......

..

IJCTA-Volume 5 Issue 1/ January-February 2014
S.No
Title/Author Name
Page No
1
An Approach for Emotion Identification from Weblog Corpora
-Santhi Priya Polisetty,Madhuri Polisetty,T.V .Rao
Abstract
Social networking today has become a very popular communication tool among Internet users. Millions of users of these websites share opinions on different aspects of life every day. Opinions are important because whenever a person needs to make a decision, he wants to hear others¡¦ opinions. So, social networking websites are rich sources of data for opinion mining and sentiment analysis.Generally, adjectives in the text represent emotions such as good, fortunate etc for positive nature and poor, inferior for negative nature. Even nowadays it has become blogging culture to add emoticons such as ƒº for happy feeling and ƒ¼ for sorrow feeling etc into the opinions. So, it is that emoticons also should be treated along with adjectives to know blogger¡¦s expression.Many studies find that movie review mining is a more challenging application than many other types of review mining. The challenges of movie review mining lie in that factual information is always mixed with real-life review data and ironic words are used in writing movie reviews.This paper describes an approach concerned with the analysis of emotions in the movie reviews including emoticons. We describe the categorization of a large data set annotated for six basic emotions: anger, disgust, fear, joy, sadness and surprise, and we propose the automatic identification of these emotions in text so that it clearly states how movie is. The results show that our results are comparable to or even better than previous findings.
Keywords:-social network, opinion mining, emoticon, catergorization, weblog.
1-7

  PDF

2
Commutative FSM Having Cycles over the Binary Alphabet
-Dr.S. Jeya Bharathi,A.Jeyanthi
Abstract
In this paper we deal with commutative FSM over the binary alphabet X. In particular, we introduce and study normal commutative FSM and commutative FSM having cycles over the binary alphabet X. Some properties on endomorphism monoids of these automata are given. Also, the representations of normal commutative FSM and commutative FSM having cycles over the binary alphabet X, are provided by S-automata and regular S-automata, respectively.
Keywords: Endomorphism monid, commutative FSM, Representation S-automata
8-15

  PDF

3
Enhanced Image Fusion Technique Based in Wavelet Transform
-Shivani Sharma,SatyajitSenPurkayastha
Abstract
Image fusion practices permit the integration of different information bases. The merged image can have complementary, spatial and spectral resolution characteristics[1]. However, the typical image fusion methods can falsify the spectral information of the multispectral data, though merging. The hypothetical image fusion is done on the images which is taken, either by different sensors at the same time or by same sensor at different times, and is graduallyblended. The image description of the scene is more accurate, comprehensive and reliable than any other image.In our paper, we have proposed method which is the hybrid version of the wavelet transforms, that is Haar and Symlet transforms ,for the multimodality medical images. Its utility and effectiveness are compared with other transforms on the basis of some standard performance criteria.
Keywords:Medicalimage, Multi-modality, HybridWavelets,Symlet,Haar.
16-24

  PDF

4
Intelligent Unipath Routing for MANET Using Genetic Algorithm
-Arun Biradar,Dr. Ravindra C. Thool
Abstract
In a mobile ad-hoc network (MANET), the topology of the network may change rapidly and unexpectedly due to mobility of nodes. To support mobility to user generally low configured nodes are in use, so limited resources and link variation are the issues with MANET. Thus, setting up router that meet high reliability is a very challenging issue. Another important problem in MANET is the energy consumption of nodes. When the energy of a node is depleted, it stops working, thus link break.Hence it is very important to find a route that has sufficient energy level and high stability, and so can obtain reliable routing and data transmission.Genetic Algorithm (GAs) promise solution to such complicated problems they have been used successfully in various practical applications. Areas in which Genetic Algorithms excel is their ability to manipulate many parameters simultaneously. The use of parallelism enables them to produce multiple equally good solutions to the same problem.
Keywords: Mobile Ad hoc Network (MANET), Genetic Algorithm (GA), link life time (LLT), Route Error (RERR), Route Request (RREQ).
25-30

  PDF

5
An Evolutionary survey on Markov Models
-Jitendra Dangra,M.K.Rawat,Poonam Kaushal
Abstract
Web mining concern with the extraction of knowledge or information from the world wide web . One of the problem in web mining is to predict user’s next web page request. Several techniques for this prediction purpose are employed and some of these are rough set clustering , support vector machine, fuzzy logic, neural network etc [1][2][3][4]. Besides these techniques Markov models are used in web page request prediction. In this paper we discuss about some Markov models and their technique of prediction .
Keywords : World wide web , Markov model .
31-34

  PDF

6
Comparing Kernels For Improving Svstream
-Kannan.E,Suresh Kumar .S,Suganthi.S
Abstract
The abstract deals with Clustering is one of the most effective means of summarizing data streams. Existing data stream clustering algorithms, which would fail in identifying arbitrary shaped clusters, or cannot adapt to the dynamic data streams, or require expensive computational resources. SVStream, which is based on support vector domain description and support vector clustering. In the data elements of a stream are mapped into a kernel space and the support vectors are used as the summary information of the historical elements to construct cluster boundaries of arbitrary shape. Existing system kernel based SVM finds the input space with kernel feature space with most datapoints but less result improve the result look for the smallest sphere that encloses most of the data points in the feature space. Kernel functions can be used in many applications as they provide a simple bridge from linearity to non-linearity for algorithms which can be expressed in terms of dot products. Different kernel function is used to compute the different datastreams. Proposed system introduce the different kernel function to map the data elements into the kernel space ,each and every kernel function will be differ based on their own functionality and the support vectors are used as the summary information of the historical elements to construct cluster boundaries of arbitrary shape.
35-38

  PDF

7
Comparative Study of Fusion Process Model with Existing Software Development Models
-Rupinder Kaur,Jyotsna Sengupta
Abstract
Software has been part of modern society for more than half century. With the growing complexity of the software development, the requirement to automate the various activities increased in the existing software models. The concept of software development lifecycle models came into existence that emphasized on the need to follow some structured approach for software development activities. The software development process model that a group uses to design software is important for determining the success of a project. This paper presents a comparative study of various existing models with software process model named Fusion Process Model (FPM), which is component driven software process model, where each phase implements a problem solving model, 3C Model. A comparative study of commonly used software development models with Fusion Process Model, demonstrates that the FPM has important features to produce a software product that are open for extensions of existing components and thus reusable. This will help to select the best model for a particular situation.
Index Terms— Software process model, Software product, Software development, Fusion Process Model (FPM).
39-52

  PDF

8
Mapping of Fusion Process Model onto ISO/IEC 12207:2008
-Rupinder Kaur,Jyotsna Sengupta
Abstract
Fusion Process Model is a component driven software development approach and can handle design and requirements changes at later stage very efficiently. The purpose of this paper is to provide a support to the standardization of Fusion Process Model (FPM). Thus, this paper is based on the results of the FPM assessment outcomes mapping (based on the experience of the team members of the four projects) with the software development standard (Industry Implementation of International Standard ISO/IEC 12207: 2008).
Index Terms— Software process model, Software product, ISO/IEC 12207, Fusion Process Model (FPM).
53-75

  PDF

9
Remote Procedure Calls Based Middleware Design for Ubiquitous Computing Environment
-Sunil Kumar Nandal,Yogesh Chaba
Abstract
Mark Weiser suggested that computing devices should be assisting human being in their day to day routine life activities, staying invisible from their attention. In such type of computing scenario, called Ubiquitous Computing, a very large number of computers are required to identify, connect and communicate with each other dynamically, without any break in service to their users.In this paper, a design of middleware layer has been suggested. It has been implemented using JAVA Remote Method Invocation (RMI). This middleware design felicitates communication among heterogeneous devices. Due to inherent characteristics of platform independence and portability, Java RMI is an appropriate technology to implement middleware layer.
Keywords: Middleware, Remote Method Invocation, Heterogeneous Systems
76-80

  PDF

10
A Novel Load Balancing Algorithms in Grid Computing
-Shikha Gautam,Abhay Tripathi
Abstract
The Grid is emerging as a wide-scale distributed computing infrastructure that promises to support resource sharing and coordinated problem solving in dynamic multi-institutional Virtual Organizations. The idea is similar to the former Meta Computing where the focus was limited to computation resources, whereas Grid computing takes a broader approach. On one hand, Grid computing provides the user with access to locally unavailable resource types. On the other hand, there is the expectation that a large number of resources are available. A computational Grid is the cooperation of distributed computer systems where user jobs can be executed on either local or remote computer systems.The main aim of the paper is to design an architectural framework to propose decentralized, scalable, adaptive, and distributed algorithms for load balancing across resources for data-intensive computations on Grid environments using job migration algorithms which is Load Balancing Algorithm.
Keywords- Grid Computing, Load Balancing, Load balancing on Arrival, Migration.
81-86

  PDF

11
Design and Implementation of a Digital Image Processor for Image Enhancement Techniques using Verilog Hardware Description Language
-DhirajR. Gawhane,Karri Babu Ravi Teja,AbhilashS. Warrier,AkshayS. Belvadi
Abstract
The design and implementation of a processor, to perform basic point operations on an image using Verilog Hardware Description Language (HDL) has been investigated. Performing signal processing operations using HDL have an advantage of immediate hardware VLSI implementation as against classical simulation methods. To achieve higher performance, especially, high speed and efficient hardware utilization, we suggest a suitable processor architecture imbibing the concept of pipelining, for signal processing, along with its implementation and results. The processor achieves image enhancement in spatial domain through point processing operations like: contrast manipulation, brightness manipulation, inversion and threshold operations.
Index Terms - Digital Image Processing, FPGA, Verilog, Image Enhancement, Point Operations
87-91

  PDF

12
Efficiency E-Auction Framework using Apriori Technique
-K.Vinoth Kumar,C.Sendhil Kumar
Abstract
Nowadays, Internet auctions are popular and useful in buying and selling the product. Performance is one of the main challenges in designing an e-commerce or e-business application like auction model. There are many types of auction like primary auction and secondary auction based on that they are categorized into several types of auction like English auction, Dutch auction etc. We are implemented using English auction. This article proposes new methods to attain scalability. We are considering two parameter to attain scalability are Customer visit model (CVM) and Apriori Algorithm. This paper introduces new algorithm called CVM-A algorithm which includes both customer visit model and Apriori algorithm. This algorithm uses new methods for estimating e-auction based on the priority of the user bided information which will be tracked by load balancer. We are using Apriori algorithm for finding frequent bidder in the e-auction system. This will be useful for calculating the winner of the bid. Results will be automatically display on the website.
92-102

  PDF

13
Implementation and Performance Analysis of Reliable and Secure End to End Voice Encryption over Public Mobile Network Based on Frequency Domain Using Dual Processor in FPGA Platform
-Yohan Suryanto,Kalamullah Ramli
Abstract
This research aims in designing a method for implementing end-to-end voice encryption over mobile network such as GSM that independent to phone devices, operating system and network devices. The proposing method is an encryption system in domain frequency to keep the encryption signal remain within the range of sound frequencies that can be transmitted through GSM/2G/3G. This method differ compare to the method used in the previous studies, in which they use the time-based encryption method to get a low rate encrypted data so the results can be communicated via GSM network. We simulated the method using Matlab. The simulation results showed that the voice encryption on the frequency domain characteristics is very different from the original signal and can be passed completely through the GSM network. This method was implemented in the Xilinx FPGA using microblaze dual core processor on the Atlys board. The results of the signal reconstruction using FFT/IFFT module in FPGA Xilinx varied in a relatively small deviation, maximum -10.42 dB, compared to the original signal. Performance analysis of the prototype showed the sender speech can be reconstructed real time in the mobile handset of the receiver side, even in the unsynchronized condition. However, in a further prototype development, the precision level of the FFT/IFFT module needs to be improved, meanwhile the synchronization module and echo canceller need to be added.
Keywords— Voice encryption, End-to-end mobile network, GSM/2G/3G, Dual core microblaze, Xilinx FPGA, FFT-IFFT, Domain frequency.
103-111

  PDF

14
Collaborative Data Publishing: A Survey on Recent Developments
-V. Sharmila,J.Francy,C.P.Shabariram,R.Anandhi,R.Aishwarya
Abstract
This paper focuses on the Collaborative Data Publishing problem that occurs when the sensitive information has been shared between different data providers. The paper includes the different attacks and problems that exist when the private data is shared between the multiple data providers in anonymizing the horizontally partitioned data. The paper also discusses about the available techniques to preserve the private information from the attackers. Data publishing also relies on the policies and guidelines which are formed by the organisation, where there exists a situation for each data provider to violate the framed policies and guidelines during data publishing. This problem enhances the several researchers to introduce innovative techniques and tools to overcome the data distortion. This survey paper summarizes all the proposed methods and techniques, discusses about the requirements and differences between the approaches.
Keywords— Collaborative Data Publishing, anonymization, horizontally Partitioned data, Data distortion.
112-118

  PDF

15
Framework of Data Integrity Verification for Multi Clouds Using CPDP Scheme
-Krunal N. Chandewar,Shailesh T. Khandare
Abstract
To provide the security first PDP scheme is proposed but due to I/O burden on the cloud. Secondly SPDP scheme is proposed but it is unsuitable for third party verification. Then DPDP scheme is proposed but it takes very large time in integrity verification. After then CPOR Scheme is proposed the Limitation of this work is a Lack of some security issues for large files Lastly CPDP scheme is proposed for integrity verification Cloud storage has become an attractive and cost effective alternative for enterprises to outsource their valuable business data. However, there are security concerns pertaining to the integrity of data as the cloud server is treated as “untrusted”. To overcome this problem many security schemes came into existence. Recently Zhu et al. presented a Scheme known as Cooperative Provable Data Possession (CPDP) for data integrity in cloud.
119-122

  PDF

16
Analytical Revision of Anomaly Intrusion Detection Performance Bases on Diversity of Domain
-Dr. Ashok R. Patel,Ajay M. Patel,Hiral R. Patel
Abstract
Anomaly detection is significant dilemma that has been explored within miscellaneous research areas and application sphere. Many anomaly detection techniques have been specifically developed for certain application domains, while others are more generic. This survey tries to provide a structured and comprehensive overview of the research on techniques used for anomaly detection. There are many categories of techniques used for Anomaly Intrusion Detection. For each category this paper tries to identify key assumptions, which are used by the techniques to differentiate between normal and anomalous behaviour and which technique is suitable for which types of network environment specification. When applying a given technique to a particular domain, these postulations can be used as strategy to assess the usefulness of the technique in that domain. This comparative analysis provides a discussion on the computational complexity of the techniques since it is an important issue in real application domains.
123-129

  PDF

17
A Proposed prediction Model for Forecasting the Financial Market Value According to Diversity in Factor
-Dr. Satyen M. Parikh,Hiral R. Patel,Amit B. Suthar
Abstract
The objective of the proposed work to study and improve the supervised learning algorithms to predict the effect of various kind of government, policy related, corporate released, global political and financial environment related news on the particular sector’s or the stock price. This report shows the proposed research work flow to fulfill the objective of same. The main aim of this study is to provide the best prediction model based on past histories and the financial news. Stock prices are strong-minded by furnish and requirement of investors. The demand supply gap has affected by the financial news. But it is a hard and time consuming task to read and analyze a lot of news published on several sources. So, investors have not enough time to review all financial news those affect stock price. The financial Market behavior is also based on the financial news so the news impact analysis guides more accurate predictions and gives more profitable trade so proposed models are considering the news impact in financial market prediction..
131-135

  PDF

18
Tackling Software Complexity using Mobile Driven Multi agent System
-P. Felcy Judith,Dr. E. Kirubakaran
Abstract
The major challenge of current software development is about increasing the level of abstraction. Model Driven development raises the level of abstraction and models could be used across technologies and platforms. Model driven development also addresses the other challenge of increasing the level of automation. The code generated could be used to build services and integrate services. Even though the models solve some of the challenges in software industry but as the software size increases it forces challenges like Maintainability of models, Skill level, Tools and Technology.
On the other hand agent technology is suitable for handling current software development challenges, more dynamic and instead of acting as a single component acts as a team and provides interactive solution. Lack of modularity in MDA could be solved with agent technology. Whereas the lack of development practices in the agent technology could be solved by MDA
Keywords-Agent; Multi-Agents; Meta model, Modeling Agents; Agent Oriented Software Engineering; ROADMAP; RAP/AOR; MDA; MDD; MDE; DSL; MAS
136-139

  PDF

19
Enhancement in Weighted Page Rank Algorithm for Ranking Web Pages
-Sowmiya.A,Gayathri.A,Damodharan.P
Abstract
To retrieve required information from World Wide Web, search engines perform number of tasks based on their respective architecture. Web structure mining, is one such task and one of three categories of web mining for data, and is a tool used to identify the relationship between web pages linked by information or direct link connection. This structure data is discoverable by the provision of web structure schema through database techniques for web pages. A fast and efficient page ranking methods for web crawling and retrieval remains as a challenging issue, most of the ranking algorithm are either link or content oriented, which does not consider the user usage behaviour. In this paper, a page ranking mechanism called optimized Weighted Page Rank algorithm being developed for search engines, which works on the basis of weighted page rank algorithm and takes number of visits of inbound links of web pages into account. This algorithm tends to be very useful in reterving more relevant information according to user’s query. So, this concept is very useful to display most valuable pages on the top of the result list on the basis of user browsing behavior, which reduce the search space to a large size.
Keywords- in link, out link ,weighted page rank
140-143

  PDF

20
A Review of Image Encryption Schemes Based on the Chaotic Map
-Sukhjeevan Kaur,Dinesh Gupta
Abstrac
For high security, encryption is one the way to protect the information from leakage. Manyapplications like military image database, medical imaging system and online personal photograph album require fast and robust security system because they are stored and transfer through network. Image encryption is conversion of image to a distorted form so that it can be secured from unauthorized users. In this paper reviews of some image encryption techniques and finally investigate two methods for image encryption. First technique is encryption of image by linear congruential generator. Random numbers are generated by prime modulo multiplicative linear congruential generator. These numbers are used as index for shuffling of rows, columns and pixels of an image. Second technique uses logistic maps to generate random number sequences. These random numbers are used as index for shuffling of rows, columns andpixels of an image. Finally we have analyzed two methods on basis of image quality parameters.
Keywords-Encryption, Decryption, Logistic map, Linear congruential generator
144-149

  PDF

 
 
IJCTA © Copyrights 2010| All Rights Reserved.

This work is licensed under a Creative Commons Attribution 2.5 India License.