Volume 6 Issue 1- January 2016

 

Page Title Full Text
01-08 Specifying Uncertainties in Inter-Agent Dependencies using Rough Sets and Decision Table
Anuja Soni, Vibha Gaur
Abstract

In Multi-Agent System (MAS), tasks are disseminated and delegated to other agents with a rationale of sharing mutual expertise. The inter-agent dependency signifies a compliance that facilitates a depender agent to accomplish a goal through the Service Provider Agents (SPAs) in a distributed environment. A number of uncertainties and ambiguities are involved with inter-agent dependencies. The inter-agent goal, soft goal or task dependencies ambiguously assist in the selection of appropriate service provider agents that would complicate the design of the system. Therefore, to reduce the complexity of the final system, it is essential to specify these uncertainties at requirements engineering phase so that coordination issues among agents could be resolved in a cooperative environment. This paper employs the decision table and the fundamental concepts of rough sets viz. indiscernible relation, approximations and boundary regions to specify ambiguities in the selection of appropriate SPAs that would assist the developer in deciding future course of action to resolve the uncertainties in framing an unambiguous Software Requirements Specification (SRS).

Keywords
Multi-Agent System (MAS), Software Requirements Specification (SRS), Degree of Dependency (DoD), Type of Dependency, Rough Sets, Equivalence Class, Indiscernible Relation, Decision Table.

Full Text PDF
09-13 Using K-means clustering algorithm with Power Efficient Gathering in Sensor Information Systems Protocol
Talib M. Jawad and Noor A. Ali
Abstract

Power-Efficient Gathering in Sensor Information Systems (PEGASIS) protocol is energy efficient protocols designed to prolong the lifetime of the network by reduction of energy consumption. In this paper a modification is proposed to the PEGASIS algorithm where sensor nodes are clustered in groups, clustering is done by k-means algorithm, and each group is treated as PEGASIS. In addition the proposed algorithm used rechargeable sensor nodes. Two parameters are searched to select chain leader: Euclidean distance of sensor node to the base station and residual energy of sensor node. Each cluster head data is transmitted directly to the base station. Simulation results showed the proposed algorithms improved in comparison with original PEGASIS.
 Keywords—K-means, PEGASIS, Wireless Sensor Networks (WSNs) , Cluster Head (CH).

Full Text PDF
14-18 Feature Selection in Session Matrix Using Enhanced ICA
Dr. V. Chitraa
Abstract

User behavior analysis helps the visitors browsing work more effective and simple and is an important research area in this internet scenario. It is used to analyze a new user and study their present behavior and classify them in a group of similar users. The group consists of user navigation patterns which are used for many applications like personalization, site improvement, business intelligence, and web page recommender system. The navigation pattern consists of features which are both relevant and irrelevant for mining process. To improve the overall clustering and classification results only important features have to be discovered in user navigation matrix. This work analyzes each and every feature and selects the relevant and important features for mining by using enhanced Independent Component Analysis. The experimental results shows that the proposed method selects more relevant features in lesser time.

Keywords - Feature Selection, ICA, Navigation Patterns, Preprocessing, Web Usage Mining

Full Text PDF
19-23 A Survey on Recognition and Analysis of Handwritten Document
Remya Vinayakumar, Vince Paul
Abstract

Handwriting differs from person to person. Some may be legible while some others are difficult to read or understand. Hence this project aims at recognizing the handwritten text and understanding what it is with the help of a neural network and fuzzy logic. It involves segmentation, feature extraction and classification.Here the method used is Canny Edge Detection Algorithm and the Histogram Of Gradients for the feature extraction. The neural network is trained on to a 50 set samples for each of the 26 alphabets and 10 numbers for recognition. The fuzzification can be applied along with this inorder to get more accurate results by giving the questionnaires, ie, by giving the conditions to check if it satisfies a particular character which is to be determined. This would thus yield 80 percentage accuracy and reliability in recognition
of the handwritten text.

Keywords— Neural network, Histogram of Gradients, Canny algorithm, fuzzy logic

Full Text PDF
24-26 Conspiring Open Source Technologies
Dr.Aruna Varanasi, S Manminder Kaur, T.Venkat Narayana Rao
Abstract

OpenDaylight is a new, ambitious and a pioneering project of the Linux Foundation which deals with the progress of the Linux kernel. Its main objective is to work with the Software-Defined Networking (SDN) that can take the virtualization to a next level by providing network architecture of virtualized network nodes. It is an approach towards computer networking, which is aimed at developing an improved way of networking among the computer devices. It is set to develop a framework that allows beneficial and robust networking, which will replace the current networking model with various virtualization technologies. OpenDaylight provides a platform that will link the traditional networking technologies with the future networking technologies. This paper states the importance of how the OpenDaylight can be collaborated with advance Software-defined Networking (SDN) that supports the emerging community led technologies and with its evolution.

Keywords:OpenDaylight, Software-defined network (SDN), virtualization of network function (NFV), OpenFlow.

Full Text PDF
27-32 A Survey On Steganographic Methods Used in Information Hiding
Anju PS, Bineeth Kuriakose, Vince Paul
Abstract

Due to Exponential growth in the internet technology, there are large amounts of images are available on the internet. Nowadays transmission of data is a daily routine and protection of such transmitted data is a big problem. Protection can be done with encryption of data or by using data hiding algorithms. Hiding techniques can be used in the environment where steganographic techniques fail.  There are many different protocols and embedding techniques allows us to hide data in a given image. In this paper we have analyzed various information hiding techniques.

Keywords— DCT, DWT, LSB, Information hiding.


Full Text PDF
33-39 Survey on Multimodal Medical Image Fusion Techniques
Swathi.P.S, Sheethal.M.S, Vince Paul
Abstract

An Image fusion is the development of amalgamating two or more image of common characteristic to form a single image which acquires all the essential features of original image. Nowadays lots of work is going to be done on the field of image fusion and also used in various application such as medical imaging and multi spectra sensor image fusing etc. For fusing the image various techniques has been proposed by different author such as wavelet transform, IHS and PCA based methods etc.The key objective of vision fusion would be to merging information from multiple images of exactly the same view in order to deliver only the useful information. This paper has centred on the many image fusion techniques. The review has shown that the still much research is needed to improve the image fusion technique further.

Keywords— Multimodal medical image fusion, Medical image, PCA, Wavelet Transform,Non subsampled contourlet Transform

Full Text PDF
40-42 A Survey of Encryption then Compression using Auxillary Information
Cinu Joseph, Jasmy Davies , Vince Paul
Abstract

Most commonly, image encryption has to be conducted prior to image compression. This has led to the problem of how to design a pair of image encryption and compression algorithms such that compressing the encrypted images can still be efficiently performed.  is a highly efficient image encryption-then-compression (ETC) system. The proposed image encryption scheme operated in the prediction error domain can able to provide a high level of security. An arithmetic coding-based approach can be used to efficiently compress the encrypted images. Most of the existing ETC solutions induce significant penalty on the compression efficiency. Image hiding approach after the encryption phase is also used for getting more security. Gradient Adjusted Predictor (GAP) is used to find predicted values of the image.

Keywords— Gradient Adjusted Predictor, Encryption then Compression, Compression then Encryption

Full Text PDF
43-47 Face Recognition through Different Facial Expressions for Women Security: A Survey
Soumya Xavier,Jasmine Jolly,Vince Paul
Abstract

Face is an essential part of our daily life. It is a complex multidimensional structure and needs a good computing technique for recognition. Face recognition has been a fast growing, challenging and interesting area in real time applications. A large number of face recognition algorithms have been developed in last decades. In this paper an attempt is made to review a wide range of methods used for face recognition comprehensively. While using automatic system for face recognition, computers are easily confused by changes in illumination, variation in poses and change in angles of faces. A numerous techniques are being used for security and authentication purposes which includes areas in detective agencies and military purpose. These surveys give the existing methods in automatic face recognition and formulate the way to still increase the performance.

Keywords— Face Recognition, Illumination, Authentication, Security


Full Text PDF
48-52 A Survey on Object Recognition Methods
Sukanya C.M, Roopa Gokul, Vince Paul
Abstract

The Recognition of Objects is considered as difficult one in Image Processing. Object recognition is an important part of computer vision because it is closely related to the success of many computer vision applications. A number of object recognition algorithms and systems have been proposed for a long time in order to address this problem. This paper presents a survey of different techniques in the field of computer vision and object recognition. Mainly this paper is  to review and study of the different methods of object detection. In this survey we discuss background subtraction, optical flow, point detector, frame differencing to detect objects. We also compared accuracy and limitations of these methods.  The research paper includes various approaches that have been used by different researchers for object detection.

Keywords— Object detection, object classification, Background subtraction.

Full Text PDF
53-56 A Survey on Enhanced Vision of Hazy Images
Magniya Davis, Bineeth Kuriakose ,Vince Paul
Abstract

Image processing techniques improve the quality of an image or enhance the maximum information from the degraded image. Image Dehazing is a technique of enhancing the quality of image from given hazy image. It is the process of converting hazy image into a haze free image. Then the resulting image will be more clear and enhanced from the prior. Many development and research is being done in these field areas of Computer Vision, Automatic object detection, Image processing, parallel and distributed processing, Robotics and remote sensing. This thesis reports a detailed study performed over a set of image Dehazing algorithms regarding their implementation. The thesis demonstrates the utility and effectiveness of a dehazing techniques.

Keywords— Dehazing,Restoration,DCP,IDCP

Full Text PDF
57-61 Survey on SLA for PaaS Clouds
Minnu Moothedan, Christina Joseph
Abstract

 Cloud Computing is one of the biggest buzzwords in the field of information technology today. Due to its wide popularity most of the organizations started shifting their business to cloud. Cloud provides flexible and reliable services to its users. However, this new technology has also created many challenges for service providers and customers, especially for those users who already own complicated legacy systems. Service Level Agreements (SLAs) are the means through which the provision of infrastructure, platform, and software services in Cloud Computing is regulated, along with functional and non-functional specifications of services. SLAs are intended to set a framework for the provision of services and for the cooperation between service providers and service consumers. Currently, Cloud SLAs are usually drafted by Cloud providers and do not allow much negotiation.

Keywords— Cloud Computing, Service Level Agreements, PaaS

Full Text PDF
62-65 Establishing Stable and Reliable Routes for Heterogeneous Multihop Wireless Networks
Pavithra . N, Nija Shining Gold. T.L
Abstract

We propose E-STAR for establishing stable and reliable routes in heterogeneous multihop wireless networks. E-STAR combines payment and trust systems with a trust-based and energy-aware routing protocol. The payment system rewards the nodes that relay other’s packets and charges those that send packets. The trust system evaluates the node’s competence and reliability in relaying packets in terms of multi-dimensional trust values. The trust values are attached to the node’s public-key certificates to be used in making routing decisions. We develop two routing protocols to direct traffic through those highly-trusted nodes having sufficient energy to minimize the probability of breaking the route. By this way, E-STAR can stimulate the nodes not only to relay packets, but also to maintain route stability and report correct battery energy capability. This is because any loss of trust will result in loss of future earnings. Moreover, an efficient anonymous communication protocol, called MANET Anonymous Peer-to-peer Communication Protocol (MAPCP), for P2P applications over MANET was proposed. MAPCP also maintains high packet delivery fraction even under selective attacks.  The efficient implementation of the trust system, the trust values are computed by processing the payment receipts.
Keywords-Securing heterogeneous multihop wireless networks, packet dropping and selfishness attacks, trust systems,payment system and secure routing protocols.

Full Text PDF
66-69 Survey on Mining Educational Data and Recommending Best Engineering College
Lavannya Varghese,Christina Joseph,Vince Paul
Abstract

In this present era, Engineering colleges are increasing day by day. Good education comes from good colleges and everyone is in search of the best to enhance their future and to live the best of it. Thus finding out one from a 1000 is a difficult task.In India itself around 1077 engineering colleges and in Kerala 145 engineering colleges. So selecting one engineering college is very difficult task.In this project, using data mining techniques and neural network, it help to predict the best engineering college on the basis of the number of students with highest passing out rate and also an account to placement happening in each college and that would definitely help the student community to get the best education and make the life worth living. Using c4.5 algorithm,student performance of different colleges will predict and using that pass/fail ratio and all other attributes like placement rate, rank holders etc recommending the best engineering college. This web application enables the colleges to enter their details. And also it can shows the analysis of their own college. Then each colleges see other registered colleges analysis based on above mentioned factors. This will help the college to improve on their facilities to become best among all.

Keywords— c4.5,neural network,datamining


Full Text PDF
70-74 A Survey on Color Transfer Methods
Evline J Alappatt, Vince Paul
Abstract

Color mapping or color transfer methods aim to recolor a given image or video by deriving a mapping between that image and another image serving as a reference. This class of methods has received considerable attention in recent years, both in academic literature and in industrial applications. Methods for recoloring images have often appeared under the labels of color correction, color transfer or color balancing, to name a few, but their goal is always the same: mapping the colors of one image to another. In this report, we present a comprehensive overview of these methods and offer a classification of current solutions.

Keywords- Colortransfer, edgepreserving smoothing, image manipulation.


Full Text PDF
75-77 Converging Technologies of Cloud and Big Data
K. Kala Bharathi
Abstract

Cloud technology is playing a vital role in present era to store and process massive amount of data, which leads to the convergence of cloud and big data. Cloud computing holds a tremendous promise of unlimited, on demand, elastic, computing and data storage resources. It has the potential to enhance business agility and productivity while enabling greater efficiencies and reducing costs. Big data environments require clusters of servers to support the tools that process the large volumes, high velocity, and varied formats of big data. It offers the promise of providing valuable insights that can create competitive advantage and also to explode new innovations. In this paper, I discussed how cloud and big data technologies are converged to improve quantitative decision making with minimal risk and to offer cost-effective delivery model for cloud-based big data analytics.

Keywords: cloud, big data, technology, analytics


Full Text PDF
     

 

 

 

 

 

IJCSET Menu

Downloads