Version-5 (Nov-Dec 2014)
Ver-1 Ver-2 Ver-3 Ver-4 Ver-5 Ver-6 Ver-7 Ver-8
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Analyzing gene expression data is a challenging task since the large number of features against the shortage of available examples can be prone to over fitting. In order to avoid this pitfall and achieve high performance, some approaches construct complex classifiers, using new or well-established strategies. In medical decision making (classification, diagnosing) there are many situations where decision must be made effectively and reliably.
[1]. Schena, M., Shalon, D., Davis, R.W., and Brown, P. O. (1995).Quantitative monitoring of gene expression patterns with a complementary DNA microarray. Science, 270(5235):467–470.
[2]. Golub, T. R., Slonim, D. K., Tamayo, P., Huard, C., Gaasenbeek, M.Mesirov, J. P., Coller, H., Loh, M., Downing, J. R., Caligiuri, M. A., Bloomfield,C. D., and Lander, E. S. (1999). Molecular classification of cancer: class discovery and class prediction by gene expression monitoring. Science, 286:531–537.
[3]. J. Han, Data Mining: Concepts and Techniques. San Francisco, CA, USA: Morgan Kaufmann Publishers Inc., 2001.
[4]. P.-N. Tan, M. Steinbach, and V. Kumar, Introduction to Data Mining,(First Edition). Boston, MA, USA: Addison-Wesley Longman Publishing Co., Inc. 2005.
[5]. J. R. Quinlan, "Induction of decision trees," Mach. Learn., vol. 1, no. 1, pp. 81–106, 1986
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | High Performance Data Encryption based on Advanced Encryption Standard using FPGA |
Country | : | Egypt |
Authors | : | M. Amr Mokhtar |
: | 10.9790/0661-16650713 |
Abstract: Many digital services, such as confidential video conferencing, medical, military imaging systems and the rapid progress of Internet, require reliable security and encryption in real time to store and transmit these digital images/videos.In this paper, a parallel implementation of the advanced encryption standard (AES) using pipelining technique is proposed. For more security, a pseudo random sequence generator (PRSG) is used in advance. The goal is to achieve a high-speed reliable security system for real time application. The parallel architecture is implemented on Field Programmable Gate Arrays (FPGA) family of Spartan_6 (XC6SLX16) using Very high speed Hardware Description Language (VHDL). An image encryption is taken as a case study. The system is capable to process image (256*256) in (0.00053) seconds;consequentially the real time requirement is achieved.
Keywords: Image encryption, FPGA, Pipeline design, AES.
[1] Fatimah, Sh., "On the security of Bitmap Images using Scrambling based EncryptionMethod", Journal of Engineering and Development, Vol. 13, No. 3, September (2009) ISSN 1813-7822.
[2] Hanna, R., "Efficiency of AES finalist candidate algorithms", Al-Nahrain University, 10th Scientific Conference 24-25 Oct.2009.
[3] H.K.Reshma R., Dr. N. Na., "Fault Detection Scheme for AES Using Optimization forMix Column", IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 3, July 2012. [4] Sliman, A. , A., AbderrahimTragha , alaheddineKhamlich , "Design and Implementation A different Architectures of mixcolumn in FPGA", International Journal of VLSI design & Communication Systems (VLSICS), Vol.3, No.4, August 2012.
[5] Bahram, R., Bahman, R., "FPGA Based A New Low Power and Self-Timed AES 128-bit Encryption Algorithm for Encryption Audio Signal", I. J. Computer Network and Information Security, 2013, 2, 10-20.
[6] Bin Liu, Bevan M. Baas, "Parallel AES Encryption Engines for Many-Core Processor Arrays", IEEE TRANSACTIONS ON COMPUTERS, VOL. 62, NO. 3, MARCH 2013.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Efficient Techniques for Unauthorized Attacks with Time-Stamp |
Country | : | India |
Authors | : | R.Swathi |
: | 10.9790/0661-16651415 |
Abstract: In many applications it is very useful to identify the unexpected activities on data with respect to time. Cyber security is one of the application area in which we are using intrusion detection system to monitor the network traffic for unauthorized activities and it generates alerts for different types of attacks. For this we propose Efficient algorithm named as Top-k PUS which identifies unexplained sequences and for alerts generation we are using GM Approach which consists of probabilistic methods. Finally experimental results Show that those are efficient with detection accuracy and time.
This paper addresses finding subsequences that are not explained by the activities.
For this We propose a Top-k PUS and GM Approach with probabilistic model for alert generation.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Survey of Recommendation Algorithms |
Country | : | India |
Authors | : | Ruchita V. Tatiya || Prof. Archana S. Vaidya |
: | 10.9790/0661-16651619 |
Abstract: Recommender system can be defined as the subclass of information filtering system which attempts to give the guidance to the users regarding the useful services based on their personalized preferences, past behavior or based on their similar likings with other users. The various approaches of recommendation systems, like content-based, collaborative filtering, hybrid, etc, can further be classified according to their algorithmic technique as memory-based (heuristic) or model-based recommendation algorithms.
[1]. Recommendation system: http://en.citizendium.org/wiki/Recommendation_system
[2]. Michael J. Pazzani and Daniel Billsus, "Content-based Recommendation Systems".
[3]. Content based Recommendations: http://findoutyourfavorite.blogspot.in/
[4]. Collaborative Filtering: http://en.citizendium.org/wiki/Collaborative_filtering
[5]. SongJie Gong, "A Collaborative Filtering Recommendation Algorithm Based on User Clustering and Item Clustering," journal of software, vol. 5, no. 7, july 2010
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | The Design and Implementation of On-Line Examination Using Firewall security |
Country | : | India |
Authors | : | V.Selvi || R.Sankar || R.Umarani |
: | 10.9790/0661-16652024 |
Abstract: Online Examination System is a software solution, which allows a company or institute to arrange, conduct and manage examinations via an online environment. This can be done through the Internet, Intranet and/or Local Area Network environments. In this paper propose a system that provides security to improve on-line Examination by utilizing DMZ Concept in firewall technology. This research paper, discuss the performance of online exam with respect to the security provided by the firewall technology.
[1] http://www.esigmatechnologies.com/etest-online.html.
[2] Chi-Chien Pan et al, Secure online examination architecture based on distributed firewall , e-Technology, e-Commerce and e-Service, 2004 IEEE International Conference on , 28-31 March 2004 ,533 - 536 .
[3] http://eduexamsoftware.weebly.com.
[4] www.projectcorner.in/online-examination-system-college-project-asp-net.
[5] Bhagyashri Kaiche et al , Online Descriptive Examination and Assessment System, International Journal of Emerging Technology and Advanced Engineering, Volume 4, Issue 3, March 2014.
[6] http://oes.sourceforge.net.
[7] http://www.esigmatechnologies.com/etest-online.html.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Here in this work we presented a hybrid model of packet marking and logging for the IP trace back for the node that wants to attack any node in the network. The main idea is to detect the DOS attacks in the network by employing the ip of the attacker node. Here we are implementing the packet marking and the logging for the homogenous and the heterogeneous network. Also here we are integrating the concept of pre shared key exchange on the routers to make the marking of the packets is easy and can increase the efficiency of detecting attacks in the network.
Keywords: Ip, Packetizing, Shared Key Exchange, Logging, Trace.
1]. Al-Duwairi,, and G. Manimaran," Novel Hybrid Schemes Employing Packet Marking and Logging for IP Traceback Bashee "IEEE. Volume 17, Issue 5, May 2006, Pages: 403 - 418.
[2]. Arbor Networks Inc., "2010 worldwide infrastructure security report," [EB/OL], http: //www.arbornetworks.com/report.
[3]. C. Gong and K. Sarac, "A more practical approach for single-packet IP trace back using packet logging and marking," IEEE Transactions on Parallel and Distributed Systems, Vol. 19 , pp. 1310-1324, 2008.
[4]. Dong yan, yulong wang, sen su and fangchun yang. "A Precise and Practical IP Trace back Technique based on packet marking and logging", published journal of information science and engineering 28, 453-470, 2012.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The DBMS applications are becoming increasingly popular in the scientific community to support the interactive exploration of huge data. A result of heavy usage has also lead to a lot of tavles generated in the warehouse. This has tremendously increased the need for recommendation system & various tools for the user as user is not capable to explore such huge data by using Structured Query language. This motivates to turn towards the idea of query recommendation system which will assist the technical & non-technical users to generate top-N query recommendations as per their needs. In this survey paper, the focus is given on opportunities that exist in domain of query recommendation, brief description of recommendation outline and techniques. Along with this, the terminology to identify the similarity and comparison of fragment based approach & matrix factorization approach is also explored.
Keywords: Database Management System, Query Recommendation, Recommendation techniques.
[1]. M. Eririnaki, S. Abraham, N. Polyzotis, and N. Shaikh,"QueRIE: Collaborative Database Exploration", IEEE Transaction on Knowledge and Data Engineering, 2013.
[2]. X. Su, and T. M. Khoshgoftarr, Review Article-"A Survey of Collaborative Filtering Techniques", in Advances in Artificial Intelligence", vol. 2009, Article Id 421425, Aug 3, 2009.
[3]. Christopher Miles, "More like This: Query Recommendation for SQL".
[4]. Y. Koren, Yahoo Research, and R. Bell, C. Volinsky, "Matrix factorization techniques for recommender system", in IEEE Computer Society, AT & T Labs, 2009.
[5]. L. Lu, M. Medo, C.H. Yeung, Yi-Cheng Zhang, Zi-Ke Zhang, and T. Zhou,"Recommender System", Feb 7,
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Component Based Representation Using Probabilistic Neural Network Classifier |
Country | : | India |
Authors | : | Anjali G. |
: | 10.9790/0661-16653539 |
Abstract: The law enforcement agency make use of face recognition system for the identification of criminals. In some cases, the photograph of criminals is not available. In this situation,sketch is drawn by the information provided by the eyewitness. In the early stages sketches are drawn by the artist by the information provided by the eyewitness. Sometimes the witness does not recall the exact apperance of the suspect. In that case,sketch drawn is not helpfull for investigation. In this networked world, the sketch construction with the help of computer generated software arises. The computer generated composite sketch is constructed by selecting the facial components provided in the system database. The composite sketch construction gives more faster results for the law enforcement agency. The component based approach for face recognition using probabilistic neural network classifier gives more accurate result in photo to sketch matching. The proposed approach performs facial decomposition, some transformations and feature extraction for photo to composite matching. The use of classifier is helpfull for comparing the features of face images and gives the degree of match to make a decision. The advantage of using Probabilisitic Neural Network( PNN) classifier is that it requires only short training time.
Keywords: Composite based approach, composite sketch , PNN.
[1]. D. Mcquiston, L. Topp, and R. Malpass, "Use of facial composite systemsin US law enforcement agencies," Psychology, Crime and Law,vol. 12, no. 5, pp. 505–517, 2006.
[2] A. K. Jain, B.Klare, andU. Park, "Face matching and retrieval in forensicsapplications," IEEE Multimedia, vol. 19, no. 1, p. 20, Jan. 2012.
[3] B. Klare, Z. Li, and A. Jain, "Matching forensic sketches to mug shotphotos," IEEE Trans. Pattern Anal. Mach. Intell., vol. 33, no. 3, pp.639–646, Mar. 2011
[4] H. A. Rowley,"Neural Network Based Face Detection, Neural network BasedFace Detection", School of Computer Science, Computer Science Department, Carnegie Mellon University, Pittsburgh, Pa, USA, 1999.
[5] Topi Maenpaa and Matti Pietikainen." Multi-scale binary patterns for texture analysis". In SCIA, pages , 2003.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Mean shift segmentation on Enhanced Color image |
Country | : | India |
Authors | : | Poonam Chauhan || R. V. Shahabade |
: | 10.9790/0661-16654044 |
Abstract: This paper proposed the method of mean shift segmentation on Enhanced color image . The method applies the modified histogram equalization technique for enhancement of under illuminated color image and then mean shift segmentation is applied on this enhanced image. This technique uses the lightness component in YIQ color space is transformed using sigmoid function, then the traditional histogram equalization (HE) method is applied on Y component. Once the image is enhanced mean shift segmentation is applied to the enhanced image due to which we get good segmentation results as compared to without enhanced image. Experiments on natural color images show promising results.
Keywords: YIQ, RGB, Histogram Equalization, Sigmoid function, Mean shift Segmentation
[1]. D.Jabson, Z.Rahman, and G.A. Woodel,"A multi-scale retinex for bridging the gap between color images and the human observation of scenes," IEEE Trans. Image Process. 6, pp. 965-976, July 1997.
[2]. Z. Rahman, G. A. Woodell, and D. J. Jobson, "A Comparison of the Multiscale Retinex with Other Image EnhancementTechniques,'' Proceedings of the IS&T 50th Anniversary Conference, May 1997.
[3]. D. J. Jobson, Z. Rahman, and G. A. Woodell, "Properties and performance of a center/surround retinex," IEEE Trans. On Image Processing 6, pp. 451–462, March 1996.
[4]. B. V. Funt, K. Barnard, M. Brockington, and V.Cardei, "Luminance-based multiscale Retinex",Proceedings AIC Color 97, Kyoto, Japan, 1997 .
[5]. K. Barnard and B. Funt, "Analysis and Improvement of Multi-ScaleRetinex" In Proceedings of the IS&T/SID Fifth Color Imaging Conference: Color Science, Systems and Applications, Scottsdale, Arizona, pp. 221-226,November 17-20, 1997.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Things on which a computer science engineer should focus on |
Country | : | India |
Authors | : | Divya || P. Deepthi |
: | 10.9790/0661-16654546 |
Abstract: One of the evergreen course in engineering is the computer science engineering .It is the one which is ruling the entire world. To continue its journey successfully in future generations ,the present generation students should play a major role by developing good softwares , by focusing on some of the important and necessary skills which leads to the success.
..............................
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Clustering Engine for Desktop Usability |
Country | : | India |
Authors | : | Prajakta Sharmao Pawar || Sushopti Gawade |
: | 10.9790/0661-16654749 |
Abstract: The increased capacity and lower prices of computer hard drives led to a new universe of knowledge. Although search and information retrieval techniques are already widely used in the Internet, its application in personal computers is still incipient. The management of information is relatively difficult when it comes to large size of data lying in the machine. There is a need to manage the number of documents and the data retrieval is difficult when the number of files is too many. This project proposes an approach of document clustering as user need to retrieve information from set of documents. [1]Document clustering is one of the approach in clustering method which is specifically used for management and retrieval of documents. [2]The clustering engine intelligently works towards providing user with document as input, the specific documents with output.
[1]. Intelligent Clustering Engine: A clustering gadget for Google Desktop, 2012 Lando M. di Carlantonio a,⇑, Bruno A. Osiek a, Geraldo B. Xerox a, Rosa Maria E.M. da Costa
[2]. Web Clustering Engine based on Wikipedia, Yuvarani Meiyappan1, N. Ch. S. Narayana Iyengar2 and A. Kannan3 1Lead, Infosys Limited, Bangalore, Karnataka, India 560100
[3]. A Survey of Web Clustering Engines CLAUDIO CARPINETO, STANISlAW OSIN´ SKI-2012
[4]. Carrot2 s.c.t. Clustering Framework, Dawid Weiss, Pozna´n University of Technology, Pozna´n, Poland and Stanisław Osi´nski
[5]. A Document Clustering Approach for Search Engines Chun-Wei Tsai, Ting-Wen Liang, Jiun-Huei Ho, Chu-Sing Yang and Ming-Chao Chiang.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Unique Identity for every human and non-human entity on the earth is the crucial issue for the time being. Unique Identity means assigning numeric identity number to every human aged greater or equal to 0 day, each shop/institute/organization/farm/company and other like entities within countries and international organizations/bodies from now/floating date. It is envisaged for peace and security of the mankind, simplifying complicated public systems within country and in the international arena, to expedite building global village and increasing cultural, economic/business relation and amity with trust among people beyond the border. This will bring discipline in human life in the world. It will substantially reduce militancy and other minor or major criminal incidents. In this system I recommend to keep an entity profile against each entity of the country in a government database. And this will facilitate people home and abroad manifold.
Keywords: Account security, citizen identity, citizen safety, human identity, information security, internet security, public discipline, public security, safe communication, security, security rules, security system, unique citizen identity, unique human identity, unique identity, unique identity number, unique people identity, unique world identity.
--------------------------------------------------------------------
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Smart phones with cameras having powerful built-in sensors tend to meet at a point towards the problem of automatic image-tagging. So such an out-of-band approach is valuable, especially with increasing device density and greater sophistication in sensing and learning algorithms. This paper shows that automatic tagging of images with relevant tags is possible by using a combination of the capture of location, the date/time when the image was captured, and an image category. Comparison of various automatic image-tagging approaches has been done so as to develop a new system with a dynamic approach for using multiple images when possible, and fewer images when not many relevant images are found.
Keywords: Annotation, context, digital images, image tagging, sensing.
[1] Moxley, E., J. Kleban, and B.S. Manjunath,"SpiritTagger: A geo-aware tagsuggestion tool mined from flickr, in Proc.1st ACM international conference on Multimedia information retrieval. 2008, ACM: Vancouver, British Columbia, Canada. p. 24-30.
[2] Popescu, A., et al., "MonuAnno: Automatic annotation of geo-referenced landmarks images", in Proc.ACM International Conference onImage and Video Retrieval. 2009, ACM: Santorini, Fira, Greece. p. 1-8.
[3] Ahern, S., et al., "ZoneTag: Designing Context-Aware Mobile Media Capture to Increase Participation, Pervasive Image Capture and Sharing", in Proc.Eight International Conference on Ubiquitous Computing (UbiComp2006), 2006.
[4] Wang, X.-J., et al., "AnnoSearch: Image Auto-Annotation by Search", in Proc.2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition - Volume 2. 2006, IEEE Computer Society.p.1483-1490.
[5] Rattenbury, T., N. Good, and M. Naaman, "Towards automatic extraction of event and place semantics from flickr tags", in Proc. 30th annualinternational ACM SIGIR Conference on Research and Development in Information Retrieval. 2007, ACM: Amsterdam, The Netherlands. p. 103-110.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Cloud computing is a network-based environment that focuses on sharing computations, Cloud computing networks access to a shared pool of configurable networks, servers, storage, service, applications & other important Computing resources. In modern era of Information Technology, the accesses to all information about the important activities of the related fields. In this paper discuss the advantages, disadvantages, characteristics, challenge, deployment model, cloud service model, cloud service provider & various applications areas of cloud computing such as small & large scale (manufacturing, automation, television, broadcast, constructions industries), Geographical Information system (GIS), Military intelligence fusion (MIS), business management, banking, Education, healthcare, Agriculture sector, E-Governance, project planning, cloud computing in family etc.
Keywords: Cloud computing, community model, hybrid model, Public model, private model
[1]. Eviwiekpaefe, A.E. & Ajakaiye,F., (2014), ―The trend and challenges of cloud computing: a literature review‖, International Letters of Social and Humanistic Sciences5,pp.13-20.
[2]. I. Foster, Y. Zhao, I. Raicu, and S. Lu, Cloud Computing and Grid Computing 360‐Degree Compared, http://arxiv.org/abs/0901.0131[Accessed May 19, 2012].
[3]. S. Biswas, "Where Is Cloud Computing Going? Up, Up And Away!" January 25, 2011, http://www.cloudtweaks.com/2011/01/where is cloud computing going up up and away [Accessed May 19, 2012].
[4]. Bhushan Lal Sahu,Rajesh Tiwari, Journal of Advanced Research in Computer Science and Software Engineering 2(9) (2012) 33-37.
[5]. U. Oktay, U.& Sahingoz, O.K.(2013) ―Attack Types and Intrusion Detection Systems in Cloud Computing‖ 6th international information security & cryptology conference, pp.71-76.
[6]. Security for Cloud Computing 10 Steps to Ensure Success, 2012 Cloud Standards Customer Council
[7]. Pawar A,. ; Shingavi, A.; Pabale, S.; Chahyal G. (2014) ―Reliability security for cloud computing‖ International Journal of Emerging Technology and Advanced Engineering. Vol.4.N0.8, pp.757-759.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Voltage Control Of Three Phase Ac/Dc Pwm Converters Using Feedback Linearisation |
Country | : | India |
Authors | : | Ancha.Sadhana || K.Bhavana |
: | 10.9790/0661-16656977 |
Abstract: This paper proposes a voltage control strategy for a three level PWM converter based on feedback linearization in order to control dc bus voltage. Incorporating the power balance of the input and output sides in system modeling, a nonlinear model of the PWM converter is derived with state variables such as ac input currents and dc output voltage. Feedback linearization transforms a nonlinear system into a linear system. Then by input–output feedback linearization, the system is linearized and a state feedback control law is obtained by pole placement. For robust control to parameter variations, integrators are added to the exact feedback control law. Since the fast voltage control is feasible for load changes, it is shown that the capacitor size can be reduced remarkably. The input current is regulated to be sinusoidal and the source power factor can be controlled at unity. This feedback linearization technique can be extended for permanent magnet synchronous generator wind power system at the grid voltage sag. The proposed method is tested and the results of simulation are observed using MATLAB/SIMULINK.
Keywords: AC/DC pulse width modulation converter, DC-link voltage, feedback linearization, permanent magnet synchronous generator (PMSG), wind power, matlab/simulink.
[1]. Ki-Hong Kim,Yoon-Cheul Jeung, Dong-Choon Lee and Heung-Geun Kim "LVRT Scheme of PSMG wind power system based on feedback linearization", IEEE Transactions on Power Electronics, vol.27,no.5,may2012.
[2]. Dai, D. Xu, B.Wu, and N. R. Zargari, "Unified DC-link current control for low-voltage ride-through in current-source-converter-based wind energy conversion systems," IEEE Trans. Power Electron., vol. 26, no. 1, pp. 288–297, Jan. 2011.
[3]. D.-E. Kim and D.-C. Lee, "Feedback linearization control of three-phase UPS inverter systems," IEEE Trans. Ind. Electron., vol. 57, no. 3, pp. 963– 968, Mar. 2010.
[4]. G. Foo and M. F. Rahman, "Sensorless direct torque and flux-controlled IPM synchronous motor drive at very low speed without signal injection," IEEE Trans. Power Electron., vol. 57, no. 1, pp. 395–403, Jan. 2010.
[5]. A.Vladan Stankovic, and K. Chen, "A New Control Method for Input-Output Harmonic Elimination of the PWM Boost Rectifier under Extreme Unbalanced Oper-ating Conditions," IEEE Transactions on Industrial Elec-tronics, Vol. 56, No. 7, 2009, pp. 2420-2430. Doi:10.1109/TIE.2009.2017550
[6]. X. H. Wu, S. K. Panda and J. X. Xu, "Analysis of the Instantaneous Power Flow for Three-Phase Boost Recti-fier under Unbalanced Supply Voltage Conditions," IEEE Transactions on Power Electronics, Vol. 23, No. 4, 2008, pp. 1679-1691. Doi:10.1109/TPEL.2008.925158
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In virtually all tertiary institutions of Nigeria, electronic voting technologies for the conduct of students' union elections are yet to be implemented as a replacement for the existent manual voting technologies. Manual voting systems are primarily characterized by high incidences of electoral malpractices and irregularities. In this era of rapid globalization, the impact of information and communications technology (ICT) advancement in Nigeria is having numerous positive implications on students and their communities.
[1]. P. Dempsey, Student Elections Online (Carlisle, England: Dickinson College, 2000).
[2]. B. C. Molokwu and M. N. Agu, Students‟ Information-exchange and Repository System for Nigerian Tertiary Institutions, African Journal of Computing & ICT, 7(3), 2014, 53-60.
[3]. B. Oxendine, Electronic Elections (www.studentleader.com/sl_10ee.htm: Student Leader, 1999).
[4]. B. Jones, A Report on the Feasibility of Internet Voting, California Secretary of State, Sacramento, California, USA, 2000.
[5]. L. F. Cranor and R. K. Cytron, Design and Implementation of a Practical Security - Conscious Electronic Polling System, Department of Computer Science, University St. Louis, Washington, USA, 1996.
[6]. V. Kalaichelvi and R.M. Chandrasekaran, Design and Analysis of Secured Electronic Voting Protocol, Asian Journal of Information Technology, 11(2), 2012, 50-55.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: An unwanted factor in digital images and videos called as Noise is responsible for hiding the details and destroying image information. Hence denoising has great importance in the detail restoration and to improve the quality measures. A simple adaptive median filter (SAMF) is one of the most promising algorithm capable of denoising the videos to better extent, but incapable to use all the neighboring pixel information while noise processing. And hence quality of the denoised video can be further improved if all neighboring pixel information is considered. To make this possible the SAMF is combined with the multi-view denoising and then a fusion strategy is used to generate enhanced denoised video sequence. The performance of the combined system is measured through the image quality matrix called as Pick Signal to Noise Ratio (PSNR) at different noise contamination level.
Keywords: simple adaptive median filter (SAMF), Multiview Fusion (MVF), Adaptive Filter, Denoising, Impulse noise, Median filter, Salt-and–pepper, Switching Median Filter.
1] Vladimir Zlokolica, Aleksandra Pizurica, and Wilfried Philips, "Video denoising using multiple class averaging with Multiresolution",University of Ghent, Sint-Pietersnieuwstraat 41, 9000 Ghent, Belgium,VLBV2003,LNCS 2849,PP. 172-179,2003, Springer verlog berlin Heidelberg 2003.
[2] Bovik, Alan C.: Handbook of Image and Video Processing (Communications, Networking and Multimedia). Academic Press, Inc., Orlando, FL, USA, (2005).
[3] Rafael C. Gonzalez, Richard E. Woods, Book on "Digital Image Processing", third edition, Pearson Education, pp.156-157,326,332-335,369©2008.
[4] Kai Zeng, and Zhou Wang; Polyview Fusion: A Strategy to Enhance Video-Denoising Algorithms; IEEE Transactions On Image Processing, Vol. 21, No. 4, APRIL (2012).
[5] Sung-JeaKo, and YoogHoon Lee, ''Center weighted median filters and their application to image enhancement'', IEEE Trans. Circuits and System, vol. 38, no. 9, pp. 984-993, September 1991.