Version-4 (May-June 2016)
Ver-1 Ver-2 Ver-3 Ver-4 Ver-5 Ver-6
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Smart Car Collision Avoidance System |
Country | : | India |
Authors | : | S.V.S.Prasad(Assoc. Prof) || G Navaneeth Prashanth Kumar || Durvesula Ajay Kumar || B.Niharika |
Abstract: In this paper we demonstrate the potential usage of vehicle to vehicle communication(V2V) to reduce the number of road accidents caused due to over taking of vehicles. The system will operate by transferring data in the form of packets. The packet contains the details of the vehicle like speed, position, registration number. The system gives alertness to the driver if any vehicle approaches towards it, so automatically the speed and position of vehicle can be determined. GPS technology is used to know the position of the vehicle and along with it speed sensor is fixed to the vehicle to determine the speed.......
Keyword: GPS, LabVIEW, myRIO, speed sensor, wireless communication.
[[1] Characterization and its Implications for Wireless System Design and Performance, Proc. of the IEEE, vol. 99, no. 7, pp. 1189–1212, Jul.2011 .
[2] Hartenstein and K. P. Laberteaux, "A Tutorial Survey on Vehicular AdHoc Networks,"IEEE Commune. Mag., vol. 46, no. 6, pp. 164–171, Jun.2008Spector, A. Z. 1989.
[3] Olney R.D.; et al. (November 1995), " Collision Warning System Technology & quot; Intelligent Transport Systems World Congress (Yokohama, Japan).
[4] Mobility Centric Data Dissemination Algorithm for Vehicular Networks" 2004" Vehicle Infrastructure Integration (VII) ". Its.dot.gov. Retrieved 2008-02- 29.
[5] [WU 04] WU H., FUJIMOTO R., GUENSLER R., HUNTER M., "MDDV Lin Hong. "Personal Information Using Fingerprints" Fröhlich, B. and Plate, J. 2000.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Hadoop-based Retail E-Commerce Weblog Analysis System |
Country | : | India |
Authors | : | Pooja D. Savant || Debnath Bhattacharyya |
Abstract: In the modern age, the act of purchasing underwent a drastic revolution due to the rapid development of e-commerce. For challenging their competitors over such kind of modern setting, which offers more than one way of completing a sales transaction, sellers sense the need to make use of novel plans of action for alluring more customers as well as keeping the existing customers. To set the plans of action, sellers have to analyze the massive web data logs generated by the retail sites.
Keyword: Hadoop Framework, Distributed File System, MapReduce Software Framework, Pig Latin Language, Apache Sqoop, Tableau Software
[1]. Chen Hau Wang, Ching Tsomg Tsai, Chia Chen Fan and Shyan Ming Yuan, "A Hadoop-based Weblog Analysis System", International Conference on Ubi-Media Computing and Workshops (UMEDIA), Ulaanbaatar, Mongolia, July 12-14, 2014, pp. 72 – 77.
[2]. Sayalee Narkhede, Tripti Baraskar, "HMR Log Analyzer: Analyze Web Application Logs Over Hadoop Mapreduce", International Journal of UbiComp (IJU), Vol. 4, No. 3, July 2013, pp. 41-51.
[3]. C. Olston, B. Reed, U. Srivastava, R. Kumar, and A. Tumkins, "Pig Latin: A Not-So-Foreign Language for Data-Processing", SIGMOD -2008, June 9-12, 2008, Vancouver, Canada, pp. 1099-1110.
[4]. Krisztian Balog, Norway, "On the investigation of similarity measures for product resolution", International Conference on Discovering Meaning On the Go in Large Heterogeneous Data, San Francisco, CA, USA, 2011, Pages 49-54.
[5]. Nayakam, GhanaShyam Nath, "Study of Similarity Coefficients Using MapReduce Programming Model", North Dakota State University Institutional Repository, Fargo, 2013.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Migrate and Map: A Framework to Access Data from Mysql, Mongodb or Hbase Using Mysql Queries |
Country | : | India |
Authors | : | Piyush Nikam || Tushar Patil || Gayatri Hungund || Ankit Pagar || Aditi Talegaonkar || Ms. Soudamini Pawar |
Abstract: Due to ever-increasing amount of data, scalability factor of the databases becomes a major constraint. Moreover, traditional relational databases fix the user's perspective to view data in tabular format. Parallel databases emerged to be one of the solutions to tackle the scalability constraint which was later replaced by more scalable and efficient solution called NoSQL databases..........
Keyword: HBase, NoSQL, MapReduce, MongoDB, MySQL.
[1]. Chung, W. C., Lin, H. P., Chen, S. C., Jiang, M. F., & Chung, Y. C. (2014). JackHare: a framework for SQL to NoSQL translation using MapReduce. Automated Software Engineering, 21(4), 489-508;
[2]. Rith, J., Lehmayr, P. S., & Meyer-Wegener, K. (2014, March). Speaking in toungues: SQL access to NoSQL systems. In Proceedings of the 29th Annual ACM Symposium on Applied Computing (pp. 855-857). ACM.
[3]. Xu, Y., & Hu, S. (2013, May). Qmapper: a tool for sql optimization on hive using query rewriting. In Proceedings of the 22nd international conference on World Wide Web companion (pp. 211-212). International World Wide Web Conferences Steering Committee.
[4]. Arora, R., & Aggarwal, R. R. (2013). An Algorithm for Transformation of Data from MySQL to NoSQL (MongoDB). International Journal of Advanced Studies in Computer Science and Engineering (IJASCSE), 2(1).
[5]. Rocha, L., Vale, F., Cirilo, E., Barbosa, D., & Mourao, F. (2015). A Framework for migrating Relational Datasets to NoSQL. Procedia Computer Science, 51, 2593-2602.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Embedded Speech in Mobile Devices |
Country | : | India |
Authors | : | Bidisha Mahanta |
Abstract: This paper is aimed in developing an Embedded Speech in mobile devices for recognizing words which will convert to voice or it can be considered as a voice activated assistant on the phone which will gone help in speech recognition. This software allows a user to convert the text messages to voice message. Since it is speech recognition technique, user can response their received message while even they are working especially when they are driving car, working on laptop, cooking etc............
Keyword: Speech Recognition, Cellular Emulator, Embedded Speech, Windows MDC
[1]. Yee-Ling Lu; Mak, Man-Wai; Wan-Chi Siu,, "Application of a fast real time recurrent learning algorithm to text-to-phoneme conversion," Neural Networks, 1995. Proceedings., IEEE International Conference on , vol.5, no., pp.2853,2857 vol.5, Nov/Dec 1995.
[2]. Decadt, Bart; Duchateau, Jacques; Daelemans, Walter; Wambacq, P., "Phoneme-to-grapheme conversion for out-of-vocabulary words in large vocabulary speech recognition," Automatic Speech Recognition and Understanding, 2001. ASRU '01. IEEE Workshop on , vol., no., pp.413,416, 2001.
[3]. Penagarikano, M.; Bordel, G., "Speech-to-text translation by a non-word lexical unit based system," Signal Processing and Its Applications, 1999. ISSPA '99. Proceedings of the Fifth International Symposium on , vol.1, no., pp.111,114 vol.1, 1999.
[4]. Olabe, J. C.; Santos, A.; Martinez, R.; Munoz, E.; Martinez, M.; Quilis, A.; Bernstein, J., "Real time text-to-speech conversion system for spanish," Acoustics, Speech, and Signal Processing, IEEE International Conference on ICASSP '84. , vol.9, no., pp.85,87, Mar 1984.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Classifying Product Quality Depending on Online Aspect Reviews |
Country | : | India |
Authors | : | Awhale Kaveri Tukaram || Ghodekar Kalpesh Shantaram || Iyer Pooja Bhaskar || Gopal B. Deshmukh |
Abstract: According to any individual living in today's world what is the most important thing that one does before buying any product? Blindly we say that it's checking out the number of online reviews about the product and its aspects, comparing it with a similar product of other brand and then coming to a conclusion about its overall quality. Now while we are referring to the reviews posted online is it possible for us to go through all the reviews posted and then come to a conclusion?............
Keyword:Sentiment Analysis, Aspect Review, e-commerce, rating systems
[1]. ShahurajPatil, John Raghavan, "An Efficient product aspect ranking and its application: A review", International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Impact Factor (2012): 3.358
[2]. Zheng-Jun Zha, Jianxing Yu, Jinhui Tang, Meng Wang, Tat-Seng Chua, IEEE Transactions on Knowledge and Data Engineering Vol. 26, No. 5, May 2014.
[3]. Y. Pan, J.Q. Zhang, "Born Unequal: A Study of the helpfulness of User-Generated Product Reviews", Vol.87, No.4, 598-7612. 2011.
[4]. Li Chen, Guanliang Chen, Feng Wang, "Recommender Systems Based on User Reviews: The State of the Art".
[5]. Daniel Kailer, KenanKanmaz, Georg Lackermair, "Importance of Online Product Reviews From a Consumer's Perspective
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Analysis of Effect of Compressive Sensing Theory and Watermarking on Verification and Authentication Performance of Multibiometric System |
Country | : | India |
Authors | : | Rohit Thanki || Ved Vyas Dwivedi || Komal Borisagar |
Abstract: In this paper, watermarking technique with compressive sensing theory have been analysed for security of biometric image against imposter manipulations in the multibiometric system. The compressive sensing theory is used for providing security to watermark biometric image before embedded into the host biometric image. These proposed watermarking techniques can be embedded sparse information of the watermark biometric image into transform coefficients of a host biometric image.............
Keyword: Authentication, CS Theory, Multibiometric System, Verification, Watermarking
[1] A. Jain and A. Kumar, "Biometric Recognition: An Overview", Second Generation Biometrics: The Ethical, Legal and Social Context, E. Mordini and D. Tzovaras (Eds.), pp. 49-79, Springer, 2012.
[2] A. Ross and A. Jain, "Multimodal Biometrics: An Overview", In Proceedings of 12th European Signal Processing Conference (EUSIPCO), September 2004, pp. 1221-1224.
[3] A. Ross & A. K. Jain, "Information Fusion in Biometrics", Pattern Recognition Letters, 24 (13), pp. 2115-2125, 2003.
[4] M. Thieme, "Multimodal Biometric Systems: Applications and Usage Scenarios", Biometric Consortium Conference, Arlington, VA, 2003.
[5] Teddy KO, "Multimodal Biometric Identification for Large User Population Using Fingerprint, Face and Iris Recognition", Proceeding of the IEEE 34th Applied Imagery and Pattern Recognition Workshop (AIPR05), 2005.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Electronic Health Records Information Security Dynamics for EHR Projects |
Country | : | Brazil |
Authors | : | Ricardo Matos Chaim, Phd || Andre Amaro Toffanello, Msc || Joao Gondim, Msc || ,Ricardo Staciarini Puttini |
Abstract: S ecuring information assets in National Electronic Health Record project is critical and complex. This research examined the effect of investing in this kind of project using S ervice Oriented Architecture and a system dynamics model that includes many concerns to analyze interdependencies between factors and explore feedback effects that emerge from its inherent dynamics............
Keyword: S ervice Oriented Architecture; S ecurity policies; System Dynamics modeling; Electronic Health Records S ecurity
[1]. Anylogic. Available at: < http://www.anylogic.com/>. Acessed in: January, 08th, 2013.
[2]. Chaim, Ricardo Matos; STREIT, Rosalvo Ermes. IT organizations governance: combining SD, Agent based Modelling and fuzzy logic to adress Dynamic Asset and Liability Management. In: 26th International Conference of the System Dynamics Society, 2008, Athens, Greece. Proceedings of the 26th International Conference of the System Dynamics Society. Hoboken, NJ, Estados Unidos : Wiley Blackwell, 2008. p. 42-42.
[3]. Chaim, Ricardo Matos. Combining ALM and System Dynamics in IT organizations. In: 24th International Conference of System Dynamics Society, 2006a. Proceedings of the 24th International Conference The Netherlands: Wiley Inter Science, 2006. Available at: <http://www.systemdynamics.org/conferences/2 006/ proceed/papers/ CHAIM315.pdf>. Acessed in: 30 de setembro de 2006.
[4]. Chaim, Ricardo Matos. 2007. Gestão das informações sobre riscos de ativos e passivos previdenciários em fundos de pensão: associação entre a Dinâmica de Sistemas e o Asset and Liability Management (ALM). PhD dissertation, Information Science School, University of Brasilia, Brazil.
[5]. Edmonds, Bruce. Simulation and complexity: How they can relate. Centre for Policy Modelling Discussion Papers, CPM Report No.: CPM-03-118, 2003.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Preamble Review of Autonomous Wheelchair Control Mechanism |
Country | : | India |
Authors | : | Ravi Kant Parashar || Tanushree Dhiran |
Abstract: Intelligent Wheelchair (IW) interface is used for providing more convenient and efficient interface to the people with disability. Robotic wheelchairs extend the capabilities of traditional powered devices by introducing control and navigational intelligence. The paper presents an exhaustive literature review in robotic wheelchair control mechanism. The main theme is to control the wheelchair according to signals from the input source. The paper presents different control mechanisms, their advantages, limitations, strengths, weaknesses as a preliminary review.............
Keyword:Autonomous Wheelchair, Bio-Potential Signal, Motion Signal, Voice Signal, Wheelchair Control.
[1]. Y Matsumoto, T Ino and T Ogsawarab (2001),"Development of Intelligent Wheelchair System with Face and Gaze Based Interface", IEEE International Workshop on Robot and Human Interactive Communication, 2001, pp. 262-267
[2]. D Purwanto, R Mardiyanto and Kohei Arai(2009),"Electric wheelchair control with gaze direction and eye blinking", Artificial Life and Robotics
[3]. R Mardiyanto and Kohei Arai (2011), "Eyes Based Electric Wheel Chair Control System", International Journal of Advanced Computer Science and Applications
[4]. P Fia, Huosheng H. Hu, Tao Lu, Kui Yuan (2007), "Head gesture recognition for hands-free control of an intelligent wheelchair", Industrial Robot: An International Journal
[5]. R. Posada-Gomez et-al (2007),"A Hands Gesture System of Control for an Intelligent Wheelchair", 2007 4th International Conference on Electrical and Electronics Engineering, Mexico, September 5-7, 2007
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Pharmi Track |
Country | : | India |
Authors | : | Shashank.H.N || Sushmitha.B || UmaMaheeswari.K.R || Deepthi.G.S || Anitha.C |
Abstract: A mobile application is a computer program designed to run on mobile devices such as tablets and smart phones. The development of Mobile applications and Internet has increased the easiness of Information Communication. The Global Positioning System (GPS) is incorporated in these devices to obtain location and time information in all weather conditions, anywhere on the earth or near the earth where there is an unobstructed line of sight to four or more satellites.............
[1]. Manoharan.S , "GPS Tracking of Mobile Devices", Dept. of Comput. Sci., Univ. of Auckland, Auckland
[2]. Ariffin.A.A.B , "Implementation of GPS for location tracking", Fac. of Electr. Eng., Univ. Teknol. MARA Malaysia, Shah Alam, Malaysia
[3]. Audomovicious.G , "Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions", Carlson Sch. of Manage., Minnesota Univ., Minneapolis, MN, USA
[4]. Jadhav.S , "Cloud-based Android botnet malware detection system", Dept. of Inf. Sci. & Technol., Rochester Inst. of Technol., Rochester, NY, USA.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Vehicular Adhoc Network (VANETs) Security Enhancement Using Autonomic Framework and Trust Based Routing Algorithm |
Country | : | India |
Authors | : | Sunita Karande || Govindkumar Lohiya |
Abstract: The security protocols in the area of Vehicular Ad-hoc Networks (VANETs) have gained an immense importance from the research community. A noteworthy improvement in the research associated to trust management in the VANETs is detected. The security, privacy and safety of private user information are the prime requirements for the deployment of the protocols in vehicular ad-hoc networks. Nodes in the VANETs network uses packet forwarding for smooth functionality of the network..............
Keywords: Trust, Reputation, VANETs, Autonomic, Security, Double-face attack, ATRMS
[1]. Dhurandher, S.K., Obaidat, M.S., Jaiswal, A., Tiwari, A. and Tyagi, A., 2014. Vehicular security through reputation and plausibility checks. Systems Journal, IEEE, 8(2), pp.384-394.
[2]. Movahedi, Z., Nogueira, M. and Pujolle, G., 2012, April. An autonomic knowledge monitoring scheme for trust management on mobile ad hoc networks. In Wireless Communications and Networking Conference (WCNC), 2012 IEEE (pp. 1898-1903). IEEE.
[3]. Dotzer, F., Fischer, L. and Magiera, P., 2005, June. Vars: A vehicle ad-hoc network reputation system. In World of Wireless Mobile and Multimedia Networks, 2005. WoWMoM 2005. Sixth IEEE International Symposium on a (pp. 454-456). IEEE.
[4]. Chen, C., Zhang, J., Cohen, R. and Ho, P.H., 2010, August. A trust modeling framework for message propagation and evaluation in VANETs. In Information Technology Convergence and Services (ITCS), 2010 2nd International Conference on (pp. 1-8). IEEE.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Survey Of DDoS Attacks Based On TCP/IP Protocol Vulnerabilities |
Country | : | India |
Authors | : | Saket Acharya || Namita Tiwari |
Abstract: Distributed denial-of-service (DDoS) attacks are one of the key threats and perhaps the toughest security problem for today's Internet.Distributed Denial of Service (DDoS) attack has become a stimulating problem to the availability of resources in computer networks.With brief or no advance warning, a DDoS attack can easily drain the computing and communication resources of its victim within a short period of time. In this paper, DDoS attacks based on the protocols vulnerabilities in the TCP/IP model, their impact on available resources viz CPU,memory,buffer space is investigated. This paper aims to provide a better understanding of the existing tools,methods and comparative analysis of them,and defense mechanisms.
Keywords: Cyber-attack, Cyber security,DDoS Attack,DDoS Attack Tools, Mitigation,Vulnerability,
[1]. Christos Douligeris , Aikaterini Mitrokotsa, DDoS attacks and defense mechanisms: Classification and State-of-the-art,IEEE Journal, 2003, 1-5
[2]. Khan Zeb, Owais Baig, Muhammad Kamran Asif, DDOS Attacks and Countermeasures in Cyber Space,IEEE Journal,2015,1-10
[3]. Astha Keshariya and Noria Foukia.,DDoS Defense Mechanisms: A New Taxonomy,IEEE Journal,2013,4-8
[4]. Mohammed Alenezi, Martin J Reed,Methodologies for detecting DoS/DDoS attacks against network servers,IEEE Journal,2012,3-9
[5]. Abdulaziz Aborujilah,Shahrulniza Musa,Detecting TCP SYN based Flooding Attacks by Analyzing CPU and Network Resources Performance,IEEE Journal,2014,1-6.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Image Reconstruction of Tumor Brain Cells |
Country | : | India |
Authors | : | Garima Goyal || Sahana L || Sravani B || Alankrutha M || Shreya S Kumar |
Abstract: Image reconstruction techniques are used to create 2-D and 3-D images from sets of 1-D projections. These reconstruction techniques form the basis for common imaging modalities such as CT, MRI, and PET, and they are useful in Medicine, Biology, Earth Science, Archaeology, Materials Science, and nondestructive testing. Image reconstruction is an MRI term for the mathematical process of converting the composite signals obtained during the data acquisition phase into an image. A real-world application that requires image reconstruction is X-ray absorption tomography where projections are formed by measuring the attenuation.............
Keywords: Image reconstruction, neural system, Vectors, MATLAB, Tumor.
[1] Mussarat Yasmin, Muhammad Sharif, Saleha Masood, Mudassar Raza and Sajjad Mohsin, Brain Image Reconstruction: A Short Survey.
[2] Mohammed sabbih hamoud al-tamimi, ghazali sulong, Tumor Brain Detection Through Mr Images: A Review Of Literature
[3] Rajeev Ratan , Sanjay Sharma , S. K. Sharma, Brain Tumor Detection based on Multi-parameter MRI Image Analysis.
[4] D. C. Noll, J. A. Fessler, Fast, iterative image reconstruction for MRI in the presence of field in homogeneities
[5] Bezdek JC , Hall LO ,Clarke LP, Review of MR image segmentation techniques using pattern recognition.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Bandwidth Aware vm Migration Policy in Cloud Data Centers |
Country | : | India |
Authors | : | Hetal Bhadja || Jigneshkumar Lakhani |
Abstract: Iwith the advent of Cloud Computing and its tremendous use, Efficient VM migration using task scheduling has become an important issue that affect the performance of Cloud. Designing and implementing .an effective vm migartion moving task between two data centers is one of the ultimate goals of Cloud Providers. Focusing on the need of effective migration of tasks (of different sizes) to the resources, a new scheduling algorithm is proposed for multiple data center adapting to the different size of tasks siz,bandwidth and capacity Mostly the task scheduling is done considering the CPU and memory requirements of resource.............
Keywords: task scheduling; data center;virtual machine;
[1]. Lin, Weiwei, et al. "Bandwidth‐aware divisible task scheduling for cloud computing." Software: Practice and Experience 44.2 (2014): 163-174.
[2]. Goudarzi, Hossein, and Massoud Pedram. "Geographical load balancing for online service applications in distributed datacenters." Cloud Computing (CLOUD), 2013 IEEE Sixth International Conference on. IEEE, 2013.
[3]. Sun, Xin, et al. "Multi-dimensional resource integrated scheduling in a shared data center." Distributed Computing Systems Workshops (ICDCSW), 2011 31st International Conference on. IEEE, 2011.
[4]. Parkavi, B., G. Malathy, and Rm Somasundaram. "Abstraction based K-tier partitioning scheme for parallel job scheduling in multiple cloud centers." Electronics and Communication Systems (ICECS), 2014 International Conference on. IEEE, 2014.
[5]. X. Wu, M. Deng, R. Zhang, B. Zeng, and S. Zhou, "A Task Scheduling Algorithm based on QoS-Driven in Cloud Computing," Inf. Technol. Quant. Manag., vol. 17, pp. 1162–1169, 2013.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Heart Disease Detection Using EKSTRAP Clustering With Statistical and Distance based Classifiers |
Country | : | India |
Authors | : | Terence Johnson || Dr. S. K. Singh || Vaishnavi Kamat || Aishwarya Joshi || Lester D‟Souza || Poohar Amonkar || Devyani Joshi || Anirudha Kulkarni |
Abstract: The heart is the most important organ in the human body which pumps blood to various parts of the body. If there is inefficient circulation of blood in body organs like brain will suffer. If heart stops pumping blood it results in death. An individual's life is very much dependent on how efficiently the heart works. Using data mining technique proposed in this paper we are trying to detect if a patient has heart disease or not. The system uses 13 attributes like age, gender, blood pressure, cholesterol etc to detect the same..............
Keywords: Enhanced K Strange, clustering, Heart Disease, Naïve Bayes Classifier
[1]. David Hand, Heikki Mannila and Padhraic Smyth, principles of data mining, Cambridge, MA: MIT Press, (2001).
[2]. Jiawei Han and Micheline Kamber, data mining - concepts and techniques, Elsevier, Second Edition, Original ISBN: 978-1- 55860-901-3, Indian Reprint ISBN: 978-81-3120535-8
[3]. Johnson Terence,Dr.Santosh Kumar Singh," Enhanced K-Strange Points Clustering Algorithm" International Conference on Emerging Information Technology and Engineering Solutions(EITES 2015),78-1-4799-1838-6/15,IEEE, DOI:10.1109/ EITES.2015.14,pp 32-37.
[4]. Kuncheva L, "On the equivalence between fuzzy and statistical classifiers" Int. J. of Uncertainity, Fuzziness and Knowledge based Systems. Vol. 4, No. 3, 1996, pp 245-253
[5]. Margaret Dunham , data mining – introductory and advanced topics, Pearson Education 2006.ISBN: 8177587854, 9788177587852
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A New Multi-Agent Game Solver |
Country | : | United States of America |
Authors | : | Miklos N Szilagyi |
Abstract: A new N-person game solver is presented in this work. The new software is an advance in the whole sate of art for the investigation of N-person games. It is now possible to investigate entire classes of games almost automatically. Moreover, this software makes it trivial to perform a systematic investigation of any game with a multidimensional parameter space..............
Keywords: N-person games, Netlogo, Agent-based simulation, Prisoners' Dilemma, Chicken Dilemma, Complexity.
[1]. A. Rapoport, N-Person Game Theory. University of Michigan Press, Ann Arbor, MI, 1970.
[2]. H. Hamburger, N-person Prisoner's Dilemma, Journal of Mathematical Sociology 1973, 3, 27–48.
[3]. T. C. Schelling, Hockey helmets, concealed weapons, and daylight saving. Journal of Conflict Resolution 1973, 17(3), 381-428.
[4]. G. Hardin, The Tragedy of the Commons. Science 1968, 162, 1243– 1248.
[5]. T. Toffoli, Cellular automata as an alternative to (rather than an approximation of) differential equations in modeling physics, Physica D 1984, 10, 117-127.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Different Method Used in Pixel Value Differencing Algorithm |
Country | : | India |
Authors | : | Tripti Dhruw || Dr. Namita Tiwari |
Abstract: Steganography is the art of hiding information inside a multimedia. The basic idea is to hide data inside carrier medium such as text, image, audio, video and networks in such a way that attacker cannot detect it. Image steganography is the major part of steganography which is divided into spatial and frequency domains. Pixel value differencing is one of the spatial domain techniques.............
Keywords: Steganography, pixel value differencing , PSNR, modulus function, hiding capacity
[1]. Mamta. Juneja, and Parvinder S. Sandhu, An Analysis of LSB Image Steganography Techniques in Spatial Domain, Journal of Computer Science and Electronics Engineering (IJCSEE),2013
[2]. Da-Chun Wu a, Wen-Hsiang Tsai, A steganographic method for images by pixel-value differencing, Elsevier,2003.
[3]. H.-C. Wu, N.-I. Wu, C.-S. Tsai and M.-S. Hwang, ―Image steganographic scheme based on pixel-value differencing and LSB replacement methods‖, IEE Proceedings-Vision, Image and Signal Processing, Vol. 152, No. 5,pp.611- 615,2005,doi:10.1049/ip-vis:20059022.
[4]. Weiqi Luo, Fangjun Huang and Jiwu Huang, ―A more secure steganography based on adaptive pixel-value differencing scheme‖, Springer Science+Business Media, LLC 2009, doi: 10.1007/s11042-009-0440-3.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Application Newton Methods in the Reduction of the Problem of Optimal Control of a Boundary Value Problem |
Country | : | India |
Authors | : | DangThiMai || Nguyen Viet Hung |
Abstract: The article presents a generalized continuation of the parameter and Newton methods for solving nonlinear equations. It describes and explores one approach to the application of the continuation method for solving boundary value problems when searching for the optimal control. Solving boundary using the para mete rand the solution obtained in the choice of variables. The results of simulations performed on Matlab.
Keywords: method Newton; boundary value problems; the parameter.
[1]. Л.Д. Кудрявцев. Математический анализ. т.2. М.: Высшая школа, 1973.
[2]. Д. Ортега, В.Рейнболдт. Итерационные методы решения нелин ейных систем уравнен ий со многими неизвестными. М.: Мир. 1975.
[3]. Д.Ф. Давиденко. Об одном новом методе численного решения систем нелинейных уравнений // ДАН СССР. 1953. Т.88. №4. С. 601-602.
[4]. Д.Ф. Давиденко. О приближенном решении систем нелинейных уравнений // Укр. мат. журн. 1953, Т.5.№2. С. 196-206..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Machine Learning techniques for filtering of unwanted messages in Online Social Networks |
Country | : | India |
Authors | : | Pinniboyina Venkateswarlu || R Lakshmi Tulasi |
Abstract: As of Recent Years, Online Social Networks have transformed into a key bit of step by step life. One key issue in today user wall(s) is to give users the ability to control the messages posted in solitude private space to keep up a vital separation from that undesirable substance is appeared. Up to now userwalls give small support to this need. To fill the fissure, I propose a structure allowing user divider users to have a prompt control on the messages posted on their walls. This is refined through a versatile principle based structure, that allows users to change the filtering criteria to be associated with their walls, and Machine Learning based sensitive classifier actually checking messages in moving of substance based isolating..............
Keywords: Online Social Networks (OSN), Blacklist, online informal organization, Machine learning content arrangement, short content order.
[1]. "A System to Filter Unwanted Messages from OSN User Walls" Marco Vanetti, Elisabetta Binaghi, Elena Ferrari, Barbara Carminati, Moreno Carullo, Department of Computer Science and Communication University of Insubria 21100 Varese, Italy IEEE Transactions On Knowledge And Data Engineering Vol:25 Year 2013
[2]. "Content-Based Filtering in On-line Social Networks" M. Vanetti, E. Binaghi, B. Carminati, M. Carullo and E. Ferrari, Department of Computer Science and Communication University of Insubria 21100 Varese, Italy fmarco.vanetti, elisabetta.binaghi, barbara.carminati, moreno.carullo, elena.ferrarig @uninsubria.it
[3]. Adomavicius, G.and Tuzhilin, "Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions," IEEE Transaction on Knowledge and Data Engineering, vol. 17, no. 6, pp. 734–749, 2005.
[4]. F. Sebastiani, "Machine learning in automated text categorization," ACM Computing Surveys, vol. 34, no. 1, pp. 1–47, 2002.
[5]. M. J. Pazzani and D. Billsus, "Learning and revising user profiles: The identification of interesting web sites," Machine Learning, vol. 27, no. 3, pp. 313–331, 1997.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | I++Mapreduce: Incremental Mapreduce for Mining the Big Data |
Country | : | India |
Authors | : | Prof. Kanchan Dhomse B. |
Abstract: Data mining is an interdisciplinary area of computer engineering. Incremental processing is a challenging approach to refreshing mining results and it uses saved states to avoid the cost of re computation from damage. Here, I propose i2MapReduce is a novel incremental processing expansion to MapReduce in data mining. As compared with the state-of-the-art work on Incoop, instead of using task level re-computation the i2MapReduce executes the key-value pair level incremental processing . It helps not only one-step computation but also more sophisticated iterative computation.............
Keywords: Big data, Incremental Processing, Mapreduce, MRBGraph, Recompilation.
[1]. J. Dean and S. Ghemawat, " Mapreduce: Simplified data processing on large clusters," in Proc. 6th Conf. Symp. Opear. Syst. Des.Implementation, 2004, p. 10.
[2]. M. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M. J. Franklin, S. Shenker, and I. Stoica, "Resilient distributed Datasets : A fault-tolerant abstraction for, in-memory cluster computing," in Proc. 9th USENIX Conf. Netw. Syst. Des. Implementation,2012, p. 2.
[3]. R. Power and J. Li, "Piccolo: Building fast, distributed programs with partitioned tables," in Proc. 9th USENIX Conf. Oper. Syst. Des.Implementation, 2010, pp. 1–14.
[4]. G. Malewicz, M. H. Austern, A. J. Bik, J. C. Dehnert, I. Horn, N. Leiser, and G. Czajkowski, "Pregel: A system for large-scale Graph processing," in Proc. ACM SIGMOD Int. Conf. Manage. Data, 2010, pp. 135–146.
[5]. S. R. Mihaylov, Z. G. Ives, and S. Guha, "Rex: Recursive, deltabased data-centric computation," in Proc. VLDB Endowment, 2012,vol. 5, no. 11, pp. 1280–1291.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Regression Test Suite Prioritization Using Hill Climbing Algorithm |
Country | : | India |
Authors | : | D. Vivekananda Reddy || Dr. A. Rama Mohan Reddy |
Abstract: Regression testing is an expensive, but important action in software testing. Unfortunately, there may be bereft assets to acquiesce for the re-execution of all analysis cases during corruption testing. In this situation, analysis case prioritization techniques aim to advance the capability of corruption testing by acclimation the analysis cases so that a lot of benign are accomplished first. In this cardboard we adduce a new analysis case prioritization technique Using Hill climbing Algorithm. The proposed address prioritizes subsequences of the Original analysis apartment so that the new suite, which is run a time-constrained beheading environment, will accept the above amount of accountability apprehension if compared of randomly Prioritized analysis suites.
Keywords:......
........
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Classification Human Brain Images and Detection Suspicious Abnormal Area |
Country | : | Iraq |
Authors | : | Ata'a A. Hasan || Dr. Dhia A. Jumaa |
Abstract: Magnetic Resonance Images (MRI) are widely utilized in the diagnosis of brain images. In this study we have developed a new approach for automatic classification of the normal and abnormal MRI images. The proposed method consists of four stages namely preprocessing, transformation, texture feature extraction and classification. The first stage is preprocessing image and utilized filter is applied for noise reduction and to make the image suitable for transformation. In the second stage, is utilized Discrete Multiwavelet Transform (DMWT) to reduce the dimensionality. In the third stage, features extraction based combined between first order statics (FOS) and second order statics (SOS). The fourth stage in the classification stage, a supervised probabilistic neural network (PNN) classifier is utilized to classify the experimental images into normal and abnormal..............
Keywords: DMWT, Feature Extraction,PNN,Superpixel.
[1] A. Lashkari, A Neural Network-Based Method for Brain Abnormality Detection in MR Images Using Zernike Moments and Geometric Moments, International Journal of Computer Applications, 4(7), 2010, 1-8.
[2] Q.U. Ain, G. Latif, S.B. Kazmi, M.A.Jaffar, and A.M.Mirza, Classification and Segmentation of Brain Tumor using Texture Analysis, proceedings of the 9th WSEAS International Conference on Artificial Intelligence, Knowledge Engineering and Databases (AIKED), 2010, 147-155.
[3] G. Anandgaonkar and G. Sable,Brain Tumor Detection and Identification from T1 Post Contrast MR Images Using Cluster Based Segmentation,International Journal of Science and Research (IJSR),3(4), 2014, 814-817.
[4] D.B.Kadam, S.S. Gade, M.D. Uplane and R.K. Prasad, Neural Network Based Brain Tumor Detection Using MR Images, International Journal of Computer Science and Communication (IJCSC), 2(2),2011, 325-331.
[5] N. Abdullah, U.K. Ngah and S.A. Aziz, Image Classification of Brain MRI Using Support Vector Machine, IEEE International Conference onImaging Systems and Techniques, 2011, 242-247.