......

..

IJCTA-Volume 6 Issue 4/ July-August 2015
S.No
Title/Author Name
Page No
1
Development of Three-Dimensional Construction Training Tool for Breast Ultrasonography Using ImageJ
-Naoki Kamiya,Nozomi Sakai,Norimitsu Shinohara
Abstract
Ultrasonography is attracting attention as a screening method with the potential to compensate for some of the problems with mammography. During ultrasonography, the investigator must reconstruct the three-dimensional shapes of the lesion and healthy tissue in his or her mind on the basis of two-dimensional video images, and he or she must therefore be skilled in perceiving three dimensional images. We have developed a three-dimensional reconstruction training tool for use by practitioners of ultrasound screening. This system generates and displays cross-sectional images sliced in the x, y, and z orientations, on the basis of which the user must deduce the three-dimensional shape of the input model. As our goal is to train in three-dimensional perception, the input models in this system are letters of the alphabet, which can easily be used as analogy. We have developed it as a plugin for ImageJ, which is popular among medical professionals, with the aim of enabling its widespread use. Our proposed system not only displays cross-sectional images but is also capable of adding noise, varying contrast, and displaying video. In tests, it was evaluated by five specialist breast cancer doctors as being of potential use for training investigators. As an ImageJ plugin, it is highly versatile and can easily be introduced. We intend to test learning outcomes when this system is used as a training tool in the future in order to provide an objective evaluation, and to verify the types of images that are appropriate for training.
Keywords---Breast ultrasonography, 3D Training tool, ImageJ Plug-in
529-534
PDF
2
Gbest-guided Group Search Optimizer Algorithm
-
Sebabrata Ghosh,Kalyan Nandi,Rayees Ahmad Dar
Abstract
Group Search Optimizer (GSO) is a population-basedoptimization approach inspired by animal searching behaviourand group living theory. The traditional GSO suffers from the drawback of having slow convergence, poor exploration and exploitation ability. In this paper, an improved version of the GSO is proposed by modifying the solution search equation to incorporate the information of the global best solution (gbest). This improves both the exploration and exploitation. We call this method the gbest-guided GSO (GGSO). Twenty benchmark functions are used to evaluate the performance of the proposed algorithm. Experimental results prove the fact that the GGSO is able to achieve better results than the basic GSO.
Keywords:Group search optimization, Multi-Producer, Gbest-guided GSO, Producer-Scrounger model.
535-542
PDF
3
Gaussian Fuzzy HSM Algorithm for Classification of BIRADS Dataset using Decision Tree
-
Prakash Bethapudi,Dr E Sreenivasa Reddy,Kamadi V S R P Varma
Abstract
Classification is one of the methods used in identifying the accuracy of the dataset of multiple classes. This paper has proposed a method named FHSM ( Fuzzy Heterogeneous Node Splitting Measure ) for building decision tree which used Gaussian membership function in assigning fuzzy membership value to the attributes. Whenever decision trees are concerned the size of the tree plays a major role in developing the rules and also shows impact on computations. When huge amount of data is considered we may get larger size decision tree which leads to more number of rules and more computational time, which becomes more critical in handling when dataset is too large. The proposed method tried to reduce the size of the decision tree and also provided more accurate results in classifying the BIRADS data set when compared to most of the other available techniques.
Keywords: Gaussian, Fuzzy, membership, Decision Tree, Heterogeneous BIRADS
543-547
PDF
4
Proposed Model For Security Policy Generation And Maintainance To Provide The Secure Network Of An Organization
-
Dr. Prashant P. Pittalia
Abstract
Business organizations have their own secret data and information. It is very important to protect such data with highly access control method. Competitor corporate or organization wants to identify secret details of othercorporate. Internet security is the first steps towards protecting the online information against the cyber attacks on Website. Internet security is easily breach by attacker if security policies are not well-designed and implement in the organization or corporate or individual. This paper presents the model for security policy generation and also maintenance for organization and corporate. Also the paper explains that how the policies are useful to avoid the attacks on the information.
548-552
PDF
5
Image Retrieval System Using Hidden Markov Model
-
Archana J.Waghchawre,Prof. J.V.Shinde
Abstract
We propose the new model of markov chain and interacting with information retrieval application. Then we can retrieve the documents from other database, but there are major issues in implementing such strategy. Then we are expected such that information retrieval application should return most relevant documents within less time and with give more accuracy. The expectations of the end users are that the application should retrieve the most relevant document in a very less time and provide accuracy. Even though the application is capable of retrieving the documents, there are some constraints that the application needs to deal with. Implementing the retrieving strategy is a challenging task. In this paper we have proposed a method for automatic annotation, indexing and annotation-based retrieval of images. The proposed method initially analyses the user’s query and tries to recognize the relevance between the index structures that were produced for collecting the images. After analysing, the system returns the covet images to the end user with higher clarity and potency. This paper also provides a good survey on the various aspects of information retrieval model.
Keyword: Information retrieval, Markov chain, Content-based image retrieval, Hidden Markov Model.
553-556
PDF
6
Mining Terms of Unstructured Text for Enlargement of D-Matrix
-
Swati S Hinge,B.R. Nandwalkar
Abstract
There is need to gather information regarding servable symptoms and failure modes to modify the fault dependency matrix which can be helpful to build Accurate and efficient fault diagnosis. There is need to gather information regarding servable symptoms and failure modes by using fault detection diagnosis (FDD) are performed to detect the faults and diagnose the root-causes modes to modify the fault dependency matrix which can be helpful to build Accurate and efficient fault diagnosis. Organizing this information is typically based on the previously known knowledge and research. It’s not enough to collect the information like symptoms, related diagnostic mechanism only once since technology is improving day by day. It is a challenging task to regularly update the D-matrix to have best result. In process of engineering Fault detection and diagnosis is an important issue. In proposed system, initially develop the fault diagnosis ontology of attributes and relationships with it observed in the fault diagnosis database. The association in faults and their causes are mapped into D-matrix by using engineering knowledge. Next, construct the algorithms of text mining which will use of the ontology to identify the important artifacts from the unstructured repair verbatim text which is online as well as offline.
Keywords - fault diagnosis, text mining, verbatim text, ontology.
558-562
PDF
7
Implementation of Retrieval Content Base Video Using Multimedia
-
Bhagwant B. Handge,Prof.N.R.Wankhade
Abstract
In the last decade e-lecturing has become more and more popular .Video data in the World Wide Web (WWW) is growing rapidly. Therefore, video retrieval on the World Wide Web or a classroom a more efficient method for Video files are urgently needed. This paper presents an automated method great video indexing and searching video Conference video files. First, use the automatic segmentation and video keyframe detection, to provide a visual cues Video content for navigation. Subsequently, application metadata extract teletext OCR (OCR) for track key frames presentation and automatic speech recognition (ASR). In the OCR and ASR Transcripts and type detection line of text on the slide using keywords extracted from these two videos and segment level Keyword extraction video browsing and content-based search. The performance and effectiveness of the proposed Indexing function is tested by evaluating Keyword extraction video browsing and content-based search.
Keywords -Lecture videos, automatic, content-based video search, video indexing, lecture video archives
563-566
PDF
8
Secure Mobile Cloud Storage and Data Transmission
-
Akanksha Samadhiya,Trapti ozha
Abstract
Cloud computing provide efficient computing experience and computational resources. In addition of that it offers secure data hosting services. The security to the cloud is essentially strong and private internet access area is also secured. But the data transmission between two secure networks is performed over unreliable network. Therefore a secure data transfer service is required to design. On the other hand the mobile devices are built with efficient processing ability but their storage support is found weak. Thus a data hosting service is desired to implement in mobile devices. Additionally the security during data transference, storage and private management is required to consolidate. Therefore this paper provides the understanding and a cloud security literature survey for problem identification and also provides a solution to overcome the reported problems.
Keywords— cloud computing, mobile computing; secure storage, secure data transmission, privacy.
567-570
PDF
9
A Strategic Framework of GIS Web Applications: Structure and Contents
-
Dr. Nedhal A. Al-Saiyd
Abstract
The rapid development of internet-based applications has led to the appearance of a new kind of GIS Web applications, new technologies and fast growing geospatial data acquired from many sources. Therefore, to improve the GIS Web decision-making abilities and performance, a suitable architectural structure is needed to well understand, manage and maintain the spatial big data, GIS components, and complex interrelations among them. In GIS Web application, the optimal visualization is required to minimize of spatial amount of data that is transferred over the network media, and well-administrate sharing data on the servers. In GIS Web application, software design and data design are very important tasks and they are considered as challenging problems that face the software developers and database administrators. This paper describes the architecture design guidelines for modular GIS software and shared data models to manage high-level of interrelationships among large number of distributed GIS components. The design concentrates on the modular quality attributes of efficient, low-coupling and high-cohesion. This paper also presents a generic and comprehensive methodology to store a generalized geographic data and eliminate geospatial data redundancy on the server-side. It will play an important role to reduce the storage space by avoiding redundant data to achieve relatively good quality of the image and enhance the in general the response time. The representation of internal stored data structures and the suitable selection of application software architecture, which uses the spatial data and non-spatial and to provide fast access to spatial data, are crucial issues. Hence, the design guidelines and implementation issues are discussed for GIS Web-based Application.
571-582
PDF
10
Literature Review on Data Mining Techniques
-
K.Suguna,Dr.K.Nandhini
Abstract
The web is an information system of interlinked hypertext documents that are retrieved over internet. Web mining is the use of data mining techniques to automatically discover and extract information from Web documents and services. A web cache stores copies of documents passing through it; subsequent requests may be satisfied from the cache if certain conditions are met.
Keywords: Association, Classification, Clustering, Prediction, Sequential patterns, Decision trees, etc.
583-585
PDF
11
A Weighing Based Feature Selection and Monotonic Classification (WFSMC) for the Effective Prediction of Outliers
-
D.Rajakumari
Abstract
Advancement in computer technologies in data processing explores the capabilities of research, communication and services in recent years. Knowledge Discovery on Database (KDD) is an essential process on data processing. Data mining is one of the form of KDD. Many feature selection and classification algorithms are used to select the relevant features and classify them according to criteria in data mining applications. The enormous quantity of high dimensional data leads to challenge in traditional data mining techniques. The employment of classifiers in data has deteriorated the performance of machine learning process since it sensible to noise, relevant or irrelevant features. The ordering of decision values on the basis of relevant features improve the performance of the classification process. In this paper, Weighing based Feature Selection and Monotonic Classification (WFSMC)are proposed to know the importance of relevant feature and design the feature selection based on constraints. This paper discusses the new feature weighing classifier on the basis of imputation methods in two ways: 1) Estimation of new distribution values for each feature, 2) Statistical test to measure the changes between original and distributed values. Based on the principle of large margin, the new feature selection algorithm evolved by introducing the monotonic constraints. The performance analysis such as no. of attributes, accuracy, precision and recall shows that proposed weighing based feature selection yields better results than the traditional algorithms.
Index Terms Data mining, Feature Selection, Imputation methods, Knowledge Discovery on Database (KDD), Monotonic Classification.
586-593
PDF
12
HARS Mechanism for Privacy-preserving Public Auditing on Shared Data in Cloud (Oruta)
-
Sonam Mahadev Kamble,Prof.Archana Lomte
Abstract
The cloud data services provide a common place for storing data as well as share data across multiple users. Still there are some issues of integrity because of hardware or software failures and human errors. Many systems allow both data owners (group users) and public verifiers (Third Party Auditor) to efficiently audit cloud data integrity without retrieving the entire data from the cloud server. However, public auditing on the integrity of shared data with these existing mechanisms will inevitably reveal confidential information, identity privacy to public verifiers. The proposed system provides the privacy-preserving mechanism that supports public auditing on shared data stored in the cloud. Here they exploit ring signatures to compute verification signature needed to audit the correctness of shared data. Using this mechanism, the identity of the signer on each block in shared data is kept private from public verifiers, who are able to efficiently verify shared data integrity without downloading the entire file from the cloud and also able to perform multiple auditing tasks simultaneously instead of verifying them one by one.
Index Terms: Public Auditing, Privacy preserving, shared Data, Cloud Computing.
594-598
PDF
13
A Roadmap towards Analysis of Component-Based Software Testing
-
Parul Madan,Lata Nautiyal
Abstract
Software Development is a practice to meet the needs of customer in the form of software. Since time bound effort, huge amount of cost and lot of risk are key ingredients of its development process, testing is responsible to check the correct working of the functionalities thus makes it an important phase in software development. Although being an expensive task, it is important because it marks the success of the software being developed. In this paper we are analyzing and evaluating Component-based Software Testing techniques.
Keywords — Black box testing, Component, Component-Based Software, Functional Testing, Equivalence Class Partitioning, EEOCP
599-605
PDF
14
Performance Evaluation of Edge Directional Image Interpolation Scheme
-
D. Himabindu,V.Ashok Kumar,Ch.Srinivasa Rao,C.Dharmaraj
Abstract
Earlier there are different interpolation techniques for denoising of images. When an image is zoomed checkerboard effect/ringing arises in images. In order to remove interpolation artefacts such as image blur and checkerboard effect. The proposed technique “DIRETIONAL DENOISE SCHEME” tries to amend the interpolation error. Meanwhile edge preservation is a critical issue in both image denoising and interpolation. In this project, we are using directional denoising scheme interpolation method to address the edge preservation. Linear interpolation methods have been introduced without considering specific local information on edges results in to artefacts. Non linear interpolation methods have been suggested to reduce the artefacts of linear method. These nonlinear methods are often computation intensive and they can be more expensive than linear methods for 2D-Images.Further, they become inefficient in the estimation of edge orientation for the classes of edge model with fine scales. More effective interpolation methods are yet to be developed in order to accurately preserve the edge orientation without introducing high computational cost. Peak Signal to Noise Ratio (PSNR) Normalized Cross Correlation (NCC) and CPU Run time are used as quantitative measures to compare the ground truth image with zoomed interpolated images. The new interpolation scheme is expected to result in high resolution images having clearer and sharper edges over existing linear interpolation methods.
KEYWORDS: Denoising, Edge preservation, Checkerboard effect, Interpolation..
606-611
PDF
15
Potential Threats to Mobile Network Security
(Can WAP virus infect the mobile phones?)

-
N.Naveen Kumar,Amit Kumar Singh,M.Suresh Kumar
Abstract
Can virus infect the mobile phones? It is a million dollar question that has no answer up to now. The result is increasing day by day hoax virus, spam sms worms. Due to the financial aspects associated with wireless communications, this subject is under through research now. The WAP protocol is leading standard for information services on wireless terminals like digital mobile phones. Using, there is a possibility of wireless devices getting infected with virus and worms. Though up to now there is fewer such attack, as the usage of script languages increases, there is a chance of malicious code injection. Wireless application protocol is an application environment and a set of communication protocols for wireless devices. It enables the wireless devices independent access to the Internet. WAP bridges the mobile world and the Internet. It also connects the corporate intranets. Due to this users can access the same amount of information by using a packet-sized device as they can from a desktop PC.The WAP standard is based on Internet standards (HTML, XML and TCP/IP). It consists of a WML language, a WMLScript, and a Wireless Telephony Application Interface (WTAI). The use of WAP-enabled mobile phones is booming. Cellular phones with support for WAP allow users to access a wide variety of services. WAP enables users to do on-line banking, monitor stock markets, use email, and access the Internet – all from their mobile phones. New services are being developed everyday and as more robust scripting becomes possible, the chance for malicious code increases. This paper discusses the threats with current WAP protocol and how changes in the protocol and its usage will enable entry of real viruses. Future threat scenarios are presented along with suggestions to avoid these problems. It also presents an overview on WAP, WAP Push, WML, and WMLScript and their ability to host malicious software. Finally to detect such future threats, potential solution placement is also presented.
612-617
PDF
16
Quantum Cryptography: A Novel Cryptographic Approach
-
N.Naveen Kumar,M.Suresh Kumar,Amit Kumar Singh
Abstract
Communication has become important aspect of life in this fast changing world of Information. Therefore the relevance of secure communication without Eavesdropping is a major issue to maintain the privacy and secrecy of information. In recent times many schemes have been published and implemented like systems involving RSA algorithm for public key encryption which are based on unproven computational difficulty of certain mathematical functions. These schemes have been shown the vulnerability to break progressively over the years, increasing with it the complexity of the schemes which at its limits can hamper secure communication. Our focus in this paper is on quantum cryptography which is seen as uncrackable and a thing of not-so-far future.
618-623
PDF
17
Public Auditing for Shared Information with Economical Recoding Theme
-
S.Ramya,Dr.K.Gokulraj
Abstract
Data distribution in the cloud, fuelled by positive cloud knowledge trends, has rising as a gifted guide in regard to enabling data more handy to users in a fitting manner. In this paper, we focus on looking for a solution that allows secure and efficient access to the cloud data. One of the most important and common character of these mechanisms is to allow a public verifier to efficiently check data honour in the cloud without downloading the intact data. Our scheme also supports re-encrypting the user’s document with fingerprint. Experimental result shows that cloud can improve the efficiency of sharing and securing data.
Keywords - Shared data, Cloud security, Public auditor, Re-encryption
624-627
PDF
18
Comparative study of Genetic Algorithm with various parameters in Neural Cryptography
-
S.Santhanalakshmi,Suneesha Kudipudi,Bhavana Vaishnavi
Abstract
In the paper, aim was to do a comparative study of optimizing the generation of weights in neural network by using the Genetic Algorithm for various selection methods, crossover rates and mutation rates. The traditional cryptographic methods had to rely on secret keys for encryption, which were transmitted between A and B over a secret channel not accessible to any opponent. However neural networks can produce a common secret key by exchanging bits over a public channel and by learning from each other. In the neural network we plan on applying the genetic algorithm for the generation of weights. When the network is tried with different selection methods, cross over rates and mutation rates, we plan on juxtaposing the results to find the optimum result. The final result will give an idea about the number of iterations and the variation in the key that has been generated with respect to the above-mentioned parameters.
Keywords : Genetic Algorithm, Tournament selection, Roulette Wheel Selection, Tree Parity Machine.
628-631
PDF
19
Prevention of Black Hole Attack in Wireless Mobile Adhoc Networks
-Veda.N,Pamela Vinitha,Kusum Rajput
Abstract
The mobile Ad hoc network (MANET) is made up number of mobile nodes deployed without any specific infrastructure. Security is important in mobile ad hoc networks to provide protected communication between the nodes. MANETs are vulnerable to various attacks and blackhole attack is among them. The blackhole attack will disturb the network and it affects the network performance. It is one of DoS(Denial of Service) attack in which the malicious node claims to have the shortest path to the destination. It will easily drop them instead of forwarding to the destination when once the data packet is received by the node. This paper gives the analysis about already present solutions and tries to find an effective solution in terms of various network parameters to give better network performance.
632-635
PDF
20
A Mobile Gas Detector with an Arduino Microcontroller
-Arkadiusz ŚPIEWAK,Wojciech SAŁABUN
Abstract
This paper describes hardware synthesis for a mobile gas detector with an Arduino microcontroller. The main aim of this project is to find the dangerous zone where many stationary detectors are unpractical or too expensive. Thus, we present a self-propelled robotic gas detector. The project specification is presented in accordance to the expected functionality of the detector. Based on this specification hardware, the proper elements are selected and described. Finally, we propose a hardware scheme for the mobile gas detector project and discuss advantages and disadvantages of this approach.
636-641
PDF
     
IJCTA © Copyrights 2015| All Rights Reserved.

This work is licensed under a Creative Commons Attribution 2.5 India License.