Version-2 (Sep-Oct 2016)
Ver-1 Ver-2 Ver-3 Ver-4 Ver-5 Ver-6
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Discriminant Analysis and Neural Network Based Breast Cancer Classifier Using Electrical Impedance |
Country | : | India |
Authors | : | Praveen C. Shetiye, Ashok A. Ghatol || Vilas N. Ghate |
Abstract: Breast cancer presents a serious medical and social problem worldwide. Early detection is key to effective breast cancer treatment. Therefore, scientists are consistently looking for new diagnostic techniques that would be more efficient, easy to use and safe for the patient. Electrical impedance tomography (EIT) is an attractive alternative modality for breast imaging. The procedure is comfortable; the clinical system cost is a small fraction of the cost of an X-ray system, making it affordable for widespread screening. Artificial neural networks (ANNs) may be good pattern classifiers for this application.........
Keyword: Breast cancer, Electrical impedance, MLP, Discriminant Analysis.
[1] Jemal, A., Murray, T., Ward, E., Tiwari, R.C., Ghafoor, A., Feuer, E.J., Thun, M.J.: Cancer Statistics, 2005. CA: A Cancer Journal for Clinicians 55 (2005) 10–30
[2] M. Cheney, D. Isaacson, and J. C. Newell, "Electrical impedance tomography," SIAM Review, 41(1): 85–101, 1999.
[3] S Kimura, T Morimoto, T Uyama, Y Monden, Y Kinouchi and T Iritani, "Application of electrical impedance analysis for diagnosis of a pulmonary mass", Chest Journal, 105: 16791682, 1995
[4] Y. Kinouchi, T. Iritani, T. Morimoto et al, "Fast in vivo measurement of local tissue impedance using needle electrode", Medical and Biological Engineering and Computing, 35: 486-492, 1997
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Face Recognition Using Convolution Based Dwt and CLBP Feature Vectors |
Country | : | India |
Authors | : | Narayan T Deshpande || Dr. S Ravishankar |
Abstract: The face recognition is an essential criteria to identify a person in recent advanced security systems. In this paper, we propose efficient Face Recognition using Convolution based DWT and CLBP Feature Vectors. Here database images are first applied with DWT then normalized and convolved with the original image to achieve sharpening of images and filtering of high frequency components. The features thus obtained are applied to CLBP which generates more unique features. The same procedure is repeated for test image to obtain unique test features which are compared with database features using Euclidean Distance. The performance parameters are calculated for standard database and it is observed that the proposed method is better in comparison with the existing methods............
Keyword: Convolution, CLBP, DWT, Euclidian Distance, Face etc.
[1]. K. Anil Jain and A. Ross, "Learning User Specific Parameters in a Multi biometric Systems", IEEE Proceedings of International Conference on Image and Signal Processing, pp. 1-5, 2002.
[2]. M. Bicego, U. Castellani, and V. Murino, "Hidden Markov Models and Wavelets for face recognition", 12th International Conference on Image Analysis and Processing (ICIAP), pp. 52-56, 2003.
[3]. Ahmed Shabaan Samra, Salah El Taweel Gad Allah and Rehab Mahmoud Ibrahim, "Face Recognition Using Wavelet Transform, Fast Fourier Transform and Discrete Cosine Transform", IEEE 46th Midwest symposium on circuits and systems, vol. 1, pp. 272-275, 2004.
[4]. Vinay Kumar. B and Shreyas. B. S, "Face Recognition Using Gabor Wavelets", Asilomar conference on signals, systems and computer, pp. 593-597, 2006.
[5]. Lim Song Li and Norashikin Yahya, "Face Recognition Technique using Gabor Wavelets and Singular Value Decomposition (SVD)", IEEE International Conference on Control System, Computing and Engineering, Penang, Malaysia, 2014..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Secure Strategy for Key Pre-Distribution in Wireless Sensor Networks |
Country | : | India |
Authors | : | D.S.S.L.Sruthi || D.Sesha Manoj || I.Ravi Prakash Reddy |
Abstract: Wireless sensor networks (WSN) are a collection of sensor nodes, which is deployed spatially among various environments. WSNs are deployed in environments where wired networks are difficult to set up. They are mainly used to record sensitive information regarding physical or environmental conditions. As they collect sensitive information, secure and accurate transmission of data is important. For secure transmission of data, key management is a corner stone in wireless sensor networks.........
[1]. W. B.kit, Y.Challal, A. Bouabdallah, V. Tarokh, "A Highly scalable Key Pre-Distribution Scheme for Wireless Sensor Networks",
IEEE Transaction on Wireless Communications, vol No. 2, PP.948-959 February 2013.
[2]. Y. Zhou, Y. Fang, and Y. Zhang, "Securing Wireless Sensor Networks: a Survey," IEEE Communication Survey, vol. 10,no.1–
4,pp. 6–28, 2008.
[3]. L. Eschenauer and V. D. Gligor, "A key-Management Scheme for the Distributed Sensor Networks," IEEE Transaction on
Wireless Communications, vol-1, pp. 41–47, 2002.
[4]. H. Chan, A. Perrig, and D. Song, "Random Key Pre-distributions Schemes for Sensor Networks," in Springer Publishers, vol-3, pp.
197–213, 2003.
[5]. W. Du, J. Deng, Y. Han, S. Chen, and P. Varshney, " A Key Pre-Management Scheme for Wireless Sensor Networks using the
Deployment Knowledge," IEEE iConference, pp. 586–597,2004..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Abalone Age Prediction using Artificial Neural Network |
Country | : | India |
Authors | : | Khadija Jabeen || K.Ishthaq Ahamed |
Abstract: Artificial Neural Networks are the intelligent computation systems that can be used to solve various challenging problems such as compression, optimization, classification, pattern recognition and prediction. In this paper, a feed forward multi layer perceptron (MLP) network is used to predict the age of abalone on the basis of various physical attributes. Levenberg-Marquardt back propagation training algorithm (trainlm) is used to train the neural network. The results of experiment show that by increasing the number of hidden layers of the MLP network, the calculated error rate keeps decreasing for each corresponding target value. Thus, the declining error rate indicates that MLP network with Levenberg-Marquardt based Backpropagation algorithm acts as best tool in predicting the age of abalone............
Keyword: Abalone age, prediction, Artificial Neural Network, MLP network, Levenberg-Marquardt Backpropagation algorithm.
[1] A.B.Karthick Anand Babu, 2012. Design and Development of Artificial Neural Network Based Tamil Unicode Symbols Identification System. IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 2, January 2012.
[2] S. Haykin, Neural networks: A comprehensive foundation (2nd Edn., New Jersey: Prentice-Hall, 1999).
[3] Ms.Sonali, B.Maind and Ms.Priyanka Wankar, "Research paper on basic of artificial neural network", International journal on recent and innovation trends in computing and communication, Vol 2 Issue 1 IJRITCC January 2014.
[4] Jitender Singh Yadav, Mohit Yadav, Ankit Jain, Artificial Neural Network. International Journal Of Scientific Research And Education, Volume 1, Issue 6, Pages 108-118, 2013, ISSN (e): 2321-7545.
[5] M. H. Hassoun, Fundamentals of artificial neural networks (Cambridge: MIT Press, 1995)...
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Computer Forensic Investigation on Hard Drive Data Recovery: A Review Study |
Country | : | India |
Authors | : | Anmol bansal || Aastha Agrawal || Mahipal Singh Sankhla || Dr. Rajeev Kumar |
Abstract: Computer Forensics is a science of seeking evidence found in computers and digital storage media. The main challenge before computer forensic investigatorsis to examine digital media with the aim of finding, collecting, preserving, recovering, analyzing and presenting facts about digital information and guaranteeing its accuracy and reliability.It is said that, "Once it is has been deleted it is gone forever!" This statement is not true. Deleted files can actually be recovered if effort to do so is made shortly after deletion. There are several tools and methods by which we can easily recover our data and get our data as it is back.............
Keyword: Computer Forensics, Hard Disk Drive (HDD), Recovery, Data, etc.
[1]. Bhagyashri P. Deshpande, (2013). "The Advanced Way Of Data Recovery", International Journal Of Computer Science And Applications, Vol. 6, No.2, Apr 2013.
[2]. Freeman, William, Long, Darrell, Miller, Ethan, Reed, Benjamin (2001). Strong Security for Distributed File Systems; in Proceedings of the 20th IEEE International Performance, Computing, and Communications Conference (IPCCC 2001), Phoenix, AZ, April 2001, pages 34-40.
[3]. Hasan, Ragib, Lee, Adam J., Myagmar, Suvda, Yurcik, William (2005). Toward a Threat Model for Storage Systems; in Proceedings of the 2005 ACM workshop on Storage security and Magnetic Data Recovery survivability, Fairfax, VA, USA, 2005, pages 94-102.
[4]. Goldschlag, David M., Landwehr, Carl E. (1997). Security Issues in Networks with Internet Access; in Proceedings of the IEEE, Vol. 85, No. 12 (December 1997).
[5]. Charles H. Sobey, LasloOrto, and Glenn Sakaguchi "Drive-Independent Data Recovery: The Current State-of-the-Art", IEEE transactions onMagnetics, IEEE volume 42 February 2006...
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Survey on Energy Efficiency and Cluster Handling in Real Time Wireless Sensor Networks |
Country | : | India |
Authors | : | Janish || Dr. Mamta Katiyar |
Abstract: Wireless networking technology in recent years has seen a thriving development. Wireless sensor networks (WSN) has remote environmental monitoring and target tracking as an important application. This makes sensors smaller and cheaper especially in recent years. These sensors form a network in the wireless interface with which they can communicate with each other. Design of WSN relies heavily on the application such as environment, and it also must consider design objectives, costs, hardware, and factors in which system is constrained. There are so many aspects involved in the wireless sensor networks which need to be readdressed or reviewed for further improvement, generally these are Clustering, Energy saving concepts and Network lifetime. Various researches and journals has been presented so far. In the current paper we are going to enlighten these aspects through survey of research studied that has being done.
Keyword:WSN, Clustering, Network Lifetime, Residual energy, power consumption.
[1]. Chiara Buratti , Andrea Conti , Davide Dardari and Roberto Verdone, " An Overview on Wireless Sensor Networks Technology and Evolution" Sensors, Aug 2009, pp. 6869-6896.
[2]. L. Malathi , R.K. Gnanamurthy , Krishnan Chandrasekaran, " Energy efficient data collection through hybrid unequal clustering for wireless sensor networks" Elsevier, June 2015, pp. 1-18.
[3]. Ameer Ahmed Abbasi and Mohamed Younis, "A survey on clustering algorithms for wireless sensor networks" Elsevier, Computer Communications, June 2007, pp. 2826–2841.
[4]. Giuseppe Anastasi a, Marco Conti b, Mario Di Francesco and Andrea Passarella, "Energy conservation in wireless sensor networks: A survey" Elsevier, Ad Hoc Networks, July 2009, pp. 537–568.
[5]. Chengfa Li, Mao Ye, Guihai Chen and Jie Wu, " An Energy-Efficient Unequal Clustering Mechanism for Wireless Sensor Networks" supported by China Jiangsu Provincial NSF grant (BK2005208), China 973 project (2002CB312002) and TRAPOYT award of China Ministry of Education, and US NSF grants CCR 0329741, CNS 0422762, and CNS 0434533, pp. 1-8.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Security Implication of Social Networking in the Corporate Environment |
Country | : | Australia |
Authors | : | Sanjiv Kumar |
Abstract: Social media offers basic business inclinations to associations and affiliations, furthermore has most likely comprehended security perils. With a particular finished objective to reduce these security risks and still admire the benefits of social media affiliations must develop and maintain extraordinary social media use game plans. In any case, various affiliations are indeterminate of how to make fruitful social media techniques. Maybe, various affiliations either basically confine social media use all around, or have no methodology at all regarding social media usage. Both of these approaches are unacceptable. Affiliations that don't grasp social media disregard to acquire its gigantic points of interest and are inattentive to their opponents that do...........
Keyword: Cybersecurity, Social Network, Corporate, Mitigation.
[1]. Batarfi, O, M. Alshiky, A, A. Almarzuki, A & A. Farraj, N 2014, 'CSRFDtool: Automated Detection and Prevention of a Reflected Cross- Site Request Forgery', International Journal of Information Engineering and Electronic Business, vol. 6, no. 5, pp. 10-15.
[2]. Armstrong, M & Taylor, S 2014, Armstrong's handbook of human resource management practice, 13th edition, Kogan Page, London.
[3]. Bednar-Friedl, B, Kulmer, V & Schinko, T 2012, 'The effectiveness of anti-leakage policies in the European Union: results for Austria', Empirica, vol. 39, no. 2, pp. 233-260.
[4]. Chowdhury, M 2015, 'Information Security Policies',.
[5]. Gomez, C 2015, 'Boost effectiveness of your threat assessment team', Campus Security Report, vol. 12, no. 1, pp. 1-7..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Personalized Offers in Local Shops Using Client-Server" |
Country | : | India |
Authors | : | Aritra kumar || Kuntal Biswas |
Abstract: Everybody loves shopping, in one way or the other. Some prefer clothes, while others may spend hours, searching for that perfect gadget. Shopping uplifts mood, nobody is unhappy after they have bought something that they like. Not so quite recent boom in online shopping portals is the result of the same mindset, i.e. shopping makes people happy, so the experience should be made effortless, secure and accessible to almost everybody with an internet connection. It isn't uncommon to crack a more than decent deal online, using their coupons and discount structure. As a result, the brick-n-mortar stores are facing a very stiff competition, in attracting customers,...........
Keyword: ........
........
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A survey on comparative study of solar energy on Improving the performance of solar power plants through IOT and predictive data analytics |
Country | : | India |
Authors | : | Manohar GS || Dr. M.N.Shanmukha Swamy |
Abstract: To increase the utilization and development of solar energy which is Eco friendly. Weather Predication is done in order to improve the performance and maintain its consistency for long term to deliver secure and reliable power while managing uncertainties. In order to enhance and improve the performance, we need to do preventive maintenance of solar power plant by implementing Operation & Maintenance (O&M) activities using predictive analytics and supervisory control and data acquisition (SCADA). With the help of internet(cloud) along with IOT devices, Operation and maintenance, Supervisory Control And Data Acquisition...........
Keyword: IOT, solar energy, scada, O&M
[1]. T.M. Razykov, "Solar photovoltaic electricity: Current status and future prospects‟, Solar Energy 85 (2011) 1580–1608
[2]. S. Chinnammai, "An Economic Analysis of Solar Energy‟, Journal of Clean Energy Technologies, Vol. 1, No. 1, January 2013
[3]. A. Garro, "Reliability Analysis of Residential Photovoltaic Systems‟, International Conference on Renewable Energies and Power Quality (ICREPQ‟11)
[4]. International Journal of Applied Engineering Research ISSN 0973-4562 Volume 11, Number 7 (2016) pp 4803-4806 © Research India Publications. http://www.ripublication.com
[5]. EMMVEE PV Pvt Ltd (EPPPL PVT LTD) New International Airport Road Bangalore
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Data Analytics on Application Logs for Managing API-related Dependencies |
Country | : | India |
Authors | : | Sreejita Dutta || Subash Prabanantham || Abhas Tandon || Saumya Garg || Arshia Garg |
Abstract: There are innumerable APIs (Application Programming Interface) that are being created every single day as they serve as a rudimentary tool in developing software applications in today's technology-driven industry. Any organization in this industry could own several APIs and managing them could be a cumbersome task. In this paper, we present an end to end solution that takes the example of one such organization and collects API -related data from application logs to solve two problems – first, maintaining and visualization the hierarchy and dependency between APIs and second, detecting failures and anomalies by efficiently traversing through the complete dependency chain.
Keyword: Anomaly Detection, API dependencies, Graph Database, Log Analysis, Time series data analysis
[1]. K.Chodorow, MongoDB: The Definitive Guide (O‟Reilly Media,2013).
[2]. H. Huang and Z. Dong, Research on architecture and query performance based on distributed graph database Neo4j, IEEE CECNet,, 2013, 10.1109/CECNet.2013.6703387.
[3]. B.Schwartz and P. Jinka, Anomaly Detection for Monitoring (O‟Reilly Media,2015).
[4]. J. Guzman and B. Poblete, On-line relevant anomaly detection in the Twitter stream: an efficient bursty keyword detection model, ODD '13 Proceedings of the ACM SIGKDD Workshop on Outlier Detection and Description, 2013, 10.1145/2500853.2500860.
[5]. A.F. Gates, Programming Pig (O‟Reilly Media,2011).
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Problem Domains in Complex Networks |
Country | : | India |
Authors | : | Mini Singh Ahuja |
Abstract: Many real world Networks can be represented with the help of complex networks. Complex networks are special graphs with non trivial topological properties—features that do not occur in simple networks such as lattices or random graphs. Complex Network is a very Young and active area of scientific research which has its roots in graph theory. In this paper most important research domains related to complex networks are reviewed such as Community detection, Influence Maximization, network sampling etc. This paper will help in selecting the research problem in field of complex networks for the researchers who are new to this field
Keyword: Complex Networks, Network models, link prediction
[1]. C. Gkantsidis, M. Mihail, and E. Zegura, "Spectral analysis of internet topologies," in IEEE INFOCOM, 2003.
[2]. S. Voulgaris, A.-M. Kermarrec, L. Massouli´e, and M. van Steen, "Exploiting semantic proximity in peer-to-peer content searching," in IEEE FTDCS, 2004
[3]. P. Boldi and S. Vigna, "The webgraph framework i: compression techniques," in WWW, 2004
[4]. Albert – Laszlo Barabasi and Reka Albert, "Emergence of Scaling in Random Networks", Science, vol. 286 (1999).
[5]. Albert – Laszlo Barabasi and Reka Albert, "Topology of Evolving networks: Local Events and Universality", The American Physical Society, vol. 85, no. 24, 11 December (2000).
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Dynamic Passwords Using Graphics |
Country | : | India |
Authors | : | Abhinav Sharma || Rupali Paunikar || Roni Raj Das || Prerak Sola |
Abstract: Textual passwords are most common method used for authentication. But textual passwords are vulnerable to eves dropping, dictionary attacks, social engineering and shoulder surfing. Graphical passwords are introduced as alternative techniques to textual passwords. Most of the graphical schemes are vulnerable to shoulder surfing. To address this problem, text can be combined with images or colors to generate session passwords for authentication. Session passwords can be used only once and every time a new password is generated. In this paper, two techniques are proposed to generate session passwords using text and colors which are resistant to shoulder surfing. These methods are suitable for Personal Digital Assistants.
Keyword: ........
[1]. R. Dhamija, and A. Perrig. "Déjà Vu: A User Study Using Images for Authentication". In 9thUSENIX Security Symposium, 2000.
[2]. Real User Corporation: Pass faces. www.passfaces.com
[3]. Jermyn, I., Mayer A., Monrose, F., Reiter, M., and Rubin., "The design and analysis of graphical passwords" in Proceedings of USENIX Security Symposium, August 1999.
[4]. A. F. Syukri, E. Okamoto, and M. Mambo, "A User Identification System Using Signature Written with Mouse," in Third Australasian Conference on Information Security and Privacy (ACISP): Springer- Verlag Lecture Notes in Computer Science (1438), 1998, pp. 403-441.
[5]. G. E. Blonder, "Graphical passwords," in Lucent Technologies, Inc., Murray Hill, NJ, U. S. Patent, Ed. United States, 1996.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Analysis and Interpretation of Coronary Artery Blockage using Soft Computing Techniques |
Country | : | India |
Authors | : | Ankur Sharma || Dr.Saurabh Mukherjee |
Abstract: Analysis and interpretation of Myocardial infarction, is very important at the early stage to detect the possible risk for heart attacks. Various non-invasive imaging modalities have been used for better diagnosis. Cardiologist wants better image resolution and detailed descriptions of the ROI (Region of Interest). In the present paper, the images have been pre-processed for further applications like filtering, denoising and deblurring by using various techniques like the usages of average and median filter, soft thresholding for various segmentation coronary blockages...........
Keyword: ........
[1]. Koen Nieman ,"International Task Force for Prevention of Coronary Heart Diseas- MSCT in coronary heart disease," Rotterdam
Feb 2003
[2]. Leo P. Lawler; Harpreet K. Pannu; Elliot K. Fishman Am J Roentgenol,"MDCT Evaluation of the Coronary Arteries, 2004: How
We Do It-Data Acquisition, Postprocessing, Display, and Interpretation ," 2005; 184 (5): 1402-1412. ©2005 American Roentgen
Ray Society
[3]. H. Mahnken, Georg Mühlenbruch, Guido Dohmen, MalteKelm, Joachim E. Wildberger, Rolf W. Günther,"Review article on
Current State of Non-Invasive Coronary MSCT Angiography," Andreas-Technical note.
[4]. Al Moudi M1, Sun Z*,1, Lenzo N2,"Biomedical Imaging and Intervention Journal REVIEW ARTICLE ,Diagnostic value of
SPECT, PET and PET/CT in the diagnosis of coronary artery disease: A systematic review,"Received 18 June 2010; received in
revised form 5 October 2010; accepted 9 October 2010
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Optimization of Routing Protocolbased on K-Anycast for Efficiency Increasing and Wireless Chargeable Sensor Net Security |
Country | : | Iran |
Authors | : | HamedAlinejad || KambizMajidzadeh |
Abstract: Considering that routing and its protocol is the base of digital data transmission, in this article has been tried that role of Routing Protocol based on K-Anycast has been evaluated in optimization of wireless chargeable sensor nets operation.In conventional WSNs, the source nodes select a sink among the sinks for the package delivery.But the K-anycast tries to select the neighbor nodes with the highest possible sink for optimizing the reliability, balance and security.More sensors should be used in data transmission for K-anycast design, that caused the energy consumption rising..........
Keyword: wireless sensor networks, anycast, Ad hoc networks, chargeable sensors, routing, K-anycast.
[1] Yang K. Wireless Sensor Networks[M]. Springer, 2014.
[2] Razzaque M A, Bleakley C, Dobson S. Compression in wireless sensornetworks: A survey and comparative evaluation[J]. ACM Transactions on Sensor Networks (TOSN), 2013, 10(1): 5.
[3] Ganiyu R A, Arulogun O T, Okediran O O, et al. Development of a Wireless Sensor Network for Monitoring Environmental Condition on a Farmland[J]. Development, 2014, 7(3).
[4] Hackmann G, Guo W, Yan G, et al. Cyber-physical codesign of distributed structural health monitoring with wireless sensor networks[J]. Parallel and Distributed Systems, IEEE Transactions on, 2014, 25(1): 63-72.
[5] Wang J C, Lin C H, Siahaan E, et al. Mixed sound event verification on wireless sensor network for home automation[J]. Industrial Informatics, IEEE Transactions on, 2014, 10(1): 803-812.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Using The Pictorial Structures in 3D Human Body Pose Estimation |
Country | : | Iran |
Authors | : | Zahra Ekhtiyari || Havva Alizadeh Noughabi |
Abstract: The processing of estimating the configuration and location of human body from the image, is called human pose estimation. If this pose determined in image space, the 2D pose estimation is done. If the images of human be available from at least two camera views, then the pose of body can be obtained in 3D. Using the pictorial structures in two dimensional estimation of human body is so popular. However during the recent years using the pictorial structures in three dimensional estimation of human body has been interested by the researchers and various methods have been presented. Due to aforementioned sentences, these novel methods have been surveyed and compared in present study............
Keyword: probability estimation, pictorial structure, human body pose estimation.
[1] M. A. Fischler and R. A. Elschlager, The representation and matching of pictorial structures, IEEE Trans. Comput., no. 1, pp. 67–92, 1973.
[2] P. F. Felzenszwalb, R. B. Girshick, D. McAllester, and D. Ramanan, Object detection with discriminatively trained part-based models, Pattern Anal. Mach. Intell. IEEE Trans., vol. 32, no. 9, pp. 1627–1645, 2010.
[3] P. F. Felzenszwalb and D. P. Huttenlocher, Efficient matching of pictorial structures, in Computer Vision and Pattern Recognition, 2000. Proceedings. IEEE Conference on, vol. 2, pp. 66–73, 2000
[4] P. F. Felzenszwalb and D. P. Huttenlocher, Pictorial structures for object recognition, Int. J. Comput. Vis., vol. 61, no. 1, pp. 55–79, 2005.
[5] P. F. Felzenszwalb and D. P. Huttenlocher, Distance Transforms of Sampled Functions., Theory Comput., vol. 8, no. 1, pp. 415–428, 2012.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Presenting A Distributed Algorithm For The Energy Consumption Reduction in Underwater Sensor Networks, Using The Learning Automata in Heterogenic State |
Country | : | Iran |
Authors | : | Zahra Maboudi || Seyed Mahdi Jameii |
Abstract: A sensor network is a set of sensor nodes, which attach to each other via links that may cause energy loss in sensor network.Clustering the nodes is an applicable and effective way that prevents the energy loss. Cluster head relates the clusters and base station. It also collects the gathered data from sensor nodes and send them to the base station. The nodes proximity to the CH and neighborhood considering for nodes are the important problems that the most protocols did not consider them. Suggested algorithm tries to balance the energy consumption and increase the network longevity, considering the neighborhood criterion. This algorithm has the lower energy consumption and longer life than the previous algorithms such as Deterministic Cluster-Head Selection (Leachswdn) and Leach-Sliding window and Dynamic Number of Nodes (Leachdchs). In addition, it had the better performance in data transmission to the base station.
Keyword: underwater sensor network, learning automata, clustering, reduction of energy consumption.
[1] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan.(2000). Energy-efficient Communication Protocol for Wireless Microsensor Networks. in Proc. 33rd Hawaii Int. Conf. Syst. Sci (pp. 1-10).
[2] Aimin Wang, Dailiang Yang, Dayang Sun. (2012). A clustering algorithm based on energy -information and cluster heads expectation for wireless sensor networks. Computers and Electrical Engineering 38 (pp. 662–671).
[3] Kumar, D. (2014). Performance analysis of energy efficient clustering protocols for maximising lifetime of wireless sensor networks. Wireless Sensor Systems, IET, 4(1), 9-16.
[4] Bagci, H., & Yazici, A. (2013). An energy aware fuzzy approach to unequal clustering in wireless sensor networks. Applied Soft Computing, 13(4), 1741-1749.
[5] Chamam, A., and Pierre, S. (2009). A distributed energy-efficient clustering protocol for wireless sensor networks. Computers and Electrical Engineering 36 Journal. (pp, 303-312).
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Segway Robot Designing And Simulating, Using BELBIC |
Country | : | Iran |
Authors | : | Nazanin Moarefi || Ali Yarahmadi || Parisa Esfehani || Maryam Mohabbati |
Abstract: Segway or human transporter is a personal transporter device that was introduced in 2002 by Dean Kamen. This device caused a good revolution in society transportation. Using of these robots is general in many countries around the world. Stability is a vital issue in Segway robots, because they could not keep their balance without a suitable controller and cannot stay balanced. In Segway system, many parameters are supervised and controlled. Various methods have been presented for their balance keeping. In this article, the BELBIC has been used for the robot moving and balancing. The results of that controller using have been stated after that.
Keyword: Segway Robot, Segway Robot Controller, Segway robot balance.
[1] An, W., & Li, Y. (2013, 12-14 Dec. 2013). Simulation and control of a two-wheeled self-balancing robot. Paper presented at the 2013 IEEE International Conference on Robotics and Biomimetics (ROBIO).
[2] Azimi, M. M., & Koofigar, H. R. (2013, 13-15 Feb. 2013). Model predictive control for a two wheeled self balancing robot. Paper presented at the Robotics and Mechatronics (ICRoM), 2013 First RSI/ISM International Conference on.
[3] Ebrahimi, S., & Mardany, A. (2015, 7-9 Oct. 2015). Dynamic modeling and construction of a two-wheeled mobile manipulator, part I: Self-balancing. Paper presented at the Robotics and Mechatronics (ICROM), 2015 3rd RSI International Conference on.
[4] Gong, Y., Wu, X., & Ma, H. (2015, 23-25 Oct. 2015). Research on Control Strategy of Two-Wheeled Self-Balancing Robot. Paper presented at the Computer Science and Mechanical Automation (CSMA), 2015 International Conference on.
[5] Guan, W., Liang, P., & Gao, H. (2015, 23-25 May 2015). Fault-tolerant control of the self-balancing two-wheeled trolley with actuator saturation. Paper presented at the The 27th Chinese Control and Decision Conference (2015 CCDC).
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Review of DNA Computing And Its Application in Complex Problems Solvation, Adelman Problem Solution in Using of DNA Via Experimental Methods |
Country | : | Iran |
Authors | : | Mostafa Omidi || Mohsen Alipour |
Abstract: In this article the using of novel generation of computers will be pointed that use some chips from the DNA type replace to silicon ones. Their structure is similar to biologic DNA.So, it should be possible to generate these DNA strings in lab and uploaded needed information on them and after that the results of DNA string converted to an apprehensible model for human. This process needs working with devices related to biology. Upon to performed experiments, the DNA strings have the considerable speed in calculation than silicon chips and also the return result of these chips always are true.In this article a simple and applied sample will be explained. Also the disadvantages and flaws of these kind of chips will be clarified.
Keyword:Silicon chips, DNA, DNA Computing, Silicon chips, Hamilton path.
[1] Adelman L. Molecular computation of solutions to combinational problems[J]. Science, 1994, 266: 1021-1024.
[2] Ouyang, Q. et al. DNA solution of the maximal clique problem. Science, 1997, 278:542.
[3] Liu, Q. et al. DNA computing on surfaces. Nature, 2000, 403: 175.
[4] Wu, H. An improved surface-based method for DNA computation. Biosystem, 2001, 59:1.
[5] Benenson, Y. et al. Programmable and autonomous computing machine made of biomolecules. Nature, 2001,414:430.
[6] https://en.wikipedia.org/wiki/Polymerase_chain_reaction
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Why NOSQL And The Necessity of Movement Toward The NOSQL Data Base |
Country | : | Iran |
Authors | : | Mostafa Omidi || Mohsen Alipour |
Abstract: The increasing development of substructures, services and applied programs, non-same structure of Data and other problems caused the classic databases sometimes can't response the human demands in huge data saving domain. Therefore, the NOSQL technology has been generated to response two main demand and problem in databases, A: increasing the data volume and demand for complicated saving structure and B: Lack of accountability in relational databases.
Keyword: Data Base, SQL, NOSQL, Big Data, Query, Data Adapter.
[1] Handling-Big-Data-Using-NoSQL report.2015.19-IEEE
[2] Data-adapter-for-querying-and-transformation-between-SQL-and-NoSQL-database report 23 July 2015
[3] BASE-analysis-of-NoSQL-database report J. future.2015.05.03
[4] "MongoDB, MySQL Compare Grid MongoDB. [Online]. Available: http://www.mongodb.org/display/DOCS/MongoDB,+CouchDB,+MySQL+Compare+Grid. [Accessed: 14-Jan-2013]