......

..

IJCTA-Volume 4 Issue 1/ January-February 2013
S.No
Title/Author Name
Page No
1
IRIS Recognition using GABOR
-Shirke Swati D,Prof.Gupta Deepak
Abstract
The iris recognition is a kind of the biometrics technologies based on the physiological characteristics of human body, compared with the feature recognition based on the fingerprint, palm-print, face and sound etc, the iris has some advantages such as uniqueness, stability, high recognition rate, and non-infringing etc. iris patterns have now been tested in many field and laboratory trials, producing no false matches in several million comparison tests [3]. We present an efficient Iris Code classifier, built from phase features which use Gabor wavelets bandwidths [1]. The final iris classifier consists of a weighted contribution of weak classifiers. Based on the Levenshtein distance between phase vectors of the respective iris images [4]. IRIS Recognition is used of Identification, Authentication,and Scanning . There are different methods for feature extraction of iris. Here proposed three different methods for feature extraction namely principal component analysis, independent component analysis and 2D gabor wavelet.[9]
Keywords: IRIS Recognition; biometrics; Euclidean distance, 2-D Gabor.
1-7

  PDF

2
Comparitive Study of Page Rank Algorithmwith Different ranking Algorithms Adopted by Search Engines for Website Ranking
-Mridula Batra,Sachin Sharma
Abstract
We use Search Engines to search for information across the Internet. Internet being an ever-expanding ocean of data, their importance grew with every passing day. The diversity of the information itself made it necessary to have a tool to cut down on the time spent in searching. Page Rank is a probability distribution used to represent the likelihood that a person randomly clicking on links will arrive at any particular page. The main disadvantage is that it favors older pages, because a new page, even a very good one, will not have many links unless it is part of an existing site. Trust Rank is a major factor that now replaces PageRank as the flagship of parameter groups in the Google algorithm. It is of key importance for calculating ranking positions and the crawling frequency of web sites. Page Rank (Google PR) and Trust Rank are the two main issues which are discussed frequently on various SEO forums. In this paper, we will compare these algorithms.
Keywords: Ranking, Page, Trust, Hits
8-18


  PDF

3
A Review Application of Data Mining Tools for Stock Market
-Keerti. S. Mahajan, R. V. Kulkarni
Abstract
One of the most important problems in modern finance is finding efficient ways to summarize and visualize the stock market data to give individuals or institutions useful information about the market behavior for investment decisions. Therefore, Investment can be considered as a one of the fundamental pillars of national economy. The single and most important reason is to earn returns on investment. At the present time, many investors look to find a criterion for comparison stock together and selecting the best. The investors try in choosing the type of strategy, to choose strategies that maximize the earning value of the investment process.
The enormous amount of valuable data generated by the stock market has attracted researchers to explore this problem domain using different methodologies. Potential significant benefits of solving these problems motivated extensive research for years. Data mining is used for mining data from databases and finding out meaningful patterns from the database. Many organizations are now using these data mining techniques. So the research in data mining has gained a high attraction due to the importance of its applications and the increasing information.
Key words: Stock market, data mining, decision tree, neural network, clustering, association rules, factor analysis, time series.
19-27

  PDF

4
Fuzzy Logic based Intelligent Farming Multi Agent System
-Anita Gutta, Dr. Priti Srinivas Sajja
Abstract
A lot of tools have been developed to personalize content on the web. And filtering techniques like content based and context filters get the proper information to users. Information captured in user profiles have certain degree of imprecision and uncertainty. Fuzzy logic provides a means to overcome this short coming. This paper proposes a means to use Fuzzy Linguistic variables in user profiles and how to handle the vague and imprecise information.
Keywords - Intelligent Multi Agent systems, Fuzzy Linguistics, Information Retrieval system, Jade systems.
28-32

  PDF

5
Solving the Traveling Salesman Problem using an Evolutionary Algorithm
-Ujjwala. H. Mandekar,Pooja B. Aher
Abstract
An evolutionary algorithm is a random search method specifically based on the principle of natural selection (i.e. survival of the fittest). It selects the best solutions from a given set of possible solutions to create new solutions. These new ones are formed using method known as crossover and mutation.Here, a genetic algorithm is used to solve a classic problem in combinatorial optimization that is NP-hard, the Traveling salesman problem (TSP).
Keywords—NP-hard; Traveling salesman problem; Genetic algorithm
33-35

  PDF

6
‘Cloud Computing’- Architecture, Applications and Advantages
-Arun Mani Tripathi,Rizwan Beg
Abstract
Many people are confused as to exactly what cloud computing is, especially as the term can be used to mean almost anything. Roughly, it describes highly scalable computing resources provided as an external service via the internet on a pay-as-you-go basis. Economically, the main appeal of cloud computing is that customers only use what they need, and only pay for what they actually use. Resources are available to be accessed from the cloud at any time, and from any location via the internet. There’s no need to worry about how things are being maintained behind the scenes –you simply purchase the IT service you require as you would any other utility. Because of this, cloud computing has also been called utility computing, or ‘IT on demand’. This new, web-based generation of computing utilizes remote servers housed in highly secure data centers for data storage and management, so organizations no longer need to purchase and look after their IT solutions in-house.
Keyword :- cloud computing, pay-as-you-go, utility computing remote servers, data storage, IT.
36-42

  PDF

7
Dual Key Triple Encryption Text Based Message using Cryptography and Steganography
-Yohan Suryanto,Nur Hayati,R. Hendra Kusumawardhana,Prof. Dr.Riri Fitri Sari
Abstract
Dual Key Triple Encryption Text Based Message Using Cryptography and Steganography is a modular encryption and decryption method for any type of file. It combines layer 1 and layer 2 encryption techniques with standard encryption like AES as layer 3 encryption. Dual symmetric key is required to encrypt or decrypt file, so it can be used by two different persons to encrypt or decrypt certain file. Layer 1 and Layer 2 can use independently to achieve higher security level and fast encrypt or decrypt processing time. We propose character mapping and window addition for level 1 encryption. This technique has better processing time more than 21 times faster than fair character mapping. For layer 2 encryption, we propose scrambling transpose position and dummy file insertion as steganography technique. This method has higher efficiency ratio compare to LSB technique. We can achieve 50% efficiency compare to 12.5% in LSB technique. Combining both methods, we can achieve higher security level by maintaining faster processing time and reduce chipper text size. It can also be used together with AES to increase security level, yet still maintaining fast overall processing time and high efficiency ratio.
Keywords— Dual Key, Encryption, Decryption, Cryptography, Steganography, Character, Window addition, Scrambling, Insertion, fast processing, high efficiency and AES
43-50


  PDF

8
Hybrid data Gathering Scheme for Energy Efficient Wirless Sensor Networks
-Mr.A.Muthu Krishnan,Dr.P.Ganesh Kumar
Abstract
Due to their ease of deployment, reliability, scalability, flexibility, and self-organization, the existing and potential applications of Wireless Sensor Networks (WSN's) span a wide spectrum in various domains, the environmental and technical requirements of which may differ significantly. The major bottle neck in WSN based data collection is the limited power back up. Due to some hostile environments periodic charging of wireless nodes is also not possible. The purpose of deploying a WSN is to collect relevant data for processing and reporting. In particular, based on data reporting, WSNs can be classified as time-driven, event-driven and data driven. In this paper, a hybrid data-gathering protocol that dynamically switches between the event-driven data-reporting and data-driven data-reporting schemes is proposed. The novel aspect of this approach is that sensor nodes that seem to detect an event of interest in the near future, as well as those nodes detecting the event, become engaged in the adaptive transmission based data-reporting process. This capability enables data from neighboring nodes to be gathered proactively without requiring observer intervention. As such, the proposed protocol accurately analyzes the environment being monitored using only moderate resource consumption. The method makes a tradeoff between the energy consumption and data accuracy. The two algorithms named parameter-based Event Detection (PED) for dynamic switching and Parameter-based Area Detection (PAD) for area coverage are proposed and the effectiveness of the algorithm in a wireless scenario is analyzed.
Keywords:Moderate resource consumption,, Energy efficient,adaptive sampling,data driven, event driven.
51-57


  PDF

9
The Most Common Success Factors in Cost Estimation-A Review
-G. Rajkumar,Dr.K.Alagarsamy
Abstract
Cost estimation process becomes a crucial factor in any software development project. An effective software estimate provides the information needed to design a workable software development plan. An effective software estimate provides important information for making project decisions, projecting performance and defining objectives and plans. Without the proper guidance in a project, the results could be disastrous. It begins by covering the fundamental problems of unreasonable software estimation: not planning up front; failure to use viable estimates as the bases of an achievable project plan, not updating the plan and estimates when a project changes, and failing to consider the uncertainties inherent in estimates. This paper proposes the success factors that bring to the effectiveness of cost estimation in software development project.
Keywords: Software Project Management, Project Success, Project Failure.
58-61

  PDF

10
A Review of Literature on Knowledge Management using ICT in Higher Education
-Prof. Ms. Ulka Toro,Dr. Milind J. Joshi
Abstract
The paper aims to survey the role of Knowledge Management (KM) using Information and Communication Technology (ICT) in higher education by conducting literature review and classification of articles from 2000 to 2012 in order to explore how KM technologies and applications have been developed in this period. The emergence of Information and Communication Technologies (ICT) in the last decade has opened new avenues in Knowledge Management that could play important roles in meeting the prevailing challenges related to sharing, exchanging and disseminating knowledge and technologies in the higher education. This paper provides a high level overview of KM using Information and Communication Technology (ICT) in higher education. A critical analysis is done by studying attempts made by professionals to implement KM using ICT in higher education .
Keywords: Knowledge, Knowledge Management, ICT, Network, higher education
62-67


  PDF

11
Commercial Off-The-Shelf (COTS) Components in Software Engineering: The Software Package SCILAB
-N. Gnanasankaran,K. Alagarsamy,S. Natarajan,K. Iyakutti
Abstract
Commercial Off-The-Shelf (COTS) components are widely used in many software industries and also in scientific computing. This paper first considers the definition of the term COTS and then tries to find how it typically manifests itself in the softwares used for mathematical computations. Some details regarding one of the popular software used for such calculations, viz., SCILAB are furnished. Since this is a freely downloadable program and a non-commercial one, it is better to consider this as an example of Scientific Off-The-Shelf (SOTS) components, a newly coined acronym.
Keywords: COTS, Computations, Mathematics, Programs
68-71


  PDF

12
Efficient Video Denoising and Real Time Object Tracking Using Particle Filter: A Condensation Approach
-Dr Samidha Dwivedi Sharma,Amit H Palve
Abstract
The video sequences are often corrupted by noise during acquisition and processing. The noise degrades the visual quality and also affects the efficiency of further processing like compression, segmentation etc... Hence, it becomes very important to remove the noise while preserving the original video contents.Tracking moving objects in video sequences is a central concern in computer vision. Reliable visual tracking is indispensable in many emerging vision applications such as automatic video surveillance, human–computer interfaces and robotics.Traditionally, the tracking problem is formulated as sequential recursive estimation having an estimate of the probability distribution of the target in the previous frame, the problem is to estimate the target distribution in the new frame using all available prior knowledge and the new information brought by the new frame. The Kalman filter provides an effective solution to the linear-Gaussian filtering problem.However, where there is nonlinearity, either in the model specification or the observation process, other methods is required. We consider methods known generically as particle filters, which include the condensation algorithm and the Bayesian bootstrap orsampling importance resampling (SIR) filter. In this paper we propose a particle filter for efficient video denoising as well as to track real time visual objects. As particle filter has many algorithms, we are using a condensation approach to implement the proposed system.
Keywords:Video denoising, Object Tracking, Kalman Filter, Linear-Gaussian Filter nonlinearity, Particle Filters, Bayesian bootstrap, Condensation.
72-77


  PDF

13
Review on Fault Tolerance Strategies in MPLS Network
-Ravi Yadav,Mrs. Laxmi Prasanna,Anil Vadhwa
Abstract
In order to provide reliable services MPLS network uses set of procedures (fault detection, fault notification and fault recovery) which provide appropriate protection to the traffic carried in active LSP (Label Switching Path). When fault occur in active LSP, the recovery scheme must re-direct the affected traffic to the recovery path which bypass the fault. The two basic recovery mechanism defined by IETF used to re-direct affected traffic is rerouting and protection switching. In protection switching number of faults can be handled simultaneously in the active and recovery path and is faster as compared to rerouting switching. On the other hand, rerouting switching can utilize resources in an efficient way but is slower than protection switching. In this paper we present a survey of various fault recovery schemes, initially we start reviewing some approaches of protection switching then we discuss the characteristics of some rerouting approaches. Finally the review recovery mechanisms are classified according to the set of characteristics considered relevant.
Keywords:Switching,,LSP ,MPLS,AP,FIS,POR.
78-83

  PDF

14
Face Recognition Methods & Applications
-Divyarajsinh N. Parmar,Brijesh B. Mehta
Abstract
Face recognition presents a challenging problem in the field of image analysis and computer vision. The security of information is becoming very significant and difficult. Security cameras are presently common in airports, Offices, University, ATM, Bank and in any locations with a security system. Face recognition is a biometric system used to identify or verify a person from a digital image. Face Recognition system is used in security. Face recognition system should be able to automatically detect a face in an image. This involves extracts its features and then recognize it, regardless of lighting, expression, illumination, ageing, transformations (translate, rotate and scale image) and pose, which is a difficult task. This paper contains three sections. The first section describes the common methods like holistic matching method, feature extraction method and hybrid methods. The second section describes applications with examples and finally third section describes the future research directions of face recognition.
Keywords—Face Recognition, Holistic Matching Methods, Feature-based (structural) Methods, Hybrid Methods
84-86

  PDF

15
Study of Location based Energy Efficient AODV Routing Protocols in MANET
-Richa Jain,Samidha Dwivedi Sharma
Abstract
A Mobile Ad hoc Network (MANET) is a collection of mobile hosts that move in different directions and speeds without the need to maintain connectivity with existing network infrastructure. If two mobile nodes are within each other’s transmission range, they can communicate with each other directly; otherwise, the nodes in between have to forward the packets for them. In such a case, every mobile node has to function as a router to forward the packets for others. Thus, routing is a basic operation for the MANET.Energy is one of the important issue in Mobile Ad hoc Network (MANET). Nodes are in network are working in the presence of limited energy then energy efficient routing is necessary for reducing energy consumption. Efficient minimum energy routing schemes can greatly reduce energy consumption and extends the lifetime of the networks. Now location aware DREAM protocol is reduces the energy consumption because due to the awareness of location less number of routing packets are flooded in the network by that energy consumption are reduces. In this paper we focus on the previous researches that had been done in field of location aware energy efficient routing in MANET.
Key words: - MANET, Location aware, Energy, Dream, Routing.
87-91


  PDF

16
Throughput Maximization in Wireless LAN with Load Balancing Approach and Cell Breathing
-Prof.Devesh Sharma, Prof.MamtaSood, Subhash patil, Santosh Durugkar
Abstract
Network load is one of the key tests in wireless LANs.This objective is typically achieved when the load of access points is well-adjusted. Recent studies on operational WLANs, shown that AP load is often uneven distribution. To correct such overload, several load balancing schemes have been suggested. These procedures are commonly required proprietary software or hardware at the user side for controlling the user-AP association.To achieve efficient resource usage without requiring changes to client software, we propose the use of cell breathing technique.In this paper we try present a new load balancing method by controlling the size of WLAN cells, which is conceptually similar to cell breathing in cellular networks. It only requires the ability of dynamically changing the transmission power of the AP beacon messages. We also consider the problem of network-wide min-max load balancing. Simulation results show that the performance of the proposed method is comparable with or superior to the best existing association-based method.
Keywords: Cell Breathing, WLAN, Load Balancing, receiving power
92-96


  PDF

17
Mobile Applications in Mulitmedia Cloud Computing
-Ramesh B,Savitha N,Manjunath A E
Abstract
This paper explains the principal concepts of multimedia cloud computing and presents a novel framework. We address multimedia cloud computing from multimedia-aware cloud (media cloud) and cloud-aware multimedia (cloud media) perspectives. First, we present a multimedia-aware cloud, which addresses how a cloud can perform distributed multimedia processing and storage and provide quality of service (QoS) provisioning for multimedia services. To achieve a high QoS for multimedia services, we propose a media-edge cloud (MEC) architecture, in which storage, central processing unit (CPU), and QoS adaptation for various types of devices. Then we present a cloud aware multimedia, which addresses how multimedia services and applications, such as storage and sharing, authoring and mashup, adaptation and delivery, and rendering and retrieval, can optimally utilize cloud-computing resources to achieve better quality of experience (QoE). And also explains mobile multimedia applications discusses deployment and distribution issues, focusing on video and audio-visual services and outline future directions for advanced audio-visual and multimedia services delivery on mobile devices.
Keywords: cloud computing, mobile multimedia, QoE, QoS, delivery
97-103

  PDF

18
Word Processors Negatively Affect Writing Quality: A Comparison with Transgenic Crops
-Lindsay Noël
Abstract
Zhao and Frank demonstrated “an ecological perspective can provide a powerful analytical framework for understanding technology uses in schools” [1]. This essay employs an ecological metaphor to illustrate the impact of using word processing to teach writing. This paper will compare the affects of planting genetically modified crops to the impacts of using word processors in education. Although their contexts are particularly different, scientists and consumers consider both revolutionary in their fields, but their use has particularly adverse consequences. This paper discusses similarities regarding their advantages, followed by parallels in their disadvantages. Consequently, this comparison establishes the need to moderate use of word processing software in schools.
104-107


  PDF

19
Management and Storage Techniques of Multimedia Data and Real-Time Oriented Access
-R. N. Jugele,Dr. V. N. Chavan
Abstract
The integration of multimedia data in one document gives very special requirements on data management in storage systems. Multimedia documents needs storing information of different types must be supported by the DBMS or storage system. New requirements to DBMS and storage systems developed as a consequence of the large amount of document data, continuous media storage and access the real-time features associated with it.
Key words:Voice Ropes, object oriented, DSS, storage device, Digital storage, Analog storage, continuous media, multimedia system
108-114


  PDF

20
Study on Web service Implementation in eclipse using apache CXF on JBoss Platform; Towards Service Oriented Architecture Principles
-Dr.T.Nalini, M.Sanjay
Abstract
Web service with SOA architecture is the mostly used word in the IT industry. SOA is a powerful distributed computing system provides the logic of divide the business processes into services with the intention of promoting the reusability. It converts the business process into loosely coupled services to integrate the Enterprise applications to reduce the IT Burden and increase the ROI. SOA platform is more popular and widely used in the distributed systems with the challenge of setting up the environment and integration, this study has been carried out to setting up the web service environment and creation of the services using SOA architecture. SOA Principles and the Open Software Tools are used in this study.
Keywords- Service Oriented Architecture (SOA); Webservices , Jboss , CXF
115-119


  PDF

 
 
IJCTA © Copyrights 2010| All Rights Reserved.

This work is licensed under a Creative Commons Attribution 2.5 India License.