of data, which leads to the convergence of cloud and big data. Cloud computing holds a tremendous promise of unlimited, on demand, elastic, computing and data storage resources. It has the potential to enhance business agility and productivity while enabling greater efficiencies and reducing costs. Big data environments require clusters of servers to support the tools that process the large volumes, high velocity, and varied formats of big data. It offers the promise of providing valuable insights that can create competitive advantage and also to explode new innovations. In this paper, I discussed how cloud and big data technologies are converged to improve quantitative decision making with minimal risk and to offer cost-effective delivery model for cloud-based big data analytics. Keywords: cloud, big data, technology, analytics
|
Full Text PDF |
- Home
- Author Instruction
- Editorial Board
- Call for Paper
- Current volume
- Archives
- Indexing
- FAQ
- Publication Fees
- Contact
- Citation Index 0.47
Email: ijcsetonline@gmail.com / editor@ijcset.net