Version-6 (May-June 2014)
Ver-1 Ver-2 Ver-3 Ver-4 Ver-5 Ver-6 Ver-7 Ver-8 Ver-9
- Citation
- Abstract
- Reference
1. The id of the color with maximum probability is received.
2. The current color is set to the color with the value id.
3. Flip the video.
4. Display the video in the designated axes.
5. Find the area, centroid and bounding box properties of the black and white form of the extracted color
component of the image.
6. Find the region of the image with maximum area and assume a rectangular bounding box around that
region.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Improving Structural Designs with Computer Programming in Building Construction |
Country | : | Nigeria |
Authors | : | Adu Michael K, Abe Omoloye E |
: | 10.9790/0661-16361016 |
Abstract: The scope of civil engineering is wide and the application of computer is not put to use as expected even among professionals in developing nations. This paper is an attempt at revealing methods available for application of computer as a tool which can tremendously improve the qualities of delivery especially utilization of user developed packages that are customized to suit a particular problem at hand. It exposes how computer programming can be used in detail designs and quick process to calculate complex force stresses in structures. It further brings to the fore its application in automation of structural designs in concrete, elicits explicitly how computer can accept data through programming and uses the data to provide information in the final analysis on total design load, moment generated and areas of main and distributed reinforcements to stair-case, landing to stairs and Slabs. 'Customized Computer Package' in this context implies a completely interactive software system with considerable dialogue between the user and the system before a solution is obtained. This is implemented using Object-Oriented FORTRAN programming language.
Keywords: Complex Force Stresses, Civil Engineering, Customized Computer Package, Object-Oriented FORTRAN, Structural Designs
[1]. O. C Akinyokun, Computers and programming using FORTRAN (New Era Commercial Press, Alagbaka, Akure, 1994).
[2]. K. K Aggarwal and S. Yogesh, Software Engineering (Third Edition, New Delhi: New Age International Publishers Limited 2004).
[3]. Wikipedia, Civil Engineering Software, The free encyclopedia [4]. M. McCormick and G. Salvador. Numerical Methods in FORTRAN (Prentice Hall international Inc., London. 1990) [5]. H, Mosley and H, Bungay. Reinforced Concrete Design (McMillan Education Ltd., London. Fourth Edition,1990)
[6]. M. K. Adu. Computer Basis, Application and Programming (Onibonadura Publishers, Akure, 2004).
[7]. S.L. Pfleeger, Software Engineering, Theory and Practice (Prentice Hall, 2001).
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Improved Method for Pattern Discovery in Text Mining |
Country | : | India |
Authors | : | Rakhi A. Dixit, Prof. V.A.Chakrawar |
: | 10.9790/0661-16361722 |
Keywords: Pattern mining, Text mining, Text classification
[1]. H. Lodhi, C. Saunders, J. Shawe-Taylor, N. Cristianini, and C. Watkins, "Text Classification Using String Kernels," J. Machine Learning Research, vol. 2, pp. 419-444, 2002.
[2]. A. Maedche, Ontology Learning for the Semantic Web. Kluwer Academic, 2003.
[3]. C. Manning and H. Schu¨ tze, Foundations of Statistical Natural Language Processing. MIT Press, 1999.
[4]. I. Moulinier, G. Raskinis, and J. Ganascia, "Text Categorization: A Symbolic Approach," Proc. Fifth Ann. Symp. Document Analysis and Information Retrieval (SDAIR), pp. 87-99, 1996.
[5]. J.S. Park, M.S. Chen, and P.S. Yu, "An Effective Hash-Based Algorithm for Mining Association Rules," Proc. ACM SIGMOD Int'l Conf. anagement of Data (SIGMOD '95), pp. 175-186, 1995
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Forensics Tools, Antivirus technologies, Firewalls, Routers, Host Intrusion Detection System (HIDS), Wireless Intrusion Detection System (WIDS)
[1]. Denning and Dorothy, "An Intrusion-Detection Model", IEEE Transactions on Software Engineering, 1987.
[2]. Lee W andStolfo S J. "A framework for constructing features and models for intrusion detection systems". ACM Transactions on Information and System Security, 2000.
[3]. Alessandri D, Chichin C and Dacier M, "Towards a taxonomy of intrusion detection systems and attacks",2001.
[4]. Matthew Tanase, The Future of IDS, 2002. http://www.securityfocus.com/infocus/1518
[5]. Kayacik.G. and Zincir-Heywood A. N., "Evaluation of the Cisco 10.9 Firewall with Darpa 99 Dataset", Technical Report, Faculty of Computer Science, Dalhousie University, November 2002.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: ICT, Rural Areas, Rural SME, Small and Medium Enterprise
[1]. American Marketing Association (2006). Marketing Terms Dictionary. Retrieved from www.marketing power.com/index, May 10th, 2014.
[2]. Ariyo, D. (2008 ). Small firms are the backbone of the Nigerian economy. Africa Economic Analysis, Retrieved from www.africaeconomicanalysis.org/articles/gen/smallhtm.html, May 14th, 2014.
[3]. Cook, P., & Nixson, F. (2000). Finance and Small and Medium-Sized Enterprise Development.
[4]. Darren, L., & Conrad, L. (2009). Entrepreneurship and Small Business management in the Hospitality Industry. Jordan Hill, UK: Elsevier Linacre House.
[5]. Elumilade, D.O., Asaolu, T.O., & Adereti, S.A. (2006). Appraising the Institutional Framework for Poverty Alleviation Programmes in Nigeria. International Research Journal of Finance and Economics, Vol. 3, pp. 66-77.
[6]. Gilmore, A., Carson, D., & Grant, K. (2001). SME Marketing in Practice. Marketing Intelligence & Planning, Vol. 19, No. 1, pp. 6-11.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Client Based Cache Consistency Scheme in Wireless Mobile Networks |
Country | : | India |
Authors | : | Aswathi.P, Abey Abraham |
: | 10.9790/0661-16363235 |
Index Terms: Cache consistency, Cache invalidation, Distributed cache invalidation method, time to live, wireless mobile networks.
[1]. Kassem Fawaz and Hassan Artail , DCIM: Distributed Cache In-validation Method for Maintaining Cache Consistency in Wireless Mobile Networks , IEEE Transactions on mobile computing,vol. 12,no. 4,April 2013.
[2]. H. Artail, H. Safa, K. Mershad, Z. Abou-Atme, and N. Sulieman , COACS: A Coop- erative and Adaptive Caching System for MANETS, IEEE Trans. Mobile Comput- ing, vol. 7, no. 8, pp. 961-977, Aug. 2008 .
[3]. K. Mershad and H. Artail , SSUM: Smart Server Update Mechanism for Maintaining Cache Consistency in Mobile Environments, IEEE Trans. Mobile Computing, vol. 9, no. 6 , pp. 778-795,June 2010.
[4]. G. Cao, A Scalable Low-Latency Cache Invalidation Strategy for Mobile Environ- ments, IEEE Trans. Knowledge and Data Eng., vol. 15, no. 5, pp. 1251-1265, Sept./Oct. 2003.
[5]. J. Cao, Y. Zhang, G. Cao, and X. Li, Data Consistency for Cooperative Caching in Mobile Environments , Computer, vol. 40, no. 4, pp. 60-66, 2007
- Citation
- Abstract
- Reference
- Full PDF
Keyword: Simulation, Fuzzy logic, ITLS, Arrival, Queue, Right-Queue, and Extension time
[1]. Javed Alam and Prof. (Dr.) M. K. Pandey "Advance Traffic Light System Based On Congestion Estimation Using Fuzzy Logic" in International Journal of Emerging Technology & Advanced Engineering (IJETAE) ISSN 2250-2459, ISO 9001:2008, Volume 4, Issue 3, March 2014, PP 870-877.
[2]. Javed Alam, Prof. (Dr.) M.K. Pandey and Husain Ahmed "Intelligent Traffic Light Control System for Isolated Intersection Using Fuzzy Logic" International conference on Advances in Communication and Control Systems 2013 (CAC2S 2013) DIT University Dehradun, India, ISBN-978-90-78677-66-6, 6-8th April 2013, PP 209-215
[3]. Javed Alam and Prof. (Dr.) M.K. Pandey "Development of Traffic Light Control System for Emergency Vehicle Using Fuzzy Logic" International Conference on Artificial Intelligence and Soft Computing, IIT- BHU Varanasi, India 7-9 December-2012.
[4]. Pappis, C. P., and E. H. Mamdani. "A Fuzzy Logic Controller for a Traffic Junction". IEEE Transactions on Systems, Man, and Cybernetics, Vol. SMC-7, No. 10, October 1977, pp. 707-717.
[5]. Chiu, S. "Adaptive Traffic Signal Control Using Fuzzy Logic". Proceedings of the IEEE Intelligent Vehicles Symposium, 1992, pp. 98-107.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Algorithms for Various Biological Networks |
Country | : | India |
Authors | : | BhartiTalukdar |
: | 10.9790/0661-16364555 |
[1]. Appel, A. Bairoch, and D. F. Hochstrasser. A new generation ofinformation retrieval tools for biologists: The example of the ExPASyWWW server. Trends Biochemical Sciences, 19:258–260, 1994.
[2]. W. Basalaj. Incremental multidimensional scaling method for databasevisualization. In R. F. Erbacher, P. C. Chen, and C. M. Wittenbrink,editors, Visual Data Exploration and Analysis VI (Proc. SPIE), volume
[3]. ofProceedings of SPIE, pages 149–158, 1999.3[Bax03] A. D. Baxevanis. The molecular biology database collection: 2003 update.Nucleic Acids Research, 31(1):1–12, 2003.
[4]. C. Bachmaier, U. Brandes, and B. Schlieper. Drawings of phylogenetictrees (extended abstract). In X. Deng and D. Du, editors, Algorithmsand Computation, Proc. ISAAC 2005, volume 3827 of LNCS, pages 1110–1121. Springer, 2005.
[5]. G. D. Bader, D. Betel D, and C. W. Hogue. BIND: the biomolecularinteraction network database. Nucleic Acids Research, 31(1):248–250,2003.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Chip Implementation of Text Encryption and Decryption Algorithms |
Country | : | India |
Authors | : | Vishwa Deepak Badoni ,Mr. Arpit jain |
: | 10.9790/0661-16365661 |
Keywords: Encryption and Decryption, SoPC (System on Programmable chip),Very High Speed integrated Circuit Hardware Description language (VHDL).
[1]. Ashwini M. Deshpande, Mangesh S. Deshpande and Devendra N. Kayatanavar, "Implementation of AES Encryption and Decryption" International Conference on "Control, Automation, Communication and Energy Conservation -2009, (page 1-5)
[2]. Beerel P, Roncken "Low power and energy efficient asynchronous design". Journal of Low Power Electron Vol.3, No. 3, pp (234–253), Dec. 2007.
[3]. C. J. Glass and L. M. Ni, "The turn model for adaptive routing," Journal of the ACM, vol. 41, no. 5, pp. 874–902, 1994.
[4]. D. Park, C. Nicopoulos, J. Kim, N. Vijaykrishnan, and C. R. Das, "Exploring fault-tolerant network-on-chip architectures," in Proceedings of the 2006 International Conference on Dependable Systems and Networks, (DSN ‟06), pp. 93–104, Philadelphia, Pa, USA, June 2006.
[5]. Hiroaki Morino Thai Thach Bao Nguyen Hoaison Hitoshi Aida Tadao Saito "A Scalable Multistage Packet Switch for Terabit IP Router Based on Deflection Routing and Shortest Path Routing" © 2002 IEEE, pp (2179-2185)
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Cluster Head Selection, Clustering Protocol, Deterministic Clustering, Energy Efficient, WSN lifetime.
[1]. Giuseppe Anastasi, Marco Conti, Mario Di Francesco, Andrea Passarella, Energy conservation in wireless sensor networks: A survey, Computer Networks, Elsevier, Volume 7, Issue 3, Pages 537–568, May 2009.
[2]. Luis Ruiz-Garcia, Loredana Lunadei, Pilar Barreiro and Jose Ignacio Robla, A Review of Wireless Sensor Technologies and Applications in Agriculture and Food Industry: State of the Art and Current Trends, Sensors, Volume 9, Issue 6, June 2009.
[3]. Gang Zhao, Davis, Wireless Sensor Networks for Industrial Process Monitoring and Control: A Survey, Macrothink Institute, Network Protocols and Algorithms, ISSN 1943-3581, Vol. 3, No. 1, 2011.
[4]. Cholatip Yawut and Sathapath Kilaso, A Wireless Sensor Network for Weather and Disaster Alarm Systems, International Conference on Information and Electronics Engineering, IPCSIT IACSIT Press, Singapore, vol.6 2011.
[5]. Mr. Puneet Garg, Mr. Kuntal Saroha, Mrs. Ruchika Lochab, Review of Wireless Sensor Networks -Architecture and Applications, IJCSMS International Journal of Computer Science & Management Studies, Vol-11, Issue 01, May 2011.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Next Generation Genetic Algorithm for Maximum Clique Problem |
Country | : | India |
Authors | : | Savita, Sudha |
: | 10.9790/0661-16366871 |
Keywords: Maximum clique problem,planner graphs,Heuristics ,Genetic Algorithm,NP hard
1]. Cazals & karande(2008);Eppstein & Strash(2011).
[2]. Eppstein;Loffler & Strash (2010).
[3]. Regin (2003)
[4]. Tomita & Kameda (2007);Konc & Janezic (2007)
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Study on User-Interface Architectures |
Country | : | India |
Authors | : | K.Nirmala, A.V.Sriharsha |
: | 10.9790/0661-16367277 |
Keywords: Architecture description languages, Architecture knowledge, User interface architectures
[1]. Roger Pressman, "Software Engineering: A Practitioner Approach", (C) Tata Mc Graw Hill, 2010.
[2]. Ian Somerville, "Software Engineering", (C) Pearson Education, 2007
[3]. Mary Shaw, David Garlan, "Software Architecture: Perspectives on Emerging Discipline", (C) Prentice Hall, 1996.
[4]. Lenn Bass, Paul Clements, Rick Kazman, "Software Architecture in Practice", Carnegie Melon Software Engineering Institute, (C) Pearson, 2003.
[5]. Wilbert O Galitz, "The Essential Guide to User Interface Design", (C) John Wiley & Sons, 2007.
[6]. Shneiderman Ben, "Designing the User Interface", Addison-Wesley Longman, Limited, © 1997.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Detecting Outliers Using Classifier Techniques and Discovering Their Behaviours |
Country | : | India |
Authors | : | Mrs. S. Nithya, Ms.M.R.Kavia |
: | 10.9790/0661-16367883 |
Index Terms: Knowledge Discovery, anomaly characterization, Machine Learning, Data Mining, WEKA, Classification
[1]. F. Angiulli, F. Fassetti, and L. Palopoli,
[2]. "Detecting outlying properties of exceptional objects," ACM Trans. Database Syst., vol. 34, no. 1, 2009.
[3]. K. Pearson, "On the criterion that a given system of deviations from the probable in the case of a correlated system of variables is such that it can be reasonably supposed to have arised from random sampling," Philosophical Magazine Series 5, vol. 50, pp. 157–175, 1900.
[4]. T. W. Anderson, "On the distribution of the two-sample cram´ervon mises criterion," The Annals of Mathematical Statistics (Institute of Mathematical Statistics), vol. 33, no. 3, pp. 1148–1159, 1962.
[5]. G. Passarino, A. Montesanto, S. Dato, S. Giordano, F. Domma, V. Mari, E. Feraco, and G. D.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: wormhole, detection, hop count, routing table
[1]. Viren Mahajan, Maitreya Natu, and Adarshpal Sethi, Nov. 2008 "Analysis of wormhole Intrusion Attacks In MANETS",IEEE Military Communications Conference,MILCOM 2008.
[2]. Yih-Chun Hu, Adrian Perrig, David B. Johnson, 2003 "Packet Leashes : A Defence against Wormhole Attacks in Wireless Networks", Twenty-Second ANNUAL Joint Conference of IEEE Computer and Communications , pp. 267-279.
[3]. Chiu, HS; Wong Lui KS, 2006 "DELPHI: Wormhole Detection Mechanism for Ad Hoc Wireless Networks",In Proceeding of International Symposium on Wireless Pervasive Computing, pp. 6-11.
[4]. Srdjan Capkun, L.evente Buttyan, and Jean-Pierre Hubaux, 2003 "SECTOR: Secure Traking of Node Encouters in Multi-hop Wireless Networks,"In Proceedings of 1st ACM Workshop on Security of Ad hoc and Sensor Networks (ACM SANS), pp. 21-32.
[5]. Lingxuan Hu and David Evans, Feb. 2004 "Using Directional Antennas to Prevent Wormhole Attack ",In Proceedings of the Network and Distributed System Security Symposium, pp. 131-141.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | An encrypted mechanism for securing cloud data from data mining attacks |
Country | : | India |
Authors | : | Priyadarshini Adyasha Pattanaik |
: | 10.9790/0661-16369294 |
[1]. Secure and Efficient Data Storage in Multi-clouds, Veena Khandelwal -2013
[2]. Database system concept, Abraham Silbersschtz, Henry F. Korth.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | An Efficient Content Based Image Retrieval System |
Country | : | India |
Authors | : | Dr. Meenakshi Sharma, Anjali Batra |
: | 10.9790/0661-163695104 |
Keywords: CBIR, Euclidean distance, GLCM, KMeans, Quadratic distance
[1]. N. S. Chang, and K. S. Fu, "A relational database system for images," Technical Report TR-EE 79-82, Purdue University, May
1979.
[2]. A.M.W. Smeulders, M. Worring, S. Santini, A.Gupta, and R. Jain, "Content-based image retrieval at the end of early years, "IEEE
Trans. On Pattern Analysis and machine intelligence, vol. 22, no. 12, December 2000.
[3]. C. Carson, M. Thomas, S. Belongie, J. M. Hellerstein, and J. Malik, "Blobworld: A system for region-based image indexing and
retrieval," In D. P. Huijsmans and A. W. M. Smeulders, ed. Visual Information and Information System, Proceedings of the Third
International Conference VISUAL‟99, Amsterdam, The Netherlands, June 1999, Lecture Notes in Computer Science 1614.
Springer, 1999.
[4]. J. Assfalg, A. D. Bimbo, and P. Pala, "Using multiple examples for content-based retrieval," Proc. Int'l Conf. Multimedia and Expo,
2000.
[5]. S. K. Chang, C. W. Yan, D. C. Dimitroff, and T. Arndt, "An intelligent image database system," IEEE Trans. on Software
Engineering, Vol.14, No.5, pp. 681-688, May 1988.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Graph Data Mining, Link Analysis, FSG
[1]. www.wikipedia.com
[2]. Agrawal, R. and Srikant, R. 1994. Fast algorithms for mining association rules. In Proc. 20th Intl. Conf. Very Large Data Bases, 487-499.
[3]. Aristides Gionis, Mining the graph structures of the web, © 2008, Yahoo! Research, Barcelona, Spain, and University of Helsinki, Finland.
[4]. Bettina Berendt, The semantics of frequent subgraphs: Mining and navigation pattern analysis, © 2005, ACM/WebKDD'05, Chicago, Illinois, USA.
[5]. Martin J Wainwrigh, Michael I. Jordan, "Graphical Models, Exponential Families, and Variational Inference", Foundations and Trends in Machine Learning, Vol. 1 No.s 1 -2, ©2008.