A Survey on Wireless Communication Technologies and Standards
Survey Paper | Journal Paper
Vol.3 , Issue.5 , pp.335-340, May-2015
Abstract
Communication is a process through which humans can exchange views, ideas, information etc. They use different languages and signs to communicate with each other. Over last decade humans live in a digital age where information is everything and communication can take place even from long geographical distances. The computer systems need some sort of platform and standards through which data and information can be communicated to each other. In this paper the advantages and drawbacks of communication in wired and wireless transmission media has been discussed. Then different types of wireless communication technologies with their features and drawbacks have been figure out. Finally the comparison between different wireless communication technologies standards has been summarized.
Key-Words / Index Term
Communication; Bluetooth; Wi-Fi; WiMAX; Standards
References
[1] J. Weatherall and A. Jones, “Ubiquitous networks and their applications”, IEEE Wireless Communications, February 2002.
[2] A. Ephremides, “Energy concerns in wireless networks”, IEEE Wireless Communications, August 2002.
[3] D. Kataria, A. Yadav and B.P. Singh,"Wireless Communication Systems: Bluetooth, Infrared, Zig bee, NFC and Wi-Fi outline", IJIRT, vol. 1, Issue 6, pp. 585-588, 2014.
[4] A. M. Gonsai, N. N. Soni and N. Goswami,"Emerging Wireless Technologies for Fast Data Transmission on Library Network", International Journal of Information Services and Technology, vol. 1, no. 1, pp. 16-20, 2014.
[5] T. S. Rappaport, “Wireless Communications: Principles and Practice”, Prentice Hall, 2002.
[6] S. Murthy, C. Siva Ram and B.S. Manoj, “Ad Hoc Wireless Networks: Architectures and Protocols,” Prentice Hall, 2004.
[7] C. E. Perkins, “Ad hoc Networking”, Addison Wesley, 2001.
[8] R.Baines, “The roadmap to mobile WiMAX”, Communications Engineer, vol. 3 , no. 4 pp. 30-34, 2005.
[9] K.Etemad, “Overview of mobile WiMAX technology and evolution”, Communications magazine, IEEE, vol. 46, issue 10, pp. 31-40, 2008.
[10] F. Wang, A. Ghosh, C. Sankaran, P. J. Fleming, F. Hsieh and S. J. Benes, “Mobile WiMAX systems: performance and evolution”, Communications Magazine, IEEE, vol. 46, Issue 10, pp. 41-49, 2008.
Citation
Amit Gupta and Dhananjay Bisen, "A Survey on Wireless Communication Technologies and Standards," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.335-340, 2015.
Theoretic Study of Various Image Compression Techniques: A Survey
Survey Paper | Journal Paper
Vol.3 , Issue.5 , pp.341-344, May-2015
Abstract
Image compression is widely used term in digital image processing. Image compression main aim is to reduce the redundant data and retaining the important data keeping the image quality as good as possible. The compressed image is represented by less number of bits compared to original. In this paper we review and discuss about the principle of image compression, need of image compression, advantages and disadvantages of image compression, classes of compression and various algorithm of image compression. At last we define what qualities image compression algorithm should contain follows with the discussion and conclusion.
Key-Words / Index Term
Image Compression; Lossy Compression; Lossless Compression; Images
References
[1] A. Jain, ―Fundamentals of Digital Image Processing‖ Prentice-Hall, 1989.
[2] K. Rao and J. Hwang, ―Techniques and Standards for Image, Video and Audio Coding, Prentice-Hall, 1996
[3] W. Penebaker and J. Mitchell, ―JPEG Still Image Data Compression Standard, Van Nostrand, 1993.
[4] Rafael C. Gonzalez, Richard Eugene; “Digital image processing”, Edition 3, 2008, page 466.
[5] Alan Conrad Bovik; “Handbook of image and vide processing”, Edition 2 1005, page 673.
[6] Keshab K. Parhi, Takao Nishitan; “Digital Signal processing for multimedia systems”, ISBN 0-8247-1924- 7, United States of America, page 22.
[7] Majid Rabbani, Paul W. Jones; “Digital image compression techniques”; ISBN 0-8194—0648-1, Washington, page
[8] Anamika Maurya, Rajinder Tiwari “Theoretic Study of Image Fusion Techniques – A Survey” published in International Journal of Computer Sciences and Engineering Volume 2, Issue 6, June 2014 pp: 43– 49 with ISSN: 2347-2693
[9] Subramanya A. “Image Compression Technique,” potentials IEEE, Vol. 20, issue 1, pp19-23, Feb-March 2001.
[10] Jeffrey M. Gilbert, Robert W. Brodersen; “A Lossless 2- D Image Compression Technique for Synthetic Discrete- Tone Images”. University of California at Berkeley
Citation
Rashmi Singh and Sugandha Agarwal, "Theoretic Study of Various Image Compression Techniques: A Survey," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.341-344, 2015.
A Review Paper on GIS Web-System to Support Emergency Situations in Urban Areas and Provide Services
Review Paper | Journal Paper
Vol.3 , Issue.5 , pp.345-350, May-2015
Abstract
The agility measure and time response during the emergency situation is that hour when the incident has existed. Prune the risk of losing lives & property from appropriate response at emergency place. Therefore this paper-thin determine and inspect the concurrent android petition, GIS and web-base system that is focusing with prior information of inspected dataset. Purpose of the system is intended in case of emergency in organizations and society. Emergency incorporates accidental, health care, fire platoons, external emergency (storm, floods, and earthquake). The person in an emergency or anybody at the emergency place will send his current location from smart phone gadget; geo-location coordinates dispatch on each supplication onto the server. The proposed petition will respond to proper request from client.
Key-Words / Index Term
Emergency , Geographic Information System (GIS),geo-locations
References
[1] Nan Jing; Yijun Li; Zhao Wang, "A context-aware disaster response system using mobile software technologies and collaborative filtering approach," Computer Supported Cooperative Work in Design (CSCWD), Proceedings of the 2014 IEEE 18th International Conference on , vol., no., pp.516-522, 21-23 May 2014..
[2] Li Zhigang; Liangtian; Yang Wunian, "Research of GIS-based urban disaster emergency management information system," Computer and Communication Technologies in Agriculture Engineering (CCTAE), 2010 International Conference On , vol.2, no., pp.484-487, 12-13 June 2010.
[3] Sadik, S.; Pasha, M.; Ali, A.; Ahmad, H.F.; Suguri, H., "Policy Based Migration of Mobile Agents in Disaster Management Systems," Emerging Technologies, 2006. ICET '06. International Conference on , vol., no., pp.224-229, 13-14 Nov. 2006.
[4] Baharin, S.S.K.; Shibghatullah, A.S.; Othman, Z., "Disaster Management in Malaysia: An Application Framework of Integrated Routing Application for Emergency Response Management System," Soft Computing and Pattern Recognition, 2009. SOCPAR '09. International Conference of , vol., no., pp.716-719, 4-7 Dec. 2009..
[5] Rifaat Abdalla, C. Vincent Tao, Jonathan Li,” Challenges for the Application of GIS Interoperability in Emergency Management ”,Geomatics Solutions for Disaster Management ,Lecture Notes in Geoinformation and Cartography 2007, pp 389-405.
[6] Alazawi, Z.; Altowaijri, S.; Mehmood, R.; Abdljabar, M.B., "Intelligent disaster management system based on cloud-enabled vehicular networks," ITS Telecommunications (ITST), 2011 11th International Conference on, vol., no., pp.361-368, 23-25 Aug. 2011.
[7] Meissner, A., Luckenbach, T., Risse, T., Kirste, T., Kirchner, H.: Design Challenges for an Integrated Disaster Management Communication and Information System. In: First IEEE Workshop on Disaster Recovery Networks (DIREN 2002), New York, NY, USA (June 2002).
[8] Jeberson Retna Raj, R.; Sasipraba, T., "Disaster management system based on GIS web services," Recent Advances in Space Technology Services and Climate Change (RSTSCC), vol., no., pp.252-261, 13-15 Nov. 2010.
[9] Prof.Seema Vanjire, Prajakta Wade, Radha Taware, Prajakta Nandawate, Namrata Shinde, “LITERATURE REVIEW ON PROVIDING SERVICES IN EMERGENCY CASES”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 11, 2014, pp.8415-8416.
[10] Rehka Jadhav, Jwalant Patel, Darshan Jain, Suyash Phadhtare,” Emergency Management System Using Android Application”, International Journal of Computer Science and Information Technology, Vol. 5 (3), 2014, pp.2803-2805.
[11] Gaikwad, D.B.; Wanjari, Y.W.; Kale, K.V., "Disaster management by integration of web services with geospatial data mining," India Conference (INDICON), 2014 Annual IEEE , vol., no., pp.1-6, 11-13 Dec. 2014.
[12] Jovilyn Therese B. Fajardo, Carlos M. Oppus,” A Mobile Disaster Management System Using the Android Technology”,
WSEAS TRANSACTIONS on COMMUNICATIONS, Vol. 9, Issue 6, 2010, pp.353-353.
[13] Jethro B. de Guzman, Ritz Carlo C. de Guzman, and Engr. Remedios G. Ado,” Mobile Emergency Response Application Using Geolocation for Command Centers”, International Journal of Computer and Communication Engineering, Vol. 3, No. 4, 2014,pp.235-238.
[14] Dipali B. Gaikwad, Yogesh W. Wanjari and Karbhari. V. Kale, “Accident Analysis System by Integration of Spatial Data Mining with GIS Web Services”, International Journal of Computer Applications, Volume 103, Issue.10, 2014, pp.15-22.
[15] Russ Johnson,” GIS Technology for Disasters and Emergency Management”, ESRI White Paper, 2000.
[16]World meters Population 2015 http://www.worldometers.info/world-population/india-population/ [Accessed: May. 15, 2015].
[17]Telecom Regulatory Authority of India: trai.gov.in/.../Consultation%20paper%20IECS%2015-3-13.pdf.
[18]Wikipedia:http://en.wikipedia.org/wiki/Aurangabad,_Maharashtra[Accessed: May. 17, 2015].
[19] Aurangabad Municipal Corporation (AMC): http://www.aurangabadmahapalika.org/complaint.jsp?id=14 [Accessed: May. 17, 2015].
[20]Android API guides: http://developer.android.com/guide/topics/manifest/uses-permission-element.html [Accessed: May. 16, 2015]
[21] Android API guides:
http://developer.android.com/guide/topics/manifest/manifest-intro.html [Accessed: May. 16, 2015].
[22] Android Location strategies:
developer.android.com/guide/topics/location/strategies.html
[Accessed: May. 16, 2015].
[23]Geographic Information Systems (GIS):
www.epa.gov/reg3esd1/data/gis.htm [Accessed: May. 16, 2015].
Citation
Swapnil R.Rajput and K.V.Kale, "A Review Paper on GIS Web-System to Support Emergency Situations in Urban Areas and Provide Services," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.345-350, 2015.
Present Imaging and Facial Gratitude
Review Paper | Journal Paper
Vol.3 , Issue.5 , pp.351-356, May-2015
Abstract
A new present imaging framework with single feature withdrawal and comparison measurements for face gratitude is presented. The examination premise is to design specialized procedures that would excerpt vasculature information, create a present facial signature, and identify the individual. The proposed procedure is fully integrated and combines the dangerous steps of feature withdrawal finished the use of morphological operators, recording using the linear double recording tool, and identical finished single comparison measures envisioned for this task. The novel tactic at emerging a present signature template using four images take at numerous instants of time ensured that unforeseen changes in the vasculature over time did not affect the biometric identical process as the substantiation process relied only on dependable present feature. To accomplish more dependable confirmation or documentation we should use something that really typifies the given person. Biometrics offer automated methods of identity confirmation or documentation on the principle of measurable physiological or behavioural appearances such as a fingerprint or a speech sample. The appearances are measurable, single and these appearances should biometrics not be duplicable.res.
Key-Words / Index Term
Biometric, face recognition, Double registration, Double segmentation, Present imaging
References
[1] Albahdal, A.A. ; Univ. of Colorado at Colorado Springs, Colorado Springs, CO, USA ; Alzahrani, H. ; Jain, L.P. ; Boult, T.E., “Trusted BWI: Privacy and trust enhanced biometric web identities”, Published in: Biometrics: Theory, Applications and Systems (BTAS), 2013 IEEE Sixth International Conference on Date of Conference: Sept. 29 2013-Oct. 2 2013 Page(s): 1 – 8.
[2] Jani, R. ; Dept. of Electron. & Commun. Eng., Coll. of Technol. & Eng., Udaipur, India ; Agrawal, N., “A Proposed Framework for Enhancing Security in Fingerprint and Finger-Vein Multimodal Biometric Recognition”, Published in: Machine Intelligence and Research Advancement (ICMIRA), 2013 International Conference on Date of Conference: 21-23 Dec. 2013 Page(s): 440 – 444.
[3] Moganeshwaran, R. ; VLSI-eCAD Res. Lab., Univ. Teknol. Malaysia, Skudai, Malaysia ; Hani, M.K. ; Suhaini, M.A., “Fingerprint-fingervein multimodal biometric authentication system in field programmable gate array”, Published in: Circuits and Systems (ICCAS), 2012 IEEE International Conference on Date of Conference: 3-4 Oct. 2012 Page(s): 237 – 242.
[4] Pallikonda Rajasekaran, M. ; Dept. of ECE, Kalasalingam Univ., Krishnankoil, India ; Suresh, M. ; Dhanasekaran, U., “Multimodal biometric recognition using sclera and fingerprint based on ANFIS”, Published in: Recent Trends in Information Technology (ICRTIT), 2014 International Conference on Date of Conference: 10-12 April 2014 Page(s): 1 – 8.
[5] Elmir, Y. ; Dept. of Comput. Sci., African Univ. of Ahmed Draia, Adrar, Algeria ; Elberrichi, Z. ; Adjoudj, R., “Score level fusion based multimodal biometric identification (Fingerprint & voice)”, Published in:Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), 2012 6th International Conference on Date of Conference: 21-24 March 2012 Page(s): 146 – 150.
[6] Paul, P.P. ; Dept. of Comput. Sci., Univ. of Calgary, Calgary, AB, Canada ; Gavrilova, M. ; Klimenko, S., “Situation Awareness through Multimodal Biometric Template Security in Real-Time Environments”, Published in: Cyberworlds (CW), 2013 International Conference on Date of Conference: 21-23 Oct. 2013 Page(s): 82 – 88.
[7] Piuri, V. ; Univ. degli Studi di Milano, Milan, Italy ; Scotti, F., “Biometrics privacy: Technologies and applications”, Published in: Optical Communication Systems (OPTICS), 2011 Proceedings of the International Conference on Date of Conference: 18-21 July 2011 Page(s): 7.
[8] Doynov, P. ; Dept. of Comput. Sci. Electr. Eng., Univ. of Missouri at Kansas City, Kansas City, MO, USA ; Derakhshani, R., “Ocular biometrics databases: Standards and data interchange formats”, Published in: Homeland Security (HST), 2012 IEEE Conference on Technologies for Date of Conference: 13-15 Nov. 2012 Page(s): 73 – 78.
[9] Ming Zhao ; Google Inc., Singapore ; Chua, T.-S., “Markovian mixture face recognition with discriminative face alignment”, Published in: Automatic Face & Gesture Recognition, 2008. FG '08. 8th IEEE International Conference on Date of Conference: 17-19 Sept. 2008 Page(s): 1 – 6.
[10] Horiuchi, T. ; Police Inf.-Commun. Res. Center, Nat. Police Acad., Japan ; Hada, T., “A complementary study for the evaluation of face recognition technology”, Published in: Security Technology (ICCST), 2013 47th International Carnahan Conference on Date of Conference: 8-11 Oct. 2013 Page(s): 1 – 5.
[11] Jain, A.K. ; Michigan State Univ., East Lansing, MI, USA ; Klare, B. ; Unsang Park, “Face recognition: Some challenges in forensics”, Published in: Automatic Face & Gesture Recognition and Workshops (FG 2011), 2011 IEEE International Conference on Date of Conference: 21-25 March 2011 Page(s): 726 – 733.
[12] Teja, G.P. ; Dept. of Comput. Sci., Pondicherry Univ., Pondicherry, India ; Ravi, S., “Face recognition using subspaces techniques”, Published in: Recent Trends In Information Technology (ICRTIT), 2012 International Conference on Date of Conference: 19-21 April 2012 Page(s): 103 - 107 .
[13] Klare, B.F. ; Noblis, Falls Church, VA, USA ; Burge, M.J. ; Klontz, J.C. ; Vorder Bruegge, R.W., “Face Recognition Performance: Role of Demographic Information”, Published in: Information Forensics and Security, IEEE Transactions on (Volume:7 , Issue: 6 ) Biometrics Compendium, IEEE Page(s): 1789 - 1801 Date of Publication : 08 October 2012.
[14] Lone, M.A. ; Dept. of Comput. Sci. & Eng., Baba Ghulam Shah Badshah Univ., Rajouri, India ; Zakariya, S.M. ; Ali, R., “Automatic Face Recognition System by Combining Four Individual Algorithms”, Published in: Computational Intelligence and Communication Networks (CICN), 2011 International Conference on Date of Conference: 7-9 Oct. 2011 Page(s): 222 – 226.
[15] Harguess, J. ; Dept. of ECE, Univ. of Texas at Austin, Austin, TX, USA ; Aggarwal, J.K., “A case for the average-half-face in 2D and 3D for face recognition”, Published in:
[16] Computer Vision and Pattern Recognition Workshops, 2009. CVPR Workshops 2009. IEEE Computer Society Conference on Date of Conference: 20-25 June 2009 Page(s): 7 – 12.
[17] Niinuma, K. ; Dept. of Comput. Sci. & Eng., Michigan State Univ., East Lansing, MI, USA ; Hu Han ; Jain, A.K., “Automatic multi-view face recognition via 3D model based pose regularization”, Published in: Biometrics: Theory, Applications and Systems (BTAS), 2013 IEEE Sixth International Conference on Date of Conference: Sept. 29 2013-Oct. 2 2013 Page(s): 1 – 8.
[18] Jie Wang ; Sch. of Comput., Nat. Univ. of Singapore, Singapore, Singapore ; Tan, C.L.,” Non-rigid Registration and Restoration of Double-Sided Historical Manuscripts”, Published in: Document Analysis and Recognition (ICDAR), 2011 International Conference on Date of Conference: 18-21 Sept. 2011 Page(s): 1374 – 1378.
[19] Tonazzini, A. ; Ist. di Scienza e Tecnol. dell''Inf., Consiglio Naz. delle Ric., Pisa, Italy ; Bianco, G. ; Salerno, E., “Registration and Enhancement of Double-Sided Degraded Manuscripts Acquired in Multispectral Modality”, Published in: Document Analysis and Recognition, 2009. ICDAR '09. 10th International Conference on Date of Conference: 26-29 July 2009 Page(s): 546 – 550.
[20] Fiona Lee ; National University of Singapore ; Bressan, S., “G-snake double transformation (GDT) model for semi-automatic registration of internet maps”, Published in: Web Information Systems Engineering (Workshops), 2002. Proceedings of the Third International Conference on Date of Conference: 2002 Page(s): 13 – 21.
[21] Jiajia Wu ; Sch. of Inf. Sci. & Eng., Lanzhou Univ., Lanzhou, China ; Yi Wan ; Zhenming Su, “Bayesian rigid point set registration using logarithmic double exponential prior”, Published in: Information Science and Technology (ICIST), 2013 International Conference on Date of Conference: 23-25 March 2013 Page(s): 1360 – 1364.
[22] Kefeli, H.C. ; Urhan, O. ; Erturk, S, “Double stage video object segmentation by means of background registration using adaptive thresholding”, Published in: Signal Processing and Communications Applications Conference, 2005. Proceedings of the IEEE 13th Date of Conference: 16-18 May 2005 Page(s): 80 – 83.
[23] Rongxing Lu ; Dept. of Electr. & Comput. Eng., Univ. of Waterloo, Waterloo, ON, Canada ; Xiaodong Lin ; Xiaohui Liang ; Xuemin Shen, “A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in VANETs”, Published in: Intelligent Transportation Systems, IEEE Transactions on (Volume:13 , Issue: 1 ) Page(s): 127 - 139 Date of Publication : 08 September 2011.
[24] Sadjadi, R. ; Lam Res. Corp., Fremont ; Zhu, H. ; Cirigliano, P. ; Pavel, Elizabeth, “Plasma-assisted CD shrink and overlay metrology techniques for double patterning”, Published in: Semiconductor Manufacturing, 2007. ISSM 2007. International Symposium on Date of Conference: 15-17 Oct. 2007 Page(s): 1 – 3.
[25] Schmidt, Karl-Heinrich ; Vistec Semiconductor Systems GmbH, Kubacher Weg 4, D-35781 Weilburg, Germany ; Roeth, Klaus-Dieter ; Laske, Frank ; Bender, Jochen, “Registration Metrology on Double Patterning Reticles”, Published in: Mask and Lithography Conference (EMLC), 2009 25th European Date of Conference: 12-15 Jan. 2009 Page(s): 1 – 8.
Citation
V.Maniraj and S.Porselvi, "Present Imaging and Facial Gratitude," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.351-356, 2015.
Encounters for Effectual Announcement in Underwater
Review Paper | Journal Paper
Vol.3 , Issue.5 , pp.357-364, May-2015
Abstract
Marine bottom Sensor protuberances can be used FOR oceanographic Data collection, contamination monitoring, offshore examination and tactical examination applications. Moreover, Unmanned or Autonomous Underwater Vehicles (UUVs, AUVs), prepared with sensors, will find request in examination of natural undersea possessions and congregation of scientific Data In cooperative observing missions. Underwater ACOUSTIC networking is the allowing knowledge FOR These applications. Underwater Networks consist of an adjustable quantity of apparatuses and vehicles that are deployed to achieve cooperative observing tasks over A Given area. In This paper, numerous important key aspects of Underwater ACOUSTIC transportations are investigated. Dis comparable buildings FOR two-dimensional and three-dimensional Underwater Sensor Networks are discussed, and The Underwater incidence is characterized. The main encounters FOR The expansion of effectual networking answers posed By The Underwater setting are detailed at All layers of The technique stack. Furthermore, open examination subjects are deliberated and conceivable answer methods are outlined.
Key-Words / Index Term
Network Security, Wireless network. UnderWater Sensor Network
References
[1] Yu Yang ; Coll. Of Marine, Northwestern Polytech. Univ., Xi''an ; Zhang Xiaomin ; Peng Bo ; Fu Yujing, “Design of sensor nodes in underwater sensor networks”, Published in: Industrial Electronics and Applications, 2009. ICIEA 2009. 4th IEEE Conference on Date of Conference: 25-27 May 2009 Page(s): 3978 – 3982.
[2] Dharan, K.T. ; SITE, VIT Univ., Vellore, India ; Srimathi, C. ; Soo-Hyun Park, “A sweeper scheme for localization and mobility prediction in underwater acoustic sensor networks”, Published in: OCEANS 2010 IEEE – Sydney Date of Conference: 24-27 May 2010 Page(s): 1 – 7.
[3] Donghoon Kim ; Dept. of Comput. Sci., Florida State Univ., Tallahassee, FL ; Yong-Man Cho ; Changhwa Kim ; Sangkyung Kim, “E-ITRC Protocol with Long & Adjustable Range on Underwater Acoustic Sensor Network”, Published in: Advanced Information Networking and Applications Workshops, 2007, AINAW '07. 21st International Conference on (Volume:2 ) Date of Conference: 21-23 May 2007 Page(s): 665 – 672.
[4] Peng Jiang ; Syst. Eng. Res. Inst., CSSC, Beijing, China, “An underwater sensor network localization algorithm based on Time-of-Arrivals (TOAs)”, Published in: Natural Computation (ICNC), 2013 Ninth International Conference on Date of Conference: 23-25 July 2013 Page(s): 1552 – 1556.
[5] Yujun Li ; Sch. of Comput. Sci. & Eng., Univ. of Electron. Sci. & Technol. of China, Chengdu, China ; Yaling Yang, “Notice of Retraction Deliverability of greedy routing in underwater sensor networks”, Published in: Computer Engineering and Technology (ICCET), 2010 2nd International Conference on (Volume:2 ) Date of Conference: 16-18 April 2010 Page(s): V2-130 - V2-134.
[6] Yuh-Shyan Chen ; Dept. of Comput. Sci. & Inf. Engneering, Nat. Taipei Univ., Taipei, Taiwan ; Yun-Wei Lin ; Sing-Ling Lee, “A mobicast routing protocol in underwater sensor networks”, Published in: Wireless Communications and Networking Conference (WCNC), 2011 IEEE Date of Conference: 28-31 March 2011 Page(s): 510 – 515.
[7] Chavhan, J.W. ; Dept. of Electron. Eng., K.D.K. Coll. of Eng., Nagpur, India ; Sarate, G.G., “Smart Antenna approach in underwater Acoustic Sensor Network using OFDM: A review”, Published in: Green Computing, Communication and Conservation of Energy (ICGCE), 2013 International Conference on Date of Conference: 12-14 Dec. 2013 Page(s): 155 – 158.
[8] Misra, S. ; Sch. of Inf. Technol., Indian Inst. of Technol., Kharagpur, India ; Ghosh, A., “The effects of variable sound speed on localization in Underwater Sensor Networks”, Published in: Australasian Telecommunication Networks and Applications Conference (ATNAC), 2011 Date of Conference: 9-11 Nov. 2011 Page(s): 1 – 4.
[9] Blouin, S. ; Defence R&D Canada - Atlantic, Canada ; Inglis, G., “Toward distributed noise-source localization for underwater sensor networks”, Published in: Intelligent Signal Processing Conference 2013 (ISP 2013), IET Date of Conference: 2-3 Dec. 2013 Page(s): 1 – 6.
[10] Gang Zhou ; Dept. of Electron. Eng., Naval Univ. of Eng., Wuhan ; Xiaodong Tian ; Zhong Liu ; Li Lu, “Design and Simulation of UUV-Based Underwater Sensor Network Vigilance and Detection System”, Published in: Robotics and Biomimetics, 2006. ROBIO '06. IEEE International Conference on Date of Conference: 17-20 Dec. 2006 Page(s): 317 – 322.
[11] Zheng Guo ; Univ. of Connecticut, Storrs ; Colombo, G. ; Bing Wang ; Jun-Hong Cui, “Adaptive Routing in Underwater Delay/Disruption Tolerant Sensor Networks”, Published in: Wireless on Demand Network Systems and Services, 2008. WONS 2008. Fifth Annual Conference on Date of Conference: 23-25 Jan. 2008 Page(s): 31 – 39.
[12] Liu Guangzhong ; Dept. of Inf. Eng., Shanghai Maritime Univ., Shanghai, China ; Li Zhibin, “Depth-Based Multi-hop Routing protocol for Underwater Sensor Network”, Published in: Industrial Mechatronics and Automation (ICIMA), 2010 2nd International Conference on (Volume:2 ) Date of Conference: 30-31 May 2010 Page(s): 268 – 270.
[13] Fang-Chen Cheng ; Wireless Inf. Network Lab., Rutgers Univ., Piscataway, NJ, USA ; Holtzman, J.M., “Wireless intelligent ATM network and protocol design for future personal communication systems”, Published in: Selected Areas in Communications, IEEE Journal on (Volume:15, Issue: 7 ) Page(s): 1289 – 1307. Date of Publication : Sep 1997.
[14] Qixuan Zhu ; Dept. of Electr. & Comput. Eng., Texas A&M Univ., College Station, TX, USA ; Xi Zhang, “Game-theory based power and spectrum virtualization for maximizing spectrum efficiency over mobile cloud-computing wireless networks”, Published in: Information Sciences and Systems (CISS), 2015 49th Annual Conference on Date of Conference: 18-20 March 2015 Page(s): 1 – 6.
[15] Zeyu Zheng ; Dept. of Comput. Sci., City Univ. of Hong Kong, Hong Kong, China ; Jianping Wang ; Jin Wang, “A Study of Network Throughput Gain in Optical-Wireless (FiWi) Networks Subject to Peer-to-Peer Communications”, Published in: Communications, 2009. ICC '09. IEEE International Conference on Date of Conference: 14-18 June 2009 Page(s): 1 – 6.
[16] Lusheng Li ; Fujitsu Lab. of America, College Park, MD, USA ; Feldman, B. ; Arge, J., “Self-organizing security scheme for multi-hop wireless access networks”, Published in: Aerospace Conference, 2004. Proceedings. 2004 IEEE (Volume:2 ) Date of Conference: 6-13 March 2004 Page(s): 1231 - 1240 Vol.2.
[17] Uchida, N. ; Fac. of Software & Inf. Sci., Iwate Prefectural Univ., Iwate, Japan ; Takahata, K. ; Shibata, Y., “Evaluation of Cognitive Wireless Networks in Rural Area for Disaster Information Network”, Published in: Computational Science and Its Applications (ICCSA), 2011 International Conference on Date of Conference: 20-23 June 2011 Page(s): 135 – 142.
[18] LaSorte, N.J. ; Electr. & Comput. Eng, Univ. of Oklahoma, Tulsa, OK, USA ; Bloom, D. ; Rajab, S. ; Refai, H.H., “Creating an automated and emulated 802.11g wireless interfering network for wireless coexistence testing”, Published in: Instrumentation and Measurement Technology Conference (I2MTC), 2013 IEEE International Date of Conference: 6-9 May 2013 Page(s): 1022 – 1027.
[19] Uchida, N. ; Fac. of Software & Inf. Sci., Iwate Prefectural Univ., Takizawa, Japan ; Takahata, K. ; Shibata, Y. ; Shiratori, N., “Never Die Network Extended with Cognitive Wireless Network for Disaster Information System”, Published in: Complex, Intelligent and Software Intensive Systems (CISIS), 2011 International Conference on Date of Conference: June 30 2011-July 2 2011Page(s): 24 – 31.
[20] Uchida, N. ; Fac. of Software & Inf. Sci., Iwate Prefectural Univ., Takizawa, Japan ; Sato, G. ; Takahata, K. ; Shibata, Y.”, Optimal Route Selection Method with Satellite System for Cognitive Wireless Network in Disaster Information Network”, Published in: Advanced Information Networking and Applications (AINA), 2011 IEEE International Conference on Date of Conference: 22-25 March 2011 Page(s): 23 – 29.
[21] Agrawal, P. ; Comput. Syst. Res. Lab., AT&T Bell Labs., Murray Hill, NJ, USA ; Hyden, E. ; Krzyzanowski, P. ; Mishra, P., ‘SWAN: a mobile multimedia wireless network”, SWAN: a mobile multimedia wireless network”, Published in: Personal Communications, IEEE (Volume:3 , Issue: 2 ) Page(s): 18 – 33.
[22] Bhatt, U.R. ; Dept. of Electron. &Telecommun. Eng., Devi Ahilya Univ., Indore, India ; Chouhan, N., “ONU placement in Fiber-Wireless (FiWi) Networks”, Published in: Engineering (NUiCONE), 2013 Nirma University International Conference on Date of Conference: 28-30 Nov. 2013 Page(s): 1 – 6.
Citation
S.X.Lizzy Valentine and R.Sivakumar, "Encounters for Effectual Announcement in Underwater," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.357-364, 2015.
Analysis of Higher Education System in Data Mining Techniques Using EML-CID
Research Paper | Journal Paper
Vol.3 , Issue.5 , pp.365-370, May-2015
Abstract
In modern world a huge amount of data is available which can be used effectively to produce vital information. The information achieved can be used in the field of Medical science, Education, Business, Agriculture and so on. As huge amount of data is being collected and stored in the databases, traditional statistical techniques and database management tools are no longer adequate for analyzing this huge amount of data. Data Mining (sometimes called data or knowledge discovery) has become the area of growing significance because it helps in analyzing data from different perspectives and summarizing it into useful information. There are increasing research interests in using data mining in education. This new emerging field, called Educational Data Mining, concerns with developing methods that discover knowledge from data originating from educational environments . The data can be collected from various educational institutes that reside in their databases. The data can be personal or academic which can be used to understand students' behavior, to assist instructors, to improve teaching, to evaluate and improve e-learning systems , to improve curriculums and many other benefits. It neighbor, naive bayes, support vector machines and many others. Using these techniques many kinds of knowledge can be discovered such as association rules, classifications and clustering. The discovered knowledge can be used for organization of syllabus, prediction regarding enrolment of students in a particular programme, alienation of traditional classroom teaching model, detection of unfair means used in online examination, detection of abnormal values in the result sheets of the students and so on.
Key-Words / Index Term
Datamining, Machine Learning, Class Imbalance
References
[1] Jung-Kyu Choi ; Dept. of Healthcare Eng., Chonbuk Nat. Univ., Jeonju, South Korea ; Chan Il Yoo ; Kyung-Ah Kim ; Yonggwan Won, “Study on Datamining Techinique for Foot Disease Prediction”, Published in: IT Convergence and Security (ICITCS), 2014 International Conference on Date of Conference: 28-30 Oct. 2014 Page(s): 1 – 4.
[2] Panah, O. ; Ayatollah Amoli Branch, Comput. Dept., Islamic Azad Univ., Amol, Iran ; Panah, A. ; Panah, A., “Evaluating the datamining techniques and their roles in increasing the search speed data in web”, Published in: Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on (Volume:9 ) Date of Conference: 9-11 July 2010.
[3] Erraguntla, M. ; Ramachandran, S. ; Chang-Nien Wu ; Mayer, R.J., “Avian Influenza Datamining Using Environment, Epidemiology, and Etiology Surveillance and Analysis Toolkit (E3SAT)”, Published in: System Sciences (HICSS), 2010 43rd Hawaii International Conference on Date of Conference: 5-8 Jan. 2010 Page(s): 1 – 7.
[4] Emanuel, A.W.R. ; Fac. of Inf. Technol., Maranatha Christian Univ., Bandung, Indonesia ; Wardoyo, R. ; Istiyanto, J.E. ; Mustofa, K., “Success factors of OSS projects from sourceforge using Datamining Association Rule”, Published in: Distributed Framework and Applications (DFmA), 2010 International Conference on Date of Conference: 2-3 Aug. 2010 Page(s): 1 – 8.
[5] Kulkarni, P., “Introduction to Reinforcement and Systemic Machine Learning”, Publisher : Wiley-IEEE Press Edition : 1 Pages : 1 – 21.
[6] Vidhate, D. ; Kulkarni, P., “Cooperative Machine Learning with Information Fusion for Dynamic Decision Making in Diagnostic Applications”, Published in: Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on (Volume:38 , Issue: 3 ) Page(s): 397 – 415 Date of Publication : May 2008.
[7] Guo Chen ; Nanjing Univ. of Aeronaut. & Astronaut., Nanjing ; Rongtao Hou, “A New Machine Double-Layer Learning Method and Its Application in Non-Linear Time Series Forecasting”, Published in: Mechatronics and Automation, 2007. ICMA 2007. International Conference on Date of Conference: 5-8 Aug. 2007 Page(s): 795 – 799.
[8] Zhanshan Ma ; Comput. Sci. Dept., Univ. of Idaho, Moscow, ID, “Cognitive ecology and social learning inspired machine learning: with particular reference to the evolving of resilient Airborne Networks (AN)”, Published in: Aerospace conference, 2009 IEEE Date of Conference: 7-14 March 2009 Page(s): 1 – 14.
[9] Ming Xue ; Changchun Inst. of Technol., Changchun, China ; Changjun Zhu, “A Study and Application on Machine Learning of Artificial Intellligence”, Published in: Artificial Intelligence, 2009. JCAI '09. International Joint Conference on Date of Conference: 25-26 April 2009 Page(s): 272 – 274.
[10] Stimpson, A.J. ; Dept. of Aeronaut. & Astronaut., Massachusetts Inst. of Technol., Cambridge, MA, USA ; Cummings, M.L., “Assessing Intervention Timing in Computer-Based Education Using Machine Learning Algorithms”, Published in: Access, IEEE (Volume:2 ) Page(s): 78 - 87 Date of Publication : 31 January 2014.
[11] Xiaofeng Liao ; Nat. Eng. Res. Center for Fundamental Software, Inst. of Software, Beijing, China ; Liping Ding ; Wang, Yongji, “Secure Machine Learning, a Brief Overview”, Published in: Secure Software Integration & Reliability Improvement Companion (SSIRI-C), 2011 5th International Conference on Date of Conference: 27-29 June 2011 Page(s): 26 – 29.
[12] Malik, A.M. ; Inst. of High Performance Comput., Singapore, Singapore, “Spatial Based Feature Generation for Machine Learning Based Optimization Compilation”, Published in: Machine Learning and Applications (ICMLA), 2010 Ninth International Conference on Date of Conference: 12-14 Dec. 2010 Page(s): 925 – 930.
[13] Dong-Jun Yu ; Sch. of Comput. Sci. & Eng., Nanjing Univ. of Sci. & Technol., Nanjing, China ; Jun Hu ; Qian-Mu Li ; Zhen-Min Tang, “Constructing Query-Driven Dynamic Machine Learning Model With Application to Protein-Ligand Binding Sites Prediction”, Published in: NanoBioscience, IEEE Transactions on (Volume:14 , Issue: 1 ) Page(s): 45 – 58. Date of Publication : Jan. 2015.
[14] Kelly, D. ; National Coll. of Ireland, Dublin, Ireland ; Tangney, B.,” 'First Aid for You': getting to know your learning style using machine learning”, Published in: Advanced Learning Technologies, 2005. ICALT 2005. Fifth IEEE International Conference on Date of Conference: 5-8 July 2005 Page(s): 1 - 3.
[15] Batista, G. ; Inst. de Cienc. Mat. e de Comput., Univ. de Sao Paulo, Säo Carlos, Brazil ; Silva, D. ; Prati, R., “An Experimental Design to Evaluate Class Imbalance Treatment Methods”, Published in: Machine Learning and Applications (ICMLA), 2012 11th International Conference on (Volume:2 ) Date of Conference: 12-15 Dec. 2012 Page(s): 95 – 101.
[16] Shuo Wang ; Centre of Excellence for Res. in Comput. Intell. & Applic. (CERCIA), Univ. of Birmingham, Birmingham, UK ; Minku, L.L. ; Xin Yao, “Resampling-Based Ensemble Methods for Online Class Imbalance Learning”, Published in: Knowledge and Data Engineering, IEEE Transactions on (Volume:27 , Issue: 5 ) Page(s): 1356 - 1368 Date of Publication : 05 August 2014.
[17] Xiaoyuan Jing ; State Key Lab. of Software Eng., Wuhan Univ., Wuhan, China ; Chao Lan ; Min Li ; Yongfang Yao,” Class-imbalance learning based discriminant analysis”, Published in: Pattern Recognition (ACPR), 2011 First Asian Conference on Date of Conference: 28-28 Nov. 2011 Page(s): 545 – 549.
[18] Das, B. ; Sch. of Electr. Eng. & Comput. Sci., Washington State Univ., Pullman, WA, USA ; Krishnan, N.C. ; Cook, D.J., “Handling Class Overlap and Imbalance to Detect Prompt Situations in Smart Homes”, Published in: Data Mining Workshops (ICDMW), 2013 IEEE 13th International Conference on Date of Conference: 7-10 Dec. 2013 Page(s): 266 – 273.
[19] Shuo Wang ; CERCIA, Univ. of Birmingham Birmingham, Birmingham, UK ; Minku, L.L. ; Xin Yao, “A learning framework for online class imbalance learning”, Published in: Computational Intelligence and Ensemble Learning (CIEL), 2013 IEEE Symposium on Date of Conference: 16-19 April 2013 Page(s): 36 – 45.
[20] Duhaney, J. ; Comput. & Electr. Eng. & Comput. Sci., Florida Atlantic Univ., Boca Raton, FL, USA ; Khoshgoftaar, T.M. ; Napolitano, A., “Studying the Effect of Class Imbalance in Ocean Turbine Fault Data on Reliable State Detection”, Published in: Machine Learning and Applications (ICMLA), 2012 11th International Conference on (Volume:1 ) Date of Conference: 12-15 Dec. 2012 Page(s): 268 – 275.
[21] Shuo Wang ; Sch. of Comput. Sci., Univ. of Birmingham, Birmingham, UK ; Minku, L.L. ; Xin Yao, “A multi-objective ensemble method for online class imbalance learning”, Published in: Neural Networks (IJCNN), 2014 International Joint Conference on Date of Conference: 6-11 July 2014 Page(s): 3311 – 3318.
[22] Shuo Wang ; Centre of Excellence for Res. in Comput. Intell. & Applic. (CERCIA), Univ. of Birmingham, Birmingham, UK ; Xin Yao, “Theoretical Study of the Relationship between Diversity and Single-Class Measures for Class Imbalance Learning”, Published in: Data Mining Workshops, 2009. ICDMW '09. IEEE International Conference on Date of Conference: 6-6 Dec. 2009 Page(s): 76 – 81.
[23] Orriols, A. ; Comput. Eng. Dept., Ramon Llull Univ., Barcelona ; Bernadó-Mansilla, E., “Class imbalance problem in UCS classifier system: fitness adaptation”, Published in: Evolutionary Computation, 2005. The 2005 IEEE Congress on (Volume:1 ) Date of Conference: 5-5 Sept. 2005 Page(s): 604 - 611 Vol.1.
[24] Jindaluang, W. ; Dept. of Comput. Sci., Chiang Mai Univ., Chiang Mai, Thailand ; Chouvatut, V. ; Kantabutra, S., “Under-sampling by algorithm with performance guaranteed for class-imbalance problem”, Published in: Computer Science and Engineering Conference (ICSEC), 2014 International Date of Conference: July 30 2014-Aug. 1 2014 Page(s): 215 – 221.
[25] Seliya, N. ; Comput. & Inf. Sci., Univ. of Michigan - Dearborn, Dearborn, MI ; Zhiwei Xu ; Khoshgoftaar, T.M., “Addressing Class Imbalance in Non-binary Classification Problems”, Published in: Tools with Artificial Intelligence, 2008. ICTAI '08. 20th IEEE International Conference on (Volume:1 ) Date of Conference: 3-5 Nov. 2008 Page(s): 460 – 466.
Citation
R.Periyasamy and P.Veeramuthu, "Analysis of Higher Education System in Data Mining Techniques Using EML-CID," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.365-370, 2015.
Asynchronous Multimodal Text Entry Using Speech and Gesture Keyboards
Research Paper | Journal Paper
Vol.3 , Issue.5 , pp.371-376, May-2015
Abstract
We propose plummeting errors in text entry by uniting speech and gesture keyboard input. We describe a combine model that combines gratitude conorders in an asynchronous and flexible manner. We composed speech and gesture data of manipulators entering both short email sentences and web search queries. By amalgamation gratitude conorders from both modalities, word error rate was abridged by 53% comparative for email sentences and 29% comparative for web searches. For email exclamations with speech errors, we examined providing gesture keyboard alterations of only the mistaken words. Deprived of the user openly indicating the improper words, our model was able to decrease the word error rate by 44% relative.
Key-Words / Index Term
Mobile text entry, Multimodal interfaces
References
[1] Arif, A.S. ; Dept. of Comput. Sci. & Eng., York Univ., Toronto, ON, Canada, “A survey on mobile text entry handedness: How do users input text on handheld devices while nomadic?”, Published in: Intelligent Human Computer Interaction (IHCI), 2012 4th International Conference on Date of Conference: 27-29 Dec. 2012 Page(s): 1 – 6.
[2] Sandnes, F.E. ; Dept. of Comput. Sci., Oslo Univ. Coll., Norway ; Thorkildssen, H.W. ; Arvei, A. ; Buverad, J.O., “Techniques for fast and easy mobile text-entry with three-keys”, Published in: System Sciences, 2004. Proceedings of the 37th Annual Hawaii International Conference on Date of Conference: 5-8 Jan. 2004.
[3] Poirier, F. ; Univ. de Bretagne-Sud, Vannes ; Sad, H.H., “A Platform for Mobile Text Entry Methods Evaluation”, Published in: Advances in Computer-Human Interaction, 2008 First International Conference on Date of Conference: 10-15 Feb. 2008 Page(s): 183 – 188.
[4] Starner, T., “Keyboards redux: fast mobile text entry”, Published in: Pervasive Computing, IEEE (Volume:3 , Issue: 3 ) Page(s): 97 – 101 ISSN : 1536-1268.
[5] Tantug, A.C. ; Istanbul Tech. Univ., Istanbul, Turkey, “A probabilistic mobile text entry system for agglutinative languages”, Published in: Consumer Electronics, IEEE Transactions on (Volume:56 , Issue: 2 ) Page(s): 1018 – 1024 ISSN : 0098-3063 DOI: 10.1109/TCE.2010.5506034 Date of Publication : May 2010.
[6] Clawson, J. ; Coll. of Comput., Georgia Inst. of Technol., Atlanta, GA, USA ; Lyons, K. ; Starner, T. ; Clarkson, E., “The impacts of limited visual feedback on mobile text entry for the Twiddler and mini-QWERTY keyboards”, Published in:Wearable Computers, 2005. Proceedings. Ninth IEEE International Symposium on Date of Conference: 18-21 Oct. 2005 Page(s): 170 – 177.
[7] Ma Yang ; Sch. of Comput. Eng., Nanyang Technol. Univ., Singapore, Singapore ; Leedham, G. ; Higgins, C. ; Htwe, S.M., “On-line recognition of Pitman shorthand for fast mobile text entry”, Published in: Information Technology and Applications, 2005. ICITA 2005. Third International Conference on (Volume:1 ) Date of Conference: 4-7 July 2005 Page(s): 686 - 691 vol.1.
[8] Ha, R.W.K. ; Dept. of Electr. & Comput. Eng., Waterloo Univ., Ont., Canada ; Pin-Han Ho ; Shen, X.S., “SIMKEYS: an efficient approach in text entry for mobile communications”, Published in: Consumer Communications and Networking Conference, 2004. CCNC 2004. First IEEE Date of Conference: 5-8 Jan. 2004 Page(s): 687 - 689.
[9] Misra, S. ; Covenant Univ., Ota, Nigeria ; Banubakode, S.M. ; Dhawale, C.A., “Novel user interface for text entry on touch screen mobile device for visually impaired users”, Published in: Computer & Information Technology (GSCIT), 2014 Global Summit on Date of Conference: 14-16 June 2014 Page(s): 1 – 5.
[10] Heng-Li Yang ; Deptartment of Manage. Inf. Syst., Nat. Chengchi Univ., Taipei, Taiwan ; Ren-Xiang Lin, “A Chinese predictive text entry method for mobile devices”, Published in: Machine Learning and Cybernetics (ICMLC), 2014 International Conference on (Volume:1 ) Date of Conference: 13-16 July 2014 Page(s): 309 – 314.
[11] Prince, M.E.H. ; Dept. of Comput. Sci. & Eng., Chittagong Univ. of Eng. & Technol. (CUET), Chittagong, Bangladesh ; Hossain, G. ; Dewan, A.A. ; Debnath, P., “An audible Bangla text-entry method in Mobile phones with intelligent keypad”, Published in: Computers and Information Technology, 2009. ICCIT '09. 12th International Conference on Date of Conference: 21-23 Dec. 2009 Page(s): 279 – 284.
[12] McDermott-Wells, P. ; Graduate Sch. of Comput. & Inf. Sci., Nova Southeastern Univ., Dania, FL, “Evaluation of Three Stylus-Based Text Entry Methods on a Pocket PCtm Mobile Device”, Published in: SoutheastCon, 2006. Proceedings of the IEEE Date of Conference: March 31 2005-April 2 2005 Page(s): 228 – 234.
[13] Sharma, R. ; Adv. Interface Technol. Inc., State College, PA, USA ; Yeasin, M. ; Krahnstoever, N. ; Rauschert, I., “Speech-gesture driven multimodal interfaces for crisis management”, Published in: Proceedings of the IEEE (Volume:91 , Issue: 9 ) Page(s): 1327 – 1354 Date of Publication : Sept. 2003.
[14] Oviatt, S. ; Dept. of Comput. Sci., Oregon Health & Sci. Univ., Beaverton, OR, USA, “User-centered modeling and evaluation of multimodal interfaces”, Published in: Proceedings of the IEEE (Volume:91 , Issue: 9 ) Page(s): 1457 - 1468 Date of Publication : Sept. 2003.
[15] Pacheco, B.A. ; Comput. & Inf. Fac., Mackenzie Presbyterian Univ., São Paulo, Brazil ; Souza-Concilio, I.A., “Multimodal interfaces: An enactive approach”, Published in: Cognitive Infocommunications (CogInfoCom), 2013 IEEE 4th International Conference on Date of Conference: 2-5 Dec. 2013 Page(s): 51 – 58.
[16] Czyzewski, A. ; Gdansk Univ. of Technol., Gdansk, Poland ; Dalka, P. ; Kosikowski, L. ; Kunka, B., “Multimodal human-computer interfaces based on advanced video and audio analysis”, Published in: Human System Interaction (HSI), 2013 The 6th International Conference on Date of Conference: 6-8 June 2013 Page(s): 18 – 25.
[17] Karpov, A. ; SPIIRAS, St. Petersburg Inst. for Inf. & Autom., St. Petersburg, Russia ; Carbini, S. ; Ronzhin, A. ; Viallet, J.E., “Comparison of two different similar speech and gestures multimodal interfaces”, Published in: Signal Processing Conference, 2008 16th European Date of Conference: 25-29 Aug. 2008 Page(s): 1 – 5.
[18] Czyzewski, A. ; Multimedia Syst. Dept., Gdansk Univ. of Technol., Gdansk, Poland, “New applications of multimodal human-computer interfaces”, Published in: New Trends in Audio & Video and Signal Processing: Algorithms, Architectures, Arrangements, and Applications (NTAV/SPA), 2012 Joint Conference Date of Conference: 27-29 Sept. 2012 Page(s): 19 – 24.
[19] Jing Liu ; Dept. of Comput., Macquarie Univ., North Ryde, VIC, Australia ; Kavakli, M., “A survey of speech-hand gesture recognition for the development of multimodal interfaces in computer games”, Published in: Multimedia and Expo (ICME), 2010 IEEE International Conference on Date of Conference: 19-23 July 2010 Page(s): 1564 – 1569.
[20] Toth, B. ; Budapest Univ. of Technol. & Econ., Budapest ; Nemeth, G., “Challenges of creating multimodal interfaces on mobile devices”, Published in: ELMAR, 2007 Date of Conference: 12-14 Sept. 2007 Page(s): 171 – 174.
Citation
V.Maniraj and E.Manohari, "Asynchronous Multimodal Text Entry Using Speech and Gesture Keyboards," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.371-376, 2015.
Improving the Efficiency of Wireless Multi-Hopping of MPEG-4 AVC Video Stream in WAN
Research Paper | Journal Paper
Vol.3 , Issue.5 , pp.377-382, May-2015
Abstract
Video streaming has become the application that drives the Internet to a new height. In this paper, we analyze and evaluate the performance of H.264-based video streaming over multi-hop wireless local area networks (WLANs). Contrary to common believes that adding relays in the same wireless channel may increase coverage but has to reduce throughput, our analysis and simulation results show a wide spectrum of coverage-capacity tradeoff in generic scenarios and confirm previous measurement observation in specific cases.
Key-Words / Index Term
H.264-based video streaming; wide spectrum
References
[1] G. Bianchi, “Performance analysis of the IEEE 802.11 distributed coordination function,” Selected Areas in Communications, IEEE Journal on, vol. 18, no. 3, pp. 535–547, 2000.
[2] NS-2 network simulator, //www.isi.edu/nsnam/ns/
[3] D. Malone, K. Duffy, and D. Leith, “Modeling the 802.11 distributed coordination function in nonsaturated heterogeneous conditions,” Networking, IEEE/ACM Transactions on, vol. 15, pp. 159–172, 2007.
[4] F. Daneshgaran, M. Laddomada, F. Mesiti, and M. Mondin, “Unsaturated Throughput Analysis of IEEE 802.11 in Presence of Non Ideal Transmission Channel and Capture Effects,” Wireless Communications,IEEE Transactions on, vol. 7, no. 4, pp. 1276–1286, 2008.
[5] Majumda, A. and Sachs, DG and Kozintsev, IV and Ramchandran, K. and Yeung, MM, “Multicast and unicast real-time video streaming over wireless LANs”, Circuits and Systems for Video Technology, IEEE Transactions on, vol. 12, pp. 524–534, 2002
[6] Stockhammer, T. and Jenkac, H. and Kuhn, G., “Streaming video over variable bit-rate wireless channels”, Multimedia, IEEE Transactions on, vol. 6, pp. 268–277, 2004
[7] Ksentini, A. and Naimi, M. and Gueroui, A., “Toward an improvement of H. 264 video transmission over IEEE 802.11 e through a cross-layer architecture”, IEEE Communications, vol. 44, pp. 107–114, 2006
[8] E. Setton, T. Yoo, X. Zhu, A. Goldsmith, and B. Girod, “Cross-layer design of ad hoc networks for real-time video streaming,” IEEE Wireless Communications, vol. 12, no. 4, pp. 59–65, 2005.
[9] EvalVid, http://www.tkn.tu-berlin.de/research/evalvid/
[10] H.264/AVC reference software, http://iphome.hhi.de/suehring/tml/
Citation
S. Rajesh Kumar, "Improving the Efficiency of Wireless Multi-Hopping of MPEG-4 AVC Video Stream in WAN," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.377-382, 2015.
eXSRUP: Hybrid Software Development Model Integrating Extreme Programing, Scrum & Rational Unified Process
Research Paper | Journal Paper
Vol.3 , Issue.5 , pp.383-392, May-2015
Abstract
Software industries are progressively adopting the agile development practices of customized models such as Extreme Programming (XP) or Scrum or Rational Unified Process (RUP). Scrum and Extreme Programming (XP) are frequently used agile models, whereas Rational Unified Process (RUP) is one popular classic plan driven software development methodology. Both agile and plan driven models have their own merits & demerits such as XP has good engineering practices, team collaboration and on the other hand weak documentation, poor performance in medium & large scale projects. Scrum is based on project management practices. RUP model has some limitations such as impractical for small and fast paced projects, tendency to be over budgeted, condemn rapid changes in requirements. This research paper based on propose hybrid framework eXSRUP by combining strengths of Scrum, XP and RUP by suppressing their limitations to produce high quality software.
Key-Words / Index Term
Extreme Programing,Scrum,Rational Unified Process and XP SCRUM RUP (eXSRUP)
References
[1] Abrahamson P, Salo O, Ron K. Agile Software Development Methods: Reviews and Analysis. VTT Electronics, 2002.
[2] A. Sillitti and G. Succi, “The Role of Plan-Based Approaches in Organizing Agile Companies,” Cutter IT Journal, Vol. 19, No. 2, 2006, pp. 14-19.
[3] Brent Barton, Evan Campbel, Ken. Implementing a Professional Services Organization Using Type C Scrum. In: Proceedings of the 40th Annual Hawaii International Conference on System Sciences, Hawaii, 2007, 275 a-275 a.
[4] “Extreme Programming Official Website”. http://www.extremeprogramming.org/map/project.html
[5] Ghulam Rasool, Shabib Aftab, Shafiq Hussain, Detlef Streitferdt, eXRUP: A Hybrid Software Development Model for Small to Medium Scale Projects, Sept 2013, Journal of Software Engineering and Applications.
[6] Nidhi Sharma, Dr. (Prof) Manoj Wadhwa, Agile Methodologies: Comparative Study and Future Direction, European Academic Research, Feb 2014
[7] Jiang, Armin Eberlein. Towards a framework for understanding the relationships between classical software engineering and agile methodologies. In: Proceedings of the 2008 international workshop on Scrutinizing agile practices or shoot-out at the agile corral, Germany, May 2008, 9-14.
[8] Juyun Cho, A hybrid software development method for large scale project, rational unified process with scrum Issues in Information Systems, 2-2009
[9] J.Grey, The development of a hybrid agile project management methodology, June 2011, Potchefstroom Campus of the North-West University
[10] Kamlesh V, Ahmad S. Evaluating Evolutionary Prototyping for Customizable Generic Products in Industry. M.S. Thesis, School of Engg. Blekinge Inst. Tech. (Ronneby, Sweden), 2008
[11] Lamia Nassif, Jessy, Nadine Ghanem, & Pedro Maroun Eid, Extreme Programming, March 2002, Software Engineering CSC 423 B – MWF 11-12
[12] M. Grant, “Introduction to Extreme Programming”. http://www.xprogramming.com
[13] Marchesi M, Mannaro K, Uras S, Locci M. Distributed Scrum in Research Project Management. In: Proceedings of the 8th International Conference on Agile processes in software engineering and extreme programming, Como, Italy, 2007.240–244.
[14] Maria P. Sadra D., Casper L. Distributed Agile Development: Using Scrum in Large Projects. In: Proceedings of IEEE International Conference on Global Software Engineering, Bangalore, India, August 2008, 87-95.
[15] M. Salman Bashir, M. Rizwan Jameel Qureshi, HYBRID SOFTWARE DEVELOPMENT APPROACH FOR SMALL TO MEDIUM SCALE PROJECTS: RUP, XP & SCRUM, 2012, Sci.Int. (Lahore), 24(4), 381-384, 2012
[16] P. Kroll and P. Kruchten, “Rational Unified Process Made Easy: A Practitioner’s Guide to the RUP,” Addison Wesley, Boston, 2003.
[17] P. Kruchten, “The Rational Unified Process—an Introduction,” 2nd Edition, Addison-Wesley, 2000.
[18] Schwaber K, Beedle M. Agile Software Development with Scrum. Prentice Hall, USA, 2001.
[19] Sadaf Un Nisa, M. Rizwan Jameel Qureshi, Empirical Estimation of Hybrid Model: A Controlled Case Study, I.J. Information Technology and Computer Science, 2012, 8, 43-50 Published Online July 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijitcs.2012.08.05
[20] Szalvay V. An introduction to agile software development, Retrieved June 2012from http//www.danube.com/docs/Intro_to_Agile.pdf, 2004
[21] Scott W. Ambler, Disciplined Agile Delivery: An introduction, April2011,http://public.dhe.ibm.com/common/ssi/ecm/en/raw14261usen/RAW14 261USEN.PDF
[22] Dubey, S.K and Rana, A.2010. Agile Software development methodologies.IJCSE.2:2726-2732
Citation
Nidhi Sharma and Manoj Wadhwa, "eXSRUP: Hybrid Software Development Model Integrating Extreme Programing, Scrum & Rational Unified Process," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.383-392, 2015.
Securing Data from Data Manipulation Using NAIVE String Search Algorithm and NTRU Algo in Cloud Computing
Research Paper | Journal Paper
Vol.3 , Issue.5 , pp.393-397, May-2015
Abstract
Cloud computing nowadays is dealing with most of security issues and privacy issues, no matter how strong security we use but achieving the 100% security will always a tough notch. However this research deals with area of cloud computing in building the trust level of cloud brokers among the general public or its distributers and buyers. The trust level is achieved by following a novel idea of checking the data manipulation in uploaded content. The SAAS cloud network in general is always secured with encryption so in this part for security NTRU is been implemented. Further this method describes the naive bayes string pattern matching algorithm. The data which is uploaded in server is auto synchronizing for back up onto another server which is a hidden database server. The user doesn’t know that his/her data is kept in this server also whenever the query for download is been generated to download the server the existing data in server is cross verified with hidden database to check the manipulation if any which is accommodated using Naïve Bayes String Search Algorithm. If no data manipulation is been occurred it defines the superiority and trustworthiness of cloud storage among the public and cloud buyers.
Key-Words / Index Term
Data Security, Cloud, Computing, Privacy, NTRU, NAIVE
References
[1] Bhadauria, R., & Sanyal, S. (2012). Survey on security issues in cloud computing and associated mitigation techniques. arXiv preprint arXiv:1204.0764.
[2] Bhadauria, R., Chaki, R., Chaki, N., & Sanyal, S. (2011). A survey on security issues in cloud computing. arXiv preprint arXiv:1109.5388.
[3] Behl, A. (2011, December). Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation. In Information and Communication Technologies (WICT), 2011 World Congress on (pp. 217-222). IEEE.
[4] Dan Boneh, Eu-Jin Goh, and KobbiNissim. Evaluating 2-DNF formulas on ciphertexts. In Theory of Cryptography Conference, TCC'2005, volume 3378 of Lecture Notes in Computer Science, pages 325-341. Springer, 2005.
[5] Dhage, S. N., & Meshram, B. B. (2012). Intrusion detection system in cloud computing environment. International Journal of Cloud Computing, 1(2), 261-282
[6] Jansen, W. A. (2011, January).Cloud hooks: Security and privacy issues in cloud computing. In System Sciences (HICSS), 2011 44th Hawaii International Conference on (pp. 1-10). IEEE.
[7] Jansen, W., & Grance, T. (2011). Guidelines on security and privacy in public cloud computing. NIST special publication, 800, 144.
[8] Jaeger, P. T., Lin, J., & Grimes, J. M. (2008). Cloud computing and information policy: Computing in a policy cloud?. Journal of Information Technology & Politics, 5(3), 269-283.
[9] Julien Bringe and al. An Application of the Goldwasser-MicaliCryptosystem to Biometric Authentication, Springer-Verlag, 2007.
[10] Ko, R. K., Jagadpramana, P., Mowbray, M., Pearson, S., Kirchberg, M., Liang, Q., & Lee, B. S. (2011, July). TrustCloud: A framework for accountability and trust in cloud computing. In Services (SERVICES), 2011 IEEE World Congress on (pp. 584-588). IEEE
[11] Kolodner, E. K., Tal, S., Kyriazis, D., Naor, D., Allalouf, M., Bonelli, L & Wolfsthal, Y. (2011, November). A cloud environment for data-intensive storage services. In Cloud computing technology and science (CloudCom), 2011 IEEE third international conference on (pp. 357-366). IEEE.
[12] Mather, T., Kumaraswamy, S., & Latif, S. (2009). Cloud security and privacy: an enterprise perspective on risks and compliance. " O'Reilly Media, Inc.".
[13] Michener, W. K., & Jones, M. B. (2012). Ecoinformatics: supporting ecology as a data-intensive science. Trends in ecology & evolution, 27(2), 85-93.
[14] Mishra, R., Dash, S. K., Mishra, D. P., & Tripathy, A. (2011, April). A privacy preserving repository for securing data across the cloud. In Electronics Computer Technology (ICECT), 2011 3rd International Conference on (Vol. 5, pp. 6-10). IEEE.
Citation
Indu Sharma and Mandeep kaur, "Securing Data from Data Manipulation Using NAIVE String Search Algorithm and NTRU Algo in Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.393-397, 2015.