Mark Reliable Including Opinion Landscapes by Outline Let Transforms
Research Paper | Journal Paper
Vol.3 , Issue.1 , pp.152-158, Jan-2015
Abstract
This newspaapiece presents a single mark reliable process by together opinion landscapes then the unsingle particulars feature to upsurge the appreciation presentation against nonlined distortion in fingerprints. The planned opinion landscapes are commodeled of four elements: opinion count, opinion length, opinion curving direction, then opinion type. These opinion landscapes have sure compensations in thon they container signify the topology info in wfleabag opinion designs prereferred amid two particulars then are not changed via nonlined distortion of the finger. Aimed at removing opinion features, we a therefore label the ridge-founded organize scheme in a skeleton zed image. With the planned opinion landscapes then unsingle particulars landscapes (particulars type, orientation, then position),we proposal a single reliable arrangement by a breadth chief pursuit to notice the complemented particulars couples incrementally. Following that, the extreme mark is considered then used as the previous reliable mark of two fingerprints. Trials were led aimed at the FVC2002 then FVC2004 files to relate the planned method with the unsingle minutiae founded method. The planned method attained progressive reliable scores. The limitations of commlone used separintelligent extensions of onedimensional transforms, such as the fourier then wavelet transforms, in taking the geometry of appearance limits are well known. In this paper, we pursue a ―true two dimensional transmethod thon container imprisonment the intrinsic geometrical structure thon is key in pictorial information. The foremost examination in discovering geometry in images originates meanwhile the sepagrade countryside of the data. Thus, uncomparable extra approaches, such as curvelets, thon chief grow a transmethod in the incessant area then then discretize aimed at sampled data, our method twitches with a discrete-area structure then then lessons its union to an growth in the incessant domain. Specifically, we construct a sepagrade area multi reresolve then multi way growth by non-separintelligent clean banks, in ample the acomparable method thon wavelets were resultant meanwhile clean banks. This structure results in a supple multi resolution, local, then maneuvering appearance growth by outline segments, then therefore it is called the outline let transform. Thus, we conclude thon the planned opinion feature stretches extra info aimed at mark reliable with minute increase in master possibility then container be used in conjunction with prereferred particulars landscapes to upsurge the correctness then heftiness of mark appreciation systems.
Key-Words / Index Term
Extensiveness Chief Search, Opinion Count, Opinion Features, Ridge-Founded Organize System, Scant Representation, Wavelets, Contourlets, Clean Banks, Multi Resolution, Multidirection, Contours, Regular Appearance Processing
References
[1] Shengli Wu ; Sch. of Comput. Sci. & Telecommun. Eng., Jiangsu Univ., Zhenjiang, China.” Fusing Blog Opinion Retrieval Results for Better Effectiveness”, Published in:Database and Expert Systems Applications (DEXA), 2011 22nd International Workshop on Date of Conference:Aug. 29 2011-Sept. 2 2011Page(s):195 - 199.
[2] Naradhipa, A.R. ; Sch. of Electr. & Inf. Engineerng, Bandung Inst. of Technol., Bandung, Indonesia ; Purwarianti, A.” Sentiment classification for Indonesian message in social media”, Published in:Cloud Computing and Social Networking (ICCCSN), 2012 International Conference onDate of Conference:26-27 April 2012Page(s):1 – 5.
[3] Jiajia Huang ; Sch. of Econ. & Manage., Tongji Univ., Shanghai, China ; Qiang Su.” A rumor spreading model based on user browsing behavior analysis in microblog”, Published in:Service Systems and Service Management (ICSSSM), 2013 10th International Conference on Date of Conference:17-19 July 2013Page(s):170 – 173.
[4] Zhen Hai ; N4-B3C-14 DISCO Lab., Nanyang Technol. Univ., Singapore, Singapore ; Kuiyu Chang ; Jung-Jae Kim ; Yang, C.C.” Identifying Features in Opinion Mining via Intrinsic and Extrinsic Domain Relevance”, Published in:Knowledge and Data Engineering, IEEE Transactions on (Volume:26 , Issue: 3) Page(s):623 – 634.
[5] Yongyong Zhai ; Sch. of Comput. Sci. & Inf. Eng., Hefei Univ. of Technol., Hefei, China ; Yanxiang Chen ; Xuegang Hu ; Peipei Li.” Extracting Opinion Features in Sentiment Patterns”, Published in:Information Networking and Automation (ICINA), 2010 International Conference on (Volume:1 )Date of Conference:18-19 Oct. 2010Page(s):V1-115 - V1-119.
[6] Lizhen Liu ; Coll. of Inf. Eng., Capital Normal Univ., Beijing, China ; Zhixin Lv ; Hanshi Wang.” Opinion mining based on feature-level”, Published in:Image and SignalProcessing (CISP), 2012 5th International Congress onDate of Conference:16-18 Oct. 2012Page(s):1596 – 1600.
[7] Balahur, Alexandra ; DLSI, Univ. Alicante, Alicante ; Montoyo, A.” A feature dependent method for opinion mining and classification”, Published in:Natural Language Processing and Knowledge Engineering, 2008. NLP-KE '08. International Conference onDate of Conference:19-22 Oct. 2008Page(s):1 – 7.
[8] Freeland, G.C. ; Dept. of Electron. & Electr. Eng., Strathclyde Univ., Glasgow, UK ; Durrani, T.S.” An introduction to multiscale defined systems: self-organising IFS fractal networks”, Published in:Acoustics, Speech and SignalProcessing, 1998. Proceedings of the 1998 IEEE International Conference on (Volume:2) Date of Conference:12-15 May 1998Page(s):1185 - 1188 vol.2.
[9] dos Santos Coelho, L. ; Ind. & Syst. Eng. Grad. Program, Pontifical Catholic Univ. of Parana, Curitiba, Brazil.”Self-Organizing Migrating Strategies Applied to Reliability-Redundancy Optimization of Systems”,Published in:Reliability, IEEE Transactions on (Volume:58 , Issue: 3 )Page(s):501 – 510.
[10] Fukunaga, K. ; Research Laboratories, Mitsubishi Electric Corp., Amagasaki, Japan. ; Ito, T.” A Design Theory of Recognition Functions in Self-Organizing Systems”,Published in:Electronic Computers, IEEE Transactions on (Volume:EC-14 , Issue: 1) Page(s):44 – 52.
[11] Wimmer, R. ; Albert-Ludwigs-Univ. Freiburg, Freiburg, Germany ; Braitling, B. ; Becker, B. ; Hahn, E.M.”Symblicit Calculation of Long-Run Averages for Concurrent Probabilistic Systems”,Published in:Quantitative Evaluation of Systems (QEST), 2010 Seventh International Conference on the Date of Conference:15-18 Sept. 2010Page(s):27 – 36.
[12] Swan, Christopher W. ; Tufts University, USA ; Paterson, Kurt G. ; Bielefeldt, Angela R.”Panel - measuring the impacts of project-based service learning in engineering education”,Published in:Frontiers in Education Conference, 2009. FIE '09. 39th IEEE Date of Conference:18-21 Oct. 2009Page(s):1 – 2.
[13] Ning Huang ; Dept. of Syst. Eng., Beihang Univ., Beijing ; Dong Wang ; Xiaoguang Jia.” An Algebra-Based Reliability Prediction Approach for Composite Web Services”, Published in:Software Reliability Engineering, 2008. ISSRE 2008. 19th International Symposium on Date of Conference:10-14 Nov. 2008Page(s):285 – 286.
[14] Evangelista, G. ; Dept. of Phys. Sci., Univ. Federico II, Italy ; Cavaliere, S.”Discrete frequency warped wavelets: theory and applications”,Published in:Signal Processing, IEEE Transactions on (Volume:46 , Issue: 4) Page(s):874 – 885.
[15] Guangwen Pan ; Dept. of Electr. Eng., Arizona State Univ., Tempe, AZ, USA ; Toupikov, M.V. ; Gilbert, B.K.”On the use of Coifman intervallic wavelets in the method of moments for fast construction of wavelet sparsified matrices”,Published in:Antennas and Propagation, IEEE Transactions on (Volume:47 , Issue: 7 )Page(s):1189 – 1200.
[16] Olhede, S.C. ; Dept. of Math., Imperial Coll. of Sci., Technol. & Med., London, UK ; Walden, A.T.”Generalized Morse wavelets”,Published in:Signal Processing, IEEE Transactions on (Volume:50 , Issue: 11 )Page(s):2661 – 2670.
[17] Xin Pan ; Inst. of Inf. Sci., Beijing Jiaotong Univ., Beijing ; Qiuqi Ruan ; Yanxia Wang.”Palmprint recognition using contourlets-based local fractal dimensions”,Published in:Signal Processing, 2008. ICSP 2008. 9th International Conference onDate of Conference:26-29 Oct. 2008Page(s):2108 – 2111.
Citation
R.Amirtha and R.Bhuvanapriya, "Mark Reliable Including Opinion Landscapes by Outline Let Transforms," International Journal of Computer Sciences and Engineering, Vol.3, Issue.1, pp.152-158, 2015.
A Safe Then Well-Prearranged Two-Waiter Pin Lone Honest Key Conversation
Research Paper | Journal Paper
Vol.3 , Issue.1 , pp.159-164, Jan-2015
Abstract
Password-honest key conversation (PAKE) is an validation maneuver currently a customer then a waiter who portion a pin then validity of the week all extra with thon pin then henceforth together will decide on a cryptographic key. Normally, the pins which are essential to check the patrons are deposited on a lone server. If the waiter is compromised, owing to sure hateful events comparable hacking or installing a Trojan horse, pins which are deposited in the waiter grows revealed. In this newsPA apiece two attendants cooperate to validity of the week a customer then if one waiter is cooperated, the enemy static cannot presentation as a customer with the indication meanwhile the conceded server. Preferred keys aimed at two attendants PAKE are whichever symmetric in the method thon the two waiter consistently underwrite to the validation or unequal in the intellect thon one waiter checks the authenticity of lawful customer with the backing of an extra server. This newsPA apiece gifts the growth of symmetric process aimed at two-waiter PAKE, currently the customer container originate altered cryptographic keys with the two servers. In totaling to thon a Nafter will be produced aimed at the duration of the retro of validation then this will presentation as a timer. If the clock safeguards not expire with in the retro limit, the validation process will be approved out in lateral the boundary which delivers refuge to rerun attacks.
Key-Words / Index Term
PAKE, Vocabulary Attack, Diffie-Hellman Key Exchange, Elgamalencryption, Nafter
References
[1] I. F. Akyildiz, X. Wang, and W. Wang, “Wireless Mesh Networks: A Survey”, Computer Networks and ISDN Systems, Vol.47, Issue-2, 2005, pp.445-487.
[2] I. F. Akyildiz, and X. Wang, “A Survey on Wireless Mesh Networks”, IEEE Radio Communications, Vol.43, Issue-3, 2005, pp.23-30.
[3] M. Lee et al., “Emerging Standards for Wireless Mesh Technology”, IEEE Wireless Communications, Vol.13, Issue-4, 2006, pp.56-63.
[4] N.B. Salem, and J-P Hubaux, “Securing Wireless Mesh Networks”, IEEE Wireless Communications, Vol.13, Issue-2, 2006, pp.50-55.
[5] S. Han, E. Chang, L. Gao, T. Dillon, T., Taxonomy of Attacks on Wireless Sensor Networks, in the Proceedings of the 1st European Conference on Computer Network Defence (EC2ND), University of Glamorgan, UK, Springer Press, SpringerLink Date: December 2007.
[6] C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Ad Hoc Networks 1, 2003, pp. 293-315.
[7] Y. Yang, Y. Gu, X. Tan and L. Ma, “A New Wireless Mesh Networks Authentication Scheme Based on Threshold Method,” 9th International Conference for Young Computer Scientists (ICYCS-2008), 2008, pp. 2260-2265.
[8] Toorani, M. ; Dept. of Inf., Univ. of Bergen, Bergen, Norway, “Security analysis of J-PAKE”,Published in: Computers and Communication (ISCC), 2014 IEEE Symposium on Date of Conference: 23-26 June 2014 Page(s): 1 – 6.
[9] Ding XiaoFei ; Zhengzhou Inf. Sci. & Technol. Inst., Zhengzhou, China ; Ma ChuanGui, “Cryptoanalysis and Improvements of Cross-Realm C2C-PAKE Protocol”,Published in:
[10] Information Engineering, 2009. ICIE '09. WASE International Conference on (Volume:1 ) Date of Conference: 10-11 July 2009 Page(s): 193 – 196.
[11] Liu Xiu-mei ; Comput. Center, Northeastern Univ., Shenyang ; Zhou Fu-cai ; Chang Gui-Ran,”A New C2C-PAKE Protocol in Cross-Realm Setting”,Published in: MultiMedia and Information Technology, 2008. MMIT '08. International Conference on Date of Conference: 30-31 Dec. 2008 Page(s): 562 – 565.
[12] Gang Yao ; State Key Lab. Of Inf. Security, Grad. Univ. of Chinese Acad. of Sci., Beijing ; Hongji Wang ; Dengguo Feng, “A Group PAKE Protocol Using Different Passwords”,Published in:
[13] Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC '09. International Conference on (Volume:1 ) Date of Conference: 25-26 April 2009 Page(s): 270 – 273.
[14] Cheung, S. ; Syst. Design Lab., SRI Int., Menlo Park, CA, USA ;Lindqvist, U. ; Fong, M.W.”Modeling multistep cyber attacks for scenario recognition”,Published in: DARPA Information Survivability Conference and Exposition, 2003. Proceedings (Volume:1 ) Date of Conference: 22-24 April 2003 Page(s): 284 - 292 vol.1.
[15] Vorobiev, A. ; Fac. of ICT, Swinburne Univ. of Technol., Melbourne, VIC, Australia ; Han, J. ”Security Attack Ontology for Web Services”,Published in: Semantics, Knowledge and Grid, 2006. SKG '06. Second International Conference on Date of Conference: 1-3 Nov. 2006 Page(s): 42.
[16] Imamoto, K. ; Graduate Sch. of Inf. Sci & Electr. Eng.., Kyushu Univ., Japan ; Sakurai, K.”A design of Diffie-Hellman based key exchange using one-time ID in pre-shared key model”,Published in: Advanced Information Networking and Applications, 2004. AINA 2004. 18th International Conference on (Volume:1 ) Date of Conference: 2004 Page(s): 327 - 332 Vol.1.
[17] Phan, R.C.-W. ; Inf. Security Res. Lab., Swinburne Univ. of Technol., Kuching, Malaysia, ”Fixing the integrated Diffie-Hellman-DSA key exchange protocol”,Published in: Communications Letters, IEEE (Volume:9 , Issue: 6 ) Page(s): 570 – 572.
[18] Yang Guang-ming ; Dept. of Inf. Security, Northeastern Univ., Shenyang, China ;Chen Jin-ming ; Lu Ya-feng ; Ma Da-ming,”An efficient improved group key agreement protocol based on Diffie-Hellman key exchange”,Published in: Advanced Computer Control (ICACC), 2010 2nd International Conference on (Volume:2 ) Date of Conference: 27-29 March 2010 Page(s): 303 – 306.
[19] Harn, L. ; Sch. of Comput. & Eng., Univ. of Missouri, Kansas City, MO, USA ; Mehta, M. ; Wen-Jung Hsin,”Integrating Diffie-Hellman key exchange into the digital signature algorithm (DSA)”,Published in: Communications Letters, IEEE (Volume:8 , Issue: 3 ) Page(s): 198 – 200.
Citation
K.Archana and V.Geetha, "A Safe Then Well-Prearranged Two-Waiter Pin Lone Honest Key Conversation," International Journal of Computer Sciences and Engineering, Vol.3, Issue.1, pp.159-164, 2015.
Against Spyware by Captcha in Graphical Pin Arrangement
Research Paper | Journal Paper
Vol.3 , Issue.1 , pp.165-172, Jan-2015
Abstract
Text-founded pin systems have inherent refuge then us capability problems, leading to the growth of graphical pin schemes. However, most of these alternate systems are vulnerary intelligent to spyware attacks. We proposal a new scheme, by captcha (finally involuntary communal Turing examinations to tell processors then persons apart) thon retaining the compensations of graphical pin schemes, smooth nevertheless competently raising the charge of opponents via guidelines of magnitude. Furthermore, sure primary trials are led then the results indicate then the capability should be healthier in the upcoming work.
Key-Words / Index Term
Graphical Password; CAPTCHA; Spyware; Validation
References
[1] Eljetlawi, A.M. ; Centre for Adv. Software Eng. (CASE), Univ. Teknol. Malaysia, Kuala Lumpur ; Ithnin, N.” Graphical Password: Comprehensive Study of the Usability Features of the Recognition Base Graphical Password Methods”,Published in:Convergence andHybrid formation Technology, 2008. ICCIT '08. Third International Conference on (Volume:2) Date of Conference:11-13 Nov. 2008Page(s):1137 – 1143.
[2] Eljetlawi, A.M. ; Fac. of Eng., Univ. of Tajoura, Tripoli, Libya.” Graphical password: Existing recognition base graphical password usability”,Published in:Networked Computing (INC), 2010 6th International Conference onDate of Conference:11-13 May 2010Page(s):1 – 5.
[3] Aljahdali, Hani Moaiteq ; Poet, Ron.” Challenge Set Designs and User Guidelines for Usable and Secured Recognition-Based Graphical Passwords”,Published in:Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on Date of Conference:24-26 Sept. 2014 Page(s):973 – 982.
[4] Yuxin Meng ; Dept. of Comput. Sci., City Univ. of Hong Kong, Hong Kong, China.” Designing Click-Draw Based Graphical Password Scheme for Better Authentication”,Published in:Networking, Architecture and Storage (NAS), 2012 IEEE 7th International Conference on Date of Conference:28-30 June 2012 Page(s):39 – 48.
[5] Aljahdali, H.M. ; Sch. of Comput. Sci., Univ. of Glasgow, Glasgow, UK ; Poet, R.” The Affect of Familiarity on the Usability of Recognition-Based Graphical Passwords: Cross Cultural Study between Saudi Arabia and the United Kingdom”,Published in:Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on Date of Conference:16-18 July 2013 Page(s):1528 – 1534.
[6] Chandavale, A. ; Dept. of E&T/C, Univ. of Pune, Pune, India ; Sapkal, A.” An Improved Adaptive Noise Reduction for Secured CAPTCHA”,Published in:Emerging Trends in Engineering and Technology (ICETET), 2011 4th International Conference on Date of Conference:18-20 Nov. 2011 Page(s):12 – 17.
[7] Hamid Ali, Firkhan Ali Bin ; Dept. Web Technology, FSKTM, Universiti Tun Hussein Onn Malaysia, Johor, Malaysia ; Karim, Farhana Bt.” Development of CAPTCHA system based on puzzle”,Published in:Computer, Communications, and Control Technology (I4CT), 2014 International Conference on Date of Conference:2-4 Sept. 2014 Page(s):426 – 428.
[8] Quan-Bin Ye ; Dept. of Comput. Sci. & Inf. Eng., Nat. Taiwan Univ. of Sci. & Technol., Taipei, Taiwan ; Te-En Wei ; Jeng, A.B. ; Hahn-Ming Lee.” DDIM-CAPTCHA: A Novel Drag-n-Drop Interactive Masking CAPTCHA against the Third Party Human Attacks”,Published in:Technologies and Applications of Artificial Intelligence (TAAI), 2013 Conference on Date of Conference:6-8 Dec. 2013Page(s):158 – 163.
[9] Te-En Wei ; Dept. of Comput. Sci. & Inf. Eng., Nat. Taiwan Univ. of Sci. & Technol., Taipei, Taiwan ; Jeng, A.B. ; Hahn-Ming Lee.” GeoCAPTCHA — A novel personalized CAPTCHA using geographic concept to defend against 3rd Party Human Attack”,Published in:Performance Computing and Communications Conference (IPCCC), 2012 IEEE 31st International Date of Conference:1-3 Dec. 2012Page(s):392 – 399.
[10] Tamang, T. ; Dept. of Math. & Comput. Sci., Chulalongkorn Univ., Bangkok, Thailand ; Bhattarakosol, P.” Uncover impact factors of text-based CAPTCHA identification”,Published in:Computing and Convergence Technology (ICCCT), 2012 7th International Conference onDate of Conference:3-5 Dec. 2012Page(s):556 – 560.
[11] Ming-Wei Wu ; Dept. of Electr. Eng., Nat. Taiwan Univ., Taipei ; Yennun Huang ; Yi-Min Wang ; Sy-Yen Kuo.” A Stateful Approach to Spyware Detection and Removal”,Published in:Dependable Computing, 2006. PRDC '06. 12th Pacific Rim International Symposium onDate of Conference:Dec. 2006Page(s):173 – 182.
[12] Shams, R. ; Dept. of Electron. Eng., Sir Syed Univ. of Eng. & Technol., Karachi, Pakistan ; Farhan, M. ; Khan, S.A. ; Hashmi, F.” Comparing Anti-Spyware products — A different approach”,Published in:Information Technology and Artificial Intelligence Conference (ITAIC), 2011 6th IEEE Joint International (Volume:1 )Date of Conference:20-22 Aug. 2011Page(s):75 – 80.
[13] Chandrasekaran, M. ; Comput. Sci. & Eng., Buffalo Univ., NY ; Vidyaraman, S. ; Upadhyaya, S.” SpyCon: Emulating User Activities to Detect Evasive Spyware”,Published in:Performance, Computing, and Communications Conference, 2007. IPCCC 2007. IEEE Internationa Date of Conference:11-13 April 2007 Page(s):502 – 509.
[14] Ming-Wei Wu ; Nat. Taiwan Univ., Taipei ; Yi-Min Wang ; Sy-Yen Kuo ; Yennun Huang.” Self-Healing Spyware: Detection, and Remediation”,Published in:Reliability, IEEE Transactions on (Volume:56 , Issue: 4 )Page(s):588 – 596.
[15] Xiaoqiao Wang ; Manage. Dept., Hunan Univ. of Sci. & Technol., Xiangtan, China ; Juanjuan Chen.” Interests-Based Spyware Detection”,Published in:Computer Science-Technology and Applications, 2009. IFCSTA '09. International Forum on (Volume:2 )Date of Conference:25-27 Dec. 2009Page(s):175 – 178.
[16] Chuang Gu ; Dept. of Equip. Command & Manage., Ordnance Eng. Coll., Shijiazhuang, China ; Xisheng Jia ; Bing Liu ; Guiqi Wang.”Notice of RetractionResearch on validation method of dynamic action of equipment maintenance support simulation conceptual model”,Published in:Quality, Reliability, Risk, Maintenance, and Safety Engineering (QR2MSE), 2013 International Conference on Date of Conference:15-18 July 2013 Page(s):1379 – 1382.
[17] Mo Chen ; Coll. of Comput., Hangzhou Dianzi Univ., Hangzhou ; Ning Zheng ; Ming Xu ; Yongjian Lou.” Validation Algorithms Based on Content Characters and Internal Structure: The PDF File Carving Method”,Published in:Information Science and Engineering, 2008. ISISE '08. International Symposium on (Volume:1 )Date of Conference:20-22 Dec. 2008 Page(s):168 – 172.
[18] Fei-Yan Min ; Control & Simulation Center, Harbin Inst. of Technol. ; Ming Yang ; Zi-Cai Wang.” An Intelligent Validation System of Simulation Model”,Published in:Machine Learning and Cybernetics, 2006 International Conference on Date of Conference:13-16 Aug. 2006 Page(s):1459 – 1464.
[19] Bojan, T. ; Israel Design Center, Intel Corp., Haifa ; Frumkin, I. ; Mauri, R.” Intel First Ever Converged Core Functional Validation Experience: Methodologies, Challenges, Results and Learning”,Published in:Microprocessor Test and Verification, 2007. MTV '07. Eighth International Workshop onDate of Conference:5-6 Dec. 2007 Page(s):85 – 90.
[20] Knauf, R. ; Dept. of Comput. Sci. & Autom., Tech. Univ. of Ilmenau ; Tsuruta, S. ; Gonzalez, A.J.” Toward Reducing Human Involvement in Validation of Knowledge-Based Systems”,Published in:Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions on (Volume:37 , Issue: 1 )Page(s):120 – 131.
Citation
P.Arthy and J.Revathi, "Against Spyware by Captcha in Graphical Pin Arrangement," International Journal of Computer Sciences and Engineering, Vol.3, Issue.1, pp.165-172, 2015.
Lung Tisue Group by Wavelet Frames
Research Paper | Journal Paper
Vol.3 , Issue.1 , pp.173-178, Jan-2015
Abstract
we label a consistency group scheme thon identifies lung ttopic designs meanwhile high–reresolve considered tomography (hrct) images of patients pretentious with interstitial lung sicknesses (ild). This design appreciation chore is portion of an image–founded diagnostic aid scheme aimed at ilds. Five lung ttopic designs (healthy, emphysema, crushed glass, fibrosis then microdules) selected meanwhile a hypermedia file are underground by the over wfleabag sepagrade wavelet advantstage decomposition joint with grey–level histogrbe situated features. The over-all multisession correctness reaches 92.5% of thoroughgoing cup tie smooth nevertheless joining the two classes of features, which are originate to be complementary.
Key-Words / Index Term
Wavelet Frames, HRCT, ILDS
References
[1] Yang Song; Biomed. & Multimedia Inf. Technol. (BMIT) Res. Group, Univ. of Sydney, Sydney, NSW, Australia ; Weeding Cai ; Yun Zhou ; Feng, D.D.” Feature-Based Image Patch Approximation for Lung Tissue Classification”, Published in:Medical Imaging, IEEE Transactions on (Volume:32 , Issue: 4 ) Page(s):797 – 808.
[2] Linying Yu ; State Key Lab. for Multi-spectral Inf. Process. Technol., Huazhong Univ. of Sci. & Technol., Wuhan, China ; Delie Ming ; Liping Xiao.”Pneumoconiosis's Gross Tissue Imaging Classification Based on Morphological Feature Description”,Published in:Computational Intelligence and Design (ISCID), 2012 Fifth International Symposium on (Volume:2 )Date of Conference:28-29 Oct. 2012Page(s):23 – 26.
[3] Rangayyan, R.M. ; Dept. of Electr. & Comput. Eng., Calgary Univ., Alta., Canada ; El-Faramawy, N.M. ; Desautels, J.E.L. ; Alim, O.A.”Measures of acutance and shape for classification of breast tumors”,Published in:Medical Imaging, IEEE Transactions on (Volume:16 , Issue: 6 )Page(s):799 – 810.
[4] Tomei, S. ; CREATIS-LRMN Lyon, CNRS UMR 5220, Inserm U630, INSA, Lyon University, Bâtiment Blaise Pascal, 7 av. Jean Capelle, 69621 Villeurbanne Cedex France ; Marache-Francisco, Simon ; Odet, C. ; Lartizien, C.”Automatic detection of active nodules in 3D PET oncology imaging using the Hotelling Observer and the Support Vector Machines: A comparison study”,Published in:Nuclear Science Symposium Conference Record, 2008. NSS '08. IEEEDate of Conference:19-25 Oct. 2008Page(s):5314 – 5319.
[5] Maglogiannis, I. ; Univ. of the Aegean, Karlovasi ; Sarimveis, H. ; Kiranoudis, C.T. ; Chatziioannou, A.A.”Radial Basis Function Neural Networks Classification for the Recognition of Idiopathic Pulmonary Fibrosis in Microscopic Images”,Published in:Information Technology in Biomedicine, IEEE Transactions on (Volume:12 , Issue: 1 )Page(s):42 – 54.
[6] Mojsilovic, A. ; Fac. of Electr. Eng., Belgrade Univ., Serbia ; Popovic, M.V. ; Neskovic, A.N. ; Popovic, A.D.”Wavelet image extension for analysis and classification of infarcted myocardial tissue”,Published in:Biomedical Engineering, IEEE Transactions on (Volume:44 , Issue: 9 ) Page(s):856 – 866.
[7] Sorensen, L. ; Dept. of Comput. Sci., Univ. of Copenhagen, Copenhagen, Denmark ; Shaker, S.B. ; de Bruijne, M.”Quantitative Analysis of Pulmonary Emphysema Using Local Binary Patterns”,Published in:Medical Imaging, IEEE Transactions on (Volume:29 , Issue: 2 )Page(s):559 – 569.
[8] Qing Li ; Biomed. & Multimedia Inf. Technol. (BMIT) Res. Group, Univ. of Sydney, Sydney, NSW, Australia ; Weidong Cai ; Feng, D.D.”Lung image patch classification with automatic feature learning”,Published in:Engineering in Medicine and Biology Society (EMBC), 2013 35th Annual International Conference of the IEEE Date of Conference:3-7 July 2013 Page(s):6079 – 6082.
[9] Depeursinge, A. ; Univ. & Univ. Hosp. of Geneva, Geneva ; Sage, D. ; Hidki, A. ; Platon, A.”Lung Tissue Classification Using Wavelet Frames”,Published in:Engineering in Medicine and Biology Society, 2007. EMBS 2007. 29th Annual International Conference of the IEEEDate of Conference:22-26 Aug. 2007Page(s):6259 – 6262.
[10] Huan Yu ; Dept. of Med. Biophys., Univ. of Toronto, Toronto, ON ; Caldwell, C. ; Mah, K. ; Mozeg, D.”Coregistered FDG PET/CT-Based Textural Characterization of Head and Neck Cancer for Radiation Treatment Planning”,Published in:Medical Imaging, IEEE Transactions on (Volume:28 , Issue: 3 )Page(s):374 – 383.
[11] Widz, S. ; Polish-Japanese Inst. of Inf. Technol., Warsaw ; Slezak, D.”Approximation Degrees in Decision Reduct-Based MRI Segmentation”,Published in:Frontiers in the Convergence of Bioscience and Information Technologies, 2007. FBIT 2007Date of Conference:11-13 Oct. 2007Page(s):431 – 436.
[12] Xujiong Ye ; Medicsight PLC, London ; Xinyu Lin ; Dehmeshki, J. ; Slabaugh, G.”Shape-Based Computer-Aided Detection of Lung Nodules in Thoracic CT Images”,Published in:Biomedical Engineering, IEEE Transactions on (Volume:56 , Issue: 7 )Page(s):1810 – 1820.
[13] Mojsilovic, A. ; Fac. of Electr. Eng., Belgrade Univ., Serbia ; Popovic, M. ; Popovic, A. ; Neskovic, A.”Analysis and characterization of myocardial tissue with the wavelet image extension [US images]”,Published in:Image Processing, 1995. Proceedings., International Conference on (Volume:2 )Date of Conference:23-26 Oct 1995Page(s):504 - 507 vol.2.
[14] Iakovidis, D.K. ; Dept. of Inf. & Comput. Technol., Technol. Educ. Inst. of Lamia, Lamia, Greece ; Tsevas, S. ; Savelonas, M.A. ; Papamichalis, G.”Image Analysis Framework for Infection Monitoring”,Published in:Biomedical Engineering, IEEE Transactions on (Volume:59 , Issue: 4) Page(s):1135 – 1144.
[15] Dash, J.K. ; Dept. of Electron. & Electr. Commun. Eng., Indian Inst. of Technol., Kharagpur, Kharagpur, India ; Mukhopadhyay, S. ; Garg, M.K. ; Prabhakar, N.”Multi-classifier framework for lung tissue classification”,Published in:Students' Technology Symposium (TechSym), 2014 IEEEDate of Conference:Feb. 28 2014-March 2 2014Page(s):264 – 269.
[16] Mavroforakis, M.E. ; Informatics Dept., Athens Univ., Greece ; Georgiou, H.V. ; Cavouras, D. ; Dimitropoulos, N.”Mammographic mass classification using textural features and descriptive diagnostic data”,Published in:Digital Signal Processing, 2002. DSP 2002. 2002 14th International Conference on (Volume:1 )Date of Conference:2002Page(s):461 - 464 vol.1.
[17] McLeod, P. ; Central Queensland Univ., Rockhampton ; Verma, B. ; Panchal, R.”Combining SOM based Clustering and MGS for Classification of Suspicious Areas within Digital Mammograms”,sPublished in:Intelligent Sensors, Sensor Networks and Information, 2007. ISSNIP 2007. 3rd International Conference onDate of Conference:3-6 Dec. 2007Page(s):413 – 418.
[18] Devan, L. ; Sathyabama Univ., Chennai, India ; Santhosham, R. ; Hariharan, R.”Non-invasive Method of Characterization of Fibrosis and Carcinoma Using Low-Dose Lung CT Images”,Published in:Systems, Man, and Cybernetics (SMC), 2013 IEEE International Conference onDate of Conference:13-16 Oct. 2013Page(s):2168 – 2172
[19] Kockelkorn, T.T.J.P. ; Image Sci. Inst., UMC Utrecht, Utrecht, Netherlands ; van Rikxoort, E.M. ; Grutters, J.C. ; van Ginneken, B.”Interactive lung segmentation in CT scans with severe abnormalities”,Published in:Biomedical Imaging: From Nano to Macro, 2010 IEEE International Symposium onDate of Conference:14-17 April 2010Page(s):564 – 567.
[20] Keerthivasan, A. ; Dept. of Electron. & Commun., Pondicherry Eng. Coll., Pondicherry, India ; Babu, J.J. ; Sudha, G.F.”Speckle noise reduction in ultrasound images using fuzzy logic based on histogram and directional differences”,Published in:Communications and Signal Processing (ICCSP), 2013 International Conference onDate of Conference: 3-5 April 2013 Page(s):499 – 503.
Citation
M.Dhivya and R.Manjupargavi, "Lung Tisue Group by Wavelet Frames," International Journal of Computer Sciences and Engineering, Vol.3, Issue.1, pp.173-178, 2015.
New Instructions In Communal Authentication
Review Paper | Journal Paper
Vol.3 , Issue.1 , pp.179-184, Jan-2015
Abstract
Mesh facilities are progressively approving supplementary validation strategies to supplement the refuge if via unsingle pin verification. In the area of communal scheme founded web-services, Facebook has pioneered the use of communal validation as an supplementary validation mechanism. If Facebook perceives a operator login under doubtful circumstances, then employees are needed to check info about their friends (in totaling to verifying their passwords). However, new exertion has individual thon face book’s communal validation is insecure. In this work-in-progress, we proposal to rethink the idea of communal authentication. Our key vision is thon on communal scheme (OSN) employees are privy to big totals of remote facts produced via users, counting info about users’ on interactions. Founded on this insight, we architect a scheme aimed at communal validation thon requests employees to check info about their communal associates then their interactions. Our scheme leverages info endangered via confidentiality policies of OSNs to battle attacks, such as enquiries founded on remote operator networks counting swapping mails then poking communal contacts. We practical our scheme protosympathetic as a Facebook application, then predesigned a initial operator instruction to assess incapability of the approach. Our first trials have been encouraging; we find thon employees have tall rates of recollection aimed at info produced in the conman script of OSN interactions. Overall, our exertion delivers a talented new way aimed at the safe then unintelligent positioning of communal authentication.
Key-Words / Index Term
Component; Formatting; Style; Styling; Insert
References
[1] I. F. Akyildiz, X. Wang, and W. Wang, “Wireless Mesh Networks: A Survey”, Computer Networks and ISDN Systems, Vol.47, Issue-2, 2005, pp.445-487.
[2] I. F. Akyildiz, and X. Wang, “A Survey on Wireless Mesh Networks”, IEEE Radio Communications, Vol.43, Issue-3, 2005, pp.23-30.
[3] M. Lee et al., “Emerging Standards for Wireless Mesh Technology”, IEEE Wireless Communications, Vol.13, Issue-4, 2006, pp.56-63.
[4] N.B. Salem, and J-P Hubaux, “Securing Wireless Mesh Networks”, IEEE Wireless Communications, Vol.13, Issue-2, 2006, pp.50-55.
[5] S. Han, E. Chang, L. Gao, T. Dillon, T., Taxonomy of Attacks on Wireless Sensor Networks, in the Proceedings of the 1st European Conference on Computer Network Defence (EC2ND), University of Glamorgan, UK, Springer Press, SpringerLink Date: December 2007.
[6] C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Ad Hoc Networks 1, 2003, pp. 293-315.
[7] Y. Yang, Y. Gu, X. Tan and L. Ma, “A New Wireless Mesh Networks Authentication Scheme Based on Threshold Method,” 9th International Conference for Young Computer Scientists (ICYCS-2008), 2008, pp. 2260-2265.
[8] Zhihong Xu ; Sch. of Comput. Sci. & Eng., Hebei Univ. of Technol., Tianjin, China ; Jing Sun “The Design of a Component Based Secure Grid Computing Environment”, Published in: Intelligent Networks and Intelligent Systems, 2009. ICINIS '09. Second International Conference on Date of Conference: 1-3 Nov. 2009 Page(s): 409 – 412.
[9] Gao, J. ; San Jose State Univ., CA, USA ; Shih, M.-C. “A component testability model for verification and measurement”, Published in: Computer Software and Applications Conference, 2005. COMPSAC 2005. 29th Annual International (Volume:2 ) Date of Conference: 26-28 July 2005 Page(s): 211 - 218 Vol. 1.
[10] Gao Huaiyan ; Sch. of Software, Yunnan Univ., Kunming, China ; Tang Jiahua ; Liu Junhui ; Liao Hongzhi “A Network-Application Framework Based on Application-Component” , Published in: Software Engineering, Artificial Intelligences, Networking and Parallel/Distributed Computing, 2009. SNPD '09. 10th ACIS International Conference on Date of Conference: 27-29 May 2009 Page(s): 181 – 185.
[11] Gao, J. ; Gopinathan, D. ; Quan Mai San ; Jingsha He “A Systematic Regression Testing Method and Tool For Software Components”, Published in: Computer Software and Applications Conference, 2006. COMPSAC '06. 30th Annual International (Volume:1 ) Date of Conference: 17-21 Sept. 2006 Page(s): 455 – 466.
[12] Jeong Ah Kim ; Comput. Educ. Dept., Kwandong Univ., KangWon, South Korea ; Oh-Cheon Kwon ; Jihyun Lee ; Gyu-Sang Shin “Component adaptation using adaptation pattern components”, Published in: Systems, Man, and Cybernetics, 2001 IEEE International Conference on (Volume:2 ) Date of Conference: 2001 Page(s): 1025 - 1029 vol.2.
[13] van den Brand, M.G.J. ; Centrum voor Wiskunde en Informatica, Amsterdam ; Kooiker, A.T. ; Vinju, J.J. ; Veerman, N.P. “A language independent framework for context-sensitive formatting”, Published in: Software Maintenance and Reengineering, 2006. CSMR 2006. Proceedings of the 10th European Conference on Date of Conference: 22-24 March 2006 Page(s): 10 pp. – 112.
[14] Bellini, P. ; Dept. of Syst. & Informatics, Univ. of Florence, Italy ; Della Santa, R. ; Nesi, P. “Automatic formatting of music sheets” , Published in: Web Delivering of Music, 2001. Proceedings. First International Conference on Date of Conference: 23-24 Nov. 2001 Page(s): 170 – 177.
[15] Cao, Yufei ; Beijing Institute of Radio Measurement, Beijing 100039, P. R. China ; Qui, Xiaoguang ; Huanq, Peikang “Research on keystone formatting based on non-baseband interpolation”, Published in: Systems Engineering and Electronics, Journal of (Volume:21 , Issue: 4 ) Page(s): 562 – 565.
[16] van den Brand, M.G.J. ; Centrum voor Wiskunde en Inf., Amsterdam, Netherlands ; Kooiker, A.T. ; Vinju, J.J. ; Veerman, N.P. “An architecture for context-sensitive formatting”, Published in: Software Maintenance, 2005. ICSM'05. Proceedings of the 21st IEEE International Conference on Date of Conference: 26-29 Sept. 2005 Page(s): 631 – 634.
[17] Xiantao Chen ; Hunan Univ., Changsha ; Jianghong Zhao “Research on the Model and Application of Feature-based Automobile Styling”, Published in: Computer-Aided Design and Computer Graphics, 2007 10th IEEE International Conference on Date of Conference: 15-18 Oct. 2007 Page(s): 258 – 263.
[18] Wonsup Kim ; Ewha Womans Univ., Seoul “Styling in Robot Flatform Design”, Published in: Robot and Human interactive Communication, 2007. RO-MAN 2007. The 16th IEEE International Symposium on Date of Conference: 26-29 Aug. 2007 Page(s): 508.
[19] Fleisch, T. ; Fraunhofer IGD, Darmstadt, Germany ; Brunetti, G. ; Santos, P. ; Stork, A. “Stroke-input methods for immersive styling environments”, Published in: Shape Modeling Applications, 2004. Proceedings Date of Conference: 7-9 June 2004 Page(s): 275 – 283.
[20] Yusof, W.Z.M. ; Comercialization Res. Group, Univ. Teknol., Skudai, Malaysia ; Mujir, M.S. ; Isa, S.S. ; Ali, A. “Ontology understanding in enhancing car styling ideation”, Published in: Humanities, Science and Engineering Research (SHUSER), 2012 IEEE Symposium on Date of Conference: 24-27 June 2012 Page(s): 227 – 232.
Citation
R. J. Jenusha and V. Geetha, "New Instructions In Communal Authentication," International Journal of Computer Sciences and Engineering, Vol.3, Issue.1, pp.179-184, 2015.
An Greater Light-Weight Dynamic Groundwork Transmitting Process by BFS Then DFS Aimed at MANET
Research Paper | Journal Paper
Vol.3 , Issue.1 , pp.185-192, Jan-2015
Abstract
MANET is a self-prearranged then self-configure intelligent scheme without preferred infrastructure. It contains of numerous moveable wire fewer nodes. A transmitting process delivers a well-prearranged method amid moveable swellings in lateral the network. The result then maintenance of method should drink minimum overhead advertisement then bandwidth. In this paper, we preferred a single dynamic groundwork transmitting process thon has a very minor communication overhead. The planned exertion is a well-prearranged then healthier light-weight dynamic groundwork transmitting process aimed at MANETs thon exploits two communal extra removal algorithms, called extensiveness chief pursuit (BFS) then complexity chief pursuit (DFS) to learn the route. In such method, all bump of the wire fewer scheme covers a national table. Such bench covers all bump then its nationals with reserve amid them. Therefore, all bump has a occupied topology of the wirefewer scheme which is valuable to learn the route. Episodic info conversation is used to inform such table. We examine the answer of transmitting in MANET then assess its presentation by scheme simulator-2 (ns-2) under altered scheme parameters.
Key-Words / Index Term
MANET, NS-2, Transmitting protocols, BFS, DFS, PSR, DSDV, AODV, OLSR, DSR
References
[1] Ismail, Z. ; Kuliyyah of Inf. Sci. & Technol., Kolej Univ. Insaniah, Alor Setar, Malaysia ; Hassan, R.” Effects of Packet Size on AODV Routing Protocol Implementation in Homogeneous and Heterogeneous MANET”, Published in: Computational Intelligence, Modelling and Simulation (CIMSiM), 2011 Third International Conference on Date of Conference: 20-22 Sept. 2011 Page(s): 351 – 356.
[2] Thorat, S.A. ; Walchand Coll. of Eng., Sangli, India; Kulkarni, P.J.” Design issues in trust based routing for MANET”, Published in: Computing, Communication and Networking Technologies (ICCCNT), 2014 International Conference on Date of Conference: 11-13 July 2014 Page(s): 1 – 7.
[3] Lacharite, Y. ; Commun. Res. Centre, Ottawa ; Wang, M. ; Lamont, L. ; Landmark, L.” A Simplified Approach to Multicast Forwarding Gateways in MANET”, Published in: Wireless Communication Systems, 2007. ISWCS 2007. 4th International Symposium on Date of Conference: 17-19 Oct. 2007 Page(s): 426 – 430.
[4] Durai, K.N. ; CSE Sri Eshwar Coll. of Eng., Coimbatore, India ; Baskaran, K.” Energy efficient random cast DSR protocol with mediation device in MANET”, Published in: Advanced Computing and Communication Systems (ICACCS), 2013 International Conference on Date of Conference: 19-21 Dec. 2013 Page(s): 1 – 5.
[5] Zupeng Li ; Telecommun. Eng. Inst., Airforce Eng. Univ., Shanxi ; Xiaochuan Yin ; Peiyang Yao ; Jinnan Huang, “Implementation of P2P Computing in Design of MANET Routing Protocol”, Published in: Computer and Computational Sciences, 2006. IMSCCS '06. First International Multi-Symposiums on (Volume:2 ) Date of Conference: 20-24 June 2006 Page(s): 594 – 602.
[6] Bansal, G. ; InfoTechnol. Center, Toyota, Mountain View, CA, USA ; Kenney, J.B. ; Weinfield, A.” Cross-Validation of DSRC Radio Testbed and NS-2 Simulation Platform for Vehicular Safety Communications”, Published in: Vehicular Technology Conference (VTC Fall), 2011 IEEE Date of Conference: 5-8 Sept. 2011 Page(s): 1 – 5.
[7] Yunjiao Xue ; Univ. of Western Ontario, London ; Ho Sung Lee ; Ming Yang ; Kumarawadu, P.” Performance Evaluation of NS-2 Simulator for Wireless Sensor Networks”, Published in: Electrical and Computer Engineering, 2007. CCECE 2007. Canadian Conference on Date of Conference: 22-26 April 2007 Page(s): 1372 – 1375.
[8] Ning Gu ; Grad. Sch. at Shenzhen, Tsinghua Univ. Shenzhen, Shenzhen, China ; Yong Jiang ; Jun Zhang ; Hai-tao Zheng,” An Implementation of WBAN Module Based on NS-2”, Published in: Computer Sciences and Applications (CSA), 2013 International Conference on Date of Conference: 14-15 Dec. 2013 Page(s): 114 – 118.
[9] Myungin Ji ; Sch. of Eng., Inf. & Commun. Univ., Daejeon ; Yonggyu Kim ; Myunghwan Seo ; Joongsoo Ma,” A Novel Multi-channel Multi-radio Wireless Mesh Node Architecture for NS-2”, Published in: Communications and Mobile Computing, 2009. CMC '09. WRI International Conference on (Volume:2 ) Date of Conference: 6-8 Jan. 2009 Page(s): 147 – 151.
[10] Papadimitriou, I. ; Dept. of Electron. & Comput. Eng., Tech. Univ. Crete, Greece ; Paterakis, M.” Energy-conserving access protocols for transmitting data in unicast and broadcast mode”, Published in: Personal, Indoor and Mobile Radio Communications, 2000. PIMRC 2000. The 11th IEEE International Symposium on (Volume:2 ) Date of Conference: 2000 Page(s): 984 - 988 vol.2.
[11] Storz, W. ; FGAN-FFM, Wachtberg, Germany ; Beling, G.” Transmitting time-critical data over heterogeneous subnetworks using standardized protocols”, Published in: Computer Communications and Networks, 1995. Proceedings., Fourth International Conference on Date of Conference: 20-23 Sep 1995 Page(s): 82 – 87.
[12] Renk, T. ; Commun. Eng. Lab., Karlsruhe Inst. of Technol., Karlsruhe, Germany ; Jaekel, H. ; Jondral, F.K. ; Goldsmith, A.” Do decode-and-forward relaying protocols beat transmit diversity?”, Published in: Wireless Conference (EW), 2010 European Date of Conference: 12-15 April 2010 Page(s): 294 – 300.
[13] Sheth, A. ; Dept. of Comput. Sci., Colorado Univ., USA ; Han, R. “SHUSH: reactive transmit power control for wireless MAC protocols”, Published in: Wireless Internet, 2005. Proceedings. First International Conference on Date of Conference: 10-14 July 2005 Page(s): 18 – 25.
[14] Kwihoon Kim ; BcN Res. Div., ETRI, Daejeon ; Jinsul Kim ; Hyun-Woo Lee ; Won Ryu,” Method for transmitting SMS for VoIP service supporting Multi-protocol”, Published in: Consumer Electronics, 2006. ISCE '06. 2006 IEEE Tenth International Symposium on Date of Conference: 0-0 0 Page(s): 1 – 5.
[15] Kurant, M. ; California Inst. for Telecommun. & Inf. Technol. (CalIT2), Univ. of California, Irvine, CA, USA ; Markopoulou, A. ; Thiran, P.” Towards Unbiased BFS Sampling”, Published in: Selected Areas in Communications, IEEE Journal on (Volume:29 , Issue: 9 ) Page(s): 1799 – 1809.
[16] Busato, F. ; Federico Busato is with the Department of Computer Science, University of Verona, Italy, (e-mail: federico.busato@univr.it). ; Bombieri, N.” BFS-4K: an Efficient Implementation of BFS for Kepler GPU Architectures”, Published in: Parallel and Distributed Systems, IEEE Transactions on (Volume:PP , Issue: 99 ) Page(s): 1.
[17] Kurant, M. ; Sch. of Comput. & Comm. Sci., EPFL, Lausanne, Switzerland ; Markopoulou, A. ; Thiran, P.” On the bias of BFS (Breadth First Search)”, Published in: Teletraffic Congress (ITC), 2010 22nd International Date of Conference: 7-9 Sept. 2010 Page(s): 1 – 8.
[18] Xu Jian-zhong ; Sch. of Econ. & Manage., Harbin Eng. Univ., Harbin, China ; Leng Dan ; Lu Jun,” Research on the PSR model of the core competence promotion of eco-enterprises”, Published in: Management Science and Engineering, 2009. ICMSE 2009. International Conference on Date of Conference: 14-16 Sept. 2009 Page(s): 717 – 723.
[18] Chandanan, A.K. ; Dept. of Inf. Technol., Smart Ashok Technol. Inst., Vidisha, India ; Shrivastava, S.K.” Secure Mobile Network Routing Protocol Using PSR”, Published in: Computational Intelligence and Communication Networks (CICN), 2010 International Conference on Date of Conference: 26-28 Nov. 2010 Page(s): 289 – 295.
[19] Allison, C. ; Div. of Comput. Sci., St. Andrews Univ., UK “Developing distributed group communication in pSR” , Published in: Parallel and Distributed Processing, 1996. PDP '96. Proceedings of the Fourth Euromicro Workshop on Date of Conference: 24-26 Jan 1996 Page(s): 462 – 469.
Citation
P.Karthika and R.Manjupargavi, "An Greater Light-Weight Dynamic Groundwork Transmitting Process by BFS Then DFS Aimed at MANET," International Journal of Computer Sciences and Engineering, Vol.3, Issue.1, pp.185-192, 2015.
Manuscript to Speech: A Humble Tutorial
Review Paper | Journal Paper
Vol.3 , Issue.1 , pp.193-196, Jan-2015
Abstract
Repursuit on manuscript to linguistic (tts) change is a big enterprise thon displays an impressive upgrading in the previous pair of decades. This article has two foremost goals. The chief goalmouth is to summarize the published literatures on manuscript to linguistic (tts), with discussing about the efforts booked in all paper. The second goalmouth is to label expresentation trequests focused aimed at the duration of manuscript to linguistic (tts) change namely, predoling out & manuscript detection, linearization, manuscript normalization, prosodic phrasing, ocr, audio doling out then intonation. We illustgrade these topics via telling the tts synthesis. This scheme will be really valuable aimed at an illitegrade then vision impaired folks to hear then understthen the content, wcurrently they look maround glitches in their everyday lifetime owing to the changes in their script system. This newspaapiece twitches with the overinterpretation to sure elementary ideas on tts synthesis, which will be valuable aimed at the readers who are fewer acquainted in this portion of research.
Key-Words / Index Term
TTS
References
[1] Ghose, R. ; Dept. of Comput. Sci. & Eng., Indian Inst. of Technol., Kharagpur, India ; Dasgupta, T. ; Basu, A. “Architecture of a web browser for visually handicapped people” ,Published in: Students' Technology Symposium (TechSym), 2010 IEEE Date of Conference: 3-4 April 2010 Page(s): 325 – 329.
[2] Conn, N. ; Fac. of Inf., Ulster Univ., Jordanstown, UK ; McTear, M. “Speech technology: a solution for people with disabilities” ,Published in: Speech and Language Processing for Disabled and Elderly People (Ref. No. 2000/025), IEE Seminar on Date of Conference: 2000 Page(s): 7/1 - 7/6.
[3] Rathod, P.S. “Script to speech conversion for Hindi language by using artificial neural network” ,Published in: Engineering (NUiCONE), 2011 Nirma University International Conference on Date of Conference: 8-10 Dec. 2011 Page(s): 1 – 5.
[4] Cofino, J. ; Dept. of Electr. & Comput. Eng., Florida Int. Univ., Miami, FL, USA ; Barreto, A. ; Abyarjoo, F. ; Ortega, F.R. “Sonifying HTML tables for audio-spatially enhanced non-visual navigation”,Published in: Southeastcon, 2013 Proceedings of IEEE Date of Conference: 4-7 April 2013 Page(s): 1 – 5.
[5] Cofino, J. ; Dept. of Electr. & Comput. Eng., Florida Int. Univ., Miami, FL, USA ; Barreto, A. ; Abyarjoo, F. ; Ortega, F.R. “Sonifying HTML tables for audio-spatially enhanced non-visual navigation”,Published in: Southeastcon, 2013 Proceedings of IEEE Date of Conference: 4-7 April 2013 Page(s): 1 – 5.
[6] Hangrong Pan ; Dept. of Electr. Eng., City Coll. of New York, New York, NY, USA ; Chucai Yi ; YingLi Tian “A primary travelling assistant system of bus detection and recognition for visually impaired people”,Published in: Multimedia and Expo Workshops (ICMEW), 2013 IEEE International Conference on Date of Conference: 15-19 July 2013 Page(s): 1 – 6 .
[7] Shirali-Shahreza, M. ; Sharif Univ. of Technol., Tehran ; Shirali-Shahreza, S. “CAPTCHA for Blind People”,Published in: Signal Processing and Information Technology, 2007 IEEE International Symposium on Date of Conference: 15-18 Dec. 2007 Page(s): 995 – 998.
[8] D'Atri, E. ; Univ. di Roma "La Sapienza", Rome ; Medaglia, C.M. ; Serbanati, A. ; Ceipidor, U.B. “A system to aid blind people in the mobility: A usability test and its results” ,Published in: Systems, 2007. ICONS '07. Second International Conference on Date of Conference: 22-28 April 2007 Page(s): 35.
[9] Yimngam, S. ; Fac. of Inf. Technol., King Mongkut ''s Inst. of Technol., Bangkok ; Premchaisawadi, W. ; Kreesuradej, W. “State of the Art Review on Thai Text-to-Speech System” ,Published in: Computer Science and Information Technology, 2008. ICCSIT '08. International Conference on Date of Conference: Aug. 29 2008-Sept. 2 2008 Page(s): 194 – 198.
[10] Karthikadevi, M. ; Dept. of Comput. Sci. & Eng. - PG, Nat. Eng. Coll. (Autonomous), Kovilpatti, India ; Srinivasagan, K.G. “The development of syllable based text to speech system for Tamil language” ,Published in: Recent Trends in Information Technology (ICRTIT), 2014 International Conference on Date of Conference: 10-12 April 2014 Page(s): 1 – 6.
[11] Yeh, C.-Y. ; Dept. of Electr. Eng., Nat. Taipei Univ. of Technol., Taiwan ; Hwang, S.-H. “Efficient text analyser with prosody generator-driven approach for Mandarin text-to-speech” ,Published in: Vision, Image and Signal Processing, IEE Proceedings - (Volume:152 , Issue: 6 ) Page(s): 793 – 799.
[12] Acero, A. ; Speech Technol. Group, Microsoft Corp., Redmond, WA, USA “An overview of text-to-speech synthesis”,Published in: Speech Coding, 2000. Proceedings. 2000 IEEE Workshop on Date of Conference: 2000.
[13] Gros, J. ; Fac. of Electr. Eng., Ljubljana Univ., Slovenia ; Mihelic, F. ; Pavesic, N. “SITES: Slovene Interactive Text-to-Speech Evaluation Site” ,Published in: Industrial Electronics, 1999. ISIE '99. Proceedings of the IEEE International Symposium on (Volume:1 ) Date of Conference: 1999 Page(s): 213 - 216 vol.1.
[14] Anil, M.C. ; Dept. of Electron. & Telecommun. Eng., JSPM's Rajarshi Shahu Coll. of Eng., Pune, India ; Shirbahadurkar, S.D. “Speech modification for prosody conversion in expressive Marathi text-to-speech synthesis” ,Published in: Signal Processing and Integrated Networks (SPIN), 2014 International Conference on Date of Conference: 20-21 Feb. 2014 Page(s): 56 – 58.
[15] Lee, F. ; Massachusetts Institute of Technology, Cambridge, Mass “Reading machine: From text to speech”,Published in: Audio and Electroacoustics, IEEE Transactions on (Volume:17 , Issue: 4 ) Page(s): 275 – 282.
[16] Liang Wang ; Dept. of Electron. Eng., Shanghai Jiao Tong Univ., Shanghai, China ; Jie Zhu ; Yao Lv “An improved method for predicting fundamental frequency contour in mandarin text-to-speech system with a small corpus” ,Published in: TENCON 2010 - 2010 IEEE Region 10 Conference Date of Conference: 21-24 Nov. 2010 Page(s): 751 – 754.
[17] Edgington, M. ; British Telecom Res. Labs., Ipswich, UK ; Lowry, A.“Residual-based speech modification algorithms for text-to-speech synthesis” ,Published in: Spoken Language, 1996. ICSLP 96. Proceedings., Fourth International Conference on (Volume:3 ) Date of Conference: 3-6 Oct 1996 Page(s): 1425 - 1428 vol.3.
[18] Xu Jun ; Inst. of Inf. Sci., Northern Jiaotong Univ., Beijing, China ; Yuan Baozong “Next generation of Chinese text-to-speech system” ,Published in: TENCON '93. Proceedings. Computer, Communication, Control and Power Engineering.1993 IEEE Region 10 Conference on (Volume:2 ) Date of Conference: 19-21 Oct. 1993 Page(s): 1078 - 1081 vol.2.
[19] Hamad, M. ; Electr. & Electron. Eng. Dept., Univ. of Khartoum, Khartoum, Sudan ; Hussain, M. “Arabic Text-To-Speech Synthesizer” ,Published in: Research and Development (SCOReD), 2011 IEEE Student Conference on Date of Conference: 19-20 Dec. 2011 Page(s): 409 – 414.
Citation
M.Priya and S.Ramya, "Manuscript to Speech: A Humble Tutorial," International Journal of Computer Sciences and Engineering, Vol.3, Issue.1, pp.193-196, 2015.
Localization in Flooded Instrument Systems − Reinterpretation then Trials
Research Paper | Journal Paper
Vol.3 , Issue.1 , pp.197-205, Jan-2015
Abstract
-In flooded instrument systems (uwsns), deter removal the site of all instrument is important then the process of estimating the site of all bump in an instrument scheme is individual as localization. Smooth nevertheless numerous localization events have been planned aimed at earthly instrument networks, currently are comparatively inadequate localization systems aimed at uwsns. The features of flooded instrument systems are essentially altered meanwhile thon of earthly networks. Flooded audio stations are measured via harsh corporeal coat surroundings with severe bandwidth limitations. The voluntary intelligent haste of complete then the lengthy spread advertisement postponements under seawater posture a single set of trials aimed at localization in uwsn. This newsPA apiece explores the altered localization events thon are applicant intelligent to flooded instrument networks, then the trials in meeting the supplies modeled via emerging submissions aimed at such networks, e.g. Offshore engineering.
Key-Words / Index Term
Localization,Flooded Instrument Systems(UWSN),Positioning
References
[1] Weiping Zhu ; Dept. of Comput., Hong Kong Polytech. Univ., Kowloon, China ; Jiannong Cao ; Yi Xu ; Lei Yang “Fault-Tolerant RFID Reader Localization Based on Passive RFID Tags”, Published in: Parallel and Distributed Systems, IEEE Transactions on (Volume:25 , Issue: 8 ) Page(s): 2065 – 2076.
[2] Guangjie Han ; Nantong Ocean & Coastal Eng. Res. Inst., Hohai Univ., Nantong, China ; Aihua Qian ; Xun Li ; Jinfang Jiang “Performance evaluation of localization algorithms in large-scale Underwater Sensor Networks”, Published in: Communications and Networking in China (CHINACOM), 2013 8th International ICST Conference on Date of Conference: 14-16 Aug. 2013 Page(s): 493 – 498.
[3] Po Yang ; Fac. of Comput., Eng. & Technol., Staffordshire Univ., Stafford, UK ; Wenyan Wu ; Moniri, M. ; Chibelushi, C.C.” Efficient Object Localization Using Sparsely Distributed Passive RFID Tags”, Published in:Industrial Electronics, IEEE Transactions on (Volume:60 , Issue: 12 ) Page(s):5914 – 5924.
[4] Tsai, Y.H. ; Hwa-Hsia Inst. of Technol., Taipei ; Lu, S.S.” Localization accuracy matrix analysis for localization accuracy consideration in 2D precision fixture system”, Published in:Control & Automation, 2007. MED '07. Mediterranean Conference on Date of Conference:27-29 June 2007 Page(s):1 –6.
[5] Hui Suo ; Coll. of Inf. Eng., Guangdong Jidian Polytech., Guangzhou, China ; Jiafu Wan ; Lian Huang ; Caifeng Zou” Issues and Challenges of Wireless Sensor Networks Localization in Emerging Applications”, Published in:Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on (Volume:3 )Date of Conference:23-25 March 2012Page(s):447 – 451.
[6] Shuai Chen ; Sch. of Electr. & Inf. Eng., Huainan Normal Univ., Huainan, China ; Renyi Shu ; Shuifeng Zhang ; Xiaodong Zheng.” Evaluate distance measurement how to influence localization in wireless sensor networks”, Published in:Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on Date of Conference:21-23 April 2012Page(s):323 – 325.
[7] Kano, S. ; Dept. of Inf. & Comput. Sci., Keio Univ., Yokohama, Japan ; Koizumi, T. ; Sasase, I.” Power saving localization by considering node's distance and localization error for reducing redundant packets in mobile WSNs”, Published in:Personal Indoor and Mobile Radio Communications (PIMRC), 2012 IEEE 23rd International Symposium on Date of Conference:9-12 Sept. 2012 Page(s):752 – 757.
[8] van Unen, R.F. ; Oceanogr. Co. of the Netherlands, Zoetermeer, Netherlands ; van Beuzekom, A.A. ; ten Brinke, W.B.M. ; Cox, H.L.H.” CCP-correlation current profiler a comparison between laboratory and field measurements”, Published in:OCEANS '98 Conference Proceedings (Volume:3 )Date of Conference:28 Sep-1 Oct 1998 Page(s):807 - 1811 vol.3.
[9] Strayer, W.T. ; BBN Technol., Cambridge, MA, USA ; Jones, C.E. ; Tchakountio, F. ; Snoeren, A.C.” SPIE demonstration: single packet traceback”, Published in:DARPA Information Survivability Conference and Exposition, 2003. Proceedings (Volume:2 )Date of Conference:22-24 April 2003Page(s):106 - 107 vol.2.
[10] Yeo, K.L. ; Department of Physics, National University of Singapore, 2 Science Drive 3 Road, Singapore 117542, Singapore ; Wee, A.T.S. ; Liu, R. ; Zhou, F.F.” Investigation of boron penetration through decoupled plasma nitrided gate oxide using backside secondary ion mass spectrometry depth profiling”, Published in:Journal of Vacuum Science & Technology B: Microelectronics and Nanometer Structures (Volume:21 , Issue: 1 )Page(s):193 – 197.
[11] Xiao-Hua Zhu ; State Key Lab. of Satellite Ocean Environ. Dynamics, Second Inst. of Oceanogr., Hangzhou, China ; Kaneko, A. ; Qingsong Wu ; Gohda, N.” The first Chinese coastal acoustic tomography experiment”, Published in:OCEANS 2010 IEEE – Sydney Date of Conference:24-27 May 2010 Page(s):1 – 4.
[12] Descloitres, J. ; Sci. Syst. & Applications Inc, NASA Goddard Space Flight Center, Greenbelt, MD, USA ; Sohlberg, R. ; Owens, J. ; Giglio, L.” The MODIS rapid response project”, Published in:Geoscience and Remote Sensing Symposium, 2002. IGARSS '02. 2002 IEEE International (Volume:2 )Date of Conference:24-28 June 2002Page(s):1191 - 1192 vol.2.
[13] Appell, G. ; Ocean Syst. Dev. Group, NOAA/NOS/OE, Silver Spring, MD, USA ; Chapin, J.L. ; Bowers, G.W.” Aanderaa DCM 12 Doppler current meter performance characteristics”, Published in:Current Measurement, 1995., Proceedings of the IEEE Fifth Working Conference on Date of Conference:7-9 Feb 1995Page(s):43 – 46.
[14] Salem, M. ; Service-centric Networking, Telekom Innovation Labs., Berlin, Germany ; Ruppel, P. ; Bareth, U. ; Kupper, A.” X-centric positioning: A combination of device-centric and multi-rat network-centric positioning approaches in NGN”, Published in:Globecom Workshops (GC Wkshps), 2012 IEEEDate of Conference:3-7 Dec. 2012Page(s):1741 – 1746.
[15] Jie Zhang ; Sch. of Electron. Sci. & Eng., Nanjing Univ., Nanjing, China ; Yun Ge ; Ying Chen ; Xiangning Chen.” A study on the positioning accuracy of patient positioning based on Optical Positioning System for nasopharyngeal carcinoma: Compared with conventional method”, Published in:Medical Imaging Physics and Engineering (ICMIPE), 2013 IEEE International Conference on Date of Conference:19-20 Oct. 2013Page(s):11 – 13..
[16] Deyue Zou ; Sch. of Electron. & Inf. Eng., Harbin Inst. of Technol., Harbin, China ; Weixiao Meng ; Shuai Han.” An Accuracy Estimation Algorithm for Fingerprint Positioning System”, Published in:Instrumentation and Measurement, Computer, Communication and Control (IMCCC), 2014 Fourth International Conference on Date of Conference:18-20 Sept. 2014Page(s):573 – 577.
[17] Glanzer, G. ; Dept. of Electron., FH JOANNEUM - Univ. of Appl. Sci., Kapfenberg, Austria.” Personal and first-responder positioning: State of the art and future trends”, Published in:Ubiquitous Positioning, Indoor Navigation, and Location Based Service (UPINLBS), 2012 Date of Conference:3-4 Oct. 2012 Page(s):1 – 7.
[18] Fumin Lu ; Key Lab. of Geol. Hazards on Three Gorges, Three Gorges Univ., Yichang, China ; Jin Li.” Precise point positioning study to use different IGS precise ephemeris”, Published in:Computer Science and Automation Engineering (CSAE), 2011 IEEE International Conference on (Volume:3 )Date of Conference:10-12 June 2011Page(s):592 – 595.
Citation
A.Rathiga and V.Geetha, "Localization in Flooded Instrument Systems − Reinterpretation then Trials," International Journal of Computer Sciences and Engineering, Vol.3, Issue.1, pp.197-205, 2015.
Privacy-Conserving Multi-Key Term Graded Search Over Encoded Rain Cloud Data
Research Paper | Journal Paper
Vol.3 , Issue.1 , pp.206-218, Jan-2015
Abstract
With the advent of rain raincloud computing, facts owners are single-minded to out groundwork their difficult facts group systems meanwhile resident spots to the profitable communal rain raincloud aimed at greon suppleness then commercial savings. Nonetheless aimed at defensive facts privacy, subtle facts has to be encoded earlier outsourcing, which obsoletes old-style facts use founded on plain manuscript key term search. Thus, permitting an encoded rain raincloud facts pursuit facility is of par quantity importance. Seeing the big digit of facts employees then papers in the cloud, it is essential to let around key influences in the pursuit appeal then homecoming papers in the order of their significance to these keywords. Related everything on search intelligent encryption attention on lone key term pursuit or Boolean key term search, then rafaith sort the pursuit results. In this paper, aimed at the chief time, we label then resolve the stimulating tricky of privacy conserving multi-key term graded pursuit over encoded rain raincloud facts (MRSE). We originate a set of severe confidentiality supplies aimed at such a safe rain raincloud facts use system. Amid numerous multicenter semantics, we select the well-prearranged corresponding quantity of “organize matching”, i.e., as around cup tie as possible, to imprisonment the significance of facts papers to the pursuit query. We extra use “inner produce similarity” to quantitatively assess such corresponding measure. We chief proposal a elementary idea aimed at the MRSE founded on safe inner produce computation, then then stretch two knowingly healthier MRSE systems to attain numerous severe confidentiality supplies in two altered danger models. Thoroughgoing enquiry extra withdrawal confidentiality then productivity assurances of planned systems is given. Trials on the real dataset extra display planned systems certainly preferred low overhead advertisement on calculation then communication.
Key-Words / Index Term
Component; Formatting; Style; Styling; Insert
References
[1] Zewdie, B. ; Dept. of Comput. Sci., Illinois Inst. of Technol., Chicago, IL ; Carlson, C.R. “Adaptive Component Paradigm for Highly Configurable Business Components”, Published in: Electro/information Technology, 2006 IEEE International Conference on Date of Conference: 7-10 May 2006 Page(s): 185 – 190.
[2] Geisterfer, C.J.M. ; Dept. of Comput. Sci., Colorado State Univ., USA ; Ghosh, S. “Software component specification: a study in perspective of component selection and reuse” , Published in: Commercial-off-the-Shelf (COTS)-Based Software Systems, 2006. Fifth International Conference on Date of Conference: 13-16 Feb. 2006.
[3] Hamlet, D. ; Portland State Univ., OR, USA ; Mason, D. ; Woitm, D. “Theory of software reliability based on components” , Published in: Software Engineering, 2001. ICSE 2001. Proceedings of the 23rd International Conference on Date of Conference: 12-19 May 2001 Page(s): 361 – 370.
[4] Jianguo Chen ; Coll. of Inf. Eng., China Jiliang Univ., Hangzhou, China ; Yeap, W.K. ; Bruda, S.D. “A Review of Component Coupling Metrics for Component-Based Development” , Published in: Software Engineering, 2009. WCSE '09. WRI World Congress on (Volume:4 ) Date of Conference: 19-21 May 2009 Page(s): 65 – 69.
[5] Yong Peng ; Sch. of Mechatron. Eng. & Autom., Nat. Univ. of Defense Technol., Changsha, China ; Chunguang Peng ; Jian Huang ; Kedi Huang “An Ontology-Driven Paradigm for Component Representation and Retrieval” , Published in: Computer and Information Technology, 2009. CIT '09. Ninth IEEE International Conference on (Volume:2 ) Date of Conference: 11-14 Oct. 2009 Page(s): 187 – 192.
[6] Kim, L. ; Dept. of English, Memphis State Univ., TN, USA ; Albers, M.J. “Presenting information on the small-screen interface: effects of table formatting” , Published in: Professional Communication, IEEE Transactions on (Volume:46 , Issue: 2 ) Page(s): 94 – 104.
[7] Chamberlin, D.D. ; IBM Almaden Research Center, 650 Harry Road, San Jose, California 95120, USA “Document convergence in an interactive formatting system”, Published in: IBM Journal of Research and Development (Volume:31 , Issue: 1 ) Page(s): 58 – 72.
[8] Stoica, Petre ; Dept. of Syst. & Control, Inf. Technol., Uppsala Univ., Sweden ; Ganesan, G. “Maximum-SNR spatial-temporal formatting designs for MIMO channels”, Published in: Signal Processing, IEEE Transactions on (Volume:50 , Issue: 12 ) Page(s): 3036 – 3042.
[9] Linfoot, S.L. ; Founder & CTO of MediaTag Ltd., Leicester, UK ; Coughlin, T. “A cross-standard metadata formatting structure” , Published in: Consumer Electronics, IEEE Transactions on (Volume:59 , Issue: 3 ) Page(s): 550 – 555.
[10] Elias, S. ; Sri Venkateswara Coll. of Eng., Chennai, India ; Mathew, L. ; Easwarakumar, K.S. ; Chbeir, R. “Automatic Temporal Formatting of Multimedia Presentations Using Dynamic Petri Nets” ,Published in: Computer Communications and Networks, 2009. ICCCN 2009. Proceedings of 18th Internatonal Conference on Date of Conference: 3-6 Aug. 2009 Page(s): 1 – 6.
[11] Dinh, Duc V. ; Institute of Solid State Physics, Technische Universität Berlin, Hardenbergstraße 36, 10623 Berlin, Germany ; Skuridina, D. ; Solopow, S. ; Frentrup, M. “Growth and characterizations of semipolar (1122) InN” , Published in: Journal of Applied Physics (Volume:112 , Issue: 1 ) Page(s): 013530 - 013530-9.
[12] Sarkar, P. ; Palo Alto Res. Center, CA, USA ; Nagy, G. “Style consistent classification of isogenous patterns”, Published in: Pattern Analysis and Machine Intelligence, IEEE Transactions on (Volume:27 , Issue: 1 ) Page(s): 88 – 98.
[13] Kanagawa, H. ; Interdiscipl. Grad. Sch. of Sci. & Eng., Tokyo Inst. of Technol., Tokyo, Japan ; Nose, T. ; Kobayashi, T. “Speaker-independent style conversion for HMM-based expressive speech synthesis”, Published in: Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on Date of Conference: 26-31 May 2013 Page(s): 7864 – 7868.
[14] Yu Wu ; Sch. of Journalism, Zhongnan Univ. of Econ. & Law, Wuhan, China “Research of the style computational model for Ming-style learning system”, Published in: Networking and Digital Society (ICNDS), 2010 2nd International Conference on (Volume:2 ) Date of Conference: 30-31 May 2010 Page(s): 484 – 487.
[15] Hussein, A.M. ; Electr. & Comput. Eng. Dept., Ryerson Univ., Toronto, ON, Canada ; Milewski, M. “CN tower lightning flash components” , Published in: Lightning Protection (XI SIPDA), 2011 International Symposium on Date of Conference: 3-7 Oct. 2011 Page(s): 7 – 13.
[16] Campos, A. ; UNINOVA, Caparica ; Pina, P. ; Neves-Silva, R.” Supporting Distributed Collaborative Work in Manufacturing Industry” , Published in: Collaborative Computing: Networking, Applications and Worksharing, 2006. CollaborateCom 2006. International Conference on Date of Conference: 17-20 Nov. 2006 Page(s): 1 – 6.
[17] Toma, S.-A. ; Mil. Tech. Acad., Bucharest, Romania ; Birsan, T. ; Totir, F. ; Oancea, E. “On letter to sound conversion for Romanian: A comparison of five algorithms”, Published in: Speech Technology and Human - Computer Dialogue (SpeD), 2013 7th Conference on Date of Conference: 16-19 Oct. 2013 Page(s): 1 – 6.
[18] Hui Yuan ; Dept. of Educ., Sichuan Radio & TV Univ., Chengdu, China ; Sihua Zhao ; Yongmin Jiang “Trajectory planning based on physical parametric design” , Published in: Information Management and Engineering (ICIME), 2010 The 2nd IEEE International Conference on Date of Conference: 16-18 April 2010 Page(s): 292 – 296.
[19] Clement, G.T. ; Focused Ultrasound Lab., Harvard Med. Sch. & Brigham & Women''s Hosp., Boston, MA “Nonlinear planar forward and backward projection” , Published in: Ultrasonics Symposium, 2008. IUS 2008. IEEE Date of Conference: 2-5 Nov. 2008 Page(s): 1800 – 1803.
[20] Wei-Zhan Hung ; Dept. of Int. Businesss, Nat. ChiNan Univ., NanTou, Taiwan “Social behavior algorithm”, Published in: Fuzzy Theory and it's Applications (iFUZZY), 2012 International Conference on Date of Conference: 16-18 Nov. 2012 Page(s): 57 – 61.
Citation
V.R.Sindhuja and K.Meena, "Privacy-Conserving Multi-Key Term Graded Search Over Encoded Rain Cloud Data," International Journal of Computer Sciences and Engineering, Vol.3, Issue.1, pp.206-218, 2015.
Result of Misbehaviour Activities In Postponement Accepting Scheme by Belief Expert
Research Paper | Journal Paper
Vol.3 , Issue.1 , pp.218-223, Jan-2015
Abstract
Hateful then self-centered presentations signify a solemn danger against transmitting in delay/disruption accepting systems (DTNs). Owing to the single scheme characteristics, scheming a misdemeanor result arrangement in DTN is regarded as a greon challenge. It trust, a probabilistic misdemeanor result scheme, aimed at safe DTN transmitting to well-prearranged belief establishment. The elementary idea of ibelief is introducing a occasionally obtainintelligent important expert (ta) to justice the node’s demeanor founded on the calm transmitting indications then probabilistically checking. Ibelief classical as the appraisal willing then use willing theoretic enquiry to demonstrate that, via location an appropriate examination probability, ta could safeguard the refuge of DTN transmitting on a abridged cost. To extra extend the productivity of the planned scheme, to relate result likelihood with a node’s reputation, which permits a lively result likelihood strong-minded via the belief of the users. The varied enquiry then perfect results display thon the planned arrangement substantiates the productivity then productivity of the planned scheme.
Key-Words / Index Term
Burglary; Intrusion Detection; Fisheye Lens; Motion Result
References
[1]. Maiti, A. ; Sch. of Comput. Sci. & Eng., VIT Univ., Vellore, India ; Sivanesan, S,” Cloud controlled intrusion detection and burglary prevention stratagems in home automation systems”, Published in: Future Internet Communications (BCFIC), 2012 2nd Baltic Congress on Date of Conference: 25-27 April 2012 Page(s): 182 – 186.
[2]. Zhang Hanjun ; Hunan Univ. Of Technol., Zhuzhou, China ; Dong Ting,” Fiber Bragg Grating Sensor System in the Application of Guarding against Burglary”, Published in: Intelligent System Design and Engineering Application (ISDEA), 2012 Second International Conference on Date of Conference: 6-7 Jan. 2012 Page(s): 1259 – 1262.
[3]. Montoya, L. ; Distrib. & Embedded Security Group, Univ. of Twente, Enschede, Netherlands ; Junger, M. ; Hartel, P.,” How "Digital" is Traditional Crime?”, Published in: Intelligence and Security Informatics Conference (EISIC), 2013 European Date of Conference: 12-14 Aug. 2013 Page(s): 31 – 37.
[4]. Po-Hui Yu ; Dept. of Geogr., Nat. Taiwan Univ., Taipei, Taiwan ; Jinn-Guey Lay,” Exploring non-stationarity of local mechanism of crime events with spatial-temporal weighted regression”, Published in: Spatial Data Mining and Geographical Knowledge Services (ICSDM), 2011 IEEE International Conference on Date of Conference: June 29 2011-July 1 2011 Page(s): 7 – 12.
[5]. Harrington-Lynn, J. ; Building Res. Establ., Watford, UK ; Pascoe, T.,” A strategy for security of buildings”, Published in: Security Technology, 1995. Proceedings. Institute of Electrical and Electronics Engineers 29th Annual 1995 International Carnahan Conference on Date of Conference: 18-20 Oct 1995 Page(s): 189 – 196.
[6]. Yun Wang ; Dept. of Comput. Sci., Southern Illinois Univ. Edwardsville, Edwardsville, IL, USA ; Weihuang Fu ; Agrawal, D.P.,” Intrusion detection in Gaussian distributed Wireless Sensor Networks”, Published in: Mobile Adhoc and Sensor Systems, 2009. MASS '09. IEEE 6th International Conference on Date of Conference: 12-15 Oct. 2009 Page(s): 313 – 321.
[7]. Zhou Mingqiang ; Coll. of Comput. Sci., Chongqing Univ., Chongqing, China ; Huang Hui ; Wang Qian,” A graph-based clustering algorithm for anomaly intrusion detection”, Published in: Computer Science & Education (ICCSE), 2012 7th International Conference on Date of Conference: 14-17 July 2012 Page(s): 1311 – 1314.
[8]. Bo-heung Chung ; Electron. & Telecommun. Res. Inst. ; Seung-Ho Ryu ; Jeong-Nyeo Kim ; Jong-Soo Jang,” Kernel-level intrusion detection method using simplification and grouping”, Published in: Advanced Communication Technology, 2005, ICACT 2005. The 7th International Conference on (Volume:1 ) Date of Conference: 0-0 0 Page(s): 251 – 254.
[9]. Yongquan Mo ; Sch. of Inf. Technol. & Eng., Lanzhou Univ., Lanzhou ; Yizhong Ma ; Liang Xu,” Design and implementation of intrusion detection based on mobile agents”, Published in: IT in Medicine and Education, 2008. ITME 2008. IEEE International Symposium on Date of Conference: 12-14 Dec. 2008 Page(s): 278 – 281.
[10]. Garcia, K.A. ; Scotiabank, Mexico City, Mexico ; Monroy, R. ; Trejo, L.A. ; Mex-Perera, C.,” Analyzing Log Files for Postmortem Intrusion Detection”, Published in: Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on (Volume:42 , Issue: 6 ) Page(s): 1690 – 1704.
[11]. Shoubo Zhao ; Sch. of Electr. Eng., Tianjin Univ. of Technol., Tianjin, China ; Baofeng Zhang ; Li Li ; Zuoliang Cao,” Fisheye lens camera system calibration and localization error analysis”, Published in: Computer Design and Applications (ICCDA), 2010 International Conference on (Volume:4 ) Date of Conference: 25-27 June 2010 Page(s): V4-441 - V4-445.
[12]. Jie Sun ; Sch. of Electron. Inf. & Commun. Eng., Tianjin Univ. of Technol., Tianjin ; Jinhui Zhu,” Calibration and Correction for Omnidirectional Image with a Fisheye Lens”, Published in: Natural Computation, 2008. ICNC '08. Fourth International Conference on (Volume:6 ) Date of Conference: 18-20 Oct. 2008 Page(s): 133 – 137.
[13]. Donggyun Kim ; Image Process. & Intell. Syst. Lab., Chung-Ang Univ., Seoul, South Korea ; Wonseok Kang ; Joonki Paik,” High-resolution digital zooming using a fisheye lens and geometric compensation”, Published in: Consumer Electronics (ICCE), 2011 IEEE International Conference on Date of Conference: 9-12 Jan. 2011 Page(s): 207 – 208.
[14]. Te Chen ; State Key Lab. of Adv. Opt. Commun. Syst. & Networks, Peking Univ., Beijing, China ; Lu Liu ; Bo Tu ; Zhong Zheng,” High-Spatial-Diversity Imaging Receiver Using Fisheye Lens for Indoor MIMO VLCs”, Published in: Photonics Technology Letters, IEEE (Volume:26 , Issue: 22 ) Page(s): 2260 – 2263.
[15]. Yalin Xiong ; QuickTime VR Group, Apple Comput. Inc., Cupertino, CA, USA ; Turkowski, K.” Creating image-based VR using a self-calibrating fisheye lens”, Published in: Computer Vision and Pattern Recognition, 1997. Proceedings., 1997 IEEE Computer Society Conference on Date of Conference: 17-19 Jun 1997 Page(s): 237 – 243.
[16]. Young, G.-S.J. ; Dept. of Electr. Eng.-Syst., Univ. of Southern California. Los Angeles, CA, USA ; Chellappa, R.” 3-D motion estimation using a sequence of noisy stereo images: models, estimation, and uniqueness results”, Published in: Pattern Analysis and Machine Intelligence, IEEE Transactions on (Volume:12 , Issue: 8 ) Page(s): 735 – 759.
[17]. Chan, K.C.D. ; Los Alamos Nat. Lab., NM ; Ekdahl, C.A. ; Chen, Yu-Jiuan ; Hughes, T.P.” Simulation results of corkscrew motion in DARHT-II”, Published in: Particle Accelerator Conference, 2003. PAC 2003. Proceedings of the (Volume:5 ) Date of Conference: 12-16 May 2003 Page(s): 3210 – 3212.
[18]. Zhao, X. ; Intelligent Autom., Inc., Rockville, MD, USA ; Xu, R. ; Kwan, C.” Ship-motion prediction: algorithms and simulation results”, Published in: Acoustics, Speech, and Signal Processing, 2004. Proceedings. (ICASSP '04). IEEE International Conference on (Volume:5 ) Date of Conference: 17-21 May 2004 Page(s): V - 125-8 vol.5.
[19]. Chunchun Chen ; Sch. of Commun. & Inf. Eng., Shanghai Univ., Shanghai, China ; Xuewei Chen ; Yang, Eryan.” A new motion compensation algorithm and new test algorithm to compare the result of motion compensation”, Published in: Microelectronics and Electronics (PrimeAsia), 2011 Asia Pacific Conference on Postgraduate Research in Date of Conference: 6-7 Oct. 2011 Page(s): 33 – 36.
[20]. Cook, D.A. ; Naval Surface Warfare Center, Panama, Panama ; Stroud, J.S. ; Fernandez, J.E. ; Lathrop, J.D.” Results from a hybrid synthetic aperture sonar motion estimation scheme”, Published in: Oceans 2005 - Europe (Volume:2 ) Date of Conference: 20-23 June 2005 Page(s): 1376 - 1381 Vol. 2.
Citation
C.Suganya and V.Mangaiyarkarasi, "Result of Misbehaviour Activities In Postponement Accepting Scheme by Belief Expert," International Journal of Computer Sciences and Engineering, Vol.3, Issue.1, pp.218-223, 2015.