......

..

IJCTA-Volume 6 Issue 3/ May-June 2015
S.No
Title/Author Name
Page No
1
A Novel Method for Image Fusion using Improved Dual Tree Wavelet Transform with Kernel Padding and High pass Filter
-Neha Yadav,Shivani Shrivastri
Abstract
Due to the limited range of focusing length of digital imaging system (camera) the poor quality of image is formed or it is not capable to form all-in-focus image of substances at varying distance in a scene. To get an image of enhanced quality or all in focus image a multi-focusing system is used. In this paper, we propose a novel method for multi focus image fusion using improved dual tree complex wavelet transform (DT-CWT) with kernel padding and filtering technique. Firstly, wavelet transform is applied to decompose the source image into different components. Then, apply the kernel padding and high pass filter to sharp the image and diminish the noise after filtering apply fusion rule to reconstruct the decomposes image to obtain fused image of enhanced features. Our proposed work is executed on MATLAB2012a and its comparative analysis is performing using performance measuring parameters such as MSE and PSNR. The experimental result reveals that our proposed method is very appropriate for multi-focus image fusion and also outperformed than other existing techniques.
359-367
PDF
2
From Nanoscopic to Macroscopic Model of Stick-pulling Khepera Robots And its Formal Verification
-
Sungeetha.D,Vasumathi K. Narayanan
Abstract
The Modeling parallelism/ concurrency , without simulation by non-deterministic interleaving leads to deterministic models as opposed to stochastic models. If a robot is modeled in a monolithic manner representing multiple parallel threads sequentially, introducing probabilities to various transitions becomes inevitable and the resulting model turns out to be stochastic. In this work, we model the multi-threaded Khepera robots, each with multiple sub-agents that communicate with each other (intra-robot communication) as well as with such sub-agents of peer robots (inter-robot communication). The advantage of doing this is not only the true representation of the concurrent system, but also the deterministic nature of the model in place of a probabilistic one. Additional advantages are reduction of state-space explosion of the modeled swarm robotic system and the ease with which model-checking is performed using distributed branching-time logic.
Key Words:CFSMs, CMPMs, multi-threaded, non-stochastic, branching-time-CDTL, model-checking
368-373
PDF
3
Multidisciplinary Model for Smart Agriculture using Internet-of-Things (IoT), Sensors, Cloud-Computing, Mobile-Computing & Big-Data Analysis
-
Hemlata Channe,Sukhesh Kothari,Dipali Kadam
Abstract
Although precision agriculture has been adopted in few countries; the agriculture industry in India still needs to be modernized with the involvement of technologies for better production, distribution and cost control.
In this paper we proposed a multidisciplinary model for smart agriculture based on the key technologies: Internet-of-Things (IoT), Sensors, Cloud-Computing, Mobile-Computing, Big-Data analysis. Farmers, Agro-Marketing agencies and Agro-Vendors need to be registered to the AgroCloud module through MobileApp module. AgroCloud storage is used to store the details of farmers, periodic soil properties of farmlands, agro-vendors and agro-marketing agencies, Agro e-governance schemes and current environmental conditions. Soil and environment properties are sensed and periodically sent to AgroCloud through IoT (Beagle Black Bone). Bigdata analysis on AgroCloud data is done for fertilizer requirements, best crop sequences analysis, total production, and current stock and market requirements. Proposed model is beneficial for increase in agricultural production and for cost control of Agro-products.
Keywords: Internet-of-Things, Cloud Computing, Big-Data Analysis, Mobile Computing, Sensor, Smart Agriculture
374-382
PDF
4
On the Solvability of Nonlinear Singular Integral Equations with Cauchy Kernel on an Interval
-
A. S. Nagdy,A. B. Mohammed
Abstract
The present paper concerns the investigation of a certain class of nonlinear singular integral equations with Cauchy kernel on an interval . there are given uniqueness and existence theorems by application of Schauder's fixed point theorem to this type of equations .
Key Words:Singular integral equations , Cauchy kernel , Schauder's fixed point theorem
383-392
PDF
5
Image Inpainting using KNN in DCT Domain and Compression to get an optimized output
-
Biprajit Bhattacharjee,Sanyam Anand
Abstract
This paper work has major focus on images which have cracks and minor distortions in them. This prevents any compression technique to give the best output. Hence there is a need to first remove those distortions from the images before applying compression. A system is proposed, in which K-Nearest Neighbor Algorithm is implemented after the DCT Step, to remove the distortions before compressing it. The neighboring color of the distorted part can be used to merge with the damaged part. So basically, less color intensities have to be stored to save the same image without the distorted part which will result in more optimized compression ratio. It will be greatly valuable for viewer perspective.
Keywords: Compression, Inpainting, DCT, KNN,JPEG
393-409
PDF
6
Multi Cold Stores Temperature Control by Internet
-
Isam muhydeen,Abdelrasoul Jabar Alzubaidi
Abstract
The internet is a global system of interconnected computer networks that use the standard internet protocol (TCP/IP) to link several billion devices world wide. In this paper the internet will be used as a media for data transmission and reception. Modems on the terminations of the internet are to be connected .Hence data coming from the source get modulated by the modem and pass through the internet to reach to the destination node .In the destination another modem performs demodulation of data to hand it to the user. The data to pass through the internet can be coming from any data source. In the design, a personnel computer is used as a data source .In the destination another personnel computer is used. Each computer is working with team viewer. The program written in the destination personnel computer performs the task of sequential control to the cold store. An interface circuit is designed and connected to the destination personnel computer through the parallel port .The interface circuit on the other side is connected to the control panel of the cold store. The program along with the interface circuit performs the control of the cold store.
Hence, internet is used to serve as a remote control for the cold store. The proposed remote control system consists of personal computers (PC ‘s) , internet , modems ,interface circuit and cold store. The analyzed data gets interpreted by the destination personnel computer in order to control the operations in the cold store . This remote control system can be used for any electronic or electrical devices to operate them from anywhere using this technique, wherever the internet is available. [6]
Keywords: - control system, PC , Modem, , cold store , internet.
410-415
PDF
7
Encryption-then-Compression System using Haar and Symlet Wavelet Transform
-
Navneet Kaur Kang,Sanyam Anand
Abstract
Image compression is the important task for the medical images. Economic and effective image compression techniques are hardly required to minimize the storage volume of medical database in hospitals as well as maintaining the image quality. But the transmission and storage of such a large data could be a tedious job. There are various methods to encrypt the images while transmission. In this research, the proposed system is Encryption then Compression of medical images where Haar and Symlet wavelets can be exploited to efficiently compress the encrypted images. The proposed encryption technique is conducted on the basis of Prediction Error Clustering and Random Permutation to provide the high security at the transmission and the compression of the encrypted image is operated by the Haar and Symlet wavelets. The greater compression efficiency is expected at the compression of the encrypted image with high level of security.
Keywords: Encryption-the-compression (ETC) System, Haar and Symlet Wavelets
416-421
PDF
8
Advanced Correlation Engine for Fault Identification and Analysis in Network
-
Preethi D’Souza,M.Dakshayini
Abstract
With the growing complexity of modern communication systems one of the key challenges for telecom service providers is to provide operations support system (OSS) that enable rapid deployment of new services, thereby fulfilling quality of service (QoS) requirements as prescribed by Service Level Agreement(SLA’s). Occurrence of single fault or invalidation in network leads to alarm floods and deducing the exact source of a failure is very challenging. The existing alarm correlation approaches still rely on the manual processing, and depend on the knowledge of the network operators. This paper discusses about various approaches used in fault localization and proposes automated alarm correlation approach to filter out redundant and spurious events and determine the root cause of faults in a network. The proposed technique performs well in terms of efficiency and accuracy of identifying root cause thereby improving the service quality and reliability.
Keywords –events, correlation, fault localization
422-425
PDF
9
An Alternative Approach for Avoiding Traffic Jam
-
Bidyapati Thiyam,M.Dakshayini
Abstract
In present days very often people encounter a blocked or closed connecting roads on their way to reach destination, they will be blocked near such roads for longer time and resulting in getting delayed in reaching their destinations. In this paper, we are proposing a solution to this problem by designing a system that notifies the people with the information about the blockage of any such connecting roads in advance in the previous junction [Signal or circle] itself so that he/she can choose an alternative way to reach their destination there-by avoiding the delay in reaching the intended destination and also the traffic jam and congestions near the blocked roads.
Keywords –connecting roads, previous junction, alternative way, intended destination
426-430
PDF
10
Rule Based Classifier to Auspicate the Sentiment towards the Top Indian E-Commerce Vendors through Social Networks
-
Dr Rajasimha A Makaram,Arpitha Sridhara,Angeline Flora J
Abstract
In the recent past, there has been an increased usage of social media across various domains. With a lot of information flooding the internet, it becomes important to analyze and find knowledge across these unstructured social media sources. In this paper, we describe an approach for sentiment analysis using a rule based implementation for analyzing vendor reviews of the Top 5 e-Commerce sites in India, namely Flipkart®, Snapdeal®, Myntra®, Ebay® and Amazon®. The data used in this implementation has been obtained from the popular site, Twitter. The tool provides a trend analysis by projecting the popularity based on the tweets. In this execution, a corpus of 24,000 – 25,000 tweets is considered. The term frequency algorithm used to create a feature vector, is classified using a rule based classifier based on the positive and negative word semantics to classify the tweets into any one of the three polarities based on the lexical resource (WordNet). We also use effective ways to measure the efficiency of the classification algorithm. Finally, we use the obtained results to predict the most popular e-Commerce vendor in India.
Key Words:Social Media Analytics, Twitter Sentiment Analysis, Rule Based Classifier, Knowledge Discovery, Vendor Review of Top Indian E-Commerce Sites
431-439
PDF
11
Survey on Ambient Intelligence
-
Ganashree.R,Prof.Ashwini.K,Dr.Vijaykumar
Abstract
This paper deals with the creating of the ambient environment. Ambient is our immediate environment. Ambient intelligence is giving intelligence to the surrounding environment and making it sensitive to us. This AmI can be applied in the various field like in the field of educations, transport etc. it involves various technologies. It involves the sensing, reasoning and acting. The ISrAmI has developed the architecture of the AmI that involves four different layers. The first module data, information layer where it captures the data from the environment. The second is the storage layer where the data is stored. In the third the reasoning layer it compares and process the data based on the stored data. Stores the data if required. The fourth layer is the decision layer it compares the stored data and based on it performs the action. Based on the ISrAmI architecture we develop the architecture it checks whether the agent is authenticated once if it is authenticated then based on the if else condition stored it performs the action. Here it allows the agents to have access on the object based on its capacity.
Keywords:Ambient, Ambient intelligence, agents.
440-447
PDF
12
Efficient Web Search Technique using String Transformation
-
Prof. Nitinkumar Mishra,Anil E.Patil
Abstract
In today’s world, we deal with data mining, retrieval of information and various fields in which necessity to arises to deal with natural language processing. In that we transforming the query or we can say that the given string as an input. Once the string is given ‘a’ as input the system or application generates the ‘n’ more suitable output strings in reply to that string or query. It means that system will create the suitable ‘n’ strings – relation of probable strings. In this system, focused on the small amount of aspects of the natural language processing and string or transformation of query. We will also focus on the proposed system. In this approach we will see how a system ‘a' can create the ‘n’ suitable relations of ‘a’ and ‘n’, and how those will be perfect and systematic. This means we will need to focus on the systems efficiency and accuracy through this novel process for retrieving the information. We can also try pruning strategy which give guarantee to create the ‘n’ suitable queries or string. In the proposed system, method is applied to correction of spelling in queries as well as reformulation of queries on web search. Experimental outcomes on large scale data show that the proposed system is very efficient, accurate and effective on improving upon existing methods with respect to accuracy and efficiency in individual settings.
Keywords— Log Linear Model, String Transformation, Query Reformulation, Spelling Check.
448-452
PDF
13
Survey on Psychological Behaviour of People in a Group
-
Krupashree.B,Prof. Ashwini.K,Dr. Vijaykumar M.V
Abstract
This paper explains about the motivation and motivation theories. The main aim of this paper is to study how psychological behaviour of an individual agent performs in a group will improve the group performance. Motivation is taken from the Latin word which is movere that is to move. Motivation is the forces acting on or within a person that causes arousal, direction and persistence of goal directed, voluntary efforts. All the motivational theory are universally accepted the motivational theory explains why and how human behaviour is activated. in this paper there is a comparative study of different motivational theories .motivational theory more focuses on Maslow’s theory and goal setting theory. Where Maslow’s involves about the priority and goal setting is about goal oriented motivation. With many case studies like business, education and construction. The proposed theory says that when time is considered as a factor the agents are highly motivated towards the goal and hence it improves the group performance
453-458
PDF
14
A Study of Various Brain Tumor Detection Techniques
-
Kirna Rani
Abstract
The brain tumor detection is a very important application of medical image processing. This paper has presented a review on various brain tumor detection techniques. The overall objective of this paper is to explore the various limitations of earlier techniques. The literature survey has shown that the most of existing methods has ignored the poor quality images like images with noise or poor brightness. Also the most of the existing work on tumor detection has neglected the use of object based segmentation. This paper ends up with the suitable future directions.
INDEX TERMS: BRAIN TUMOR, MRI, NEURAL NETWORK, FUZZY C-MEANS
459-467
PDF
15
Recent Trends Towards Multimedia based Wireless Networking Protocols
-
Shivani,Gagandeep Singh Saini
Abstract
The fast development in network multimedia tools have let extra real-time digital companies such as for instance as an example video-conferencing, online games and distance knowledge to cultivate to be the standard internet tasks. These companies often necessitate the fundamental process to provide multicast facility. The multicast describes the distribution of from merely a unitary node to level of destinations. These real-time companies have a stringent necessity of QoS factors like bandwidth, delay, jitter etc. to make sure clear, regular, and fair sign to the receivers. This paper has presented recent protocols which are used in multimedia networks to provide better services. This paper ends up with the suitable future directions to extend this work.
KEYWORDS:- QoS, Wireless network, AODV, Multicast.
468-477
PDF
16
Cross Site Scripting Vulnerabilities and Defences: A Review
-
Swati Maurya,Anita Singhrova
Abstract
With the advancement in the internet technology since last two decades, the dependence on web applications has increased rapidly. All the facilities are nowadays available online at the ease of just one click. As a result, Web applications are prone to cyber-attacks which has major consequences such as theft of personal secure data and information tampering by 'Cookie stealing' or 'Session Hijacking'. Cross site scripting is one of the most common application layer web attacks and security vulnerability. This paper provides review of the concept and the approaches provided for vulnerability detection, defence mechanism and security analysis.
Keywords— XSS; Web Application Vulnerabilities; Cross-site Scripting; Security
478-482
PDF
17
Using Fuzzy Logic Approach to Detect Selfish Attacks in Cognitive Radio Network
-
Vani.S.Hanji,Prof.D.M.Choudhary
Abstract
Cognitive radio play important role in the communication technology by solving shortage of the spectrum bands through the access of „dynamic spectrum access ‟it help for the illegal secondary users to use the more number of license bandwidth. But some malicious attack node can acquire the all spectrum bands of“multiple channels”. avoiding the other nodes from using this channels. “selfish nodes deals with some major security problem” like fake signal attack, Channel pre-occupation attack. These security problems they degrade the overall performance of a cognitive network. Here we proposal identify the types of selfish attack and also proposed reliable detection methods using FUZZY LOGIC APPROACH. this technique is simple, accurate and best suited in future work.
483-489
PDF
18
Review on Improved Edge Preservation Filtering Using Gradient & Multiple Selection Based Sorted Switching Median Filter
-
Kanchan Bali,Prabhpreet Kaur
Abstract
We also advise a Sorted Switching Median Filter (i.e. SSMF) for successfully denoising very corrupted images while preserving the image details. The center pixel is measured as ‘‘uncorrupted’’ or ‘‘corrupted’’ noise in the detecting stage. The tarnished pixels that possess more noise-free surroundings will have higher processing priority in the SSMF sorting and filtering stages to rescue the heavily noisy neighbors. Five noise models are considered to assess the presentation of the proposed SSMF algorithm. Several extensive simulation results conducted on both grayscale and color images with a wide range (from 10% to 90%) of noise corruption clearly show that the proposed SSMF substantially outperforms all other existing median-based filters.
General Terms – Denoising, Digital image, Decision based median filter, Impulse noise, SSMF, Noise model, Salt-andpepper noise, PSNR
490-495
PDF
19
Cross Layer QoS Support for Zone Routing using Self Organized Mobile Agents
-
Amit Chopra,Sandeep Chopra
Abstract
Researchers have developed the various solutions for the MAC aware routing to manage the contention and to enhance the network performance. In case of contention at MAC layer, providing a solution for routing will not feasible so there is need to explore the behavior of MAC protocol and compatibility with routing protocols. Researchers have also developed the agent based solutions for different network operations but there is need to explore it further because use of mobile agent can enhance the network operations by interacting with multiple layers and can maintain an optimal network performance. In this paper, we introduced the concept of self organized mobile agents which can manage the collision and contention at MAC layer over zone routing and they can also keep the track of TCP window. This can be used to support the Quality of services over ad hoc networks while minimizing the effect of collision and contention at MAC layer.
Keywords-MANETs, Zone Routing, Wireless, QoS, MAC Contention, TCP Congestion
496-507
PDF
20
Integration of Spring and Hibernate Frameworks in Development of Web Applications
-
Heena Choithwani,Kajal Sahatiya,Mona Deshmukh
Abstract
This paper proposes the concept of spring framework which is an open source application framework and inversion of control container for the Java platform. The framework's core features can be used by any Java application, but there are extensions for building web applications on top of the Java EE platform. The EJB (Enterprise Java Bean) which was prior used widely is now being replaced by the spring framework, which provides less services but it is much less intrusive than EJB. The driving force behind this shift is the need for greater productivity and reduced complexity in the area of Web application software development and implementation. Spring Framework assert that ordinary java beans (POJO) can be utilize with minimal modification for connectivity with the database. The paper also presents the architecture and features of spring. The mechanism of both spring and hibernate that have made the look and feel of the management system attractive and compatible which is briefly described hereafter.
508-510
PDF
 
 
IJCTA © Copyrights 2010| All Rights Reserved.

This work is licensed under a Creative Commons Attribution 2.5 India License.