A Survey on Cloud Computing with different Encryption Techniques to Secure Cloud Data
Survey Paper | Journal Paper
Vol.3 , Issue.5 , pp.1-6, May-2015
Abstract
Cloud provides facility of assigning data to a great number of scattered computers, rather than local computer or remote server. This paper briefly surveys the issues in cloud computing security. The fact is that the data shared with the cloud service provider is identified as the core scientific problem that separates cloud computing security from other topics in computing environment. The paper also describes different encryption techniques to secure the cloud data from unauthorized users.
Key-Words / Index Term
Component Cloud computing security, Obstacles in cloud, Attribute based encryption, Homomorphic encryption.
References
[1] Huth and J. Cebula, “The Basics of Cloud Computing,” Carnegie Mellon University. pp. 1–4, 2011 [Online].
[2] S. Marston, Z. Li, S. Bandyopadhyay, J.Zhang, and A. Ghalsasi, “Cloud computing the business perspective,” Decis. Support Syst.,vol. 51, no. 1, pp. 176–189, Apr. 2011.
[3] P. Mell, T. Grance, and T. Grance, “The NIST Definition of Cloud Computing” Recommendations of the National Institute Of Standards and Technology, pp. 800-145, September 2011.
[4] P. G. Dorey and a. Leite, “Commentary: Cloud computing – A security problem or solution?”Inf. Secur. Tech. Rep., vol. 16,no. 3–4, pp. 89–96, Aug. 2011.
[5] M. Armbrust, A. D. Joseph, R. H. Katz, and D. A. Patterson, “Above the Clouds: A Berkeley View of Cloud Computing,” University of California at Berkeley pp. 14-19, February 10, 2009.
[6] B. J. Brodkin, N. W. Cloud, S. Risks, C. Computing, and G. A. Engine, “Gartner: Seven cloud-computing security risks,” pp. 2–3, 2008.
[7] C. Lee, P. Chung, and M. Hwang, “A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments,” vol. 15, no. 4, pp. 231–240, 2013.
[8] N. York, “Securing the cloud with homomorphic encryption,” vol. 20, no. 3, pp. 1–4, 2014.
[9] M. Tibouchi, “Fully Homomorphic Encryption over the Integers: From Theory to Practice,” pp. 1–4, 2014.
[10] A. Atayero and O. Feyisetan, “Security Issues in Cloud Computing : The Potentials of Homomorphic Encryption,” vol. 2, no. 10, pp. 546–552, 2011.
[11] M. Tebaa, S. E. L. Hajji, and A. E. L. Ghazi,“Homomorphic Encryption Applied to the Cloud Computing Security,” vol. 1, pp. 8–11, 2012.
Citation
Kiran prajapati, Jaytrilok choudhary, "A Survey on Cloud Computing with different Encryption Techniques to Secure Cloud Data," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.1-6, 2015.
Object Detection Using IP for Visually Impaired Person
Research Paper | Journal Paper
Vol.3 , Issue.5 , pp.7-10, May-2015
Abstract
In this paper, we have proposed a real time android application for object detection using android Smartphone for visually impaired person. The proposed object detection system, the main module is to scan objects and match to a database of objects for object detection. Feature detector methods such as SIFT, SURF, FAST are good which yields high quality features but they are computationally complex to use in real time system. It also has limited resources for computer and Smartphone platform. In this paper, we have used Sobel edge detection method for faster feature computation by extracting object edge information. Normalization is applied to extracted object features. Further, back propagation neural network training is performed for efficient detection of objects. Compared to conventional SIFT, SURF and FAST algorithm. The proposed object detection system based on Sobel edge detection yields in increased speed of detection and low performance degradation on Smartphone.
Key-Words / Index Term
Object Detection; Sobel Edge Detection, BPNN, Smartphone;
References
[1] Strumillo P. Electronic navigation systems for the blind and the visually impaired, Lodz University of Technology Publishing House ( in polish).
[2] Hersh M, Johnson M. (Eds) Assistive technology for visually impaired and blind people, Springer, London (2008)
[3] Ms. Sonali. B. Maind and Ms. Priyanka Wankar “Research Paper on Basic of Artificial Neural Network” International Journal on Recent and Innovation Trends in Computing and Communication, Vol. 2, Issue-1, January 2014, pp.96 – 100.
[4] Gartner Says Worldwide Sales of Mobile Phone
http:/www.gartner.com/newsroom/id/2237315.
Accessed 25th February 2013.
[5] Kanghun Jeong and Hyeonjoon Moon “Object Detection using FAST Corner Detector based on Smartphone platforms” 2011 First ACIS/JNU International Conference on Computers, Networks, Systems, and Industrial Engineering, pp.111 – 115.
[6] K. Matusiak, P.Skulimowski and P. Strumillo “Object Recognition in a mobile phone application for visually impaired users” 6th International Conference on Human System Interaction (HSI), 2013 , IEEE, pp. 479 – 484.
[7] Savitha G, Venugopal P S, Dr. Sarojdevi and Dr. Niranjan Chiplunkar “An Approach for Object Detection in Andriod Device” Fifth International Conference on Signal and Image Processing , 2014, pp. 9 – 14.
[8] Ruxandra tapu, Bogdan Mocanu, Andrei Bursuc and Titus Zaharia “A Smartphone-based obstacle detection and classfication system for assisting visually impaired people” Proceedings of the 2013 IEEE International Conference on Computer Vision Workshops, pp. 444-451.
[9] Rashmi, Mukesh Kumar and Rohini Saxena “ Algorithm And Technique On Various Edge Detection : A Survey” An International Journal Signal & Image Processing, June 2013, Vol.4, Issue-3, pp.65-75.
[10] Saduf and Mohd Arif Wani “Comparative Study of Back Propagation Learning Algorithms for Neural Networks” International Journal of Advanced Research in Computer Science and Software Engineering, December 2013 Vol.3, Issue-12, pp 1151-1157.
[11] Wenshuo Gao, LeiYang Xiaoguang Zhang and Huizhong Liu , “An Improved Sobel Edge Detection” 2010 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT), pp. 67 – 71.
[12] Dr. Rama kishore and Taranjit Kaur “Backpropagation Algorithm: An Artificial Neural Network Approach for Pattern Recognition” International Journal of Scientific & Engineering Research, June 2012 , Vol.3, Issue-6, pp.1-
Citation
Shruti Parkhi, S.S.Lokhande2 and N.D.Thombare, "Object Detection Using IP for Visually Impaired Person," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.7-10, 2015.
Performance of Great Occurrence Modal Responses in Non-Linear Seismic Examination
Review Paper | Journal Paper
Vol.3 , Issue.5 , pp.10-15, May-2015
Abstract
Practical problems related with the non- linear straight numerical addition of the equations of gesture leads to the use of non- linear static pushover examination of structures. Pushover examination is getting popular due to its simplicity. Great occurrence incomes and nonlinear belongings may play an important role in stiff and/or uneven structures. The influence of progressive incomes in pushover examination is not completely developed. The performance of great occurrence modal responses in non- linear seismic examination of arrangements is not known. In this paper an attempt is made to study the performance of great occurrence modal responses in non- linear seismic examination of structures.
Key-Words / Index Term
Pushover, Great Occurrence Modal Response, Rigid Frequency, Non Linear, Seismic Examination
References
[1] Liu Weixing ; Sch. of Civil & Archit. Eng., Northeast Dianli Univ., Jilin, China, “A new lateral load pattern for nonlinear pushover analysis of high-rising RC frame-wall structures”, Published in: Mechanic Automation and Control Engineering (MACE), 2010 International Conference on Date of Conference: 26-28 June 2010 Page(s): 1385 – 1388.
[2] Yang Zhang ; Dept. of Civil Eng., Tsinghua Univ., Beijing, China ; Junjin Liu ; Jiaru Qian, “Numerical simulation and analysis of a pushover of a full-scale two-story model”, Published in: Information Science and Technology (ICIST), 2011 International Conference on Date of Conference: 26-28 March 2011 Page(s): 103 – 108.
[3] Shengnan Sun ; Sch. of Archit. & Civil Eng., Liaocheng Univ., Liaocheng, China ; Zhibin Su,” Pushover analysis of a reinforced concrete shear wall based on multi-layer shell element” Published in: Electric Technology and Civil Engineering (ICETCE), 2011 International Conference on Date of Conference: 22-24 April 2011 Page(s): 5284 – 5287.
[4] Hamzah, H.F. ; Civil Eng. Dept., Univ. Teknol. PETRONAS, Tronoh, Malaysia ; Teo Wee ; Liew, Mohd Shahir,” A review of seismic assessment of reinforced concrete structure using pushover analysis”, Published in: National Postgraduate Conference (NPC), 2011 Date of Conference: 19-20Sept.2011 Page(s):1 – 5.
[5] Zhao Li ; Dept. of Civil Eng., Beijing Jiaotong Univ., Beijing, China ; Yongjun Ni ; Na Yang, “Simplified model of integrated station-bridge structure and its pushover analysis”, Published in: Electric Technology and Civil Engineering (ICETCE), 2011 International Conference on Date of Conference: 22-24 April 2011 Page(s): 6169 – 6173.
[6] Sifeng Qin ; Res. Center for Numerical Tests on Mater. Failure, Dalian Univ., Dalian, China ; Huili Wang, “Estimating for Cable-Stayed Bridge by Modified DASPA Procedure”, Published in: Intelligent Computation Technology and Automation (ICICTA), 2014 7th International Conference on Date of Conference: 25-26 Oct. 2014 Page(s): 240 – 243.
[7] Jin Shu Cheng ; Key Lab. for Large Span Bridge Constr. Technol., Wuhan, China ; Niu Zhao ; Yang Yan Hua, “Research on push-over method for earthquake-resistant performance of jacket offshore Platforms”, Published in:
[8] Electric Technology and Civil Engineering (ICETCE), 2011 International Conference on Date of Conference: 22-24 April 2011 Page(s): 2514 – 2517.
[9] Jing-en Luan ; STMicroelectronics, Singapore, Singapore ; Tong Yan Tee ; Eric Pek ; Chwee Teck Lim, “Modal analysis and dynamic responses of board level drop test”, Published in: Electronics Packaging Technology, 2003 5th Conference (EPTC 2003) Date of Conference: 10-12 Dec. 2003 Page(s): 233 – 243.
[10] Guedes, R. ; Univ. of Fortaleza, Fortaleza, Brazil ; Furtado, V. ; Pequeno, T., “Multiagent Models for Police Resource Allocation and Dispatch”, Published in: Intelligence and Security Informatics Conference (JISIC), 2014 IEEE Joint Date of Conference: 24-26 Sept. 2014 Page(s): 288 – 291.
[11] Sanaye-Pasand, M. ; Dept. of Electr. & Comput. Eng., Tehran Univ., Iran ; Mohseni, H. ; Farhangi, Sh. ; Rezaei-Zare, A., “Effects of grading capacitors of CBs on inception ferroresonance in power transformers”, Published in: Universities Power Engineering Conference, 2004. UPEC 2004. 39th International (Volume:2 ) Date of Conference: 8-8 Sept. 2004 Page(s): 860 - 868 vol. 1.
[12] Zhang, Jun ; Department of Electrical Engineering, Arizona State University, Tempe, AZ, USA, 85287-7206 ; Gottin, Bertrand ; Papandreou-Suppappola, A. ; Ioana, C., “Time-Frequency Modeling of Shallow Water Environments: Rigid vs. Fluid Seabed”, Published in: Statistical Signal Processing, 2007. SSP '07. IEEE/SP 14th Workshop on Date of Conference: 26-29 Aug. 2007 Page(s): 740 – 744.
[13] Barbarossa, S. ; Infocom Dept., Rome Univ., Italy ; Scaglione, A., “Motion compensation and target classification based on parametric modeling of the instantaneous frequency of echoes backscattered from rigid bodies”, Published in: Signals, Systems & Computers, 1997. Conference Record of the Thirty-First Asilomar Conference on (Volume:1 ) Date of Conference: 2-5 Nov. 1997 Page(s): 260 - 264 vol.1.
[14] Kerh, T. ; Nat. Pingtung Univ. of Sci. & Technol., Pingtung ; Lai, J.S. ; Gunaratnam, D. ; Saunders, R., “Neural Network Examination on Seismic Design Values in the Building Code of Taiwan”, Published in:
[15] Computer Systems and Applications, 2007. AICCSA '07. IEEE/ACS International Conference on Date of Conference: 13-16 May 2007 Page(s): 781 – 785.
[16] Stigall, Paul D. ; University of Missouri-Rolla, Rolla, MO 65401 ; Panagos, P., “Data Compression in Microprocessor-Based Data Acquisition Systems”, Published in: Geoscience Electronics, IEEE Transactions on (Volume:16 , Issue: 4 ) Page(s): 323 – 332.
Citation
A.Angeline, B.Jose Ravindra Raj and R.Vijayasarathy, "Performance of Great Occurrence Modal Responses in Non-Linear Seismic Examination," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.10-15, 2015.
Improving interference mitigation and priority based channel allocation in cognitive radio networks
Review Paper | Journal Paper
Vol.3 , Issue.5 , pp.16-20, May-2015
Abstract
The message infraconstruction amongst liveliness generation, transmission, delivery and process will need multi-way communications, interoperability amongst the progressive and prevailing system, and end-to-end dependable and protected infrastructures with low-latencies. Radical message Building is compulsory for real process and control of clever grid, and Cognitive Radio grounded message building can provide a unique solution. By leveraging Cognitive Radio technology, the suggested infrastructures infraconstruction potentials to exploit possibly all obtainable spectrum possessions professionally in the clever grid. The Radio agility allows the clever grid strategies to sense the unsecond hand spectrum opportunities in the surroundings and exploit them subject to meddlesome constraints. Active spectrum contact enabled by Cognitive Radio information can be adopted by the clever grid to exploit the under applied incidences in an opportunistic manner. As a result, the flexibility, efficiency, and dependability can be meaning completely improved in a Cognitive Radio grounded Clever Grid network.
Key-Words / Index Term
Cognitive radio, Clever grid, Message
References
[1] Tawk, Y.; Configurable Space Microsyst. Innovations & Applic. Center (COSMIAC), Univ. of New Mexico, Albuquerque, NM, USA; Costantine, J.; Christodoulou, C.G., “Cognitive-radio and antenna functionalities: A tutorial [Wireless Corner]”, Published in: Antennas and Propagation Magazine, IEEE (Volume: 56, Issue: 1) Page(s): 231 – 243.
[2] Shixian Wang ; Sch. of Comput., Nat. Univ. of Defense Technol., Changsha, China ; Lunguo Xie ; Hengzhu Liu ; Botao Zhang, “ACRA: An Autonomic and Expandable Architecture for Cognitive Radio Nodes”, Published in: Wireless Communications and Signal Processing (WCSP), 2010 International Conference on Date of Conference: 21-23 Oct. 2010 Page(s): 1 – 5.
[3] Reddy, A.V. ; ECE, Jyothishmathi Inst. of Tech., Karimnagar, India ; Krishna, E.R. ; Reddy, P.M., “Notice of Violation of IEEE Publication Principles
[4] Sensor networks for cognitive radio: Theory and system design”, Published in: Electronics Computer Technology (ICECT), 2011 3rd International Conference on (Volume: 3) Date of Conference: 8-10 April 2011 Page(s): 229 – 233.
[5] Nolan, K.E.; CTVR, Trinity Coll., Dublin; Sutton, P.; Doyle, L.E., “An Encapsulation for Reasoning, Learning, Knowledge Representation, and Reconfiguration Cognitive Radio Elements”, Published in: Cognitive Radio Oriented Wireless Networks and Communications, 2006. 1st International Conference on Date of Conference: 8-10 June 2006 Page(s): 1 – 5.
[6] Qian Li ; Zhiyong Feng ; Wei Li ; Gulliver, T.A. ; Ping Zhang, “Joint Spatial and Temporal Spectrum Sharing for Demand Response Management in Cognitive Radio Enabled Smart Grid”, Published in: Smart Grid, IEEE Transactions on (Volume:5 , Issue: 4 ) Page(s): 1993 – 2001.
[7] Bicen, A.O. ; Koc Univ., Istanbul, Turkey ; Akan, O.B. ; Gungor, V.C., “Spectrum-aware and cognitive sensor networks for smart grid applications”, Published in: Communications Magazine, IEEE (Volume:50 , Issue: 5 ) Page(s): 158 – 165.
[8] Khalfi, B. ; Qatar Univ., Doha, Qatar ; Ben Ghorbel, M. ; Hamdaoui, B. ; Guizani, M., “Optimal power allocation for smart-grid powered point-to-point cognitive radio system”, Published in: Computing, Communications and IT Applications Conference (ComComAp), 2014 IEEE Date of Conference: 20-22 Oct. 2014 Page(s): 316 – 320.
[9] Jing Gao ; Sch. of Inf. Sci. & Eng., Northeastern Univ., Shenyang, China ; Jinkuan Wang ; Bin Wang ; Xin Song, “Cognitive radio based communication network architecture for smart grid”, Published in: Information Science and Technology (ICIST), 2012 International Conference on Date of Conference: 23-25 March 2012 Page(s): 886 – 888.
[10] Yinghua Han ; Northeastern Univ. at Qinhuangdao, Qinhuangdao, China ; Jinkuan Wang ; Qiang Zhao ; Peng Han, “Cognitive information communication network for smart grid”, Published in: Information Science and Technology (ICIST), 2012 International Conference on Date of Conference: 23-25 March 2012 Page(s): 847 – 850.
[11] Sreesha, A.A. ; Dept. of Electr. & Comput. Eng., Polytech. Inst. of New York Univ., Brooklyn, OH, USA ; Somal, S. ; I-Tai Lu, “Cognitive Radio Based Wireless Sensor Network architecture for smart grid utility”, Published in: Systems, Applications and Technology Conference (LISAT), 2011 IEEE Long Island Date of Conference: 6-6 May 2011 Page(s): 1 – 7.
[12] Hamza, D. ; Phys. Sci. & Eng. Div., King Abdullah Univ. of Sci. & Technol., Thuwal, Saudi Arabia ; Aissa, S., “An Optimal Probabilistic Multiple-Access Scheme for Cognitive Radios”, Published in: Vehicular Technology, IEEE Transactions on (Volume:61 , Issue: 7 ) Page(s): 3002 – 3014.
[13] Fang Liu ; Sch. of Inf. Sci. & Eng., Northeastern Univ., Shenyang, China ; Jinkuan Wang ; Yinghua Han ; Peng Han, “Cognitive radio networks for smart grid communications”, Published in: Control Conference (ASCC), 2013 9th Asian Date of Conference: 23-26 June 2013 Page(s): 1 – 5.
[14] Gungor, V.C. ; Dept. of Comput. Eng., Bahcesehir Univ., Istanbul, Turkey ; Sahin, D., “Cognitive Radio Networks for Smart Grid Applications: A Promising Technology to Overcome Spectrum Inefficiency”, Published in: Vehicular Technology Magazine, IEEE (Volume:7 , Issue: 2 ) Page(s): 41 – 46.
[15] Rong Yu ; Fac. of Autom., Guangdong Univ. of Technol., Guangzhou, China ; Yan Zhang ; Yanrong Chen, “Hybrid spectrum access in cognitive Neighborhood Area Networks in the smart grid”, Published in: Wireless Communications and Networking Conference (WCNC), 2012 IEEE Date of Conference: 1-4 April 2012 Page(s): 1478 – 1483.
[16] Khan, F.A. ; ECIT, Queen''s Univ. of Belfast, Belfast, UK ; Ratnarajah, T. ; Sellathurai, M. ; Prakriya, S., “Outage analysis of causal cognitive radio channel”, Published in: Cognitive Wireless Systems (UKIWCWS), 2009 First UK-India International Workshop on Date of Conference: 10-12 Dec. 2009 Page(s): 1 – 6.
[17] Wei Wu ; Univ. of Texas at Austin, Austin ; Vishwanath, S. ; Arapostathis, A., “Capacity of a Class of Cognitive Radio Channels: Interference Channels With Degraded Message Sets”, Published in: Information Theory, IEEE Transactions on (Volume:53 , Issue: 11 ) Page(s): 4391 – 4399.
[18] Goochul Chung ; Univ. of Texas at Austin, Austin, TX, USA ; Sridharan, S. ; Vishwanath, S. ; Chan Soo Hwang, “On the Capacity of Overlay Cognitive Radios with Partial Cognition”, Published in: Information Theory, IEEE Transactions on (Volume:58 , Issue: 5 ) Page(s): 2935 – 2949.
[19] Rini, S. ; Tech. Univ. Munchen, Munich, Germany ; Kurniawan, E. ; Goldsmith, A., “Combining superposition coding and binning achieves capacity for the Gaussian cognitive interference channel”, Published in: Information Theory Workshop (ITW), 2012 IEEE Date of Conference: 3-7 Sept. 2012 Page(s): 227 – 231.
Citation
J.Nandhini and V.Hamsadhwani, "Improving interference mitigation and priority based channel allocation in cognitive radio networks," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.16-20, 2015.
A Slicing Founded Consistency Quantity for Clusters
Research Paper | Journal Paper
Vol.3 , Issue.5 , pp.21-25, May-2015
Abstract
Numerous procedures and methods consume been planned in recent years for the publication of sensitive microdata. However, there is a trade-OFF to be measured amongst the level of privacy offered and the usefulness of the obtainable data. Recently, slicing was planned as a unique method for cumulative the usefulness of an anonymized obtainable dataset by separating the dataset vertically and horizontally. This effort proposes a unique method to upsurge the usefulness of a communal dataset even additional by permitting touched gathering though maintaining the prevention of association disclosure. It is additional exposed that by incomes of a process to mondrian upsurges the competence of slicing. This paper displays though work weight trials that these improvements help preserve facts usefulness healthier than outdated slicing.
Key-Words / Index Term
Facts Anonymization, Privacy Preservation, Facts Mining, Slicing
References
[1] Halboob, W. ; Center of Excellence in Inf. Assurance, King Saud Univ., Riyadh, Saudi Arabia ; Abulaish, M. ; Alghathbar, K.S., “Quaternary privacy-levels preservation in computer forensics investigation process”, Published in: Internet Technology and Secured Transactions (ICITST), 2011 International Conference for Date of Conference: 11-14 Dec. 2011 Page(s): 777 – 782.
[2] Komishani, E.G. ; Fac. of Electr. & Comput. Eng., Tarbiat Modares Univ., Tehran, Iran ; Abadi, M., “A generalization-based approach for personalized privacy preservation in trajectory data publishing”, Published in: Telecommunications (IST), 2012 Sixth International Symposium on Date of Conference: 6-8 Nov. 2012 Page(s): 1129 – 1135.
[3] Tiancheng Li ; Dept. of Comput. Sci., Purdue Univ., West Lafayette, IN ; Ninghui Li, “Injector: Mining Background Knowledge for Data Anonymization”, Published in :Data Engineering, 2008. ICDE 2008. IEEE 24th International Conference on Date of Conference: 7-12 April 2008 Page(s): 446 – 455.
[4] Gaofeng Zhang ; Fac. of Inf. & Commun. Technol., Swinburne Univ. of Technol. Hawthorn, Melbourne, VIC, Australia ; Yun Yang ; Xuyun Zhang ; Chang Liu, “Key Research Issues for Privacy Protection and Preservation in Cloud Computing”, Published in: Cloud and Green Computing (CGC), 2012 Second International Conference on Date of Conference: 1-3 Nov. 2012 Page(s): 47 – 54.
[5] Sochor, T. ; Dept. of Comput. Sci., Univ. of Ostrava, Ostrava, Czech Republic, “Fuzzy control of configuration of web anonymization using TOR”, Published in: Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE), 2013 International Conference on Date of Conference: 9-11 May 2013 Page(s): 115 – 120.
[6] Grunbaum, R. ; ABB AB, Baden-Dättwil, Switzerland ; Rasmussen, J., “FACTS for cost-effective improvement of power feeding of large mining complexes”, Published in: IECON 2012 - 38th Annual Conference on IEEE Industrial Electronics Society Date of Conference: 25-28 Oct. 2012 Page(s): 1295 – 1300.
[7] Grunbaum, R. ; ABB AB, Västerås, Sweden ; Willemsen, N., “Facts for voltage stability and power quality improvement in mining”, Published in: Electricity Distribution (CIRED 2013), 22nd International Conference and Exhibition on Date of Conference: 10-13 June 213 Page(s): 1 – 4.
[8] Zhen Zhu ; State Key Lab. of Remote Sensing Sci., Beijing Normal Univ., Beijing, China ; Wuming Zhang ; Ling Zhu ; Jmg Zhao, “Research on different slicing methods of acquiring LAI from terrestrial laser scanner data”, Published in: Spatial Data Mining and Geographical Knowledge Services (ICSDM), 2011 IEEE International Conference on Date of Conference: June 29 2011-July 1 2011 Page(s): 295 – 299.
[9] Binkley, D. ; Loyola Coll., Baltimore, MD ; Danicic, S. ; Gyimothy, T. ; Harman, M., “Formalizing executable dynamic and forward slicing”, Published in: Source Code Analysis and Manipulation, 2004. Fourth IEEE International Workshop on Date of Conference: 16-16 Sept. 2004 Page(s): 43 – 52.
[10] Takada, T. ; Dept. of Informatics, Osaka Univ., Japan ; Ohata, F. ; Inoue, K., “Dependence-cache slicing: a program slicing method using lightweight dynamic information”, Published in: Program Comprehension, 2002. Proceedings. 10th International Workshop on Date of Conference: 2002 Page(s): 169 – 177.
Citation
P.Sathiyakala and G.Baskaran, "A Slicing Founded Consistency Quantity for Clusters," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.21-25, 2015.
An Improved Keyword Exploration Recovery By incomes of Page Position over Difference Query Facilities
Research Paper | Journal Paper
Vol.3 , Issue.5 , pp.26-29, May-2015
Abstract
The necessities of cloud calculating is cumulative due to massive upsurge of operator contact to the cloud databases. The more number of users are trying to contact the cloud databases to achieve their storage necessities somewhere the cloud amenity earners essential to emphasis on if effectual services. In the prevailing work, EIRQ method is applied somewhere it aims to regain the leaflets grounded on operator necessities and similarly emphasis on discount of message cost. The EIRQ doesn’t concentrate on retrieving most comparable leaflets to the users. Henceforth it necessities to be concentrated to re shelter the operator friendly environment. In this work, the page position arrangement is obtainable which concentrates on retrieving the most comparable leaflets to the users. This method recovers the operator friendly situation as well as it tries to emphasis on the discount of message cost.
Key-Words / Index Term
Cloud Computing, AES algorithm, Page ranking, file filter, Aggregation And Delivery Layer
References
[1] Almorsy, M. ; Comput. Sci. & Software Eng., Swinburne Univ. of Technol., Hawthorn, VIC, Australia ; Grundy, John ; Ibrahim, A.S., “Collaboration-Based Cloud Computing Security Management Framework”, Published in: Cloud Computing (CLOUD), 2011 IEEE International Conference on Date of Conference: 4-9 July 2011 Page(s): 364 – 371.
[2] Zehua Zhang ; Sch. of Inf. Sci. & Eng., Yunnan Univ., Kunming, China ; Xuejie Zhang, “Realization of open cloud computing federation based on mobile agent”, Published in: Intelligent Computing and Intelligent Systems, 2009. ICIS 2009. IEEE International Conference on (Volume:3 ) Date of Conference: 20-22 Nov. 2009 Page(s): 642 – 646.
[3] Wang En Dong ; State Key Lab. of High-end Server & Storage Technol., Beijing, China ; Wu Nan ; Li Xu, “QoS-Oriented Monitoring Model of Cloud Computing Resources Availability”, Published in: Computational and Information Sciences (ICCIS), 2013 Fifth International Conference on Date of Conference: 21-23 June 2013 Page(s): 1537 – 1540.
[4] Qiang Guan ; Dept. of Comput. Sci. & Eng., Univ. of North Texas, Denton, TX, USA ; Chi-Chen Chiu ; Song Fu, “CDA: A Cloud Dependability Analysis Framework for Characterizing System Dependability in Cloud Computing Infrastructures”, Published in: Dependable Computing (PRDC), 2012 IEEE 18th Pacific Rim International Symposium on Date of Conference: 18-19 Nov. 2012 Page(s): 11 – 20.
[5] Vishnu, M.B. ; Commun. Dev. Centre, Panasonic R&D Malaysia ; Tiong, S.K. ; Zaini, M. ; Koh, S.P., “Security enhancement of digital motion image transmission using hybrid AES-DES algorithm”, Published in: Communications, 2008. APCC 2008. 14th Asia-Pacific Conference on Date of Conference: 14-16 Oct. 2008 Page(s): 1 – 5.
[6] Fei Shao ; Dept. of Inf. Technol., Jinling Inst. of Technol., Nanjing, China ; Zinan Chang ; Yi Zhang, “AES Encryption Algorithm Based on the High Performance Computing of GPU”, Published in: Communication Software and Networks, 2010. ICCSN '10. Second International Conference on Date of Conference: 26-28 Feb. 2010 Page(s): 588 – 590.
[7] Chauhan, Vijay ; Jaiswal, Arunima ; Khan, Junaid, “Web Page Ranking Using Machine Learning Approach”, Published in: Advanced Computing & Communication Technologies (ACCT), 2015 Fifth International Conference on Date of Conference: 21-22 Feb. 2015 Page(s): 575 – 580.
[8] Sweah Liang Yong ; Univ. of Wollongong, Wollongong, NSW ; Hagenbuchner, M. ; Ah Chung Tsoi, “Ranking Web Pages Using Machine Learning Approaches”, Published in: Web Intelligence and Intelligent Agent Technology, 2008. WI-IAT '08. IEEE/WIC/ACM International Conference on (Volume:3 ) Date of Conference: 9-12 Dec. 2008 Page(s): 677 – 680.
Citation
L.Lavanya and P.Shanmugapriya, "An Improved Keyword Exploration Recovery By incomes of Page Position over Difference Query Facilities," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.26-29, 2015.
Word Level and Efficient Text Recognition Using Sift
Review Paper | Journal Paper
Vol.3 , Issue.5 , pp.30-34, May-2015
Abstract
Gratitude of text in ordinary segment images is varying into a distinguished examination space owing to the widespread obtainability of imaging strategies in low-priced client product like portable phones. Detecting text in ordinary pictures, as hostile scans of written pages, faxes and commercial cards, is a crucial stage for variety of laptop dream applications, like treated aid for visually impaired and robotic navigation in urban environments. Retrieving texts in every indoor and outdoor situation delivers discourse clues for a good kind of dream tasks. During this project, we execute two processes like text disco actual and text recognition. In text detection, exploit alteration map is then binaries by median strainer and joint with cranny’s edge map to spot the text stroke edge pixels supported feature extraction. The options extractors are Harris Corner, maximal stable extremely sections (Mser), and dense sampling and histogram of oriented gradients (hog) descriptors. Then tool text recognition. The primary one is coaching a personality recognizer to predict the class of a personality in an image patch. The other is coaching a binary personality category for actual personality class to predict the existence of this class in an image patch. The two systems are suitable with two promising needs related with segment text that are text understanding and text retrieval. In supplementary we tend to extend this idea with word level gratitude with lexicon incomes with correct results. And additionally gratitude text in actual era pictures, videos and portable submission pictures.
Key-Words / Index Term
Personality Recognition, Text Detection, Text Recognition
References
[1] Haifang Li ; Comput. & Software Coll., Taiyuan Univ. of Technol., Taiyuan ; Na Pang ; Shangbo Guo ; Heping Wang, “Research on textual emotion recognition incorporating personality factor”, Published in: Robotics and Biomimetics, 2007. ROBIO 2007. IEEE International Conference on Date of Conference: 15-18 Dec. 2007 Page(s): 2222 – 2227.
[2] Alam, F. ; Dept. of Inf. Eng. & Comput. Sci., Univ. of Trento, Trento, Italy ; Riccardi, G., “Fusion of acoustic, linguistic and psycholinguistic features for Speaker Personality Traits recognition”, Published in: Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on Date of Conference: 4-9 May 2014 Page(s): 955 – 959.
[3] Teso, S. ; Dept. of Inf. Eng. & Comput. Sci., Univ. of Trento, Trento, Italy ; Staiano, J. ; Lepri, B. ; Passerini, A., “Ego-centric Graphlets for Personality and Affective States Recognition”, Published in: Social Computing (SocialCom), 2013 International Conference on Date of Conference: 8-14 Sept. 2013 Page(s): 874 – 877.
[4] Salamin, H. ; Sch. of Comput. Sci., Univ. of Glasgow, Glasgow, UK ; Polychroniou, A. ; Yinciarelli, A., “Automatic recognition of personality and conflict handling style in mobile phone conversations”, Published in: Image Analysis for Multimedia Interactive Services (WIAMIS), 2013 14th International Workshop on Date of Conference: 3-5 July 2013 Page(s): 1 – 4.
[5] Nancy, A. ; M.E Commun. Syst., M. Kumarasamy Coll. of Eng., Karar, India ; Jayapriya, D., “Video frames text detection through Bayesian classification and boundary growing method”, Published in: Information Communication and Embedded Systems (ICICES), 2014 International Conference on Date of Conference: 27-28 Feb. 2014 Page(s): 1 – 6.
[6] Shivakumara, P. ; Sch. of Comput., Nat. Univ. of Singapore, Singapore, Singapore ; Sreedhar, R.P. ; Trung Quy Phan ; Shijian Lu, “Multioriented Video Scene Text Detection Through Bayesian Classification and Boundary Growing”, Published in: Circuits and Systems for Video Technology, IEEE Transactions on (Volume:22 , Issue: 8 ) Page(s): 1227 – 1235.
[7] Sharma, N. ; Griffith Univ., Brisbane, QLD, Australia ; Shivakumara, P. ; Pal, U. ; Blumenstein, M., “A New Method for Arbitrarily-Oriented Text Detection in Video”, Published in: Document Analysis Systems (DAS), 2012 10th IAPR International Workshop on Date of Conference: 27-29 March 2012 Page(s): 74 – 78.
[8] Xuejian Rong ; Chucai Yi ; Xiaodong Yang ; YingLi Tian, “Scene text recognition in multiple frames based on text tracking”, Published in: Multimedia and Expo (ICME), 2014 IEEE International Conference on Date of Conference: 14-18 July 2014 Page(s): 1 – 6.
[9] Roy, S. ; Tata Consultancy Services, Kolkata, India ; Roy, P.P. ; Shivakumara, P. ; Louloudis, G., “HMM-Based Multi Oriented Text Recognition in Natural Scene Image”, Published in: Pattern Recognition (ACPR), 2013 2nd IAPR Asian Conference on Date of Conference: 5-8 Nov. 2013 Page(s): 288 – 292.
[10] Jian Yi ; Inst. of Comput. Sci. & Technol., Peking Univ., Beijing, China ; Yuxin Peng ; Jianguo Xiao, “Published in: Document Analysis and Recognition, 2009. ICDAR '09. 10th International Conference on Date of Conference: 26-29 July 2009 Page(s): 71 – 75.
Citation
K.Buvanalakshmi and T.Geetha , "Word Level and Efficient Text Recognition Using Sift," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.30-34, 2015.
Adaptive Active Importance Planning for Simulated Desktop Infrastructures
Research Paper | Journal Paper
Vol.3 , Issue.5 , pp.35-44, May-2015
Abstract
Simulated desktop infra arrangements (VDIS) are gaining popularity in cloud calculating by permitting businesses to deploy their office surroundings in a virtualized setting in its place of relying on bodily desktop machines. Consolidating numerous users into a VDI situation can meaning completely lower it association expenses and allows new features such as “available-anywhere” desktops. However, barriers to broad adoption comprise the slow presentation of virtualized I/O, CPU planning meddlesome problems, and shared-cache contention. In this paper, we suggest a new lenient real-Era planning process that employs supple importance designations (via usefulness functions) and automated planner class disco actual (via hypervisor observing of operator behavior) to provide a progressive excellence operator experience. We consume applied our planner within the XEN virtualization platform, and prove that the expenses incurred subsequently collocating great numbers of simulated apparatuses can be abridged subsequently 66% with prevailing schedulers to under 2% in our system. We assess the benefits and expenses of by incomes of a lesser planning Era important in a VDI setting, and show that the normal above your head Era per planner call is on the identical instruction as the prevailing SEDF and credit schedulers.
Key-Words / Index Term
Xen, Scheduler, Simulated Desktop Infrastructure, Desktop Virtualization, Cloud Computing
References
[1] Sisu Xi ; Dept. of Comput. Sci. & Eng., Washington Univ. in St. Louis, St. Louis, MO, USA ; Wilson, J. ; Chenyang Lu ; Gill, C., “RT-Xen: Towards real-time hypervisor scheduling in Xen”, Published in: Embedded Software (EMSOFT), 2011 Proceedings of the International Conference on Date of Conference: 9-14 Oct. 2011 Page(s): 39 – 48.
[2] Yun Chan Cho ; SungKyunKwan Univ., Suwon ; Jae Wook Jeon, “Sharing data between processes running on different domains in para-virtualized xen”, Published in: Control, Automation and Systems, 2007. ICCAS '07. International Conference on Date of Conference: 17-20 Oct. 2007 Page(s): 1255 – 1260.
[3] Tafa, I. ; Inf. Technol. Fac., Polytech. Univ. of Tirana, Tirana, Albania ; Beqiri, E. ; Paci, H. ; Kajo, E., “The Evaluation of Transfer Time, CPU Consumption and Memory Utilization in XEN-PV, XEN-HVM, OpenVZ, KVM-FV and KVM-PV Hypervisors Using FTP and HTTP Approaches”, Published in: Intelligent Networking and Collaborative Systems (INCoS), 2011 Third International Conference on Date of Conference: Nov. 30 2011-Dec. 2 2011 Page(s): 502 – 507.
[4] Weikuan Yu ; Comput. Sci. & Math., Oak Ridge Nat. Lab., Oak Ridge, TN ; Vetter, J.S., “Xen-Based HPC: A Parallel I/O Perspective”, Published in: Cluster Computing and the Grid, 2008. CCGRID '08. 8th IEEE International Symposium on Date of Conference: 19-22 May 2008 Page(s): 154 – 161.
[5] Jianhua Che ; Coll. of Inf. Sci. & Technol., Nanjing Agric. Univ., Nanjing, China ; Wei Yao ; Shougang Ren ; Haoyun Wang, “Performance Analyzing and Predicting of Network I/O in Xen System”, Published in:
[6] Dependable, Autonomic and Secure Computing (DASC), 2013 IEEE 11th International Conference on Date of Conference: 21-22 Dec. 2013 Page(s): 637 – 641.
[7] Yue Jiang ; Services Comput. Technol. & Syst. Lab., Huazhong Univ. of Sci. & Technol., Wuhan, China ; Hai Jin ; Xiaofei Liao, “DevStore: Distributed storage system for desktop virtualization”, Published in: Computer Science & Education (ICCSE), 2013 8th International Conference on Date of Conference: 26-28 April 2013 Page(s): 341 – 346.
[8] Hai Jin ; 26–28 October 2011, Port Elizabeth, South Africa, “Desktop virtualization: Path to pervasive computing in cloud computing era”, Published in: Pervasive Computing and Applications (ICPCA), 2011 6th International Conference on Date of Conference: 26-28 Oct. 2011 Page(s): 3.
[9] Jiewei Wu ; Sch. of Software, Shanghai Jiao Tong Univ., Shanghai, China ; Jiajun Wang ; Zhengwei Qi ; HaiBing Guan, SRIDesk: A Streaming based Remote Interactivity architecture for desktop virtualization system”, Published in: Computers and Communications (ISCC), 2013 IEEE Symposium on Date of Conference: 7-10 July 2013 Page(s): 000281 – 000286
[10] Manvar, D. ; Comput. Sci. & Eng. Dept., Indian Inst. of Technol. Bombay, Mumbai, India ; Mishra, M. ; Sahoo, A., “Low cost computing using virtualization for Remote Desktop”, Published in: Communication Systems and Networks (COMSNETS), 2012 Fourth International Conference on Date of Conference: 3-7 Jan. 2012 Page(s): 1 – 2.
[11] Bordetsky, A. ; Center for Res. in Telecommun. & Collaborative Technol., California State Univ., Hayward, CA, USA ; Simcox, F., “Desktop video conferencing collaborative technology for planning satellite based communications”, Published in: MILCOM 97 Proceedings (Volume:1 ) Date of Conference: 2-5 Nov 1997 Page(s): 223 - 227 vol.1.
[12] Dos Anjos, J.C.S. ; Fed. Univ. of Rio Grande do Sul, Porto Alegre, Brazil ; Fedak, G. ; Geyer, C.F.R., “BIGhybrid -- A Toolkit for Simulating MapReduce in Hybrid Infrastructures”, Published in:
[13] Computer Architecture and High Performance Computing Workshop (SBAC-PADW), 2014 International Symposium on Date of Conference: 22-24 Oct. 2014 Page(s): 132 – 137.
[14] El Houssaini, S. ; Lab. d'Electron., Univ. Hassan II - Mohammedia, Casablanca, Morocco ; Badri, A., “A web-based spatial decision support system for effective monitoring and routing problem”, Published in:
[15] Multimedia Computing and Systems (ICMCS), 2012 International Conference on Date of Conference: 10-12 May 2012 Page(s): 669 – 674.
[16] Narayan, S. ; Dept. of Comput., UNITEC Inst. of Technol., Auckland, New Zealand ; Yhi Shi, “Application layer network performance analysis of IPv4 and IPv6 on Windows operating systems”, Published in: Computers and Devices for Communication, 2009. CODEC 2009. 4th International Conference on Date of Conference: 14-16 Dec. 2009 Page(s): 1 – 4.
Citation
T.Bhuvaneswari and J.Sasidevi , "Adaptive Active Importance Planning for Simulated Desktop Infrastructures," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.35-44, 2015.
Charge Effective Enquiry Facilities Complete Combination Then Delivery Coat
Review Paper | Journal Paper
Vol.3 , Issue.5 , pp.45-49, May-2015
Abstract
An Effective Information recovery aimed at graded enquiries (EIRGE) arrangement is recovery of graded files on operator demand. An EIRGE worked founded on the combination then delivery coat (ADL). An ADL is Presentation as mediator amid bank of cloud computing then end-users. An EIRGE arrangement decreases the communication charge then communication overhead. Request medium is used to clean out as whatever operator truly wants complemented facts earlier recurring to the combination then delivery coat (ADL). To evade minor measure of interruptions in bank of cloud computing computing, shadow two vital issues: - Confidentiality then efficiency. Remote key term founded file recovery arrangement was anticipated via ostrovsky.
Key-Words / Index Term
Combination Then Delivery Layer, Flower Filter, Ostrovsky, Remote Search, Abundant Privacy
References
[1] Stephens, D.N. ; California Univ., Davis, CA ; Ming Lu, X. ; Proulx, T. ; Walters, W., “5A-1 Multi-frequency Array Development for Drug Delivery Therapies: Characterization and First Use of a Triple Row Ultrasound Probe”, Published in: Ultrasonics Symposium, 2006. IEEE Date of Conference: 2-6 Oct. 2006 Page(s): 66 – 69.
[2] Yangyang Gao ; Dept. of Electron. & Inf. Eng., Beijing Jiaotong Univ., Beijing, China ; Fei Song ; Yajuan Qin ; Ilsun You, “On Performance Evaluation of Various Traffic Combination Based on Network Calculus” Published in: Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2013 Seventh International Conference on Date of Conference: 3-5 July 2013 Page(s): 381 – 386.
[3] Piamrat, K. ; INRIA/IRISA, Rennes, France ; Fontaine, P. ; Viho, C., “Managing wireless IPTV in multimedia home networking”, Published in: Advanced Communication Technology (ICACT), 2013 15th International Conference on Date of Conference: 27-30 Jan. 2013 Page(s): 352 – 356. Young-Ki Hwang ; Electr. Eng. & Comput. Eng., Syracuse Univ., NY, USA ; Hariri, S., “Improving TCP performance over wireless ATM networks”, Published in: Information Technology Conference, 1998. IEEE Date of Conference: 1-3 Sep 1998 Page(s): 157 – 160.
[4] Sgardoni, V. ; Centre for Commun. Res., Univ. of Bristol, Bristol ; Sarafianou, M. ; Ferre, P. ; Nix, A., “Robust video broadcasting over 802.11a/g in time-correlated fading channels”, Published in: Consumer Electronics, IEEE Transactions on (Volume:55 , Issue: 1 ) Page(s): 69 – 76.
[5] Nintanavongsa, P. ; Dept. of Comput. Eng., Rajamangala Univ. of Technol. Thanyaburi, Thanyaburi, Thailand ; Naderi, M.Y. ; Chowdhury, K.R., “A dual-band wireless energy transfer protocol for heterogeneous sensor networks powered by RF energy harvesting”, Published in: Computer Science and Engineering Conference (ICSEC), 2013 International Date of Conference: 4-6 Sept. 2013 Page(s): 387 – 392.
[6] Sevit, A. ; Sch. of Biomed. Eng., Sci. & Health Syst., Drexel Univ., Philadelphia, PA, USA ; Forsberg, F. ; Eisenbrey, J.R. ; Fitzgerald, K.E., “Development of an ultrasound-sensitive antimicrobial platform for reducing infection after spinal stabilization surgery”, Published in: Ultrasonics Symposium (IUS), 2014 IEEE International Date of Conference: 3-6 Sept. 2014 Page(s): 1045 – 1048.
[7] Zhijin Zhang ; State Key Lab. of Power Transm. Equip. & Syst. Security & New Technol., Chongqing Univ., Chongqing, China ; Xiaohuan Liu ; Xingliang Jiang ; Jianlin Hu, “Study on AC Flashover Performance for Different Types of Porcelain and Glass Insulators With Non-Uniform Pollution”, Published in: Power Delivery, IEEE Transactions on (Volume:28 , Issue: 3 ) Page(s): 1691 – 1698.
[8] Tonello, A.M. ; Dipt. di Ing. Elettr., Gestionale e Meccanica, DIEGM, Univ. di Udine, Udine, Italy ; Versolatto, F. ; Girotto, M., “Multitechnology (I-UWB and OFDM) Coexistent Communications on the Power Delivery Network”, Published in: Power Delivery, IEEE Transactions on (Volume:28 , Issue: 4 ) Page(s): 2039 – 2047.
[9] Kim, Woo-Young ; Robot Research Initiative, 300 Yongbong-Dong, 500-757, Gwangju, Korea ; Song, Il-hyeon ; Kim, Kyung-whan ; Park, Suk-Ho, “Group Dancing Mobile Flower Robots with Moving Mechanism, Mobility and Localization Functions”, Published in: Robotics (ISR), 2010 41st International Symposium on and 2010 6th German Conference on Robotics (ROBOTIK) Date of Conference: 7-9 June 2010.
[10] Xiao Ke ; Cognitive Sci. Dept., Xiamen Univ., Xiamen, China ; Shaozi Li ; Xiaofen Chen, “Modified model in content-based flower image retrieval”, Published in: Intelligent Computing and Intelligent Systems (ICIS), 2010 IEEE International Conference on (Volume:3 ) Date of Conference: 29-31 Oct. 2010.
[11] Zhenyu Guo ; Dept. of ECE, Univ. of British Columbia, Vancouver, BC, Canada ; Wang, Z.J., “An Adaptive Descriptor Design for Object Recognition in the Wild”, Published in: Computer Vision (ICCV), 2013 IEEE International Conference on Date of Conference: 1-8 Dec. 2013 Page(s): 2568 – 2575.
[12] Goyal, V. ; Microsoft Res., Bangalore, India ; Chen-Kuei Lee ; Ostrovsky, R. ; Visconti, I., “Constructing Non-malleable Commitments: A Black-Box Approach”, Published in: Foundations of Computer Science (FOCS), 2012 IEEE 53rd Annual Symposium on Date of Conference: 20-23 Oct. 2012 Page(s): 51 – 60.
[13] Yen-Shin Lee ; Dept. of Electron. & Electr. Eng., Nat. Defense Univ., Taoyuan, Taiwan ; Shu-Sheng Hao ; Shu-Wei Lin ; Sheng-Yi Li, “Image retrieval by region of interest motif co-occurence matrix”, Published in: Intelligent Signal Processing and Communications Systems (ISPACS), 2012 International Symposium on Date of Conference: 4-7 Nov. 2012 Page(s): 270 – 274.
[14] Johnson, A. ; Electron. Visualization Lab., Illinois Univ., Chicago, IL, USA ; Moher, T. ; Yong-Joo Cho ; Edelson, D., “6th graders "doin' science"-collecting data and looking for patterns in a virtual field”, Published in: Virtual Reality, 2002. Proceedings. IEEE Date of Conference: 2002 Page(s): 281 – 282.
[15] Anand, V. ; Muffakham Jah Coll. of Eng. & Technol., Hyderabad, India ; Abdul Moiz Qyser, A., “Weighted Ranked Queries for secure search in cost-effective clouds”, Published in: Computer and Communications Technologies (ICCCT), 2014 International Conference on Date of Conference: 11-13 Dec. 2014 Page(s): 1 – 6.
[16] Benisty, H. ; Lab. Charles Fabry, Inst. d''Opt. Grad. Sch., Palaiseau, France ; Piskunov, N. ; Golovan, L.A., “Littrow resonators and their triply resonant nonlinear response”, Published in: Transparent Optical Networks (ICTON), 2012 14th International Conference on Date of Conference: 2-5 July 2012 Page(s): 1 – 4.
Citation
V. Menaka and M.Arthi , "Charge Effective Enquiry Facilities Complete Combination Then Delivery Coat," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.45-49, 2015.
Mobile-Assisted Language Learning
Review Paper | Journal Paper
Vol.3 , Issue.5 , pp.50-54, May-2015
Abstract
The chief features of mobile learning (m-learning) are documented as the probable for knowledge process to be modified, unprompted, unceremonious and omnipresent. Though learning concluded mobile phones may take lengthier time associated to processers, the apprentices feel a superior sense of liberty of time and place, so that they can revenue the improvement of spare time to acquire a second philological when and anywhere they stay, Mobile-Assisted Language Learning (MALL) arrangements with the custom of mobile expertise in language learning. In difference to classroom culture, in MALL around is no requirement for the pupils to sit in a teaching space or at a processer to get education resources. In fact, MALL can be measured an ideal explanation to philological learning barricades in footings of period and residence. In this manuscript by observing at some submissions of m-learning as well as some specimens transversely numerous features of it, we perceive the compensations and difficulties resulting from consuming mobile skills for scholars as well as specialists. Here, it has remained strained to establish the welfares of expending mobile earphones in education English as an additional linguistic. Zones of mobile-based linguistic education conversed in this manuscript are terminology, attending, parsing, phonetics, and construing conception.
Key-Words / Index Term
E-Learning, Mobile-Assisted Language Learning, Mobile Knowledge, Second Linguistic Learning, Wireless Announcement
References
[1] Kapoor, A. ; Dept. of Electron., Univ. of Delhi, New Delhi, India ; Kabra, S. ; Dua, H., “Development, use and impact of e-learning based modules for teaching electronics: To undergraduate girl students: A case study”, Published in: MOOC, Innovation and Technology in Education (MITE), 2014 IEEE International Conference on Date of Conference: 19-20 Dec. 2014 Page(s): 215 – 218.
[2] Tudevdagva, U. ; Dept. of Comput. Sci., Mongolian Univ. of Sci. & Technol., Ulaanbaatar, Mongolia ; Ayush, Y. ; Baatar, B., “The Virtual Laboratories Case Study in Traditional Teaching and E-Learning for Engineering Sciences”, Published in: Ubi-Media Computing and Workshops (UMEDIA), 2014 7th International Conference on Date of Conference: 12-14 July 2014 Page(s): 281 – 285.
[3] Yu Puyong ; Dept. of Inf. Sci. & Technol., TaiShan Univ., Taian, China ; Xu Chengzhi, “Architecture model for learning community of SNS: Based on Multi-Agent and the concept of E-learning 2.0”, Published in: Electrical and Control Engineering (ICECE), 2011 International Conference on Date of Conference: 16-18 Sept. 2011 Page(s): 6386 – 6389.
[4] Pevac, D.V. ; Coll. of Inf. & Commun. Technol., Belgrade ; Milanovic, K.S. ; Milosavljevic, M.M., “E-learning Method Implementation in the High School Vocational Education”, Published in: Computer as a Tool, 2005. EUROCON 2005.The International Conference on (Volume:1 ) Date of Conference: 21-24 Nov. 2005 Page(s): 835 – 838.
[5] Chukwunonso, F. ; Dept. of Inf. Syst., Univ. Teknol. Malaysia, Skudai, Malaysia ; Binti Ibrahim, R. ; Bin Selamat, A., “A user-specific integrated approach for designing knowledge-based e-learning”, Published in: e-Learning, e-Management and e-Services (IC3e), 2013 IEEE Conference on Date of Conference: 2-4 Dec. 2013 Page(s): 40 – 45.
[6] azek, M.A. ; Depart. of Math & Comput. Sci., Azhar Univ., Cairo, Egypt ; Frasson, C. ; Kaltenbach, M., “Multi-learner system towards an efficient e-learning system”, Published in: Advanced Learning Technologies, 2005. ICALT 2005. Fifth IEEE International Conference on Date of Conference: 5-8 July 2005 Page(s): 620 – 622.
[7] Sampson, D.G. ; Dept. of Digital Syst., Univ. of Piraeus, Piraeus, Greece ; Zervas, P., “Open Access to Mobile Assisted Language Learning Supported by the Mobile2Learn Framework”, Published in: Advanced Learning Technologies (ICALT), 2012 IEEE 12th International Conference on Date of Conference: 4-6 July 2012 Page(s): 441 – 445.
[8] Ahmad, K.S. ; Sch. of Eng. & Inf. Technol., Murdoch Univ., Murdoch, WA, Australia ; Armarego, J. ; Sudweeks, F., “Literature review on the feasibility of mobile-assisted language learning (MALL) in developing vocabulary skills among non-English speaking migrant and refugee women”, Published in: Research and Innovation in Information Systems (ICRIIS), 2013 International Conference on Date of Conference: 27-28 Nov. 2013 Page(s): 336 – 341.
[9] Zervas, P. ; Inf. & Telematics Inst. (ITI), Centre for Res. & Technol. Hellas (CERTH), Athens, Greece ; Sampson, D.G., “Enhancing Educational Metadata with Mobile Assisted Language Learning Information”, Published in: Advanced Learning Technologies (ICALT), 2010 IEEE 10th International Conference on Date of Conference: 5-7 July 2010 Page(s): 269 – 273.
[10] Lung-Hsiang Wong ; Learning Sci. Lab., Nat. Inst. of Educ., Singapore, Singapore ; Chee-Kit Looi, “Mobile-Assisted Vocabulary Learning in Real-Life Setting for Primary School Students: Two Case Studies”, Published in: Wireless, Mobile and Ubiquitous Technologies in Education (WMUTE), 2010 6th IEEE International Conference on Date of Conference: 12-16 April 2010 Page(s): 88 – 95.
[11] Ru-Chu Shih ; Dept. of Modern Languages, Nat. Pingtung Univ. of Sci. & Technol., Pingtung, Taiwan ; Papa, C. ; Tsai-Feng Cheng, “Establishment of a Mobile-Assisted Language Teaching Model for English Teachers of Technological Universities and Colleges”, Published in: Robot, Vision and Signal Processing (RVSP), 2013 Second International Conference on Date of Conference: 10-12 Dec. 2013 Page(s): 144 – 147.
[12] Troussas, C. ; Dept. of Inf., Univ. of Piraeus, Piraeus, Greece ; Alepis, E. ; Virvou, M., “Mobile authoring in a multiple language learning environment”, Published in: Information, Intelligence, Systems and Applications, IISA 2014, The 5th International Conference on Date of Conference: 7-9 July 2014 Page(s): 405 – 410.
[13] Erradi, A. ; Dept. of Comput. Sci. & Eng., Qatar Univ., Doha, Qatar ; Almerekhi, H. ; Nahia, S., “Game-Based Micro-learning Approach for Language Vocabulary Acquisition Using LingoSnacks”, Published in: Advanced Learning Technologies (ICALT), 2013 IEEE 13th International Conference on Date of Conference: 15-18 July 2013 Page(s): 235 – 237.
[14] Yufei Yuan ; DeGroote Sch. of Bus., McMaster Univ., Hamilton, ON, Canada ; Wuping Zheng, “Mobile Task Characteristics and the Needs for Mobile Work Support: A Comparison between Mobile Knowledge Workers and Field Workers”, Published in: Mobile Business, 2009. ICMB 2009. Eighth International Conference on Date of Conference: 27-28 June 2009 Page(s): 7 – 11.
[15] Chin-Teng Lin ; Dept. of Electr. & Control Eng., Nat. Chiao Tung Univ., Hsinchu, Taiwan ; Ming-Chih Kan, “Adaptive fuzzy command acquisition with reinforcement learning”, Published in: Fuzzy Systems, IEEE Transactions on (Volume:6 , Issue: 1 ) Page(s): 102 – 121.
[16] Ciortuz, L. ; Dept. of Comput. Sci., Al. I. Cuza Univ. of Iasi, Iasi, Romania ; Saveluc, V., “Learning to Unlearn in Lattices of Concepts: A Case Study in Fluid Construction Grammars”, Published in: Symbolic and Numeric Algorithms for Scientific Computing (SYNASC), 2011 13th International Symposium on Date of Conference: 26-29 Sept. 2011 Page(s): 160 – 167.
[17] Yi Ling Liu ; Sch. of Electr. & Comput. Eng., Univ. of Campinas, Campinas, Brazil ; Gomide, F., “Fuzzy systems modeling with participatory evolution”, Published in: IFSA World Congress and NAFIPS Annual Meeting (IFSA/NAFIPS), 2013 Joint Date of Conference: 24-28 June 2013 Page(s): 380 – 385.
[18] Chi-Hsu Wang ; Sch. of Microelectron. Eng., Griffith Univ., Brisbane, Qld., Australia ; Han-Leih Liu ; Chin-Teng Lin, “Dynamic optimal learning rates of a certain class of fuzzy neural networks and its applications with genetic algorithm”, Published in: Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on (Volume:31 , Issue: 3 ) Page(s): 467 – 475.
Citation
A .Jenbagalakshmi and V.Geetha , "Mobile-Assisted Language Learning," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.50-54, 2015.