Modified and Adaptive E-learning
Review Paper | Journal Paper
Vol.3 , Issue.5 , pp.55-61, May-2015
Abstract
This manuscript presents modified and adaptive eLearning methods and explanations, which are executed in some modern eLearning schemes. Unit 1 deliberates elementary ideas and dissimilar types of modification. In the unit 2 of the manuscript is labeled an explanation for role- and proficiency based learning customization that uses Web Services method. A method for expansion and enterprise of adaptive learning satisfied is characterized in unit 3. The facility of improved admittance to learning objects necessitates a silhouette to be exhibited and stored for each student and for each group of apprentices. Student demonstrating is deliberated in unit 4. A crucial obligation of learning management systems (LMSs) is modification of students' admission to scholarship stuffs by providing outcomes personalized to the separate or set of students as the answer to hunt demands. Some features of modification can also proceeds even earlier a question is succumbed for assessment. These matters are comprised in unit 5. The latest portion grants how modification methods are applied in Learning Network focused presentations.
Key-Words / Index Term
Adaptive Learning At ease, Modified learning, Modification, Learning Network, Learning Management Systems
References
[1] Gokulan, B.P. ; Dept. of Electr. & Comput. Eng., Nat. Univ. of Singapore, Singapore, Singapore ; Srinivasan, D., “Modified Symbiotic Evolutionary Learning for Type-2 Fuzzy System”, Published in: Systems Journal, IEEE (Volume:8 , Issue: 2 ) Page(s): 353 – 362.
[2] Fang Wang ; Coll. of Shipbuilding Eng., Harbin Eng. Univ., Harbin, China ; Yuru Xu ; Lei Wan ; Ye Li, “Modified Learning of T-S Fuzzy Neural Network Control for Autonomous Underwater Vehicles”, Published in: Information Technology and Computer Science, 2009. ITCS 2009. International Conference on (Volume:1 ) Date of Conference: 25-26 July 2009 Page(s): 361 – 365.
[3] Naihong Wei ; Dept. of Autom., Tsinghua Univ., Beijing, China ; Shiyuan Yang ; Shibai Tong, “A modified learning algorithm for improving the fault tolerance of BP networks”, Published in: Neural Networks, 1996., IEEE International Conference on (Volume:1 ) Date of Conference: 3-6 Jun 1996 Page(s): 247 - 252 vol.1.
[4] Makino, S. ; Res. Center for Appl. Inf. Sci., Tohoku Univ., Sendai, Japan ; Endo, M. ; Sone, T. ; Kido, K., “Continuous speech recognition with modified learning vector quantization algorithm and two-level DP-matching”, Published in: Acoustics, Speech, and Signal Processing, 1992. ICASSP-92., 1992 IEEE International Conference on (Volume: 1) Date of Conference: 23-26 Mar 1992 Page(s): 597 - 600 vol.1.
[5] Adam, A. ; Univ. Teknol. Malaysia, Malaysia ; Shapiai, I. ; Ibrahim, Z. ; Khalid, M., “A Modified Artificial Neural Network Learning Algorithm for Imbalanced Data Set Problem”, Published in: Computational Intelligence, Communication Systems and Networks (CICSyN), 2010 Second International Conference on Date of Conference: 28-30 July 2010 Page(s): 44 – 48.
[6] Jin-Ping Chen ; Dept. of Electr. Eng., Nat. Sun Yat-Sen Univ., Kaohsiung, Taiwan ; Shin-Fu Wu ; Shie-Jue Lee, “Modified learning for discrete multi-valued neuron”, Published in: Neural Networks (IJCNN), The 2013 International Joint Conference on Date of Conference: 4-9 Aug.2013 Page(s):1 – 6.
[7] Cyre, W. ; Dept. of Electr. & Comput. Eng., Virginia Tech., Blacksburg, VA, USA, “Learning grammars with a modified classifier system”, published in: Evolutionary Computation, 2002. CEC '02. Proceedings of the 2002 Congress on (Volume:2 ) Date of Conference: 2002 Page(s): 1366 – 1371
[8] Aizenberg, I. ; Texas A&M Univ. - Texarkana, Texarkana, TX, USA, “Periodic Activation Function and a Modified Learning Algorithm for the Multivalued Neuron”, Published in: Neural Networks, IEEE Transactions on (Volume:21, Issue: 12 ) Page(s): 1939 – 1949.
[9] Aizenberg, I. ; Texas A&M Univ. - Texarkana, Texarkana, TX, USA, “A modified error-correction learning rule for multilayer neural network with multi-valued neurons”, Published in: Neural Networks (IJCNN), The 2013 International Joint Conference on Date of Conference: 4-9 Aug. 2013 Page(s): 1 – 8.
[10] Chih-Ping Chu ; Dept. of Comput. Sci. & Inf. Eng., Nat. Cheng-Kung Univ., Tainan ; Yi-Chun Chang, “A Prediction Mechanism of Adaptive Learning Content in the Scalable E-Learning Environment”, Published in: Advanced Information Networking and Applications Workshops, 2007, AINAW '07. 21st International Conference on (Volume:2 ) Date of Conference: 21-23 May 2007 Page(s): 1029 – 1034.
[11] Chi-Syan Lin ; Nat. Univ. of Tainan, Taiwan ; Ming-Shiou Kuo, “Adaptive networked learning environments using learning objects, learner profiles and inhabited virtual learning worlds”, Published in: Advanced Learning Technologies, 2005. ICALT 2005. Fifth IEEE International Conference on Date of Conference: 5-8 July 2005 Page(s): 116 – 118.
[12] Jun-Ming Su ; Dept. of Inf. & Learning Technol., Nat. Univ. of Tainan, Tainan, Taiwan, “A Self-Regulated Learning System to Support Adaptive Scaffolding in Hypermedia-Based Learning Environments”, Published in: Ubi-Media Computing and Workshops (UMEDIA), 2014 7th International Conference on Date of Conference: 12-14 July 2014 Page(s): 326 – 331.
[13] Ako-Nai, F.; Athabasca Univ., Athabasca, AB, Canada ; Qing Tan ; Pivot, F.C. ; Kinshuk, “The 5R Adaptive Learning Content Generation Platform for Mobile Learning”, Published in: Technology for Education (T4E), 2012 IEEE Fourth International Conference on Date of Conference: 18-20 July 2012 Page(s): 132 – 137.
[14] Yarandi, M. ; Sch. of Comput. Inf. Technol. & Eng., Univ. of East London, London, UK ; Jahankhani, H. ; Tawil, A.-R.H., “An adaptive e-learning Decision support system”, Published in: Interactive Collaborative Learning (ICL), 2012 15th International Conference on Date of Conference: 26-28 Sept. 2012 Page(s): 1 – 5.
[15] Dharani, B. ; Dept. of Comput. Sci. & Eng., Anna Univ., Chennai, India ; Geetha, T.V., “Adaptive learning path generation using colored Petri nets based on behavioral aspects”, Published in: Recent Trends in Information Technology (ICRTIT), 2013 International Conference on Date of Conference: 25-27 July 2013 Page(s): 459 – 465.
[16] Shipin Chen ; Coll. of Educ. Sci. & Technol., China West Normal Univ., Nanchong ; Jianping Zhang, “Ability Assessment Based on CAT in Adaptive Learning System”, Published in: Education Technology and Training, 2008. and 2008 International Workshop on Geoscience and Remote Sensing. ETT and GRS 2008. International Workshop on (Volume:1 ) Date of Conference: 21-22 Dec. 2008 Page(s): 88 – 91.
[17] Kurisu, T.; Grad. Sch. of Sci. & Technol., Hiroshima Inst. of Technol., Hiroshima, Japan ; Matsumoto, S. ; Kashima, T. ; Akiyoshi, M. “A study on constructing user adaptive learning environment to realize sustainable self-study”, Published in: Computational Intelligence and Applications (IWCIA), 2014 IEEE 7th International Workshop on Date of Conference: 7-8 Nov. 2014 Page(s): 131 – 136.
[18] Shipin Chen ; Coll. of Educ. Sci. & Technol., China West Normal Univ., Nanchong ; Jianping Zhang, “The Adaptive Learning System Based on Learning Style and Cognitive State” Published in: Knowledge Acquisition and Modeling, 2008. KAM '08. International Symposium on Date of Conference: 21-22 Dec. 2008 Page(s): 302 – 306.
[19] Wen-Chung Shih ; Dept. of Inf. Sci. & Applic., Asia Univ., Taichung, Taiwan ; Shian-Shyong Tseng ; Chao-Tung Yang ; Liao, A.Y.H., “Generating Adaptive Learning Sheets for Museum Tour Guide in U-learning Grid Environments”, Published in: Wireless, Mobile and Ubiquitous Technologies in Education (WMUTE), 2010 6th IEEE International Conference on Date of Conference: 12-16 April 2010 Page(s): 122 – 126.
[20] Wickremaratne, J. ; Sri Lanka Inst. of Inf. Technol., Colombo ; Wimalaratne, G. ; Goonetilleke, V., “A Blend of Adaptive and Digital Learning Towards Language Proficiency”, Published in: Information and Automation for Sustainability, 2008. ICIAFS 2008. 4th International Conference on Date of Conference: 12-14 Dec. 2008 Page(s): 173 – 178.
[21] Shuiming Zhong ; Inst. of Intell. Sci. & Technol., Hohai Univ., Nanjing, China ; Xiaoqin Zeng ; Shengli Wu ; Lixin Han, “Sensitivity-Based Adaptive Learning Rules for Binary Feedforward Neural Networks”, Published in: Neural Networks and Learning Systems, IEEE Transactions on (Volume:23 , Issue: 3 ) Page(s): 480 – 491.
[22] Szentes, D. ; Dept. of Interoperability & Assistance Syst., Fraunhofer Inst. of Optronics, Syst. Technol. & Image Exploitation IOSB, Karlsruhe, Germany ; Bargel, B.-A. ; Streicher, A. ; Roller, W, “Enhanced test evaluation for web based adaptive learning paths”, Published in: Next Generation Web Services Practices (NWeSP), 2011 7th International Conference on Date of Conference: 19-21 Oct. 2011 Page(s): 352 – 356.
[23] Bergstedt, S. ; Dept. of Comput. Sci., Hamburg Univ., Germany ; Wiegreffe, S. ; Wittmann, J. ; Moller, D., “Content management systems and e-learning systems -a symbiosis?”, Published in: Advanced Learning Technologies, 2003. Proceedings. The 3rd IEEE International Conference on Date of Conference: 9-11 July 2003 Page(s): 155 – 159.
[24] Qinghua Zheng ; MOE KLINNS Lab. & SKLMS Lab., Xi''an Jiaotong Univ., Xi''an ; Bo Dong ; Feng Tian ; Wei Chen, “A service-oriented approach to integration of e-learning Information and Resource Management Systems”, Published in: Computer Supported Cooperative Work in Design, 2008. CSCWD 2008. 12th International Conference on Date of Conference: 16-18 April 2008 Page(s): 1047 – 1052.
[25] Partheeban, N. ; Dept. of Inf. Technol., S.A. Eng. Coll., Chennai, India ; SankarRam, N., “e-Learning management system using web services”, Published in: Information Communication and Embedded Systems (ICICES), 2014 International Conference on Date of Conference: 27-28 Feb. 2014 Page(s): 1 – 7.
[26] Fontenla, J. ; Dept. of Telematic Eng., Univ. of Vigo, Vigo, Spain ; Caeiro, M. ; Llamas, M., “Remote Permission Management in Third-Party Tools and e-Learning Systems”, Published in: Advanced Learning Technologies (ICALT), 2010 IEEE 10th International Conference on Date of Conference: 5-7 July 2010 Page(s): 521 – 522.
[27] Hasegawa, S. ; Res. Center for Distance Learning, JAIST, Japan ; Ochimizu, K., “A learning management system based on the life cycle management model of e-learning courseware”, Published in: Advanced Learning Technologies, 2005. ICALT 2005. Fifth IEEE International Conference on Date of Conference: 5-8 July 2005 Page(s): 35 – 37.
[28] Kaewkiriya, T. ; Fac. of Inf. Technol., Thai Nichi Inst. of Technol., Suanluang, Thailand ; Utakrit, N. ; Tsuji, H., “Experimental evaluation of distributed e-Learning management system”, Published in: TENCON 2011 - 2011 IEEE Region 10 Conference Date of Conference: 21-24 Nov. 2011 Page(s): 1193 – 1197.
[29] Ruoman Zhao ; Coll. of Sci. & Technol., Ningbo Univ., Ningbo, China ; Chuan Zhang, “An Ontology-Based Knowledge Management Approach for E-Learning System”, Published in: Management and Service Science, 2009. MASS '09. International Conference on Date of Conference: 20-22 Sept. 2009 Page(s): 1 – 4.
[30] Uthayakumar, C. ; Sathyabama Univ., Chennai, India ; Sarukesi, K., “An adaptive e-Learning system using knowledge management”, Published in: Trendz in Information Sciences and Computing (TISC), 2011 3rd International Conference on Date of Conference: 8-9 Dec. 2011 Page(s): 70 – 74.
Citation
D.Sindhuja and V.Geetha , "Modified and Adaptive E-learning," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.55-61, 2015.
BUG TRACING
Review Paper | Journal Paper
Vol.3 , Issue.5 , pp.62-66, May-2015
Abstract
Affording to the current setting, open foundation programs revolt is attaining motion in information system epoch. In the arena of program skill, the open foundation programs cannot be overlooked. The thinking overdue open foundation ranges towards superiority and proficiency. In Open Foundation Program growth there is a communal considerate between open foundation Programmers, correspondents and managers that professionally progresses the product quality. However superiority and adeptness of Open foundation programs be contingent upon the bug’s contemporary in the merchandise. Thus considerate and following of organization is energetic development. In Open foundation programs progress tracing of bug is most significant period. Bug Tracing scheme plays an important role in hunting of bugs. Bug succeeding system contains the large amount of substantial about the bug in open foundation programs. Signifying a good bug tracing system for any merchandise will escalation efficiency of program. So we examined the remaining bug tracing classification and find out the restrictions. Later we suggested the framework for bug tracing system based on the restrictions originated in existing bug tracing system.
Key-Words / Index Term
Open foundation programs, Bug tracing system, Bug Report, Bugs, Programmers, Reporter
References
[1] Van Hentenryck, P., “Modularity in Logic Programming”, Publisher : MIT Press Edition : 1 Pages : 15 – 17.
[2] Jann, J. ; IBM Research Division, Thomas J. Watson Research Center, Yorktown Heights, NY, USA ; Dubey, N. ; Burugula, R.S. ; Pattnaik, P., “AHAFS subsystem for enhancing operating system health in the cloud computing era”, Published in: IBM Journal of Research and Development (Volume:54 , Issue: 5 ) Page(s): 6:1 - 6:11.
[3] Tobbicke, R. ; CERN, Geneva, Switzerland, “Distributed file systems: focus on Andrew File System/Distributed File Service (AFS/DFS)”, Published in: Mass Storage Systems, 1994. 'Towards Distributed Storage and Data Management Systems.' First International Symposium. Proceedings., Thirteenth IEEE Symposium on Date of Conference: 1994 Page(s): 23 – 26.
[4] Goh, J.C.H. ; Dept. of Bioeng., Nat. Univ. of Singapore, Singapore, Singapore, “Manpower development for the biomedical industry space”, Published in: Engineering in Medicine and Biology Society (EMBC), 2013 35th Annual International Conference of the IEEE Date of Conference: 3-7 July 2013 Page(s): 3138 – 3141.
[5] Correa, D. ; Indraprastha Inst. of Inf. Technol., New Delhi, India ; Lal, S. ; Saini, A. ; Sureka, A., “Samekana: A Browser Extension for Including Relevant Web Links in Issue Tracking System Discussion Forum”, Published in: Software Engineering Conference (APSEC), 2013 20th Asia-Pacific (Volume:1 ) Date of Conference: 2-5 Dec. 2013 Page(s): 25 – 33.
[6] Sureka, A. ; IIIT-D, New Delhi, India ; Lal, S. ; Agarwal, L., “Applying Fellegi-Sunter (FS) Model for Traceability Link Recovery between Bug Databases and Version Archives”, Published in: Software Engineering Conference (APSEC), 2011 18th Asia Pacific Date of Conference: 5-8 Dec. 2011 Page(s): 146 – 153.
[7] Kefa Lu ; Dept. of Electr. Eng. & Comput. Sci., Univ. of Tennessee, Knoxville, TN, USA ; Qing Cao ; Thomason, M., “Bugs or anomalies? Sequence mining based debugging in wireless sensor networks”, Published in: Mobile Adhoc and Sensor Systems (MASS), 2012 IEEE 9th International Conference on Date of Conference: 8-11 Oct. 2012 Page(s): 463 – 467.
[8] Su, A.P. ; kuo, j. ; Kuen-Jong Lee ; Ing-Jer Huang, “Multi-core software/hardware co-debug platform with ARM CoreSight™, on-chip test architecture and AXI/AHB bus monitor”, Published in: VLSI Design, Automation and Test (VLSI-DAT), 2011 International Symposium on Date of Conference: 25-28 April 2011 Page(s): 1 – 6.
[9] Xin Xia ; Coll. of Comput. Sci. & Technol., Zhejiang Univ., Hangzhou, China ; Lo, D. ; Ming Wen ; Shihab, E., “An empirical study of bug report field reassignment”, Published in: Software Maintenance, Reengineering and Reverse Engineering (CSMR-WCRE), 2014 Software Evolution Week - IEEE Conference on Date of Conference: 3-6 Feb. 2014 Page(s): 174 – 183.
[10] Yuan Tian ; Sch. of Inf. Syst., Singapore Manage. Univ., Singapore, Singapore ; Chengnian Sun ; Lo, D., “Improved Duplicate Bug Report Identification”, Published in: Software Maintenance and Reengineering (CSMR), 2012 16th European Conference on Date of Conference: 27-30 March 2012 Page(s): 385 – 390.
[11] Xiaoyin Wang ; Inst. of Software, Peking Univ., Beijing; Lu Zhang ; Tao Xie ; Anvik, J., “An approach to detecting duplicate bug reports using natural language and execution information”, Published in: Software Engineering, 2008. ICSE '08. ACM/IEEE 30th International Conference on Date of Conference: 10-18 May 2008 Page(s): 461 – 470.
[12] Geunseok Yang ; Dept. of Comput. Sci., Univ. of Seoul, Seoul, South Korea ; Tao Zhang ; Byungjeong Lee, “Towards Semi-automatic Bug Triage and Severity Prediction Based on Topic Model and Multi-feature of Bug Reports”, Published in: Computer Software and Applications Conference (COMPSAC), 2014 IEEE 38th Annual Date of Conference: 21-25 July 2014 Page(s): 97 – 106.
Citation
S.Keerthika and V.Geetha , "BUG TRACING," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.62-66, 2015.
The Effect of SPI in Small Scale Concerns
Review Paper | Journal Paper
Vol.3 , Issue.5 , pp.67-71, May-2015
Abstract
Most of the software evolution concerns everywhere the globe are small scale Concerns. These Concerns are measured as the vital need of the global economy. These small Concerns have understood that refining their procedure and working approaches are critical for their corporate, but they are missing in the information and possessions to gadget it. Efficacious SPI (software process improvement) execution is a superhuman job for these small Concerns in the meantime they are not proficient of capitalizing the price of these plans. There is inadequate information about which novelties are operative, and which issues encouragement the acceptance of SPI in small Concerns. There is adequate indication that the mainstream of minor software Concerns are not appreciative existing ethics as they notice them as presence focused on en route for large Concerns and readings have shown that small Concerns ’ negative observations of progression model values are principally motivated by negative views of price, certification and administration. In this manuscript, we extant the current important SPI procedures for small Concerns assessments, and a projected procedure for future readings.
Key-Words / Index Term
Software Excellence, Small Concerns, SPI, SPI Methodology
References
[1] Osteen, B.J. ; Ramanan, S. ; Jeganathan, K., “Optimizing the Cost of Software Quality - A Path to Delivery Excellence”, Published in: Information Technology: New Generations (ITNG), 2013 Tenth International Conference on Date of Coerence: 15-17 April 2013 Page(s): 754 – 756.
[2] Faulk, Stuart R. ; Dept. of Comput. & Inf. Sci., Oregon Univ., Eugene, OR, USA, “Achieving industrial relevance with academic excellence: lessons from the Oregon master of software engineering”, Published in: Software Engineering, 2000. Proceedings of the 2000 International Conference on Date of Conference: 2000 Page(s): 293 – 302.
[3] Vandenbosch, G.A.E. ; Gillard, R., “Introduction to the antenna center of excellence and the antenna software initiative”, Published in: Microwave Conference, 2004. 34th European (Volume:1 ) Date of Conference: 12-14 Oct. 2004 Page(s): 409 – 412.
[4] Bennett, K.H. ; Res. Inst. for Software Evolution, Durham Univ., UK ; Knight, C. ; Munro, M. ; Xu, J., “Centres of excellence: Research Institute in Software Evolution, University of Durham”, Published in: Computing & Control Engineering Journal (Volume:11, Issue: 4 ) Page(s): 179 – 186.
[5] Wang, Yingxu ; Sch. of Comput., Inf. Syst. & Math., South Bank Univ., London, UK ; King, G. ; Dorling, A. ; Patel, D., “A worldwide survey of base process activities towards software engineering process excellence”, Published in: Software Engineering, 1998. Proceedings of the 1998 International Conference on Date of Conference: 19-25 Apr 1998 Page(s): 439 – 442. Di Nitto, E. ; Sassen, A. ; Traverso, P. ; Zwegers, A., “S-Cube: The Network of Excellence on Software Services and Systems”, Publisher : MIT Press Edition : 1 Pages : 524 – 529.
[6] Cox, J.W.R. ; DRA, Farnborough, UK, “Problems concerning the validation of moment-method models of small aircraft in the HF band”, Published in: Application and Validation of Design Tools for Antennas, IEE Colloquium on Date of Conference: 11 Jun 1993 Page(s): 6/1 - 6/8.
[7] Taxt, H. ; Energy Res., SINTEF, Trondheim, Norway ; Catrinu, M.D. ; Nordgård, D.E., “Overall challenges and recommendations concerning the integration of small scale hydro in MV distribution networks”, Published in: Electricity Distribution (CIRED 2013), 22nd International Conference and Exhibition on Date of Conference: 10-13 June 213 Page(s): 1 – 4.
[8] Charalambous, C.D. ; Dept. of Electr. Eng., McGill Univ., Montreal, Que., Canada ; Elliott, R.J., “Certain results concerning filtering and control of diffusion in small white noise” Published in: Decision and Control, 1997., Proceedings of the 36th IEEE Conference on (Volume:3 ) Date of Conference: 10-12 Dec 1997 Page(s): 2773 - 2778 vol.3.
[9] Hossain, M.K. ; Electr. & Comput. Eng. Dept., Univ. of Memphis, Memphis, TN, USA ; Ali, M.H., “Small scale energy storage for power fluctuation minimization with spatially diverged PV plants”, Published in: Southeastcon, 2013 Proceedings of IEEE Date of Conference: 4-7 April 2013 Page(s): 1 – 6.
[10] Yamamoto, T. ; KDDI R&D Labs. Inc., Fujimino, Japan ; Konishi, S. “Impact of small cell deployments on mobility performance in LTE-Advanced systems”, Published in: Personal, Indoor and Mobile Radio Communications (PIMRC Workshops), 2013 IEEE 24th International Symposium on Date of Conference: 8-9 Sept. 2013 Page(s): 189 – 193.
[11] Ross, L. ; Global Emerging Technol. Inst., “Global investment activities in robotics, nanotechnology and energy”, Published in:
[12] Robotics and Biomimetics (ROBIO). 2005 IEEE International Conference on Date of Conference: 0-0 0 Page(s): xxxviii
[13] Kyun, K.S. ; Electron. & Telecommun. Res. Ins., Dajeon ; Oh Kyoung Seok ; Park Beom Soo ; Chung Ha Jae, “A Win-Win Cooperation Strategy for Big and Small Businesses: 10 Policy Proposals”, Published in: Technology Management for the Global Future, 2006. PICMET 2006 (Volume:1 ) Date of Conference: 8-13 July 2006 Page(s): 311 – 319.
[14] Zurina, R. ; Centre for Adv. Software Eng., Univ. Teknol. Malaysia, Kuala Lumpur, Malaysia ; Ali, R.M. ; Ibrahim, S. “An iSPA model evaluation based on critical success factors and selected criteria to support Malaysia's SME environment”, Published in: Software Engineering and Data Mining (SEDM), 2010 2nd International Conference on Date of Conference: 23-25 June 2010 Page(s): 225 – 230.
[15] Zil-e-Huma ; Int. Islamic Univ., Islamabad, Pakistan ; Bano, M. ; Ikram, N., “Software Process Improvement: A systematic literature review”, Published in: Multitopic Conference (INMIC), 2012 15th International Date of Conference: 13-15 Dec. 2012 Page(s): 459 – 464.
[16] Martins, P.V. ; INESC-ID, Univ. do Algarve, Faro, Portugal ; da Silva, A.R., “PIT-ProcessM: A Software Process Improvement Meta-Model”, Published in:
[17] Quality of Information and Communications Technology (QUATIC), 2010 Seventh International Conference on the Date of Conference: Sept. 29 2010-Oct. 2 2010 Page(s): 453 – 458.
[18] Habib, M. ; Dept. of Comput. Sci., LUMS, Lahore ; Ahmed, S. ; Rehmat, A. ; Khan, M.J., “Blending Six Sigma and CMMI - an approach to accelerate process improvement in SMEs”, Published in: Multitopic Conference, 2008. INMIC 2008. IEEE International Date of Conference: 23-24 Dec. 2008 Page(s): 386 – 391.
[19] Ali, R.Z.R.M. ; Ibrahim, S., “An application tool to support the implementation of integrated software process improvement for Malaysia's SME”, Published in: Software Engineering (MySEC), 2011 5th Malaysian Conference in Date of Conference: 13-14 Dec. 2011 Page(s): 177 – 182.
Citation
S.Elakkiya and V.Geetha , "The Effect of SPI in Small Scale Concerns," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.67-71, 2015.
Changeability in Software Structural Design
Review Paper | Journal Paper
Vol.3 , Issue.5 , pp.72-78, May-2015
Abstract
In the software creation line area, the notion of Changeability is well documented. Though, Changeability in the background of software structural design still appears to be poorly unstated. In this manuscript, we purpose at subsidizing to the expansion of a basic considerate of the notion of Changeability in the software structural design area, outside the knowledge of product appearances. We achieve an initial investigative study which involves of two parts: a skilled survey between 11 themes, and a mini prominence group with 4 contributors. For both portions, we gather and examine mostly qualitative facts. Our annotations designate that there appears to be no shared sympathetic of “Changeability” in the situation of software structural design. On the added indicator, some tasks connected to Changeability in software structural design are comparable to tasks identified in the merchandise line province. Changeability in software structural design strength necessitate more hypothetical fundamentals in order to inaugurate “Changeability” as an architectural key awareness and first-class superiority characteristic.
Key-Words / Index Term
Software Structural Design,Changeability,Product Outlines,Survey,Mini Attention Cluster
References
[1] Baelen, W. ; Drexel Univ., Philadelphia, PA, USA ; Yuanfang Cai, “Simulating Structural Design Evolution of Software”, Published in: Software Architecture (WICSA) and European Conference on Software Architecture (ECSA), 2012 Joint Working IEEE/IFIP Conference on Date of Conference: 20-24 Aug. 2012 Page(s): 258 – 261
[2] Kramer, C. ; Software Eng. Dept., Computec GmbH, Karlsruhe, Germany ; Prechelt, L., “Design recovery by automated search for structural design patterns in object-oriented software”, Published in: Reverse Engineering, 1996., Proceedings of the Third Working Conference on Date of Conference: 11-10 Nov. 1996 Page(s): 208 – 215.
[3] Bo Chen ; Dept. of Mech. Eng. - Eng. Mech., Michigan Technol. Univ., Houghton, MI ; Tomizuka, M., “OpenSHM: Open Architecture Design of Structural Health Monitoring Software in Wireless Sensor Nodes”, Published in: Mechtronic and Embedded Systems and Applications, 2008. MESA 2008. IEEE/ASME International Conference on Date of Conference: 12-15 Oct. 2008 Page(s): 19 – 24.
[4] Bonfatti, F. ; Dipartimento di Sci. dell''Ingegneria, Modena Univ., Italy ; Monari, P.D. ; Gadda, G., “Bridging structural and software design of PLC-based system families”, Published in: Engineering of Complex Computer Systems, 1995. Held jointly with 5th CSESAW, 3rd IEEE RTAW and 20th IFAC/IFIP WRTP, Proceedings., First IEEE International Conference on Date of Conference: 6-10 Nov 1995 Page(s): 377 – 384.
[5] Morton, S.D. ; Appl. Dynamics Int., Ann Arbor, MI, USA, “Enhanced software design reusability in safety-critical embedded applications using automated structural test generation”, Published in: AUTOTESTCON '99. IEEE Systems Readiness Technology Conference, 1999. IEEE Date of Conference: 1999 Page(s): 755 – 767.
[6] Birmingham, R.W. ; Dept. of Marine Technol., Newcastle upon Tyne Univ., “Software assisted evaluation in structural design”, Published in: Knowledge-Based Approaches to Automation in Construction, IEE Colloquium on Date of Conference: 9 Jun 1995 Page(s): 3/1 - 3/3.
[7] Mehta, A.M. ; DelPreto, J. ; Shaya, B. ; Rus, D., “Cogeneration of mechanical, electrical, and software designs for printable robots from structural specifications”, Published in: Intelligent Robots and Systems (IROS 2014), 2014 IEEE/RSJ International Conference on Date of Conference: 14-18 Sept. 2014 Page(s): 2892 – 2897.
[8] Singh, P.B. ; Dept. of Comput. Sci. & Eng., Motilal Nehru Nat. Inst. of Technol., Allahabad ; Chaudhary, B.D., “Singh, P.B. ; Dept. of Comput. Sci. & Eng., Motilal Nehru Nat. Inst. of Technol., Allahabad ; Chaudhary, B.D.”, Published in: Digital Society, 2009. ICDS '09. Third International Conference on Date of Conference: 1-7 Feb. 2009 Page(s): 283 – 288.
[9] Hak Ju Kim ; Pittsburgh Univ., PA, USA, “Measuring complementarity in network design using structural equation modeling (SEM) technique with LISREL software”, Published in: Telecommunications, 2003. ICT 2003. 10th International Conference on (Volume:2 ) Date of Conference: 23 Feb.-1 March 2003 Page(s): 1513 - 1519 vol.2.
[10] Hongxu Wang ; Baoding Electric Power&Voc.&Tech College, China ; Xiaoqiang Tang ; Tianru Hu, “Structural design of distributed software system based on component”, Published in: Cyberspace Technology (CCT 2013), International Conference on Date of Conference: 23-23 Nov. 2013 Page(s): 444 – 447.
[11] Kabaili, H. ; Dept. of IRO, Montreal Univ., Que., Canada ; Keller, R.K. ; Lustman, F., “Cohesion as changeability indicator in object-oriented systems”, Published in: Software Maintenance and Reengineering, 2001. Fifth European Conference on Date of Conference: 2001 Page(s): 39 – 46.
[12] Ajrnal Chaumun, M. ; Dept. d''Inf. et de Recherche Oper., Montreal Univ., Que., Canada ; Kabaili, H. ; Keller, R.K. ; Lustman, F., “Design properties and object-oriented software changeability”, Published in: Software Maintenance and Reengineering, 2000. Proceedings of the Fourth European Date of Conference: Feb 2000 Page(s): 45 – 54.
[13] Hebig, R. ; Hasso Plattner Inst., Univ. of Potsdam, Potsdam, Germany ; Gabrysiak, G. ; Giese, H., “Towards patterns for MDE-related processes to detect and handle changeability risks”, Published in: Software and System Process (ICSSP), 2012 International Conference on Date of Conference: 2-3 June 2012 Page(s): 38 – 47.
[14] Xiaobing Sun ; Sch. of Comput. Sci. & Eng., Southeast Univ., Nanjing, China ; Bixin Li ; Qiandong Zhang, “A Change Proposal Driven Approach for Changeability Assessment Using FCA-Based Impact Analysis”, Published in: Computer Software and Applications Conference (COMPSAC), 2012 IEEE 36th Annual Date of Conference: 16-20 July 2012 Page(s): 328 – 333.
[15] Fitzgerald, M.E. ; Syst. Eng. Advancement Res. Initiative (SEAri), Massachusetts Inst. of Technol., Cambridge, MA, USA ; Ross, A.M., “Mitigating contextual uncertainties with valuable changeability analysis in the multi-epoch domain”, Published in: Systems Conference (SysCon), 2012 IEEE International Date of Conference: 19-22 March 2012 Page(s): 1 – 8.
[16] Chhabra, J.K. ; Dept. of Comput. Eng., Nat. Inst. of Technol., Kurukshetra, India ; Parashar, A., “Prediction of changeability for object oriented classes and packages by mining change history”, Published in: Electrical and Computer Engineering (CCECE), 2014 IEEE 27th Canadian Conference on Date of Conference: 4-7 May 2014 Page(s): 1 – 6.
[17] Maeshiro, T. ; Evolutionary Syst. Dept., ATR Human Inf. Process. Labs., Kyoto, Japan, “The importance of the robustness and changeability in evolutionary systems” Published in: Systems, Man, and Cybernetics, 1998. 1998 IEEE International Conference on (Volume:3 ) Date of Conference: 11-14 Oct 1998 Page(s): 2342 - 2347 vol.3.
[18] Ajrnal Chaumun, M. ; Dept. d''Inf. et de Recherche Oper., Montreal Univ., Que., Canada ; Kabaili, H. ; Keller, R.K. ; Lustman, F., “A change impact model for changeability assessment in object-oriented software systems”, Published in: Software Maintenance and Reengineering, 1999. Proceedings of the Third European Conference on Date of Conference: 1999 Page(s): 130 – 138.
[19] Bracke, S. ; Dep. of Risk Manage. & Safety Eng., Wuppertal, Germany ; Haller, S., “Field damage analysis (FDA) concept: Analysis of complex damage causes”, Published in: Reliability and Maintainability Symposium (RAMS), 2011 Proceedings – Annual Date of Conference: 24-27 Jan. 2011 Page(s): 1 – 7.
Citation
K.Sitharanjani and V.Geetha , "Changeability in Software Structural Design," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.72-78, 2015.
A survey on Robotic Vehicles in Autonomous Navigation
Survey Paper | Journal Paper
Vol.3 , Issue.5 , pp.79-84, May-2015
Abstract
This paper deals with the survey based on Robotic navigation the various types of mobility related procedures that are existing for this particular purpose. The paper further explores the vehicles built with robotic technology, its requirement and an existing project that implements the various concepts and principles. The paper presents an overview of the Google Self Driving Car and its principles and further discusses the impact of Radar/LiDAR fusion algorithm in enabling the efficiency of the existing projects that are done in this domain.
Key-Words / Index Term
Radar, LiDAR etc
References
[1]aBiomimeticsaa[online]. http://en.wikipedia.org/wiki/Biomimetics, Last accessed : 07/12/2014.
[2] Daniel G¨ohring, Miao Wang, Michael Schn¨urmacher, Tinosch Ganjineh, “Radar/Lidar Sensor Fusion for Car-Following on Highways”, ISBN: 978-1-4577-0329-4, pp 407 - 412, December 2011.
[3] How Google's Self-Driving Car Works [online]. http://spectrum.ieee.org/automaton/robotics/artificialintelligence/how-google-self-driving-car-works,Last accessed: 07/012/2014.
[4] Ken Goldberg, Ben Kehoe, “Cloud Robotics and Automation: A Survey of Related Work”, UCB/EECS-2013-5, May 2013.
[5]aNavigationaa[online]. http://en.wikipedia.org/wiki/Navigation , Last accessed: 07/12/2014.
[6]aOlivier Lefebvre, Florent LAMIRAUX, Cedric Pradalier, Thierry Fraichard, “Obstacles Avoidance for Car-Like Robots. Integration and Experimentation on Two Robots”, ISSN: 1050-4729, IEEE, pp. 4277 – 4288 Volume 5, May 2005.
[7]aRobotic Vehicles [online]. http://www.wtec.org/robotics/ , Last accessed: 07/12/2014.
Citation
Nupur Choudhury, Rupesh Mandal2, "A survey on Robotic Vehicles in Autonomous Navigation," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.79-84, 2015.
Obviate SLA violation for Resource Allocation based on SaaS in Cloud Environment
Research Paper | Journal Paper
Vol.3 , Issue.5 , pp.85-88, May-2015
Abstract
Cloud Computing is an emerging way of storing data, but still it on the verge of improving with every development. Taken in an account for performing more profit, as providing services to various users are difficult because it should in a manner though all can benefit in their work. Allocation is tedious task due to: 1) Diversity in resource allocation. 2) Hard to map request 3) frequent change in customer. Cloud level of agreement done throughout the Service Provided, SLA provide a standard way of controlling the mechanism. This paper deal with an allocation of resource considering a token like price, response time, space and contract length. As all the type of user can benefit the more of the system resource.
Key-Words / Index Term
SLA (Service Level Agreement); Resource Allocation; Cloud Computing;
References
[1] Y.C. Lee, C. Wang, A.Y. Zomaya and B.B. Zhou, “Profit-driven Service Request Scheduling in Clouds”. In Proceedings of the International Symposium on Cluster and Grid Computing, (CCGrid 2010), Melbourne, Australia.
[2] Linlin Wu, Saurabh Kumar Garg and Rajkumar Buyya, “SLA-based Resource Allocation for Software as a Service Provider (SaaS) in Cloud Computing Environments” in Proceedings of the 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing.
[3] Kimish Patel and Murli Annavaram, “NFRA:Generalized Network Flow-Based Resource Allocation for Hosting Centers” in IEEE TRANSACTIONS ON COMPUTERS, VOL 62, NO. 9, SEPTEMBER 2013.
[4] Vincent C. Emeakaroha, Ivona Brandic, Michael Maurer and Ivan Berskovic, “SLA-Aware Application Deployment and Resource Allocation in Clouds”, in proceedings of 35th IEEE Annual Computer Software and Applications Conference Workshops, 2011.
[5] Rodrigo N. Calheiros, Rajiv Ranjan, Anton Beloglazov, Cesar A. F. De Rose, and Rajkumar Buyya, CloudSim: A Toolkit for Modeling and Simulation of Cloud Computing Environments and Evaluation of Resource Provisioning Algorithms, Software: Practice and Experience (SPE), Volume 41, Number 1, Pages: 23-50, ISSN: 0038-0644, Wiley Press, New York, USA, January, 2011.
[6] C. Vecchiola, X.C. Chu, M. Mattess, and R. Buyya, “Aneka Integration of Private and Public Clouds”, Cloud Computing Principles and Paradigms, Willy, USA, 2011
Citation
Faraz Khatri, Faraz Shaikh, Deepak Yadav, Pramod Murkute, "Obviate SLA violation for Resource Allocation based on SaaS in Cloud Environment," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.85-88, 2015.
Agriculture Automation and Crop Monitoring using Android
Survey Paper | Journal Paper
Vol.3 , Issue.5 , pp.89-92, May-2015
Abstract
The objective of the paper is to present a conceptual model of a micro controller based equipment which will monitor the crop. Analyzing the climatic data allows us to provide real-time information about the state of crop both in quality and quantity, with the possibility of early warning on alarm situations so that timely interventions can be planned and undertaken. In the proposed system we are using different sensors to monitor the temperature, humidity and irrigation process. Temperature sensor is used in monitoring the crop’s soil temperature and humidity sensor, monitoring humidity level of soil. So we are integrating all the major factors that influence crop yielding to get a better overall monitoring capability to reduce manual labor involved in agriculture. This simply increases the cost effectiveness, water efficiency, convenience and the ability for the farmers to be absent from fields occasionally. If any abnormality is found, irrigation process will stop automatically.
Key-Words / Index Term
Irrigation, Android, Crop Monitoring
References
[1] Suhinthan Maheswararajah, Saman K. Halgamuge, Member, IEEE, Kithsiri B. Dassanayake, and David Chapman,Management of Orphaned-Nodes in Wireless Sensor Networks for Smart Irrigation Systems,IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 10, OCTOBER 2011
[2] Virupakshagowda C. Patil, Khalid A. Al-Gaadi, Rangaswamy Madugundu, ElKamil H. M. Tola, Samy Marey, Ali Aldosari, Chandrashekhar M. Biradar, and Prasanna H. Gowda Assessing Agricultural Water Productivity in Desert Farming System of Saudi Arabia,IEEE JOURNAL OF SELECTED TOPICS IN APPLIED EARTH OBSERVATIONS AND REMOTE SENSING, VOL. 8, NO. 1, JANUARY 2015
[3] Sabrine Khriji,ET AL Published in IET Science, Measurement and Technology,17th January 2014,ISSN 1751-8822
[4] Vandana Tomar, Vinay Prasad Mandal, Pragati Srivastava, Shashikanta Patairiya, Kartar Singh, Natesan Ravisankar, Natraj Subash, and Pavan Kumar, Member, IEEE Rice Equivalent Crop Yield Assessment Using MODIS Sensors’ Based MOD13A1-NDVI Data,IEEE SENSORS JOURNAL, VOL. 14, NO. 10, OCTOBER 2014,3599
[5] K.Prathyusha1, M. Chaitanya Suman2 , Design of Embedded Systems for the Automation of Drip Irrigation,INTERNATIONAL JOURNAL OF APPLICATION OR INNOVATION IN ENGINEERING AND MANAGEMENT,Volume 1,Issue 2,,October 2012 ISSN 2319-4847
[6] R.suresh, S.Gopinath, K.Govindaraju, T.Devika, N.SuthanthiraVanitha, GSM based Automated Irrigation Control using Raingun Irrigation System,International Journal of Advanced Research in Computer and Communication Engineering,Vol. 3, Issue 2, February 2014
[7] Jonathan A. Enokela, Isaiah I. Tsavwua, Simon A. Onyilo , The Implementation of a Control Circuit for a Microcontroller Based Automated Irrigation System,International Journal of Emerging Technology and Advanced Engineering,Volume 4, Issue 6, June 2014,ISSN 2250-2459.
Citation
Prabhu L, Pravin Shankar, Vanmathi C and Mangayarkarasi R, "Agriculture Automation and Crop Monitoring using Android," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.89-92, 2015.
Embryonic Spatial-Chronological Prototypes for Activity Recognition
Survey Paper | Journal Paper
Vol.3 , Issue.5 , pp.93-97, May-2015
Abstract
This manuscript offerings an claim of image grounded nursing of enduring maintenance capability inhabitants. We advance a procedure to notice proceedings of attention, predominantly falls by ageing populations. The procedure uses a max-margin embryonic adjustable method with spatial chronological positions of the person in the audiovisual as embryonic variables. The freshly established Act Series descriptor is employed as an amusing feature depiction for each edge. Experiential results determine the efficiency of this manner.
Key-Words / Index Term
Spacio Temporal, Localization, Survailance
References
[1] Okutomi, M. ; Graduate Sch. of Inf. Sci. & Eng., Tokyo Inst. of Technol., Japan ; Sugimoto, S., “Shape recovery of rotating object using weighted voting of spacio-temporal images”, Published in: Pattern Recognition, 2000. Proceedings. 15th International Conference on (Volume:1 ) Date of Conference: 2000 Page(s): 790 - 793 vol.1.
[2] Beck, A.B. ; Centre for Robot Technol., Danish Technol. Inst., Odense, Denmark ; Risager, C. ; Andersen, N.A. ; Ravn, O., “Spacio-temporal situation assessment for mobile robots”, Published in: Information Fusion (FUSION), 2011 Proceedings of the 14th International Conference on Date of Conference: 5-8 July 2011 Page(s): 1 – 8.
[3] Umeda, Y. ; Dept. of Comput. Sci., Meiji Univ., Kawasaki, Japan ; Arakawa, K., “Removal of film scratches using exemplar-based inpainting with directional median filter”, Published in: Communications and Information Technologies (ISCIT), 2012 International Symposium on Date of Conference: 2-5 Oct. 2012 Page(s): 6 – 11.
[4] Andersson, M. ; FOI, Linkoping, Sweden ; Patino, L. ; Burghouts, G.J. ; Flizikowski, A., “Activity recognition and localization on a truck parking lot”, Published in: Advanced Video and Signal Based Surveillance (AVSS), 2013 10th IEEE International Conference on Date of Conference: 27-30 Aug. 2013 Page(s): 263 – 269.
[5] Oikonomopoulos, A. ; Comput. Dept., Imperial Coll. London, London, UK ; Patras, I. ; Pantic, M., “An implicit spatiotemporal shape model for human activity localization and recognition”, Published in: Computer Vision and Pattern Recognition Workshops, 2009. CVPR Workshops 2009. IEEE Computer Society Conference on Date of Conference: 20-25 June 2009 Page(s): 27 – 33.
[6] Macho, D. ; TALP Res. Center, Univ. Politecnica de Catalunya, Barcelona ; Padrell, J. ; Abad, A. ; Nadeu, C., “Automatic Speech Activity Detection, Source Localization, and Speech Recognition on the Chil Seminar Corpus”, Published in: Multimedia and Expo, 2005. ICME 2005. IEEE International Conference on Date of Conference: 6-6 July 2005 Page(s): 876 – 879.
[7] Yurtman, A. ; Elektr. ve Elektron. Muhendisligi Bolumu, Bilkent Univ., Ankara, Turkey ; Barshan, B., “Human activity recognition using tag-based localization”, Published in: Signal Processing and Communications Applications Conference (SIU), 2012 20th Date of Conference: 18-20 April 2012 Page(s): 1 – 4.
[8] Torok, A. ; Bay Zolten Nonprofit Ltd. for Appl. Res., Budapest, Hungary ; Nagy, A. ; Kovats, L. ; Pach, P., “DREAR - Towards Infrastructure-Free Indoor Localization via Dead-Reckoning Enhanced with Activity Recognition”, Published in: Next Generation Mobile Apps, Services and Technologies (NGMAST), 2014 Eighth International Conference on Date of Conference: 10-12 Sept. 2014 Page(s): 106 – 111.
[9] Zhu, Y. ; Y. Zhu is with the Department of Electrical and Engineering, University of California, Riverside.(email:yzhu010@ucr.edu); Nanyak, N. ; Roy-Chowdhury, A., “Context-Aware Activity Modeling using Hierarchical Conditional Random Fields”, Published in: Pattern Analysis and Machine Intelligence, IEEE Transactions on (Volume:PP , Issue: 99 ) Page(s): 1.
[10] Yamanoi, T. ; Hokkai-Gakuen Univ., Sapporo ; Toyoshima, H. ; Ohnishi, S. ; Yamazaki, T., “Spatiotemporal Human Brain Activities by Visual Stimulus of Directional Characters and Symbols”, Published in: Computational Intelligence and Intelligent Informatics, 2007. ISCIII '07. International Symposium on Date of Conference: 28-30 March 2007 Page(s): 195 – 198.
[11] Alvarez-Alvarez, A. ; Eur. Centre for Soft Comput. (ECSC), Mieres, Spain ; Alonso, J.M. ; Trivino, G. ; Hernandez, N., “Human activity recognition applying computational intelligence techniques for fusing information related to WiFi positioning and body posture”, Published in: Fuzzy Systems (FUZZ), 2010 IEEE International Conference on Date of Conference: 18-23 July 2010 Page(s): 1 – 8.
[12] Yousaf, M.H. ; Dept. of Comput. Eng., Univ. of Eng. & Technol. Taxila, Taxila, Pakistan ; Azhar, K. ; Sial, H.A., “A novel vision based Approach for instructor's performance and behavior analysis”, Published in: Communications, Signal Processing, and their Applications (ICCSPA), 2015 International Conference on Date of Conference: 17-19 Feb. 2015 Page(s): 1 – 6.
[13] Chunjiao Dong ; Sch. of Traffic & Transp., Beijing Jiaotong Univ., Beijing, China ; Chunfu Shao ; Xia Li, “Short-Term Traffic Flow Forecasting of Road Network Based on Spatial-Temporal Characteristics of Traffic Flow”, Published in: Computer Science and Information Engineering, 2009 WRI World Congress on (Volume:5 ) Date of Conference: March 31 2009-April 2 2009 Page(s): 645 – 650.
[14] Zhihui Liu ; Inst. of Remote Sensing Applic., Grad. Univ. of Chinese Acad. of Sci., Beijing, China ; Li Liu ; Yanyou Qiao, “Study on extendable spatial decision support system based on service”, Published in: Software Engineering and Service Science (ICSESS), 2013 4th IEEE International Conference on Date of Conference: 23-25 May 2013 Page(s): 317 – 320.
[15] Nicolaides, K. ; CSIR Mater. Sci. & Manuf., Pretoria, South Africa ; van Jaarsveld, J. ; Wilkinson, A., “Demonstration of the advantages offered by an ultra-wideband (100–400 kHz) sonar system for simultaneous planar imaging, volumetric imaging and Doppler in harbour survailance applications”, Published in: Waterside Security Conference (WSS), 2010 International Date of Conference: 3-5 Nov. 2010 Page(s): 1 – 5.
Citation
S.Sathya and V.Geetha , "Embryonic Spatial-Chronological Prototypes for Activity Recognition," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.93-97, 2015.
A Review paper on different Pose Invariant Face Recognition Techniques using Neural Networks
Review Paper | Journal Paper
Vol.3 , Issue.5 , pp.98-104, May-2015
Abstract
In existing face recognition techniques researchers have encountered major difficulties while dealing with variation of poses, aging, expressions, and variation in illumination. As the rotations of face parts causes major differences in face image and changes in appearance. For that reason extensive efforts have been taken by vision researchers in area of pose-invariant face recognition in last decade and many salient methodologies have been implemented. This paper provides a literature review of the existing robust face recognition methodologies using neural networks for handling pose invariant and above mentioned issues which caused difficulties in face recognition, it also contains detailed description of presented methods. This paper also includes strengths and drawbacks of these face recognition systems, and several promising directions for future research are also considered.
Key-Words / Index Term
Face Recognition, Pose Invariant, Gabor Feature, Local Binary Pattern (LBP), Local Derivative Pattern (LDP) ,Neural Networks, Classifier
References
[1] W. Zhao, R. Chellappa, P.J. Phillips, A. Rosenfeld, Face recognition: A literature survey, ACM Computing Surveys 35 (4) (2003) 399–458.
[2] M. Turk and A. Pentland, “Face Recognition Using Eigenfaces,” Proc. IEEE Conf. on Computer Vision and Pattern Recognition, 1991, pp. 586-591..
[3] M.S. Bartlett, J.R. Movellan, and T.J. Sejnowski, Face recognition by independent component analysis, IEEE Trans Neural Networks 13 (2002), 1450–1464.
[4] Y. Moses, Y. Adini, and S. Ullman, “Face Recognition: The Problem of Compensating for Changes in Illumination Direction,” European Conf. Computer Vision, 1994, pp. 286-296.
[5] P. Belhumeur, J. Hespanha, and D. Kriegman, Eigenfaces vs. fisherfaces: Recognition using class specific linear projection, Proc Fourth Eur Conf Computer Vision, Vol. 1, 14–18 April 1996, Cambridge, UK, pp. 45–58.
[6] Z. Jahan, M.Y. Javed, and Q. Usman, Low resolution single neural network based face recognition, in: Proceedings of the Fourth International Conference on Computer Vision, Image and Signal Processing, 2007, vol. 22, pp. 189–193.
[7] J. Huang, B. Heisele, and V. Blanz, Component-based face recognition with 3D Morphable models, in: International Conference on Audio- and Video-Based Biometric Person Authentication, 2003, vol. 2688, pp. 27–33
[8] C. Shan, S. Gong, and P.W. McOwan, Robust facial expression recognition using local binary patterns, in: Proceedings of IEEE International Conference on Image Processing (ICIP), 2005, vol. 2, pp. 370–373.
[9] T.S. Lee, Image representation using 2D Gabor wavelets, IEEE Transaction on Pattern Analysis and Machine Learning 18 (1996) 959–971.
[10] De Stefano, C., Sansone, C., Vento, M., 1995. Comparing generalization and recognition capability of learning vector quantization and multilayer perceptron architectures. In: Proceedings of the 9th Scandinavian Conference on Image Analysis, June, pp. 1123–1130.
[11] S. Bashyal, G.K. Venayagamoorthy, Recognition of facial expressions using Gabor wavelets and learning vector quantization, Engineering Applications of Artificial Intelligence 21 (2008) 1056–1064
[12] M.E. Aroussi, M.E. Hassouni, S. Ghouzali, M. Rziza, D. Aboutajdine, Local appearance based face recognition method using block based steerable pyramid transform, Signal Processing 91 (2011) 38–50.
[13] H. Sahoolizadeh, D. Sarikhanimoghadam, H. Dehghani, Face detection using Gabor wavelet and neural network, World Academy of Science, Engineering and Technology 35 (2008) 552–555.
[14] C. Shan, S. Gong, and P.W. McOwan, Robust facial expression recognition using local binary patterns, in: Proceedings of IEEE International Conference on Image Processing (ICIP), 2005, vol. 2,pp. 370–373.
[15] T. Ahonen, A. Hadid, M. Pietik¨ ainen, Face recognition with local binary patterns, Computer Vision, ECCV 2004 Proc., Lecture Notes in Computer Science 3021, Springer, 2004, pp. 469–481.
[16] J. Yang, D. Zhang, A.F. Frangi, J. Yang, Two-dimensional PCA: a new approach to appearance-based face representation and recognition, IEEE Trans. Pattern Anal. Mach. Intell. 26 (1) (2004) 131–137.
[17] S. Lawrence, C.L. Giles, A.C. Tsoi, A.D. Back, Face recognition: a convolutional neural-network approach, IEEE Trans. Neural Network 8 (1) (1997) 98–113.
Citation
Nivedita Verma and Sanyam Shukla, "A Review paper on different Pose Invariant Face Recognition Techniques using Neural Networks," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.98-104, 2015.
Review of Different Routing Protocols in Mobile Ad-Hoc Networks
Review Paper | Journal Paper
Vol.3 , Issue.5 , pp.105-112, May-2015
Abstract
A Mobile ad-hoc network (MANET) is an infrastructure less network formed by collection of mobile nodes. Due to mobility of mobile nodes it supports Distributed routing protocols which are different from the conventional routing protocols like Distance-Vector Routing (what the routers tell each other) and Link-State Routing (how they use the information to form their routing tables). This paper discussed the issues and challenges of mobile ad hoc network responsible for the desire of different categories of routing protocols like proactive (table-driven), reactive (on-demand) and hybrid protocols with their comparisons based on different parameters.
Key-Words / Index Term
Mobile ad-hoc network, Routing protocol, Issues, Characteristic
References
[1] S. Murthy, C. Siva Ram and B.S. Manoj, “Ad Hoc Wireless Networks: Architectures and Protocols,” Prentice Hall, 2004.
[2] C. E. Perkins and P. Bhagwat, “Highly Dynamic Destination- Sequenced Distance-Vector (DSDV) for Mobile Computers,” “Proc. ACM Conf. Communications Architectures and Protocols”, London, UK, August 1994, pp. 234-244.
[3] Chiang C-C, Wu H-K, Liu W, Gerla M (1997) Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel. Proceedings of IEEE SICON:197–211.
[4] S. Murthy and J. J. Garcia-Luna-Aceves, “An Efficient Routing Protocol for Wireless Networks,” “ACM Mobile Networks and App. J., Special Issue on Routing in Mobile Communication Networks”, October 1996, pp. 183–197.
[5] D. B. Johnson, D. A Maltz, and J. Broch, “DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad hoc Networks,” “Ad Hoc Networking, C.E. Perkins”, Ed., Addison-Wesley, 2001, pp. 139-172.
[6] C. E Perkins, E. M. Royer, and S. Das, “Ad hoc On-demand Distance Vector (AODV),” RFC 3561, July 2003.
[7] P. Papadimitratos and Z. J. Haas. “Secure routing: Secure Data Transmission in Mobile Ad Hoc Networks,” “Proc. ACM Wksp. Wireless Security 2003”, September 2003, pp. 41-50.
[8] V. D. Park and M. S. Corson, “A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks,” Proc. INFOCOM ’97, April 1997.
[9] H. Dang, W. Li, and D. P. Agrawal, “Routing security in wireless ad hoc networks,” “IEEE Communications Magazine”, October 2002, pp.70-75.
[10] Z. J. Haas and M. R. Pearlman, ZRP: a hybrid framework for routing in ad hoc networks, 2001, pp. 221- 253.
[11] C. E. Perkins, “Ad hoc Networking”, Addison Wesley, 2001.
[12] Dhananjay Bisen, Preetam Suman, Prof. Sanjeev Sharma, Rajesh Shukla, “Effect of Pause Time on DSR, AODV and DYMO Routing Protocols in MANET”, International Journal of IT & knowledge management, Vol.3, Issue-1, November 2009.
[13] C K Toh, “Ad Hoc Mobile Wireless Networks”, Prentice Hall Publishers, 2002.
[14] Tseng Y.C., Shen C.C, and Chen W.T., Mobile IP and ad hoc networks: An integration and implementation experience. Technical report, Dept. of Comput. Sci. and Inf. Eng., Nat. Chiao Tung Univ., Hsinchu, Taiwan, 2003.
[15] Url: http://docwiki.cisco.com/wiki/Routing_Basics
Citation
Amit Gupta and Dhananjay Bisen, "Review of Different Routing Protocols in Mobile Ad-Hoc Networks," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.105-112, 2015.