Thepade’s Sorted Ternary Block Truncation Coding with Score level fusion for Multimodal Biometric Identification using Iris &Palmprint
Research Paper | Journal Paper
Vol.3 , Issue.5 , pp.113-116, May-2015
Abstract
The fusion of multiple biometric traits helps to increase accuracy in terms of genuine acceptance ratio (GAR). Here Iris and Palmprint fusion at Matching Score level is performed. The feature extraction in spatial domain using Thepade’s sorted ternary block truncation coding is taken here to reduce the feature vector size of image. Iris and Palmprint are together taken here for identification. The test beds of 60 pairs of Iris and Palmprint samples of 10 persons (6 per person of iris as well as Palmprint) are used as test bed for experimentation. Experimental result in matching score proportion of Iris: Palmprint (1:4) using TSTBTC given better performance as indicated by higher GAR values than all other scores for matching score level fusion of proposed multimodal biometric identification using TSTBTC.
Key-Words / Index Term
Multimodal Biometric, Matching Score level fusion, GAR, TSTBTC
References
[1] H.B.Kekre, Sudeep D. Thepade, “Image Retrieval using
Augmented Block Truncation Coding Techniques”, ACM
International Conference on Advances in Computing,
Communication and Control (ICAC3- 2009), pp. 384
23-24 Jan 2009, Fr. Conceicao Rodrigous College of Engg.,
Mumbai.Uploaded on online ACM portal.
[2] H. B. Kekre, Sudeep Thepade, Rik Kamal Kumar Das,
Saurav Ghosh,” Performance Boost of Block Truncation
Coding based Image Classification using Bit Plane Slicing
International Journal of Computer Applications Volume 47
No.15, June 2012.
[3] Dr.Sudeep D.Thepade, Rupali K.Bhondave,”
Multimodal Identification Technique using Iris & Palmprint
traits with Various Matching Score Level Proporti
BTC of Bit Plane Slices”.2015
Pervasive Computing(ICPC),Jan 9
[4] Dr.Sudeep D.Thepade, Pritam H. Patil
Content Summarization in Videos using
Extraction with Thepade's Sorted Ternary
Coding and Assorted Similarity
International Conference on Communication, Information &
Computing Technology (ICCICT), Jan. 16
India.
[5] Dr.Sudeep D.Thepade, Nalini B.Yadav,” Assessment of
Similarity Measurement Cri
Ternary Block Truncation Coding(TSTBTC) for Content
Based Video Retrieval”.2015
Communication, Information & Computing Technology
(ICCICT), Jan. 16-17, Mumbai, India.
[6] Dr.H.B.Kekre, Ms. Swapna Borde, “Co
Retrieval,”National Conference on Applications of Digital
Signal Processing, January19-
[7] Dr.Sudeep D.Thepade, Rupali K.Bhondave,”
Weighted Score Level Fusion in Multimodal Biometric
Identification using Iris & Palmprint Trai
Conference on Futuristic Trendsin Computational Analysis
and Knowledge Management Feb 25
[8] The Hong Kong Polytechnic University (PolyU) FKP
Database:www4.comp.polyu.edu.hk~biometrics/2D_3D_Pal
m print.html.
[9] Palacky university iris database:
"http://www.advancedsourcecode.com
Citation
Rupali K Bhondave and Sudeep Thepade, "Thepade’s Sorted Ternary Block Truncation Coding with Score level fusion for Multimodal Biometric Identification using Iris &Palmprint," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.113-116, 2015.
Video Classification using Fractional Fourier Transformed Content of Video
Research Paper | Journal Paper
Vol.3 , Issue.5 , pp.117-121, May-2015
Abstract
Advanced technology has resulted in drastic growth of multimedia data. In day to day life huge amount of multimedia data is generated an uploaded over web. Storing this multimedia data has become a challenging task. Storing the data in video format efficiently and retrieving it accurately has become important. If the data is appropriately classified under different categories and then stored, it can be retrieved faster. In this paper a novel video classification techniques has been proposed to classify the videos. Transform domain has the property of energy compaction that helps to figure out the important data in the video and neglect the least important data. Thus the proposed techniques uses the Fourier transformed video content as the attributes for classification process. Twelve different classification algorithms are used and six fractional portions of transformed content forming the feature vectors of six different sizes are experimented. With the proposed technique highest classification accuracy of 89.16% is obtained.
Key-Words / Index Term
Content based video classification, Fourier transform, Fractional energy, data mining classifiers
References
[1] Ambika Ashirvad Mohanty, Bipul Vaibhav, “A Frame-based Decision Pooling Method for Video Classification “, Annual IEEE India Conference (INDICON), 2013
[2] Mahmood Karimian, Mostafa Tavassolipour, “Exploiting Multiview Properties In Semi-Supervised Video Classification”, 6'th International Symposium on Telecommunications (IST'2012)
[3] Dr. Sudeep D. Thepade, Rik Das,” Performance Comparison of Feature Vector Extraction Techniques in RGB Color Space using Block Truncation Coding for Content Based Image Classification with Discrete classifiers” INDICON 2014.
[4] Dr. Sudeep D. Thepade, Madhura M. Kalbhor, Video Classification using Sine, Cosine, and Walsh Transform with Bayes, Function, Lazy, Rule and Tree Data Mining Classifier. International Journal of Computer Applications (0975 –8887) Volume 110 –No. 3, January 2015.
[5] Dr. Sudeep D. Thepade, Madhura M. Kalbhor,Video classification with fractional energy of Haar, Hartley, Slant and Kekre transforms using Function , Bayes, Tree, Lazy and Rule classifiers. A-Blaze, Nodia, 2015
[6] J. L. Walsh, “A Closed Set of Orthogonal Functions,” American Journal of Mathematics, vol. 45, pp. 5-24, 1923 .
[7] J. Han and M. Kamber, (2000) “Data Mining: Concepts and Techniques,” Morgan Kaufmann.
[8] Mizianty, M. ; Kurgan, L. ; Ogiela, M.,” Comparative Analysis of the Impact of Discretization on the Classification with Naïve Bayes and Semi-Naïve Bayes Classifiers”. Seventh International Conference Machine Learning and Applications, ICMLA 2008.
[9] Ian H.Witten and Elbe Frank, (2005) "Datamining Practical Machine Learning Tools and Techniques," Second Edition, Morgan Kaufmann, San Fransisco.
Citation
Madhura M. Kalbhor and Sudeep D. Thepade, "Video Classification using Fractional Fourier Transformed Content of Video," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.117-121, 2015.
Survey of Attacks and Security Schemes in Wireless Sensor Network
Review Paper | Journal Paper
Vol.3 , Issue.5 , pp.122-128, May-2015
Abstract
Wireless Sensor Networks are emerging as the latest tier for data monitoring in many applications like commercial, industrial, military etc. Security in WSN’s is one of the major challenges in order to provide protected and authenticated communication between sensor nodes. However providing secure routing in WSN is a matter of fundamental concern. Although a wide variety of routing protocols have been proposed for WSN’s but most of them do not take security into account as a main goal. Routing attacks can have devastating effects on WSNs .Hence it is the major challenge when designing robust security mechanism for WSNs. In this paper ,we examine some of the most common routing attacks, routing protocols and security schemes in WSNs. It is suggested that in order to overcome the challenges of routing attacks in WSNs , some new routing protocols or strategy must be carefully designed so that attacks can be rendered meaningless .
Key-Words / Index Term
WSN, Security, Attack, Routing. Survey
References
[1] Chris Karlof, David Wagner, “Secure Routing in Wireless Sensor Networks", Attacks and Countermeasures”, Ad Hoc Networks (elsevier), Page: 299-302, 2003.
[2] Santi, P. “Topology control in wireless ad hoc and sensor networks” Chichester, England: John Wiley & Sons, 2005.
[3] Jun Zheng and Abbas Jamalipour, “Wireless Sensor Networks: A Networking Perspective”, a book published by A John & Sons, Inc, and IEEE, 2009.
[4] Clement Ogugua Asogwa, Xiaoming Zhang, Degui Xiao, Ahmed Hamed, “Experimental Analysis of AODV, DSR and DSDV Protocols Based on Wireless Body Area Network” Communications in Computer and Information Science,Springer-VerlagBerlin Heidelberg,Volume 312, pp 183-191, 2012.
[5] Faleh Rabeb, Nasri Nejah, Kachouri Abdennaceur,Samet Mounir, “An Extensive Comparison among DSDV, DSR and AODV Protocols in wireless sensor network” IEEE, International Conference on Education and e-Learning Innovations, 2012.
[1] Nasrin Hakim Mithila, “Performance analysis of DSDV, AODV and DSR in Wireless Sensor Network” International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE) Volume 2, Issue 4, pp.395-404, April 2013
[2] Ipsita Panda “A Survey on Routing Protocols of MANETs by Using QoS Metrics” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 10, pp. 121-129, 2012.
[6] Jamal Al-Karaki, and Ahmed E. Kamal, “Routing Techniques in Wireless Sensor Networks: A Survey“, IEEE Communications Magazine, vol 11, no. 6, pp. 6-28, Dec. 2004.
[7] 13. Kemal Akkaya and Mohamed Younis, “A Survey on Routing Protocols for Wireless Sensor Networks”, Ad hoc Networks, vol. 3, no. 3, pp. 325-349, May 2005.
[8] 5.C. Karlof and D. Wagner, Secure Routing in Sensor Networks: Attacks and Countermeasures, In Proc. of First IEEE International Workshop on Sensor Network Protocols and Applications, 2003.
[9] N. Bulusu, J. Heidemann, and D. Estrin, “GPS-less Low Cost Outdoor Localization for Very Small Devices”, IEEE Personal Communication Magazine, vol. 7, no. 5, pp. 28-34, Oct. 2000
[10] A.Babu Karuppiah, T.Meenakshi, T.I.Mano Ranjitha & S.Vivitha, " False Misbehaviour Elimination in Watchdog Monitoring System Using Change Point in a Wireless Sensor Network", An International Journal on Graduate Research in Engineering and Technology (GRET), pp. 31-35, 2013
[11] S. Nishanthi, "Intrusion Detection in Wireless Sensor Networks Using Watchdog Based Clonal Selection Algorithm", IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013
[12] Silva, A.P.R.D., M.H.T. Martins, B.P.S. Rocha, A.A.F.Loureiro and L.B. Ruiz, "Decentralized Intrusion Detection In Wireless Sensor Networks" Proceedings of the 1st ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks, (QSSWMN; 25), pp: 16-23, 2005
[13] Xie, M., S. Han, B. Tian and S. Parvin, "Anomaly detection in wireless sensor networks: A survey" Journal of Network and Computer Application, pp.1302-1325, 2011
[14] Pires, W.R., T.H. De Paula Figueiredo, H.C. Wong and A.A.F. Loureiro, "Malicious node detection in wireless sensor networks", Proceedings. 18th International, Parallel and Distributed Processing Symposium, (PDS’ 04), pp: 1-7, 2004.
[15] Onat, I. and A. Miri, "An Intrusion Detection System For Wireless Sensor Networks", Proceedings of the IEEE International Conference on, Wireless And Mobile Computing, Networking And Communications, IEEE Xplore Press, pp: 253-259, Aug. 22-24, 2005.
[16] Krontiris, I., T. Dimitriou and F.C. Freiling, "Towards Intrusion Detection In Wireless Sensor Networks", Proceeding of the 13th European Wireless Conference, CiteSeer, 2007.
[17] Krontiris, I., T. Dimitriou, T. Giannetsos and M. Mpasoukos, "Intrusion Detection Of Sinkhole Attacks In Wireless Sensor Networks" Proceedings of the 3rd International Conference on Algorithmic Aspects of Wireless Sensor Networks, (AAWSN’ 28), Springer-Verlag Berlin, Heidelberg, pp: 150- 161, 2008.
[18] Stetsko, A., L. Folkman and V. Matyáš, "Neighbor-Based Intrusion Detection For Wireless Sensor Networks". Proceedings of the 6th International Conference on Wireless and Mobile Communications (ICWMC), IEEE Xplore Press, Valencia, pp: 420-425, Sept. 20-25, 2010.
[19] Lemos, M.V.D.S., L.B. Leal and R.H. Filho, "A New Collaborative Approach for Intrusion Detection System on Wireless Sensor Networks", Novel Algorithms Techniques Telecommunication Network, pp. 239-244, 2010.
[20] Shio Kumar Singh, M P Singh, and D K Singh“A Survey on Network Security and Attack Defense Mechanism For Wireless Sensor Networks” International Journal of Computer Trends and Technology (IJCTT) pp. 1-9, May to June 2011.
Citation
Sonam Jai, Deepak Singh Tomar and Rachana Kamble, "Survey of Attacks and Security Schemes in Wireless Sensor Network," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.122-128, 2015.
Obtaining New Facts from Knowledge Bases using Neural Tensor Networks
Research Paper | Journal Paper
Vol.3 , Issue.5 , pp.129-132, May-2015
Abstract
Knowledge bases are an important resource for easily accessible, systematic relational knowledge. They provide applications with the benefit of question answering and other tasks but often suffer from their incompleteness, lack of knowledge and ability to purpose over new entities and relations. Much work has done to build and extend the relationship in knowledge base. This paper mainly focuses on completing a knowledge base by reasoning over entities relationship with Neural Tensor Network (NTN). New relationships can be predicted with Neural Tensor Network that can be added to the database. We make evident that the model is improved by making entities represented with vectors learned from unsupervised large corpora.
Key-Words / Index Term
Neural Tensor Network, Knowledge Base, Entity Vector, Bilinear Tensors, Unsupervised Text
References
[1] G.A. Miller. WordNet: A Lexical Database for English. Communications of the ACM, 1995.
[2] F.M. Suchanek, G. Kasneci, and G.Weikum. Yago: a core of semantic knowledge. In Proceedings of the 16th international conference on World Wide Web, 2007.
[3] J. Graupmann, R. Schenkel, and G. Weikum. The SphereSearch engine for unified ranked retrieval of heterogeneous XML and web documents. In Proceedings of the 31st international conference on Very large data bases, VLDB, 2005.
[4] Ng and C. Cardie. Improving machine learning approaches to coreference resolution. In ACL, 2002.
[5] R. Snow, D. Jurafsky, and A. Y. Ng. Learning syntactic patterns for automatic hypernym discovery. In NIPS, 2005.
[6] Fader, S. Soderland, and O. Etzioni. Identifying relations for open information extraction. In EMNLP, 2011.
[7] J. Turian, L. Ratinov, and Y. Bengio. Word representations: a simple and general method for semisupervised learning. In Proceedings of ACL, pages 384–394, 2010.
[8] Bordes, X. Glorot, J. Weston, and Y. Bengio. Joint Learning of Words and Meaning Representation for Open-Text Semantic Parsing. AISTATS, 2012.
[9] Bordes, J. Weston, R. Collobert, and Y. Bengio. Learning structured embeddings of knowledge bases. In AAAI, 2011.
[10] Sutskever, R. Salakhutdinov, and J. B. Tenenbaum. Modelling relational data using Bayesian clustered tensor factorization. In NIPS, 2009.
[11] R. Socher, B. Huval, C. D. Manning, and A. Y. Ng. Semantic Compositionality Through Recursive Matrix-Vector Spaces. In EMNLP, 2012.
[12] M. Ranzato and A. Krizhevsky G. E. Hinton. Factored 3-Way Restricted Boltzmann Machines For Modeling Natural Images. AISTATS, 2010.
[13] R. Collobert and J. Weston. A unified architecture for natural language processing: deep neural networks with multitask learning. In ICML, 2008.
[14] Y. Bengio, R. Ducharme, P. Vincent, and C. Janvin. A neural probabilistic language model. J. Mach. Learn. Res., 3, March 2003.
[15] H. Huang, R. Socher, C. D. Manning, and A. Y. Ng. Improving Word Representations via Global Context and Multiple Word Prototypes. In ACL, 2012.
[16] Richard Socher, Danqi Chen, Christopher D. Manning, and Andrew Y. Ng. 2013. Reasoning With Neural Tensor Networks For Knowledge Base Completion. In Advances in Neural Information Processing Systems 26.
[17] R. Socher, B. Huval, C. D. Manning, and A. Y. Ng. Semantic Compositionality Through Recursive Matrix-Vector Spaces. In EMNLP, 2012.
[18] Richard Socher, Recursive Deep Learning for Natural Language Processing and Computer Vision, 2014.
[19] R. Collobert and J.Weston. A unified architecture for natural language processing: deep neural networks with multitask learning. In ICML, 2008.
[20] R. Socher, E. H. Huang, J. Pennington, A. Y. Ng, and C. D. Manning. Dynamic Pooling and Unfolding Recursive Autoencoders for Paraphrase Detection. In NIPS. MIT Press, 2011.
[21] E. H. Huang, R. Socher, C. D. Manning, and A. Y. Ng. Improving Word Representations via Global Context and Multiple Word Prototypes. In ACL, 2012.
[22] Recursive Deep Models for Semantic Compositionality Over a Sentiment Treebank, Richard Socher, Alex Perelygin, Jean Wu, Jason Chuang, Chris Manning, Andrew Ng and Chris Potts. Conference on Empirical Methods in Natural Language Processing (EMNLP 2013, Oral).
[23] L. Deng and D. Yu, "Deep Learning: Methods and Applications "http://research.microsoft.com/pubs/209355/DeepLearning-NowPublishing-Vol7-SIG-039.pdf”
[24] Y. Bengio, A. Courville, and P. Vincent., "Representation Learning: A Review and New Perspectives," IEEE Trans. PAMI, special issue Learning Deep Architectures, 2013.
Citation
Sagarika Sahoo and Avani Jadeja, "Obtaining New Facts from Knowledge Bases using Neural Tensor Networks," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.129-132, 2015.
A Survey on User Navigation Pattern Prediction from Web Log Data
Survey Paper | Journal Paper
Vol.3 , Issue.5 , pp.133-137, May-2015
Abstract
This paper proposes a survey of Web Page Prediction Methods. Prefetching of Web pages has been mostly used to reduce the access latency problem of the WWW users. However, if Prefetching of Web page is not accurate and Prefetched web pages are not visited by the users in their accesses, the limited bandwidth of network and services of Data Center and Cloud will not be used efficiently and may face the problem of access delay. Therefore, it is critical that we need an effective prediction method during prefetching of Services. The Markov models have been widely used to predict and analyze users navigational behavior. All the activities of web users have been saved in web log files. The stored users session is used to extract popular web navigation paths traverse and predict current users next web page Action in domain.
Key-Words / Index Term
Clustering,Classification,Recommender,N-Grams, User Sessions, Web Usage Mining
References
[1] Raymond Kosala, Hendrik Blockeel, “Web Mining Research”: A Survey, ACM SIGKDD Explorations Newsletter, Volume 2 Issue 1, June 2000.
[2] S. Chakrabarti, B. E. Dom, S. R. Kumar, P. Raghavan, S. Rajagopalan, A.Tomkins, D. Gibson, and J. Kleinberg, “Mining the Web’s link structure”. Computer, 32(8):60–67, 1999.
[3] [3] T. Joachims, D. Freitag, and T. Mitchell, “WebWatcher: A tour guide for the World Wide Web”, in Proceedings of IJCAI, pp. 770–777, 1999.
[4] [4] Z. Su, Q. Yang, Y. Lu, and H. Zhang, “What Next: Aprediction system for Web requests using n-gram sequence models”, in Proceedings of 1st Int. Conference Web Inf. Syst. Eng. Conference, Hong Kong pp. 200–207, Jun. 2000.
[5] M. Levene and G. Loizou, “Computing the entropy of user navigation in theWeb,” Int. J. Inf. Technol. Decision Making, volume 2, no. 3, pp. 459–476, 2003.
[6] M. Deshpande, G. Karypis, “Selective Markov Models for Predicting Web Page Accesses,” ACM transactions on Internet Technology, volume 4, No.2, pp.163-184, May 2004
[7] M. Awad, L. Khan, and B. Thuraisingham, “Predicting WWW surfing using multiple evidence combination,” VLDB J., volume 17, no. 3, pp. 401–417, May 2008. [10] M. Awad and L. Khan, “Web navigation prediction using multiple evidence combination and domain knowledge,” IEEE Trans. Syst., Man,Cybern. A, Syst., Humans, volume 37, no. 6, pp. 1054–1062, Nov. 2007.
[8] M. T. Hassan, K. N. Junejo, and A. Karim, “Learning and predicting key Web navigation patterns using Bayesian models,” in Proceedings of Int. Conf. Comput. Sci. Appl. II, Seoul, Korea, pp. 877–887, 2009.
[9] F.Khalil, J. Li, H. Wang, “An Integrated Model for Next Page Acces Prediction”, Inderscience Enterprises Ltd., 2009.
[10] Bhawna Nigamand Dr. Suresh Jain, “Analysis of Markov Model on Different Web Prefetching and Caching Schemes”, 978-1-4244-5967-4/10/ 2010 IEEE
[11] Mamoun A. Awad and Issa Khalil, “Prediction of User’s Web-Browsing Behavior: Application of Markov Model,” IEEE Trans. Syst., Man,Cybern. A, Syst., Humans, volume 42, no. 4, pp., Aug. 2012.
[12] Poornalatha G, Prakash S Raghavendra, “Web Page Prediction by Clustering and Integrate Distance Measures” IEEE/ ACM Trans. Syst., Man,Cybern. A, Syst., Humans, volume 44, no. 2, pp., Sep. 2012.
[13] Li Yue, Dong Shou-bin, Zheng Xiang, Ma Bin-Hua.” Improving Navigation Page Detection by Using DOM-Based Block Text Identification” Tenth International Conference on ICT and Knowledge Engineering pp.978-1-4673-2317-8/12 IEEE-2012
[14] A. Anitha, “A New Web Usage Mining Approach for Next Page Access Prediction”, International Journal of Computer Applications, Volume 8– No.11, October 2010
[15] M. Jalali, N. Mustapha et al ,” WebPUM: A Web-based recommendation system to predict user future movements”, in international journal Expert Systems with Applications 37 (2010) 6201–6212
[16] V. Sujatha and Punithavalli, “Improved User Navigation Pattern Prediction Technique from Web Log Data”, Procedia Engineering 30, 2012.
[17] Trilok Nath Pandey, Ranjita Kumari Dash , Alaka Nanda Tripathy ,Barnali Sahu, “Merging Data Mining Techniques for Web Page Access Prediction: Integrating Markov Model with Clustering”, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 1, November 2012.
[18] Mathias Gery, Hatem Haddad “Evaluation of Web Usage Mining Approaches for User‟s Next Request Prediction” WIDM‟03 Proceedings of the 5th ACM international workshop on web information and data management p.74-81, November 7-8,2003.
[19] Yi-Hung Wu and Arbee L. P. Chen, “Prediction of Web Page Accesses by Proxy Server Log” World Wide Web: Internet and Web Information Systems, 5, 67–88, 2002.
[20] Siriporn Chimphlee, Naomie Salim, Mohd Salihin, Bin Ngadiman , Witcha Chimphlee “Using Association Rules and Markov Model for Predict Next Access on Web Usage Mining” © 2006 Springer.
Citation
Yogesh Bhalerao and P. P. Rokade, "A Survey on User Navigation Pattern Prediction from Web Log Data," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.133-137, 2015.
An Extensive Survey of Image Integrity Approaches and Its Perspectives
Research Paper | Journal Paper
Vol.3 , Issue.5 , pp.138-142, May-2015
Abstract
The Storage of digital information is increasing day by day and at the same time new multimedia broadcasting services has also been developed. This development motivated research on copyright-protection and authentication schemes to be applied to these services. One Possible solution is to apply labelling which is a low level system that works upon the bit-stream. Another one is a high level, graphically inlaid, non-deletable system i.e. watermarking. This paper focuses on authentication and watermarking and presents methods that are proposed for the particular cases of still images. The effects of these methods to JPEG and other image formats are to be analyzed, as well as its sensitivity to image manipulations, are expounded and evaluated.
Key-Words / Index Term
Image Integrity, Image Cropping, Watermarking
References
[1] Dr. Joachim von zur Gathen , Mahmoud El-Gayyar “Watermarking Techniques Spatial Domain Digital Rights” Seminar Media Informatics University of Bonn Germany May 06
[2] Preeti Gupta, “Cryptography based digital image watermarking algorithm to increase security of watermark data”, International
Journal of Scientific & Engineering Research, Volume 3, Issue 9 (September 2012) ISSN 2229-5518
[3] B Surekha, Dr GN Swamy, “A Spatial Domain Public Image Watermarking”, International Journal of Security and Its Applications Vol. 5 No. 1, January, 2011
[4] C. Rey, J.L. Dugelay, “A Survey of Watermarking Algorithms for Image Authentication”, EURASIP Journal on Applied Signal Processing 2002:6, pp. 613 – 621, Hindawi Publishing Corporation.
[5] M. Schneider and S. F. Chang, “A robust content based digital signature for image authentication,” 12 in Proc. IEEE Intl. Conf. On Image Processing, vol. III, Lausanne, Switzerland, September 1996, pp. 227- 230.
[6] J.S. Seo, C.D. Yoo, “Image Watermarking based on scale space representation”, Security, Steganography, and Watermarking of Multimedia Contents, VI, SPIE vol. 5306 2004, pp. 560 – 570
[7] P. W. Wong, “A watermark for image integrity and ownership verification,” in Proc. IS & T PICConference, Portland, USA, May 1998.
[8] P. W. Wong, “A Public Key Watermark for Image Verification and Authentication,” in Proc. IEEEIntl. Conf. On Image Processing, vol. I, Chicago, USA, October 1998, pp. 455-459.
[9] M. Wu and B. Liu, “Watermarking for Image Authentication,” in Proc. IEEE Intl. Conf. On Image Processing, vol. II, Chicago, USA, October 1998, pp. 437-441.
[10] M. Yeung and F. Minzter, “Invisible Watermarking for Image Verification,” Journal of Electronic Imaging, vol. 7, no. 3, pp. 578-591, July 1998.
[11] J. Fridrich, M. Goljan and A. C. Baldoza, “New Fragile Authentication Watermark for Images,” in Proc. IEEE Int. Conf. Image Processing, vol. I, Vancouver, Canada, Sept. 2000, pp. 446-449.
[13] Frank Hartung, Martin Kutter(July 1999), “Multimedia Watermarking Techniques”, proceedings of The IEEE, Vol. 87, No. 7, pp. 1085 – 1103.
[14] Lu, C-S., Liao, H-Y., M., Huang, S-K., Sze, C-J., “ CombinedWa- termarking for Images Authentication and Protection” , in 1st IEEE- International Conference on Multimedia and Expo, vol. 3, 30 July-2Aug. 2000 pp. 1415 – 1418
[16] Jiang Xuehua, “Digital Watermarking and Its Application in Image Copyright Protection”, 2010 International Conference on Intelligent Computation Technology and Automation
[17] Wu, C. and W. Hsieh, 2000, “Digital watermarking using zero tree of DCT”, IEEE Trans. Consumer Electronics, vol. 46, No. 1, pp. 87-94.
[18] Ms.Jalpa M.Patel,”A brief survey on digital image watermarking techniques” ,International Journal For Technological Research In Engineering Volume 1, Issue 7, March-2014
[19 ]Vinita Gupta, “A Review on Image Watermarking and Its Techniques” International Journal of Advanced Research in Computer Science and Software Engineering ,Volume 4, Issue 1, January 2014.
[20] Prabhishek Singh “A Survey of Digital Watermarking Techniques, Applications and Attacks” ,International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 9, March 2013
[21]Xiao Jun Kang Li Jun Dong, “Study of the Robustness of Watermarking Based on Image Segmentation and DFT”, IEEE International Conference on Information Engineering and Computer Science, ICIECS, 2009, pp1-4.
Citation
Amit Bhagat and Rajshree Dubey, "An Extensive Survey of Image Integrity Approaches and Its Perspectives," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.138-142, 2015.
Improving MRI Segmentation by Fuzzy C Mean Clustering Algorithm Using BBHE Techniques
Research Paper | Journal Paper
Vol.3 , Issue.5 , pp.143-147, May-2015
Abstract
Magnetic resonance imaging (MRI) is a medical imaging technique used to investigate the anatomy and physiology of the body is widely used in hospitals for medical diagnosis and staging of diseases. The research efforts have been devoted to processing and analyzing medical images to extract meaningful information to detect abnormalities. MRI segmentation aims at extraction of object boundary features which plays a fundamental role in understanding image content. A challenging problem is to segment regions are boundary insufficiencies, blur edges, lack of texture contrast between regions of interest and background. To address this problem two categories of approaches are used on medical image segmentation: (i) enhancement technique i.e. histogram equalizer technique is implemented on selected image to enhance the contrast of image. Brightness preserving Bi Histogram Equalization (BBHE) technique is used for enhancing the image because previous technique perverse contrast but only BBHE consider Brightness of an image. (ii) Apply fuzzy-C mean (FCM) clustering segmentation algorithm on enhanced image. Fuzzy C mean algorithm helps to compute clusters from the image and calculate the centers of clusters. Examples of medical data segmentation and general conclusions from the methods are described and we give future directions for solving challenging and open problems in medical image segmentation.
Key-Words / Index Term
uzzy-C Means Clustering; Magnetic Resonance Imaging; Histogram Equalization Technique; Segmentation
References
[1] R. Bakshi, S. Ariyaratana,R. H. B Benedict and L.jacobs,”Fluide-attenuated inversion recovery magnetic Resonance Imaging Detects Cortical and Juxtacortical Multiple Sclerosis Lesions,” Archives of Neurology, Vol. 58, No. 5, 2001, pp. 742-748.
[2] A. Ayman, T. Funatomi, M. Minoh, E. A. Zanaty, T. okada, k. togashi, T. sakai and S. Yamada,’’new region growing segmentayion technique for MR images with Weak Boundaries,’’ IEICE Conference M12010-79,japan, 2010, pp.71-76.
[3] A. K. Jain, M. N. Murty, P. J. Flynn, Data Clustering: A Review, ACM Computing Surveys 31 (3) (1999)264–323.
[4] Hojat Yeganeh, Ali Ziaei, Amirhossein Rezaie“A Novel Approach for Contrast Enhancement Based on Histogram Equalization” International Conference on Computer and Communication Engineering, ICCCE, pp. 256 – 260, 2008.
[5] Y. T. Kim, "Contrast Enhancement Using Brightness Preserving Bi-Histogram Equalization," IEEE Transactions on Consumer Electronics,Vol 43,No.1, pp.1-8, 1997.
[6] WANG Zhiming, TAO Jianhua “A Fast Implementation of Adaptive Histogram Equalization” 2006 8th International Conference on Signal Processing ,2007.
[7] Hojat Yeganeh, Ali Ziaei, Amirhossein Rezaie“A Novel Approach for Contrast Enhancement Based on Histogram Equalization” International Conference on Computer and Communication Engineering, ICCCE, pp. 256 – 260, 2008.
[8] Jeong CB, Kim KG, Kim TS, Kim SK “Comparison of image enhancement methods for the effective diagnosis in successive whole-body bone scans”, Vol.24,No.3, pp. 424-36, 2011.
[9] Rajesh Garg, Bhawna Mittal, Sheetal Garg “Histogram Equalization techniques For image Enhancement,” IJECT Vol. 2, Issue 1, March 2011.
[10] E. A. Zanaty and A. Afifi, “A Watershed Approach for Improving Medical Image Segmentation,” Computer Methods in Biomechanics and Biomedical Engineering, Vol. 16, No. 12, 2012, pp. 1262-1272.
[11] Chen D. and Ramli R., “Preserving Brightness in Histogram Equalization Based Contrast Enhancement Techniques,” Computer Journal of Digital Signal Processing, Vol. 14, No. 5, pp. 413-428, 2004.
[12] Ibrahim H. and Kong P., “Brightness Preserving Dynamic Histogram Equalization for Image Contrast Enhancement,” Computer Journal of IEEE Transactions on Consumer Electronics, Vol.53, No. 4, pp. 1752-1758, 2007.
[13] J.A. Stark, Adaptive image contrast enhancement using generalizations of histogram equalization, IEEE Trans. Image Process. Vol.9, No.5,pp. 889-896 ,2000.
[14] Kim Y., Kim S., and Hwang H., “An Advanced Contrast Enhancement Using Partially Overlapped Sub: Block Histogram Equalization,Computer Journal of IEEE Transaction Circuits System Video Technology, Vol. 11, No. 4, pp. 475-484, 2001.
[15] D. Pham and J. prince ,‘’ Adaptive fuzzy segmentation of Magnetic Resonance Images,” IEEE Transactions on Me- dical Imaging, Vol. 18, No. 9, 1999, pp. 737-752.
[16] A. W. C. Liew and H. Yan, “An Adaptive Spatial FClustering Algorithm for 3-D MR Image Segmentat IEEE Transactions on Medical Imaging, Vol. 22, No. 9, 2003, pp. 1063-1075.
[17] E. A. Zanaty and S. Aljahdali, “Automaticrithms for Reliable Image Segmentation,” International Society for Computers and Their Applications, Vol. 19, No. 3, 2012, pp. 166-175.
[18] L. Szilágyi, S. M. Szilágyi and Z. Benyó, “A Mod FCM Algorithm for Fast Segmentation of Brain MR Im- ages,” ICIARLNCS, Vol. 4633, 2007, pp. 866-877.
[19] B. Y. Kang, D. W. Kim and Q. Li, “Spatial Homogeneity- Based Fuzzy c-Means Algorithmtion,” FSKDLNAI, Vol. 3613, 2005, pp. 462-469.
[20] J. Z. Wang, J. Kong, Y. H. Lu, M. Qi and B. X. Zhang, “A Modified FCM Algorithm for MRI Brain Image Segmentation Using Both Local and Non-Local Spatial Con- strains,” Computerized medical images and graphics’’, Vol. 31, No. 8, 2008, pp. 685-698.
[21] Z. Ji, Q. Sun and D. Xia, “A Modified Possibilistic Fuzzy c-Means Clustering Algorithm for Bias Field estimation and Segmentation of Brain MR Image’’, computerized Medical Imaging and Graphics, Vol. 35, No. 5, 2011, pp. 383-397 .
[22] A. Rajendran and R. Dhaneskaran,’’MRI brain image Tissue Segmentation Analysis Using Possibilistic Fuzzy c-Means Method,” International Journal on Computer Science and Engineering, Vol. 3, No. 12, 2011, pp. 3832- 3836.
Citation
Karanbir singh and Ashima Kalra, "Improving MRI Segmentation by Fuzzy C Mean Clustering Algorithm Using BBHE Techniques," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.143-147, 2015.
Leakage Reduction Technique on FinFET Based 7T and 8T SRAM Cells
Research Paper | Journal Paper
Vol.3 , Issue.5 , pp.148-157, May-2015
Abstract
In this paper, we propose a FinFET based 7T and 8T Static Random Access Memory (SRAM) cells. FinFETs also promise to improve challenging performance versus power tradeoffs. Designers can run the transistors more rapidly and use the similar amount of power, compared to the planar CMOS, or run them at the similar performance using less power. The aim of this paper is to reduce the leakage current and leakage power of FinFET based SRAM cells using Self-controllable Voltage Level (SVL) circuit Techniques in 45nm Technology. SVL circuit allows supply voltage for a maximum DC voltage to be applied on active load or can reduce the supplied DC voltage to a load in standby mode. This SVL circuit can reduce standby leakage power of SRAM cell with minimum problem in terms of chip area and speed. High leakage currents in submicron regimes are primary contributors to total power dissipation of bulk CMOS circuits as the threshold voltage, channel length and gate oxide thickness are scaled down. The leakage current in the SRAM cell increases due to reduction in channel length of the MOSFET. Two methods are used; one method in which the supply voltage is reduced and other method in which the ground potential is increased. The Proposed FinFET based 7T and 8T SRAM cells have been designed using Cadence Virtuoso Tool, all the simulation results has been generated by Cadence SPECTRE simulator at 45nm Technology.
Key-Words / Index Term
FinFET; Leakage Current; Leakage Power; Static random access memory (SRAM); Self-controllable Voltage Level (SVL); Upper SVL; Lower SVL
References
[1] K. Bowman, et al., “Impact of die-to-die and within die parameter fluctuations on the maximum clock frequency distribution for gigascale integration,” IEEE J. Solid-State Circuits, vol. 37, no. 2, 2002, pp. 183-190.
[2] S. Borkar, et al., “Parameter variations and impact on circuits and microarchitecture,” ACWIEEE DAC, 2003, pp. 338-342.
[3] T. Karnik, T. De, and S. Borkar, “Statistical design for variation tolerance: key to continued Moore’s law,” in Proc. Int. Conf. Integrated Circuit Design and Technology, 2004, pp. 175-176.
[4] Yu, H. Wang, A. Joshi, Q. Xiang, E. Ibok, and M. R. Lin, “15 nm gate length planar CMOS transistor,” in IEDM Tech. Dig., 2001, pp. 937–939.
[5] Hisamoto, W. C. Lee, J. Kedzierski, H. Takeuchi, K. Asano, C. Kuo, E. Anderson, T. J. King, J. Bokor, and C. Hu, “FinFET—A self-aligned double-gate MOSFET scalable to 20 nm,” IEEE Trans. Electron Devices, vol. 47, 2000, pp. 2320–2325.
[6] J. Y. S. Balasubramanium, “Design of sub-50 nm FinFET based low power SRAMs,” Semicond. Sci. Technol., vol. 23, 2008, p. 13-19.
[7] K. Zhang, U. Bhattacharya, Z. Chen, F. Hamzaoglu, D. Murray, N. Vallepalli, Y. Wang, B. Zheng, and M. Bohr, “A 3-GHz 70 MB SRAM in 65nm CMOS technology with integrated column-based dynamic power supply,” in Proc. IEEE Int. Solid-State Circuits Conf., 2005, pp. 474–476.
[8] M.D. Powell, S.H. Yang, B. Falsafi et. al, “Gated – VDD:A circuit technique to reduce leakage in cache memories,” in proceedings of International Symposium on Low Power Electronics and Design, 2000, pp. 90-95.
[9] Amit Agarwal, Hai Li and Kaushik Roy, “DRG Cache: A data retention gated- ground cache for low power,” in proceedings of the 39th Design Automation Conference, 2002, pp. 473-478.
[10] Rafik S. Guindi , Farid N. Najm, “Design Techniques for Gate-Leakage Reduction in CMOS Circuits,” in proceedings of the Fourth International Symposium on Quality Electronic Design, 2003, pp. 61-65.
[11] L. Chang et al., “Stable SRAM Cell Design for the 32nm Node and Beyond,” Symp. VLSI Tech. Dig., 2005, pp. 292-293.
[12] Enomoto, T., Oka, Y., Shikano, H., & Harada, T., “A self-controllable voltage-level (SVL) circuit for low-power, high-speed CMOS circuits,” in Proceedings of European solid-state circuits conference, 2002, pp. 411–414.
[13] K. Kanda, H. Sadaaki, and T. Sakurai, “90% write power-saving SRAM using sense-amplifying memory cell,” IEEE Journal of Solid-State Circuits, vol. 39, 2004, pp. 927–933.
[14] S. Lavanya, and J. Lisbin, “Self controllable voltage level (SVL) for low power consumption” in IEEE International Conference on Computational Intelligence & Computing Research (ICCIC), 2012, pp. 1-5.
Citation
Anugrah Narayan Singh and Ravi Koneti, "Leakage Reduction Technique on FinFET Based 7T and 8T SRAM Cells," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.148-157, 2015.
A Thorough Investigation of Code Obfuscation Techniques for Software Protection
Review Paper | Journal Paper
Vol.3 , Issue.5 , pp.158-164, May-2015
Abstract
The Process of reverse engineering allows attackers to understand the behavior of software and extract the proprietary algorithms and key data structures (e.g. cryptographic keys) from it. Code obfuscation is the technique is employed to protect the software from the risk of reverse engineering i.e. to protect software against analysis and unwanted modification. Program obfuscation makes code harder to analyze. In this paper we survey the literature on code obfuscation. we have analyze the different obfuscation techniques in relation to protection of intellectual property. At the last, we are purposing suggestion to provide protection from both the static and dynamic attacks.
Key-Words / Index Term
Code Obfuscation, Software Protection, Reverse Engineering
References
[1]Christian S. Collberg and Clark Thombor-son. Watermarking, tamper-proofing, and obfuscation - tools for software protection.In IEEE Transactions on Software Engineering, volume 28, pages 735–746, August 2002.
[2] Shakya Sundar Das, Code Obfuscation using Code Splitting with Self-modifying Code, Disseration National Institute of Technology Rourkela -769 008, Odisha, India May 2014.
[3] C. Collberg, C. Thomborson, and D. Low, “A taxonomy of obfuscating transformations," tech. rep., Department of Computer Science, The University of Auckland, New Zealand, 1997.
[4] C. Wang, A security architecture for survivability mechanisms. PhD thesis, University of Virginia, 2001.
[5] V. Balachandran and S. Emmanuel, “Potent and stealthy control flow obfuscation by stack based self-modifying code," Information Forensics and Security, IEEE Transactions on, vol. 8, no. 4, pp. 669-681, 2013.
[6] M. H. Halstead, Elements of Software Science (Operating and programming systems series). Elsevier Science Inc., 1977.
[7] T. J. McCabe, “A complexity measure," Software Engineering, IEEE Transactions on, no. 4, pp. 308-320, 1976.
[8] W. A. Harrison and K. I. Magel, “A complexity measure based on nesting level," ACM Sigplan Notices, vol. 16, no. 3, pp. 63-74, 1981.
[9] G. Wroblewski, General Method of Program Code Obfuscation (draft). PhD thesis, Citeseer, 2002.
[10] C. Wang, A security architecture for survivability mechanisms. PhD thesis, University of Virginia, 2001
[11] M. Madou, B. Anckaert, P. Moseley, S. Debray, B. De Sutter, and K. De Bosschere, “Software protection through dynamic code mutation," in Information Security Applications, pp. 194-206, Springer, 2006.
[12] I. V. Popov, S. K. Debray, and G. R. Andrews, “Binary obfuscation using signals," in USENIX Security Symposium, pp. 275-290, 2007
[13] Z. Wu, S. Gianvecchio, M. Xie, and H. Wang, “Mimimorphism: a new approach to binary code obfuscation," in Proceedings of the 17th ACM conference on Computer and communications security, pp. 536-546, ACM, 2010.
[14] L. Shan and S. Emmanuel, “Mobile agent protection with self-modifying code," Journal of Signal Processing Systems, vol. 65, no. 1, pp. 105-116,2011
[15] Z. Wang, C. Jia, M. Liu, and X. Yu, “Branch obfuscation using code mobility and signal," in Computer Software and Applications Conference Workshops (COMPSACW), 2012 IEEE 36th Annual, pp. 553-558, IEEE, 2012.
[16] V. Balachandran and S. Emmanuel, “Potent and stealthy control ow obfuscation by stack based self-modifying code," Information Forensics and Security, IEEE Transactions on, vol. 8, no. 4, pp. 669-681, 2013.
[17]“Idapro debugger : Data rescue [Online]." http://www.datarescue.com/. Last Accessed: 07-1-2015
[18]“Immunity debugger [Online]."
https://www.immunityinc.com/productsimmdbg.shtml. Last Accessed: 07-1-2015.
[19] “Olly debugger [Online]." http://www.ollydbg.de”. Last Accessed: 12-09-2013
[20] Matias Madou, Bertrand Anckaert, Bjorn De Sutter, and De Bosschere Koen."Hybrid static-dynamic attacks against software protection mechanisms", In Proceedings of the 5th ACM Workshop on Digital Rights Management. ACM, 2005
[21] Sebastian Schrittwieser and Stefan Katzenbeisser, "Code Obfuscation against Static and Dynamic Reverse Engineering", Vienna University of Technology, Austria, Darmstadt University of Technology, Germany.
[22] Chow, S., Gu, Y., Johnson, H., and Zakharov, V.A.: "An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs", In the proceedings of 4th International Conference on Information Security, LNCS Volume 2200. Pages 144-155. Springer-Verlag. Malaga, Spain. 2001.
[23]F.Kazumasa , T.Haruaki ” An Obfuscation Method to Build a Fake Call Flow Graph by Hooking Method Calls” Las Vegas, USA IEEE, SNPD 2014, June 30-July 2, 2014.
Citation
Krishan Kumar and Prabhpreet Kaur, "A Thorough Investigation of Code Obfuscation Techniques for Software Protection," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.158-164, 2015.
Implementation insight for High Performance Messaging Solution
Research Paper | Journal Paper
Vol.3 , Issue.5 , pp.165-174, May-2015
Abstract
This paper addresses the messaging needs of decomposed multi-tier applications to support high performance. In the transformation exercise, the applications are getting decomposed into multiple logical tiers and get deployed in clusters to take advantage of computing power available in multi-core commodity hardware. In such deployments the communication between the tiers or layers within the deployment is critical for such transformations, as there are millions of small packets moving across these tiers and gets processed at different stages. It is important that a suitable messaging middleware is put to use for the success of such transformation exercise to address the transportation of messages across tiers. This study provides an insight to the developer community on, (a) various communication protocols current and emerging ones that can be used given a problem situation and the deployment nuances of these protocols (b) messaging models and middleware available for such deployment (c) key factors that are to be kept in mind for selection of such commercially available messaging middleware and (d) finally, approach towards deployment of such middleware and key parameters that are available for fine tuning to achieve the desired scalability and latency.
Key-Words / Index Term
Messagin middleware; Messaging for high performance; Messaging models; Ultra-low latency messaging; ; Thin stream
References
[1] A. R. Alkhawaja, L. L. Ferreira and M. Albano, “Message Oriented Middleware with QoS Support for Smart Grids”, INForum 2012 - Conference on Embedded Systems and Real Time, 2012.
[2] Holger Wunderlich, Diego Cardalliaguet, Russ Heald, Tomokuni Shimizu and Dirk Ziesemann, “IBM, Building Multi-Tier Scenarios for Web Sphere Enterprise Applications”, An IBM Redbook Publications, 2003.
[3] EDS, “Financial Services Legacy Modernization”, EDS White Paper, 2007.
[4] Shameem Akhter and Jason Roberts, “Multi-Core Programming”, An Intel Press Publications, ISBN 0-9764832-4-6,2006.
[5] A Friedley, T Hoefler and ML Leininger, “Scalable High Performance Message Passing over InfiniBand for Open MPI”, e-reports.ext.llnl.gov, 2007.
[6] Andreas Petlund, “Improving latency for interactive, thin-stream applications over reliable transport”, Doctoral Thesis, http://urn.nb.no/URN:NBN:no-24274, October 2009.
[7] Ross Carter, “Microsoft Real-Time Communications : Protocols and Technologies”, Microsoft TechNet Library, July 2003.
[8] Jan Newmarch, “Introduction to Stream control Transmission Protocols”, Linux Journal, September 2007.
[9] Mark Allman, “Improving TCP Performance over Satellite Channels”, Doctorol Thesis, 1997.
[10] A Petlund, K Evensen and P Halvorsen, “Improving application layer latency for reliable thin-stream game traffic”, Netgames `08Proceedings of the 7th ACM SIGCOMM Workshop on Network and System Support for Games, 2008, pp.91-96.
[11] Mark A. Miller, “Voice Over IP Technologies : Building the Convergent Network”, John Willy & Sons Inc., NY,ISBN:0764549073, 2002.
[12] Manoj Bhatia, Jonathan Davidson, Satish Kalidindi, Sudipto Mukherjee and James Peters, “VoIP: An In-Depth Analysis”, Publication by CISCO Press, October, 2008, pp.145-168.
[13] PPK Lam, SC Liew, “UDP-Liter: an improved UDP protocol for real-time multimedia applications over wireless”,1st International Symposium on Wireless Communication Systems, 2004, pp.314-318.
[14] Mike Diehl, “Network Programming with Enet”, Linux Journal, 2012.
[15] PK Chrysanthis, V Liberatore and K. Pruhs, “Middleware Support for Multicast-based Data Dissemination: A working Reality”, Proceedings of the Eighth International Workshop on IEEE Explore Object-Oriented Real-Time Dependable Systems, (WORDS 2003), 2003, pp.265-272.
[16] A. Tripathi, A.K. Gupta and Dr. D. Arora, “Comparative Analysis of Quality Services of Dense and CBT Mode of Multicast Routing Strategies”, International Journal of Scientific and Research Publications, Volume 3, Issue 2, February 2013.
[17] D. Zappala and A. Fabbri, “Using SSM Proxies to Provide Efficient Multiple- Source Multicast Delivery”,Global Telecommunications Conference, GLOBECOM '01, IEEE,Volume 3, 2001, pp.1590-1594.
[18] L. Rizzo, L. Vicisano, “A Reliable Multicast data Distribution Protocol based on software FEC techniques”, The fourth IEEE Workshop on High-Performance Communication Systems, 1997, pp.116-125.
[19] Y.Chu, S. G. Rao, S. Seshan and H.Zhang, “Enabling Conferencing Applications on the Internet using an Overlay Multicast Architecture”, SIGCOMM’01, 2001,pp.55-67.
[20] “The Advantage of Using Hardware-Based TCP Fanout for High-Performance Messaging”, http://www.solacesystems.com,Solace Systems.
[21] “Stream Control Transmission Protocol: Past, Current, and Future Standardization Activities”,IEEE Communications Magazine, April 2011.
[22] Mohammad Nayeem Teli, Endrit Thanasi, “Analysis of Datagram Congestion Control Protocol (DCCP)”, Colorado State University, 2005.
[23] S Pack, E Hong, Y Choi, I Park, “Game Transport Protocol: A Reliable Lightweight Transport Protocol for Massively Multiplayer On-line Games (MMPOGs)”,Proceedings of SPIE 4861, Multimedia Systems and Applications, 2002.
[24] E. C. Eugène and L.A.A. Frejus, “Asynchronous Message Exchange System between Servers based on Java Message Service API”, International Journal of Computer Science Engineering (IJCSE), Volume 1, Issue 2, November 2012, pp.144-152.
[25] “Fiorano MQ Enterprise Messaging”, Fiorano, 2015.
[26] “Messaging Middleware – a Technical Reference Guide for Designing Mission-Critical Middleware Solutions”, Microsoft, SQL Server 2012, 2012.
[27] G Chen, Y Du, P Qin and L Zhang, “Research of JMS Based Message Oriented Middleware for Cluster”, International Conference on Computational and Information Sciences, 2012, pp.1628-1631.
[28] H Abie, RM Savola and I Dattani, “Robust, secure, self-adaptive and resilient messaging middleware for business critical systems”, Computation World, 2009, pp.153-160.
[29] RS Wu, SM Yuan, “A Pluggable Security Framework for Message Oriented Middleware”, 5th WSEAS International Conference on Applied Computer Science, April 2006, pp.1045-1050.
[30] Andrew Foster, “Messaging Technologies for the Industrial Internet and Internet of Things”, Prism Tech Corp. White paper, May 2015.
[31] D. Sangvikar, V. Tekale, “Multi Protocol Cross Platform Communication”, IJERT,Volume 3, Issue 5, May 2014.
[32] P Tran and P. Greenfield, “Behavior and Performance of Message-Oriented Middleware Systems”, 22nd International Conference on Distributed Computing Systems Workshops,2002, pp.645-650.
Citation
Muralidaran Natarajan, Nandlal L. Sarda and Sharad C. Srivastava, "Implementation insight for High Performance Messaging Solution," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.165-174, 2015.