Review of Different Criteria for Designing Routing Protocols
Review Paper | Journal Paper
Vol.3 , Issue.8 , pp.56-59, Aug-2015
Abstract
Routing is the process of finding optimal path between source and destination. Because of the fact that packet may be necessary to hop or several hops before a packet reach the target, a routing protocol is needed. Routing protocols allow routers to dynamically advertise and discover routes, decide which routes are available and which are the most efficient routes to a target. In this paper we review different existing protocols and their applicability in current scenario.
Key-Words / Index Term
MANET, Routing, Performance, Qualitative, Quantitative Characteristics
References
[1]. Laiali Almazaydeh, Eman Abdelfattah, Manal Al- Bzoor, and Amer Al- Rahayfeh “Performance Evaluation Of Routing Protocols In Wireless Sensor Networks” International Journal of Computer Science and Information Technology, Volume 2, Number 2, April 2010
[2]. Jamal N. Al- Karaki, Ahmed E. kamal,”Routing Techniques In Wireless Sensor Networks:A Survey”,IEEE Wireless Communications December 2004.
[3]. Smt. Rajashree.V. Biradar & Prof V. C. Patil, “Classification and Comparison of routing Techniques in Wireless Ad-hoc Networks”, Proceedings of international Symposium on Ad-hoc Ubiquitous Computing (ISHUC’06), pages 7-11, 2006.
[4]. Yi-Chun Hu, Adrian Perrig, “A Survey of Secure Wireless Ad Hoc Routing”, IEEE Security and Privacy, 2(3): pages 28-39, May/June 2004.
[5]. P. Gupta and P. Kumar, “The capacity of wireless networks”, IEEE Transactions on Information Theory, 46(2): pages 388-394, March 2000.
[6]. G. S. Lauer, “Packet-radio Routing in Communications Networks”, (Ed. M. teenstrup), pages 313–350, 2004.
[7]. Bokureche, “Performance evaluation of routing protocols for ad hoc wireless networks”, ACM Mobile networks application, vol.9, no.4, pages 333-342, august- 2004.
[8]. L. Schwiebert, S. K. S. Gupta, and J. Weinmann, “Reserach challenges in wireless networks of biomedical sensors”, Proceedings of the 7th ACM International Conference on Mobile Computing and Networking (MobiCom ’01), pages 151-165, Rome, Italy, July 2001.
[9]. M. R. Pearlman, Z. J. Haas, P. Sholander and S. S. Tabrizi, “On the Impact of Alternate Path Routing for Load Balancing in Mobile Ad Hoc Networks”, Proceedings of the ACM MobiHoc, pages 3-10, 2000.
[10]. Nasipuri, R. Castaneda, and S. R. Das, “Performance of multipath routing for on-demand protocols in mobile ad hoc networks”, Mobile Networks and Applications, vol. 6, pages 339-349, 2001.
Citation
Suman Saroj, Raj Gaurang Tiwari and Pankaj Kumar, "Review of Different Criteria for Designing Routing Protocols," International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.56-59, 2015.
Analysis of TCI Index Using Landsat8 TIRS Sensor Data of Vaijapur Region
Research Paper | Journal Paper
Vol.3 , Issue.8 , pp.60-64, Aug-2015
Abstract
World is facing drought severity in every year. Drought is hard to predict and it is a very complex natural disaster to understand. It has high impact on human habitat and the agricultural sector. Satellite remote sensing is a revolutionary technology which is helpful for monitor natural disaster on earth from the space. This research study investigates drought severity level in Vaijapur tehsil on the basis satellite drought indicator. This study is focused on Vaijapur tehsil which is coming under scanty rainfall region. The water scarcity in throughout the year has been an unsolved problem for decades. In this research paper we have used Landsat 8 TIRS (Thermal Infrared) Sensor data, to extract the Temperature Condition Index (TCI) of the year 2013-2014. We have collected rainfall and temperature data from Indian Meteorological Department (IMD) web portal.
Key-Words / Index Term
Drought Indices; Landsat 8; TCI; ATCOR
References
[1] Abduwasit Ghulam , Qiming Qin , Timothy Kusky & Zhao ‐Liang Li, “A re ‐examination of perpendicular drought indices,” International Journal of Remote Sensing, Vol. 29, Issue No. 20, 2008, Page No. 6037-6044. DOI: 10.1080/01431160802235811.
[2] Tadesse, T., Brown, J. And Hayes, M., “A new approach for predicting drought-related vegetation stress: integrating satellite, climate, and biophysical data over the US central plains,” ISPRS Journal of Photogrammetry and Remote Sensing, Vol. 59, 2005, Page No. 244–253.
[3] B. Narasimhan, R. Srinivasan, “Development and evaluation of Soil Moisture Deficit Index (SMDI) and Evapotranspiration Deficit Index (ETDI) for agricultural drought monitoring,” Agricultural and Forest Meteorology, Vol. 133, 2005, Page No. 69–88.
[4] M.B. Masud, M.N. Khaliq, H.S. Wheater, “Analysis of meteorological droughts for the Saskatchewan River Basin using univariate and bivariate approaches,” Journal of Hydrology, Vol. 522, 2015, Page No.452–466.
[5] Zhang Xiu-Pinga,Li Rong-Fang a, b, Lei Sheng a,Fu Quna, Wang Xiao-Xiao: The Study of Dynamic Monitor of Rice Drought in Jiangxi Province with Remote Sensing, Procedia Environmental Sciences, Vol, 10, 2011, Page No.1847 – 1853.
[6] Y. Bayarjargal, A. Karnieli, M. Bayasgalan, S. Khudulmur, C. Gandush, C.J. Tucker., “A comparative study of NOAA– AVHRR derived drought indices using change vector analysis,” Remote Sensing of Environment, Vol. 105, (2006) Page No. 9 – 22.
[7] James Storey, Michael Choate and Donald Moe, "Landsat 8 Thermal Infrared Sensor Geometric Characterization and Calibration", Remote Sens. Vol. 6, 2014, Page No.11153-11181; doi:10.3390/rs61111153.
[8] D.P. Roy M.A. Wulder at. al. "Landsat-8: Science and product vision for terrestrial global change research". Remote Sensing of Environment 145 (2014) 154–172of Applied Earth Observation and Geoinformation, Vol. 30 (2014), Page No. 203–216.
[9] Monica Cook, John R. Schott, John Mandel and Nina Raqueno,"Atmospheric Compensation Component of a Land SurfaceTemperature (LST) Product from the Archive", Remote Sens. Vol. 6, 2014, Page No.11244-11266; doi:10.3390/rs61111244
[10] Julia A. Barsi, John R. Schott, Simon J. Hook, Nina G. Raqueno, Brian L. Markham and Robert G. Radocinski 3, "Landsat-8 Thermal Infrared Sensor (TIRS) VicariousRadiometric Calibration", Remote Sens. Vol. 6, 2014, Page No.11607-11626. doi:10.3390/rs61111607
[11] Roy D. P. et al. “Conterminous United States demonstration and characterization of MODIS-based Landsat ETM + atmospheric correction,” Remote Sensing of Environment. Vol. 140, 2014, Page No.433–449.
[12] W. C. Snyder, Z. Wan, Y. Zhang & Y.-Z. Feng, Classification-based emissivity for land surface temperature measurement from space, International Journal of Remote Sensing, Vol.19, Issue No. 14, 1998, Page No. 2753-2774. DOI: 10.1080/014311698214497
[13] Ying xin Gu, Jesslyn F. Brown, James P. Verdin, and Brian Wardlow, "A five-year analysis of MODIS NDVI and NDWI for grassland drought assessment over the central G reat Plains of the United States",Geophysical Research Letters, Vol. 34, 2007, L06407, doi:10.1029/2006GL029127
[14] Ravish Keshri, Sanjay K. Jain, Mahesh Kothari And A.K. Mishra, "Remote sensing satellite (NOAA AVHRR) based drought assessment and monitoring in Southern Rajasthan",International Journal of Agricultural Engineering, Vol. 2 No. 1, 2009, Page No. 50-57.
[15] Khalil1 A.A. 1; M.M. Abdel-Wahab2; M. K. Hassanein1; B.Ouldbdey 3; B. Katlan 3; and Y.H. Essa1. "Drought Monitoring over Egypt by using MODIS Land Surface Temperature and Normalized Difference Vegetation Index," Nature and Science Vol. 11. No.11, 2013, pp 116-122.
[16] Kogan, F. N., “Operational Space Technology for Global Vegetation Assessment. Bull,” Amer. Meteor. Soc., Vol.82, No.9, 2001, Page No. 1949-1964.
[17] Kogan, F. N., “World Droughts in the New Millennium from AVHRR-based Vegetation Health Indices,” Eos, Transactions, Amer. Geophy. Union, Vol. 83, No.48, 2001, Page No. 562-563.
[18] Heim, R. R., “A review of twentieth-century drought indices used in the United States,” Bulletin of the American Meteorological Society, Vol.84, 2002, Page No.1149 −1165.
[19] Map of Maharashtra State. Mumbai: Maharashtra State Chemists and Druggist Association; Available From: http://www.mscda.net/map.html, retrieved May 05. 2015.
[20] Map of Aurangabad District Map, Aurangabad: Collector Office; http://www.aurangabad.nic.in/newsite/index.htm. retrieved May 05. 2015.
[21] Map of India, Online Photo gallery; http://www.imagekb.com/india-map, retrieved May 05. 2015.
[22] Hadjimitsis, D. G., Clayton, C. R. I., and Hope, V. S. “An assessment of the effectiveness of atmospheric correction algorithms through the remote sensing of some reservoirs,” International Journal of Remote Sensing, Vol.25, 2004, Page No.3651–3674.
[23] Minu S1 and Amba Shetty2, "Atmospheric Correction Algorithms for Hyperspectral Imageries: A Review", International Research Journal of Earth Sciences, Vol. 3, Issue 5, 2015, Page No.14-18.
[24] Richter R., “A spatially adaptive fast atmosphere correction algorithm,” International Journal of Remote Sensing, Vol. 11, 1996, Page No.159–166.
[25] Richter R. “Correction of satellite imagery over mountainous terrain,” Applied Optics, 37, 4004−4015, 1998.
[26] Matthew Montanaro, Raviv Levy and Brian Markham, "On-Orbit Radiometric Performance of the Landsat 8 Thermal Infrared Sensor", Remote Sens. Vol. 6, 2014, Page No.11753-11769; doi:10.3390/rs61211753
[27] Bindschadler, R. “Landsat coverage of the earth at high latitudes,” Photogramm. Eng. Remote Sens. Vol.69, 2003, Page No.1333–1340.
[28] Ramesh P. Singh, Sudipa Roy & F.Kogan, “Vegetation and temperature condition indices from NOAA AVHRR data for drought monitoring over India,” International Journal of Remote Sensing, Vol. 24, No.22, 2003, Page No. 4393-4402. DOI: 10.1080/0143116031000084323
[29] Sumanta Das et al. “Geospatial assessment of agricultural drought (A Case Study of Bankura District, West Bengal),” International Journal of Agricultural Science and Research (IJASR) ISSN 2250-0057 Vol. 3. No.1, 2013, Page No.1-28.
[30] Thenkabail et al. “The use of remote sensing data for drought assessment and monitoring in southwest Asia. Colombo, Sri Lanka: International Water Management Institute (IWMI) v, 25p. (IWMI Research Report 085) URL http://www.iwmi.cgiar.org/Publications/IWMI_Research_Reports/PDF/PUB107/RR107.pdf (accessed on 15 May 2015).
[31] Surendra Singh Chaoudhary, P. K. Garg, S. K. Ghosh. “Mapping of agriculture drought using Remote Sensing and GIS,” International Journal of Scientific Engineering and Technology. Vol 1, No.4, 2012, Page No.149-157.
[32] Tucker C. J., & Choudhury B. J., “Satellite remote sensing of drought conditions,” Remote Sensing of Environment, Vol. 23, 1987, Page No. 243 −251.
Citation
Sandeep V. Gaikwad, Kale K.V., Rajesh K. Dhumal and Amol D. Vibhute, "Analysis of TCI Index Using Landsat8 TIRS Sensor Data of Vaijapur Region," International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.60-64, 2015.
Implementation of Kerberos method on DDAS system and search data speedily from extracted Zip data
Research Paper | Journal Paper
Vol.3 , Issue.8 , pp.65-71, Aug-2015
Abstract
Deploying application over the web is increasing day by day. Such deployed application useful for client to store as well as retrieve database to/from particular server. Over the web data stored in distributed manner so flexibility, reliability, scalability and security are important aspects need to be considered while constructed data management system. After analyzing Distributed data aggregation service(DDAS) system which maintain a catalog which is relying on Blobseer it found that it provide a good performance in aspects such as data storage as a Blob (Binary large objects) and fast retrieval of data by data aggregation process. For highly complex analysis and instinctive mining of scientific data, Blobseer act as a repository backend for easy retrieval of data. By using this Kerberos method client will able to done a secure authentication as using this method only authorized clients are able to access distributed database. Kerberos consist of 4 steps i.e. Authentication Key exchange, Ticket granting service Key exchange, Client/Server service exchange and Build secure communication. After that aggregation of data carried out and aggregated data catalog is generated. From that catalog user is able to search a required data and this data in zip file form saved at client side. For zipping purpose Adaptive Huffman method is used (also referred to as Dynamic Huffman method) which is based on Huffman coding. It permits compression as well as decompression of aggregated data.
Key-Words / Index Term
Adaptive Huffman Method; Blobseer; Distributed Database; Kerberos; Data Aggregation
References
[1] Suraj Gulhane, Sonali Bodkhe “DDAS using Kerberos with Adaptive Huffman Coding to enhance data retrieval speed and security” in Proceedings of the IEEE International Conference on International Conference on Pervasive Computing, IEEE Computer Society, 2015.
[2] Florin Pop, Gabriel Antoniu, Vlad Serbanescu, Valentin Cristea, “Architecture of Distributed Data Aggregation Service” in Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, IEEE Computer Society, 2014.
[3] K. Aamodt et al, “The ALICE experiment at the CERN LHC,” JINST, vol. 3, p.S08002,Augest 14,2008.
[4] S. Lanteri, J. Leduc, N. Melab, G. Mornet, R. Namyst, B. Quetier, O. Richard, F. Cappello, E. Caron, M. Dayde, F. Desprez, Y. Jegou, P. Primet, and E. Jeannot,“Grid’5000:Alarge scale and highly reconfigurable grid experimental testbed,” in Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing, ser. GRID’05.Washington,DC,USA: IEEE Computer Society, 2005.[Online].Available:http://dx.doi.org/10.1109/GRID.2005.1542730.
[5] X. Pennec,T. Glatard, and J. Montagnat,“ Efficient services composition for grid-enabled data-intensive applications,” in Proceedings of the IEEE International Symposium on High Performance and Distributed Computing,Jun.2006.[Online].Available:http://hal.archivesouvertes.fr/hal-00683201.
[6] S. Dustdar, W. Hummer, and P. Leitner, “Ws-aggregation: distributed aggregation of web services data,” in Proceedings of the 2011 ACM Symposium on Applied Computing, ser. SAC’11. New York, NY, USA: ACM, 2011.
[7] S. Leo power presentation on Python MapReduce Programming with Pydoop, “Pydoop: a python mapreduce and hdfs api for hadoop”.
[8] G. Antoniu, L. Boug´e, D. Moise, A. Carpen-Amarie, and B. Nicolae, “Blobseer: Next-generation data management for large scale infrastructures,” Author manuscript, published in “Journal of Parallel and DistributedComputing”71,2(2011).
[9] M. Ripeanu, S. Garfinkel, M. R. Palankar, and A. Iamnitchi, “Amazon s3 for science grids: a viable solution?” in Proceedings of the 2008 international workshop on Data-aware distributed computing, ser. DADC ’08. New York, NY, USA: ACM, 2008.
[10] K. Ramamohanarao, S. Venugopal, and R. Buyya, “A taxonomy of data grids for distributed data sharing, management, and processing,” ACM Computer Survey, vol.38, June 2006.
[11] M. Isard, Y. Yu, and P. K. Gunda, “Distributed aggregation for data parallel computing: interfaces and implementations,” in Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles, ser. SOSP ’09.New York, NY, USA: ACM, 2009.
[12] Jaydip Sen “A Robust and Secure Aggregation Protocol for Wireless Sensor Networks” Innovation Lab, TCS Ltd.
[13] N. Chiwande, Prof. Animesh R. Tayal, and Ms. Vidya, “An Approach to Balance the Load with Security for Distributed File System in Cloud,” in Proceedings of 2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies.
[14] Ranjita Bhagwan, Venkata N. Padmanabhan, Krishna P. N. Puttaswamy, “Anonymity-Preserving Data Aggregation using Anonygator,” Computer Science Department, UCSB, †Microsoft Research, India.
[15] Eunmi Choi, Subaji Mohan, Pilsung Kim, SangBum Kim, and Tran Doan Thanh, “A Taxonomy and Survey on Distributed File Systems” in Proceedings of Fourth International Conference on Networked Computing and Advanced Information Management,2008.
[16] Bogdan Nicolae, “BlobSeer: Efficient Data Management for Data Intensive Applications Distributed at Large-Scale,” University of Rennes IRISA, France.
[17] Gonzalo Navarro, Nieves Rodriguez Brisaboa, “New Compression Codes for Text Databases” University of Coruna (Espana).
Citation
Suraj Gulhane and Sonali Bodkhe, "Implementation of Kerberos method on DDAS system and search data speedily from extracted Zip data," International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.65-71, 2015.
Performance Analysis of Machine Learning Algorithms for Predicting Chronic Kidney Disease
Research Paper | Journal Paper
Vol.3 , Issue.8 , pp.72-76, Aug-2015
Abstract
chronic kidney disease refers to the condition of kidneys caused by conditions, diabetes, glomerulonephritis or high blood pressure. These problems may happen gently for a long period of time, often without any symptoms. It may eventually lead to kidney failure requiring dialysis or a kidney transplant to preserve survival time. So the primary detection and treatment can prevent or delay of these complications. The aim of this work is to reduce the diagnosis time and to improve the diagnosis accuracy through classification algorithms. The proposed work deals with classification of different stages in chronic kidney diseases using machine learning algorithms. The experimental results performed on different algorithms like Naive Bayes, Decision Tree, K-Nearest Neighbour and Support Vector Machine. The experimental result shows that the K-Nearest Neighbour algorithm gives better result than the other classification algorithms and produces 98% accuracy.
Key-Words / Index Term
Chronic Kidney Disease (CKD), Machine Learning (ML), End-Stage Renal Disease (ESRD), Cardiovascular disease, data mining, machine learning,
References
[1] John R, Webb M, Young A and Stevens PE, “Unreferred chronic kidney disease: a longitudinal study”, American Journal of Kidney Disease, Vol.5, Issue- 3, 2004, pp.825-35.
[2] Coresh J, Astor BC, Greene T, Eknoyan G and Levey AS, “Prevalence of chronic kidney disease and decreased kidney function in the adult US population: Third National Health and Nutrition Examination Survey”, American Journal Kidney Disease, Vol.1, Issue- 4, 2003, pp.1-12.
[3] De Lusignan S, Chan T, Stevens P, O’Donoghue D, Hague N and Dzregah B, et al. “Identifying patients with chronic kidney disease from general practice computer records” ,Oxford Journals of Family Practice,Vol.3, Issue- 22, 2005, pp.234-241.
[4] Hallan SI, Coresh J, Astor BC, Asberg A, Powe NR and Romundstad S, et al. “International comparison of the relationship of chronic kidney disease prevalence and ESRD risk”, Journal American Society of Nephrology,Vol.17, Issue-8, 2006, pp.2275-2284.
[5] Levin A, Coresh J, Rossert J, et al.“Definition and classification of chronic kidney disease: a position statement from kidney disease”, The New England Journal of Medicine, 2002, pp.36-42.
[6] Miguel A. Estudillo-Valderrama, Alejandro Talaminos-Barroso and Laura M. Roa,“A Distributed Approach to Alarm Management in Chronic Kidney Disease”, IEEE journal of biomedical and health informatics,Vol.18, Issue-6, 2014, pp. 1796-1803.
[7] Christopher A. Harle, Daniel B. Neill and Rema Padman, “Information Visualization for Chronic Disease Risk Assessment”, IEEE Computer Society, 2012, pp.81-85.
[8] Srinivasa R. Raghavan, Vladimir Ladik, and Klemens B. Meyer,“Developing Decision Support for Dialysis Treatment of Chronic Kidney Failure”, IEEE transactions on information technology in biomedicine, Vol. 9, Issue-2, 2005, pp. 229-238.
[9] Ricardo T. Ribeiro, Rui Tato Marinho, and J. Miguel Sanches, “Classification and Staging of Chronic Liver Disease from Multimodal Data”, IEEE transactions on biomedical engineering, Vol. 60, Issue- 5, 2013, pp.1336-134.
[10] Mitri F.G. et al, “Vibro-acoustography imaging of kidney stones in vitro Vibro-acoustography”, IEEE Transactions on Biomedical Engineering 2011.
[11] Chih-Yin Ho, Tun-Wen Pai, Yuan-Chi Peng and Chien-Hung Lee, “Ultrasonography Image Analysis for Detection and Classification of Chronic Kidney Disease”, IEEE conference published on Intelligent and Software Intensive Systems (CISIS),2012, pp.624 – 629.
[12] Al-Hyari and Al-Taee, “Clinical decision support system for diagnosis and management of Chronic Renal Failure”, IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT), 2013, pp.1-6.
[13] Kuo-Su Chen, Yung-Chih Chen and Yang-Ting Chen, “Stage diagnosis for Chronic Kidney Disease based on ultrasonography”, IEEE International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), 2014, pp. 525 – 530.
[14] Anne Rogers, Anne Kennedy, Thomas Blakeman and Christian Blickem, “Non-disclosure of chronic kidney disease in primary care and the limits of instrumental rationality in chronic illness self-management”, ELSEVIER Social Science & Medicine 131, 2015, pp.31-39.
[15] Mohammed Shamim Rahman, Rajan Sharma and Stephen J.D. Brecker,“Transcatheter aortic valve implantation in patients with pre-existing chronic kidney disease”, ELSEVIER International Journal of Cardiology Heart & Vasculature , Vol.5, 2015, pp. 9–18.
[16] Eibe Frank, Ian H. Witten,” Data Mining – Practical Machine Learning Tools and Techniques”, Elsevier, 2005.
[17] Han, J., Kamber, M. Kamber. “Data mining: concepts and techniques”. Morgan Kaufmann Publishers, 2000.
[18] N. Bhatia et al, “Survey of Nearest Neighbour Techniques”, International Journal of Computer Science and Information Security, Vol. 8, , Issue- 2, 2010.
[19] John Shawe-Taylor, Nello Cristianini, “Support Vector Machines and other kernel- based learning methods”, Cambridge University Press, UKS, 2000.
Citation
N. Radha and S. Ramya , "Performance Analysis of Machine Learning Algorithms for Predicting Chronic Kidney Disease," International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.72-76, 2015.
Performance Evaluation of Sensor Node Scalability on Reactive Modified I-Leach Protocol
Research Paper | Journal Paper
Vol.3 , Issue.8 , pp.77-84, Aug-2015
Abstract
Sensor nodes in Wireless Sensor Networks having restricted power, weak computing capacity and reduced storage capacity. Therefore an proficient energy saving method is required to extend the duration of a network. LEACH is one of the popular algorithm, but it's some negatives such as for example each node may possibly not be established often in clusters, even though nodes have different power, CH is selected unreasonably and many other. These limitations are over come in I-LEACH algorithm by which sensor node with higher remaining power, more neighbors and lesser range from Base station is selected as a Cluster Head. I-LEACH algorithm more could be revised and thereby we could reduce the energy consumption of the network. Thus it's be great for prolonging the network lifetime. This research paper has dedicated to increasing the network lifetime by using the reactive I-LEACH protocol. The comparison among LEACH, I-LEACH and proposed method has also been performed based on power usage and network life time. Even in case of node scalability analysis the proposed technique shows rather effective results.
Key-Words / Index Term
Leach, I-Leach, Cluster Head, Energy Efficiency, Reactivity
References
[1] Beiranvand, Z., Patooghy, A. and Fazeli M., “I-LEACH: An Efficient Routing Algorithm to Improve Performance & to Reduce Energy Consumption in Wireless Sensor Networks”, IEEE 5th International Conference on Information and Knowledge Technology, May 2013, pp. 13-18.
[2] Elbhiri, B., Fkihi, S. E., Saadane, A., Lasaad N., Jorio, A., Driss, Aboutajdine, E.R. and Morocco “A New Spectral Classification for Robust Clustering in Wireless Sensor Networks”, IEEE Conference on Wireless and Mobile Networking (WMNC), April 2013, pp. 1-10.
[3] Renold A.P., Poongothai R.and Parthasarathy R., “Performance Analysis of LEACH with Gray Hole Attack in Wireless Sensor Networks”, IEEE 2012 International Conference on Computer Communication an Informatics (ICCCI-2012) on IEEE, Jan 2012.
[4] Sen A., Gupta M.D., and De D., “Energy Efficient Layered Cluster Based Hierarchical Routing Protocol with Dual Sink”, IEEE 5th International Conference on Computer and Devices for Communication (CODEC), IEEE, May 2012.
[5] Kim D. S., Cha H. S. and Yoo S., “Improve Far-Zone LEACH Protocol for energy Conserving” MKE(Ministry of Knowledge Economy) support this research, under the Convergence- ITRC(Convergence Information Technology Research Center) support program supervised by NIPA(National IT Industry Promotion Agency) on IEEE 2012.
[6] Quynh T. N., Phung K. H. and Quoc H. V. “Improvement of Energy Consumption and Load Balance for LEACH in Wireless Sensors Networks” IEEE, ICTC, @012 IEEE, pp. 583-588.
[7] Xu J., Jin N., Lou X., Peng T., Zhou Q. and Chen Y. “Improvement of LEACH protocol for WSN” , IEEE 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2012) on IEEE,2012, pp. 2174 – 2177.
[8] Sikander G., Zafar M. H., Babar M. I. K. and Rashid M. “Comparison of Clustering Routing Protocols for Wireless Sensor Networks”, Proc. Of the IEEE International Conference on Smart Instrumentation , Measurement and Applications (ICSIMA) on IEEE, November 2013
[9] Tripathi M., Battula R. B., Gaur M. S. and Laxmi V “Energy Efficient Clustered Routing for Wireless Sensor Network” 9th International Conference on Mobile Ad-hoc and Sensor Networks on IEEE, 2013, pp. 330-335
[10] Heinzelman W. R., Chandrakasan A. and Balakrishnan H “Energy- Efficient Communication Protocol for Wireless Micro sensor Networks” Proceedings of the 33rd International Conference on System Sciences, IEEE 2000, pp. 1-10
[11] Kodali R. K. and Sarma N “ Energy Efficient Routing Protocols for WSN’s” International Conference on Computer Communication and Informatics (ICCCI -2013), IEEE, Jan 2013
[12] Ahlawat A. and Malik V. “An EXTENDED VICE-CLUSTER SELECTION APPROACH TO IMPROVE V LEACH PROTOCOL IN WSN “, Third International Conference on Advanced Computing & Communication Technologies on IEEE, IEEE 2013, pp. 236 - 240.
[13] HOANG V-T, JULIEN N. And BERRUET P. “Cluster-Head Selection Algorithm to Enhance Energy-Efficiency and Reliability of Wireless Sensor Networks”, European Wireless 2014, pp. 933 – 938
[14] Ruperee A., Nema S. And Pawar S. “ Achieving Energy Efficiency and Increasing Network Life in Wireless Sensor Network”, IEEE International Advance Computing Conference (IACC), 2014 IEEE, pp. 171 – 175
[15] Yadav J., Dr. Dubey S.K. “ Analytical Study of Cluster Head Selection Schemes in Wireless Sensor Networks” International Conference on Signal Propagation and Computer Technology (ICSPCT), 2014 IEEE, pp. 81 – 85
[16] Wang Q., Kulla E., Mino G. And Barolli L. “ Prediction of Sensor Lifetime in Wireless Sensor Networks using Fuzzy Logic” 28th International Conference on Advanced Information Networking and Applications, 2014 IEEE, pp. 1127 – 1131
[17] Sharma T., Kumar B. Berry K., Dhawan A., Rathore R.S. and Gupta V. “Ant Based Cluster Head Election Algorithm in Wireless Sensor Network to avoid redundancy” Fourth International Conference on Communication Systems and Network Technologies, 2014 IEEE, pp. 83 – 88
[18] Kumar D. “ Performance analysis of energy efficient clustering protocols for maximising lifetime of wireless sensor networks” The institute of Engineering and technology 2014, IET Wireless Systems,2014, Vol. 4, pp. 9 - 16
Citation
Jagwant Singh and Jaswinder Singh, "Performance Evaluation of Sensor Node Scalability on Reactive Modified I-Leach Protocol," International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.77-84, 2015.
Face Matching for Similar Faces Evaluation from Videos Using Low Level Facial Geometries
Research Paper | Journal Paper
Vol.3 , Issue.8 , pp.85-89, Aug-2015
Abstract
The enhancement of digital devices and the popularity of social networking sites like Facebook, twitter, Instagram etc. The large numbers of peoples are shearing their images and videos by different social networking sites. The users are very much interested in uploading the images or videos on the internet in which most of the photos and videos contain faces. Thus with the rapidly growing photos and videos on the internet the large scale content base face image retrieval is a facilitating technology for many prominent applications. In this project, our aim is to detect a human face image which is present in the video frame and retrieving the similar human face images from the large scale database. By using human attributes in a systematic and scalable framework. The attribute-enhanced sparse coding is used to improve the performance of face retrieval in the offline stage. With this method the performance improvement to greater extent. Experimenting on public photo and video datasets, the result shows that the implementation of above method by using video.
Key-Words / Index Term
Face image, human attributes, content-based image retrieval, Face image retrieval, Face occurrences in videos
References
[1] D. Wang, S. C. Hoi, Y. He, and J. Zhu, “Retrieval-based face annotation by weak label regularized local coordinate coding,” ACM Multimedia, 2011.
[2] U. Park and A. K. Jain, “Face matching and retrieval using soft biometrics,” IEEE Transactions on Information Forensics and Security,2010.
[3] B.-C. Chen, Y.-H. Kuo, Y.-Y. Chen, K.-Y. Chu, and W. Hsu, “Semi-supervised face image retrieval using sparse coding with identity con-straint,” ACM Multimedia, 2011.
[4] M. Douze and A. Ramisa and C. Schmid, “Combining Attributes and Fisher Vectors for Efficient Image Retrieval,” IEEE Conference onComputer Vision and Pattern Recognition, 2011.
[5] N. Kumar, A. C. Berg, P. N. Belhumeur, and S. K. Nayar, “Describable visual attributes for face verification and image search,” in IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI), Special Issue on Real-World Face Recognition, Oct 2011.
[6] Y. Freund, R.E. Schapire, “Experiments with a New Boosting Algorithm”,In Proc. of the IEEE International Conference on Machine Learning (ICML), pp. 148–156, Bari, Italy, 1996.
[7] P. Viola, M. Jones, “Rapid Object Detection using a Boosted Cascade of Simple Features”, IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2001, pp. 511–518.
[8] J. Zobel and A. Moffat, “Inverted files for text search engines,” ACMComputing Surveys, 2006.
[9] A. Gionis, P. Indyk, and R. Motwani, “Similarity search in high dimensions via hashing,” VLDB, 1999.
[10] J. Sivic and A. Zisserman, “Video google: A text retrieval approach to object matching in videos,” International Conference on Computer Vision, 2003.
[11] D. Lowe, “Distinctive image features from scale-invariant keypoints,” International Journal of Computer Vision, 2003.
[12] L. Wu, S. C. H. Hoi, and N. Yu, “Semantics-preserving bag-of-words models and applications,” Journal of IEEE Transactions on image processing, 2010.
[13] Y.-H. Kuo, H.-T. Lin, W.-H. Cheng, Y.-H. Yang, and W. H. Hsu, “Unsupervised auxiliary visual words discovery for large-scale image object retrieval,” IEEE Conference on Computer Vision and PatternRecognition, 2011.
[14] N. Kumar, A. C. Berg, P. N. Belhumeur, and S. K. Nayar, “Describable visual attributes for face verification and image search,” in IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI), Special Issue on Real-World Face Recognition, Oct 2011.
[15] V. Blanz, S. Romdhani, and T. Vetter, “Face Identification across Different Poses and Illuminations with a 3D Morphable Model,” Proc. IEEE Int’l Conf. Automatic Face and Gesture Recognition, 2002.
[16] A.S. Georghiades, P.N. Belhumeur, and D.J. Kriegman, “From Few to Many: Illumination Cone Models for Face Recognition under Variable Lighting and Pose,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 23, no. 6, pp. 643-660, June 2001.
[17] R. Gross, J. Shi, and J. Cohn, “Quo Vadis Face Recognition?” Proc. Workshop Empirical Evaluation Methods in Computer Vision, Dec.2001.
[18] B. Siddiquie, R. S. Feris, and L. S. Davis, “Image ranking and retrieval based on multi-attribute queries,” IEEE Conference on Computer Vision and Pattern Recognition, 2011.
[19] W. Scheirer, N. Kumar, K. Ricanek, T. E. Boult, and P. N. Belhumeur, “Fusing with context: a bayesian approach to combining descriptive attributes,” International Joint Conference on Biometrics, 2011.
[20] W. Scheirer and N. Kumar and P. Belhumeur and T. Boult, “Multi-Attribute Spaces: Calibration for Attribute Fusion and Similarity Search,” IEEE Conference on Computer Vision and Pattern Recognition, 2012.
[21] W. J. Scheirer, A. Rocha, R.Michaels, and T. E. Boult. Meta-Recognition: The Theory and Practice of Recognition Score Analysis. IEEE TPAMI, 33(8):1689–1695, August 2011.
[22] W. J. Scheirer, A. Rocha, R. Micheals, and T. E. Boult. Robust Fusion: Extreme Value Theory for Recognition Score Normalization. In ECCV, September 2010
[23] Z. Wu, Q. Ke, J. Sun, and H.-Y. Shum, “Scalable face image retrieval with identity-based quantization and multi-reference re-ranking,” IEEE Conference on Computer Vision and Pattern Recognition, 2010.
[24] H. Jegou, M. Douze, and C. Schmid, “Hamming embedding and weak geometric consistency for large scale image search,” European Conference on Computer Vision, 2008.
[25] J. Mairal, F. Bach, J. Ponce, and G. Sapiro, “Online dictionary learning for sparse coding,” ICML, 2009.
Citation
Devendra Sakharkar and Sonali Bodkhe, "Face Matching for Similar Faces Evaluation from Videos Using Low Level Facial Geometries," International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.85-89, 2015.
Affect of Six Sigma Methdology on Reliability and Quality of Product
Research Paper | Journal Paper
Vol.3 , Issue.8 , pp.90-96, Aug-2015
Abstract
Six Sigma at various esteemed organizations merely means a calculation of excellence that strives for near perfection. Six Sigma is a restricted, data-driven move toward methodology for eliminating defects in any process – from developed to transactional and from manufactured goods to service. The statistical representation of Six Sigma describes quantitatively of how a procedure is performed. To attain Six Sigma, a process must not produce more than 3.4 defects per million opportunities. A Six Sigma defect is distinct, no matter at which peripheral of customer stipulation it occurs. A Six Sigma prospect is entire extent of probability for a defect. Six Sigma calculator can be used to design process sigma. Following paper works on different approaches of Six Sigma such as Lean Six Sigma, how it affects the overall customer experience, work and effort when put together in a process. It studies of how Lean and Six Sigma supplement each other and their use at different levels of organization. It focuses on how use of six sigma approach affects reliability; different reliability metrics on which reliability has been measured upon in past and changes which six sigma has induced in. Its overall effect on the working of an organization process and number of failures faced when it is implemented thoroughly.
Key-Words / Index Term
Six sigma, Lean Six Sigma, Reliability metrics
References
[1] Forrest W. Breyfogle Implementing Six Sigma:Smarter Solutions Using Statistical Methods :
[2] 6σ OJT Six Sigma Application – GEPS Playbook,GE Power Systems
[3] Darshak A.Desai,“ Improving productivity and profitability through Six Sigma: experience of a small-scale jobbing Industry”, Int. J. Productivity and Quality Management, Vol. 3, No. 3, (2008)
[4] Coleman, S. (2008). Six Sigma: an opportunity for statistics and for statisticians. Significance,Vol. 5, Issue 2, pp. 94-96
[5] Harry, M. J. (1998, May), “Six-Sigma: A breakthrough strategy for profitability”, Quality Progress, Vol. 31, No. 5, pp. 60-64.
[6] Mrinal Singh Rawat1, Arpita Mittal(2012), “Survey on Impact of Software Metrics on Software Quality,(IJACSA) International Journal of Advanced Computer Science and Applications”,Vol. 3, No. 1
[7] Aasia Quyoum, Mehraj – Ud - Din Dar 9November 2010).” Improving Software Reliability using Software Engineering Approach- A Review , International Journal of Computer Applications (0975 – 8887)”,Volume 10– No.5,
[8] DMADV ,http://www.governica.com/DMADV,8/08/15
[9] DMADV,http://whatis.techtarget.com/definition/DMADV,17/3/15
[10] Reliability,http://www.ausairpower.net/PDF-A/Reliability-PHA.pdf,15/08/15
[11] James V. Earle(2009), “DEVELOPMENT OF A STRATEGIC PLANNING PROCESS MODEL”
[12] International Journal of Quality & Reliability Management, Volume 26, Issue 7 2012
[13] SixSigmaMethodology,http://blog.royaleinternational.com/2013/10/the-six-sigma-methodology.html,18/07/15
[14] Reliability and six sigma, http://reliabilityweb.com/index.php/articles/bridging_the_gap_between_reliability_six_sigma/,19/08/15
[15] Duane Model ,http://reliawiki.org/index.php/Duane_Model,1/8/15
[16] Quality and Six Sigma,http://www.simplilearn.com/quality-assurance-six-sigma-rar91-article,2/08/15
[17] Metrices and Six Sigma,http://www.intechopen.com/books/six-sigma-projects-and-personal-experiences/demystifying-six-sigma-metrics-in-software,20,08/15
[18] Reliablity and six Sigma Relation,http://reliabilityweb.com/index.php/articles/bridging_the_gap_between_reliability_six_sigma/,21/08/15
[19] Zscore,http://stattrek.com/statistics/dictionary.aspx?definition=z%20score,18/08/15
[20] B.Anni Princy, “Software Reliability of Proficient Enactment”, Vol. 5 No.3 Jun-Jul 2014
Citation
Kumar Shashvat, Arshpreet Kaur and Raman Chadha , "Affect of Six Sigma Methdology on Reliability and Quality of Product," International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.90-96, 2015.
A Comparative Study of Spam Detection in Social Networks Using Bayesian Classifier and Correlation Based Feature Subset Selection
Review Paper | Journal Paper
Vol.3 , Issue.8 , pp.97-100, Aug-2015
Abstract
The article gives an overview of some of the most popular machine learning methods (Naïve Bayesian classifier, naïve Bayesian k-cross validation, naïve Bayesian info gain, Bayesian classification and Bayesian net with correlation based feature subset selection) and of their applicability to the problem of spam-filtering. Brief descriptions of the algorithms are presented, which are meant to be understandable by a reader not familiar with them before. Classification and clustering techniques in data mining are useful for a wide variety of real time applications dealing with large amount of data. Some of the application areas of data mining are text classification, medical diagnosis, intrusion detection systems etc. The Naive Bayesian Classifier technique is based on the Bayesian theorem and is particularly suited when the dimensionality of the inputs is high. Despite its simplicity, Naive Bayesian can often outperform more sophisticated classification methods. The approach is called “naïve” because it assumes the independence between the various attribute values. Naïve Bayesian classification can be viewed as both a descriptive and a predictive type of algorithm. The probabilities are descriptive are used to predict the class membership for a untrained data.
Key-Words / Index Term
Bayesian Classifier, Feature Subset Selection, Naïve Bayesian Classifier, Correlation Based FSS, Info Gain, K-cross validation, Spam, Non-Spam
References
[1] Rushdi Shams and Robert Mercer,” Classifying Spam Emails using Text and Readability Features,” IEEE 13th International Conference on Data Mining (ICDM), 2013, pp. 657-666.
[2] Chotirat “ANN” Ratana Mahatana and Dimitrios Gunppulos,” Feature Selection For the Naïve Bayesian Classifier Using Decision Trees,” Applied Artificial Intelligence, Volume-17, 2003, pp. 475-487.
[3] Mehdi Naseriparsa, Amir-Masoud Bidgoli, Touraj Varaee,”A Hybrid Feature Selection Method to Improve Performance of a Group of Classification Algorithms,” International Journal of Computer Applications (0975-8887), Volume 69, No-17, May 2013.
[4] Aakriti Aggarwal and Ankur Gupta, “Detection of DDoS Attack Using UCLA Dataset on Different Classifiers, International Journal of Computer Science and Engineering, Volume-03, Issue-08, August 2015, pp. 33-37.
[5] Ioannis Kanaris, Konstantinos Kanaris, Ioannis Houvardas, And Efstathios Stamatatos, “Words Vs. Character N-Grams For Anti-Spam Filtering,” International Journal on Artificial Intelligence Tools, 2006, pp.1-20.
[6] Mehdi Naseriparsa, Amir-Masoud Bidgoli and Touraj Varaee,” A Hybrid Feature Selection Method to Improve Performance of a Group of Classification Algorithms” International Journal of Computer Applications (0975 – 8887),Volume 69, Issue- 17,May 2013
[7] Sanjeev Dhawan and Meena Devi, “Spam Detection in Social Networks Using Correlation Based Feature Subset Selection,” International Journal of Computer Applications Technology and Research, Volume 4, Issue-8, August 2015, pp. 629-632.
[8] Dipali Bhosale and Roshani Ade,” Feature Selection based Classification using Naive Bayesian, J48 and Support Vector Machine,” International Journal of Computer Applications (0975 – 8887) Volume 99– No.16, August 2014.
[9] Anjana Kumari,” Study on Naive Bayesian Classifier and its relation to Information Gain,” International Journal on Recent and Innovation Trends in Computing and Communication, Volume: 2, Issue- 3, March 2014, pp.601 – 603.
Citation
Sanjeev Dhawan, Kulvinder Singh and Meena Devi, "A Comparative Study of Spam Detection in Social Networks Using Bayesian Classifier and Correlation Based Feature Subset Selection," International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.97-100, 2015.
Speaker Recognition System Techniques and Applications
Review Paper | Journal Paper
Vol.3 , Issue.8 , pp.101-104, Aug-2015
Abstract
Speaker verification is feasible method of controlling access to computer and communication network. It is an automatic process that uses human voice characteristics obtained from a recorded speech signal, as the biometric measurements to verify claimed identity of speaker. It can be classified into two categories, text–dependent and text-independent system. This paper introduces the fundamental concepts of speaker verification for security system. It focuses on techniques and their unique features.
Key-Words / Index Term
Speaker identification, Gamma tone frequency cepstral coefficient, Mel frequency cepstral coefficient
References
[1] Wu Ju, “Speaker Recognition System Based on Mfcc and Schmm.” Symposium on ICT and Energy Efficiency and Workshop on Information Theory and Security,2005, Dublin Ireland, pp. 88 – 92.
[2] R.Mukherje, I.Tanmoy, and R.Sankar, "Text dependent speaker recognition using shifted MFCC." Southeast on,2013, Proceedings ofIEEE,Orlando,FL USA,pp.1-4.
[3] D.A.Reynolds, “Speaker Identification and Verification Using Gaussian Mixture Speaker Models,” Speech Communication, Vol.17,1995, No. 1-2, pp. 91-108.
[4] W. Junqin, and Y.Junjun, “An Improved Arithmetic of Mfcc in Speech Recognitions System.” Electronics, Communications and Control (ICECC), International Conference on.IEEE,2011, ZhejiangChina,pp.719-722.
[5] U.Shrawankar, and V.M. Thakare, “Techniques for Feature Extraction In Speech Recognition System: A Comparative Study.”
International Journal Of Computer Applications In Engineering, Technology And Sciences,Vol. 2, No. 5,2010, pp. 412-418.
[6] H.Hermansky, “Perceptual Linear Predictive (PLP) Analysis of Speech.” Speech Technology Laboratory, Division of Panasonic Technologies, Vol. 87, No. 4, 1990,pp. 1738-1752.
[7] N. Wang, and P.C.Ching, “Robust Speaker Recognition Using Denoised Vocal Source and Vocal Tract Features speaker verification,” IEEE Transaction on Audio Speech and Language processing, Vol. 19, No. 1,2011, pp. 196-205.
[8] M.I. Faraj, and J.Bigun,"Synergy of lip-motion and acoustic features in biometric speech andspeaker recognition."Computers, IEEE Transactions on computers Vol.56, No.9,2007, pp. 1169-1175.
[9]M.S. Sinith,A.Salim,K. GowriShankar,S. Narayanan, and V. Soman,"A novel method for Text-Independent speaker identification using MFCC and GMM."Audio Language and Image Processing (ICALIP), International Conference on. IEEE,Shanghai,2010, pp.292-296.
[10] A.Solomon off,. "Channel compensation for SVM speaker recognition." Odyssey.Vol. 4,2004, pp.57-62.
[11] R.Collobert, andS.Bengio, "SVMTorch: Support vector machines for large-scale regression problems." The Journal of Machine Learning Research ,No.1,2001, pp. 143-160.
[12] D.E.Sturim, and D.A. Reynolds, "Speaker Adaptive Cohort Selection for Tnorm in Text-Independent Speaker Verification."ICASSP ,No.1,USA ,2005, pp.741-744.
[13] G.S.V.S.Sivaram, Thomas, and H.Hermansky, “Mixture of Auto-Associative Neural Networks for Speaker Verification,”INTERSPEECH, Baltimore, USA,2011, pp. 2381-2384.
[14] S.Gfroerer, “Auditory instrumental forensic speaker recognition” Proceedings of Eurospeech,Geneva, 2003,pp. 705–708.
[15] H.R.Bolt,andF.S.Cooper, “Identification of a Speaker by Speech Spectrograms,” American Association for the Advancement in Science, Science, Vol. 166, 1969.pp. 338–344.
[16] D.Charlet, D.Jouvet, and O.Collin, “An Alternative Normalization Scheme in HMM-based Text-dependent Speaker Verification,” Speech Communication, Vol. 31,2000, pp. 113-20.
[17] T.Dutta, “Dynamic Time Warping Based Approach to Text-Dependent Speaker Identification Using Spectrograms,” Congress on Image and Signal Processing, Vol. 2,No.8,2008, pp. 354-60.
[18] M.Ben, M.Betser, F.Bimbot, and G.Gravier, "Speaker diarization using bottom-up clustering based on a parameter-derived distance between adapted GMMs." 2004,Proc. ICSLP, France.
[19] A.A.M. AbushariahT.S,Gunawan, O.O. Khalifa, and M.A.M. Abushariah, “Voice based automatic person identification system using vector quantization”. In Computer and Communication Engineering (ICCCE), International Conference, Kuala Lumpur, 2012,pp. 549–554.
[20] S.Agrawal, A.Shruti,and A.C.Krishna , “Prosodic Features Based Text Dependent Speaker Recognition Using Machine Learning Algorithms,” International Journal of Engineering Science and Technology, Vol. 2,No.10,2010, pp. 5150-5157.
Citation
Sukhandeep Kaur and Anwalvir Singh Dhindsa , "Speaker Recognition System Techniques and Applications," International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.101-104, 2015.
ARM-Cortex Based Control System to Generate Attendance Monitoring System
Review Paper | Journal Paper
Vol.3 , Issue.8 , pp.105-108, Aug-2015
Abstract
The paper presents modelling and implementation of an automated system which can be used to generate attendance monitoring system. ARM NXP CORTEX-M3 LPC1768 version is employed in which RFID module is interfaced along the controller to track the number of absent and present students. The detailed information about the student can be seen on the central computer system as a single application created on Visual Basic which thus can be printed.
Key-Words / Index Term
ARM-Cortex based controller, Visual Basic, RFID module
References
[1] Anil K. Jain, Arun Ross and Salil Prabhakar, “ An introduction to biometric recognition”, Circuits and Systems for Video Technology, IEEE Transactions on vol 14, Issue 1, Jan. 2004.
[2] K.G.M.S.K. Jayawardana, T.N. Kadurugamuwa, R.G. Rage and S. Radhakrishnan, ―Timesheet: An Attendance Tracking System”, Proceedings of the Peradeniya University Research Sessions, Sri Lanka, vol.13, Part II, 18th Dec. 2008.
[3] D. Maltoni, D. Maio, A. K. Jain, S. Prabhaker, “Handbook of Fingerprint Recognition”, Springer, New York, 2003.
[4] A. J. Goldstein, L. D. Harmon, and A. B. Lesk, "Identification of Human Faces,” in Proc. IEEE Conference on Computer Vision and Pattern Recognition, vol. 59, pp 748 – 760, May 1971
[5] M. A. Fischler and R. A. Elschlager, ―The Representation and Matching of Pictorial Structures,” IEEE Transaction on Computer, vol. C-22, pp. 67-92, 1973.
[6] S. Chitresh, K. Amit ,An efficient Automatic Attendance Using Fingerprint Verification Technique ,International Journal on Computer Science and Engineering (IJCSE), 2 (2) (2010), pp. 264–269
[7] Cary D. Snyder,“ARM FAMILY EXPANDS AT EPF” JUNE 3, 2002, http://www.arm.com.
Citation
Amit Kumar Yadav, "ARM-Cortex Based Control System to Generate Attendance Monitoring System," International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.105-108, 2015.