Channel Estimation in OFDM systems: A Survey paper
Survey Paper | Journal Paper
Vol.7 , Issue.2 , pp.540-543, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.540543
Abstract
The OFDM (Orthogonal Frequency Division Multiplexing) is a modulation technique which can offer high speed voice, video and data facility up to the customer end. Developing an understanding of the Channel estimation of OFDM can be best achieved by studying two types of estimation techniques. This paper discusses the model building of channel estimation of OFDM. This model is a beneficial tool serving as a helpful reserve for the students and the scholars who want to base their studies and research in the meadow of OFDM. The performance can be enriched by using some kind of Intelligence technique. This paper also discusses the benefits of using channel estimation in an OFDM system
Key-Words / Index Term
orthogonal frequency division multiplexing (ofdm), channel estimation, block type pilot arrangement, comb type pilot arrangement
References
[1]Keshav Kumar, Amit Grover,“Pilot Channel Estimation: A Performance Analysis ofOFDM”, International Journal of Scientific & Engineering Research Volume 4, Issue 1, 2013.
[2] Michele Morelli and Umberto Mengali, “A Comparison of Pilot-Aided Channel EstimationMethods for OFDM Systems”,IEEE Transactions on Signal Processing Volume49 , Issue: 12 ,2001.
[3] O. Edfors, M. Sandell, J. J. van de Beek, S. K. Wilson, and P. O. Borjesson, “OFDM channel estimation by singular value decomposition,”IEEE Trans. Commun., vol. 46, pp. 931–939, 1998.
[4] Sinem Coleri, Mustafa Ergen, Anuj Puri, and Ahmad Bahai, “Channel Estimation Techniques Based on PilotArrangement in OFDM Systems”,IEEE Transactions on Broadcasting , Volume48 , Issue 3 ,2002.
[5] J.-J. van de Beek, O. Edfors, M. Sandell, S. K. Wilson, and P. O. Borjesson, “On channel estimation in OFDM systems”, in Proc. IEEE 45thVehicular Technology Conf., Chicago, IL, pp. 815–819, 1995.
[6] Pallaviram Sure, Chandra Mohan Bhuma, “A survey on OFDM channel estimation techniques based on denoising strategies”,Engineering Science and Technology, an International Journal,Volume 20, Issue 2, pp 629-636,2017.
[7] Chia-Hsin Cheng , Yung-Fa Huang , Hsing-Chung Chen,Tsung-Yu Yao, “Neural Network-Based Estimation for OFDM Channels", 2015 IEEE 29th International Conference on Advanced Information Networking and Applications,2015.
[8] Meng-Han Hsieh, Che-Ho Wei, “Channel Estimation for OFDM Systems Based onComb-Type Pilot Arrangement in Frequency Selective Fading Channels”, IEEE Transactions on Consumer Electronics, Volume 44, Issue 1, 1998 )
Citation
H.P.S. Rishi, Garima Behl, Dalveer Kaur, "Channel Estimation in OFDM systems: A Survey paper," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.540-543, 2019.
Classification of Healthy and Diseased Arecanuts using SVM Classifier
Research Paper | Journal Paper
Vol.7 , Issue.2 , pp.544-548, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.544548
Abstract
Arecanut is the seed of the areca palm (Areca catechu), Arecanut palm is one of the important commercial crops in India. Majority of arecanut are produced and consumed by Indian populations when compared to other countries. This paper proposes, to Classify Healthy and Diseased Arecanut images. In this paper Healthy and diseased arecanut are have been done. Structured matrix decomposition model (SMD) is used to segment the images and LBP features are extracted using SVM classifier. Experimental results demonstrate proposed method perform well and obtained accuracy of 98%.
Key-Words / Index Term
Arecanut Images, SMD, SVM Classifier
References
[1] M. Suresha, A. Danti and S. K. Narasimhamurthy, “Classification of Diseased Arecanut based on TextureFeatures”, 2014.
[2] S. H. Tsai, Y. H. Tseng, “ A novel color detection method based on HSL color space for robotic soccer competition”, Computers & Mathematics with Applications, 64(5), 1291-1300, 2012.
[3] N.V , Ganganagowdar, H. K Siddaramappa “Recognition and ‘classification of White Wholes (WW) grade cashew kernel using artificial neural networks”, ActaScientiarum. Agronomy, 38(2), 145-155., 2012, 2016.
[4] H. Peng, B. Li, H. Ling, W. Hu, W. Xiong, & S.J. Maybank, “Salient object detection via structured matrix decomposition.”, IEEE transactions on pattern analysis and machine intelligence, 39(4), 818-832, 2017.
[5] H. N. Patel, R. K. Jain, & M. V. Joshi, “Fruit detection using improved multiple features based algorithm.”, International journal of computer applications13(2), 1-5, 2011
[6] A. Danti & M. Suresha, “Arecanut grading based on three sigma controls and SVM.”, In Advances in Engineering, Science and Management (ICAESM), International Conference on (pp. 372-376). IEEE. 2012.
[7] T. Ojala, M. Pietikainen and D. Harwood. “A comparative study of texture measures with classification based on feature distributions.”, International Pattern Recognition vol. 29, 1996.
[8] T. Mäenpaa, “The local binary pattern approach to texture analysis—extensions and applications.”, PhD thesis,Acta Universitatis Ouluensis C 187, University of Oulu 2003.
[9] V. N. Vapnik, “Estimation of dependencies based on empirical data ”,Springer. New York, 1982.
[10] M. Weis, T. Rumpf, R. Gerhards, & L. Plümer, “Comparison of different classification algorithms forWeed detection from images based on shape parameters.”, Bornimer Agrartechn. , 69, 53-64. 2009.
[11] B. E. Boser, I. M. Guyon & V. N. Vapnik, “A training algorithm for optimal margin classifiers.”, In Proceedings of the fifth annual workshop on Computational learning theory (pp. 144-152). ACM.1992 July.
[12] C. Cortes & V. Vapnik, “Support-vector networks. Machine learning.”, 20(3), 273-297.1995.
[13] M. Suresha K. N. Shreekanth and B. V. Thirumalesh B V. “Diagnosis and Classification of diseases in Paddy Leaves`.”, Journal of Current Advanced Research , 06(10), pp. 6448-6452.DOI: http://dx.doi.org/10.24327/ijcar.2017.6452.0945 ,2017.
Citation
H. Chandrashekhara, M. Suresha, "Classification of Healthy and Diseased Arecanuts using SVM Classifier," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.544-548, 2019.
Effects of Additives on Structural and Optical Properties of Selenium Thin Films
Research Paper | Journal Paper
Vol.7 , Issue.2 , pp.549-552, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.549552
Abstract
Chalcogenide alloys are highly explored due to their various technological applications. In present study, effect of additives on structural and optical properties of a-Se thin films is observed. Bulk samples of a-Se, In50Se50 (InSe) and Sb50Se50 (SbSe) are prepared using melt quench technique. Thin films of powdered samples have been deposited by thermal evaporation technique. X-ray diffraction study reveals that Se and SbSe thin films are amorphous in nature, whereas InSe thin films are crystalline in nature which indicates about phase change upon In incorporation. The change in morphology due to phase change, studied by field emission scanning electron microscopic image, is also shown. The optical transmission is also found to vary with Sb and In alloying. The optical band gap decreases greatly in SbSe with slight decrease in transmission, whereas in InSe, transmission reduced drastically with decrease in band gap. The decrease in transmission in InSe is attributed to the phase change in InSe thin films. The tuning of band gap and transmission upon In and Sb addition makes them applicable for various technological applications.
Key-Words / Index Term
Chalcogen, melt quenching, thermal evaporation, phase change material, optical transmission
References
[1] S. Sagadevan, E. Chandraseelan, “Applications of Chalcogenide Glasses: An Overview”, International Journal of ChemTech Research, Vol. 6, No. 11, pp. 4682-4686, 2014.
[2] R. Wang, J. Wei, Y. Fan, “Chalcogenide Phase-Change Thin Films used as Grayscale Photolithography Materials”, Optics Express, Vol. 22, Issue. 5, pp. 4973-4984, 2014.
[3] M. K. Agarwal, M. Saxena, S. Gupta, “A Study on Optical Parameters of Ge-Se-Te Thin Film for Optical Storage Devices”, International Journal of Computer Sciences and Engineering, Vol. 6, Issue. 12, pp. 943-947, 2018.
[4] M. H. R. Lankhorst, “Modelling Glass Transition Temperatures of Chalcogenide Glasses. Applied to Phase-Change Optical Recording Materials”, Journal of Non-Crystalline Solids, Vol. 297, Issue. 2-3, pp. 210-219, 2002.
[5] M. M. Hafiz, O. El-Shazly, N. Kinawy, “Reversible Phase Change in BixSe100-x Chalcogenide Thin Films for using as Optical Recording Medium”, Applied Surface Science, Vol. 171, Issue. 304, pp. 231-241, 2001.
[6] M. L. Anne, J. Keirsse, V. Nazabal, K. Hyodo, S. Inoue, C. Boussard-Pledel, H. Lhermite, J. Charrier, K. Yanakata, O. Loreal, J. L. Person, F. Colas, C. Compere, B. Bureau, “Chalcogenide Glass Optical Waveguides for Infrared Biosensing”, Sensors, Vol. 9, Issue. 9, pp. 7398-7411, 2009.
[7] H. Fritzsche, “Why are Chalcogenide Glasses the Materials of Choice for Ovonic Switching Devices ?”, Journal of Physics and Chemistry of Solids, Vol. 68, No. 5-6, pp. 878-882, 2007.
[8] P.Singh, A. P. Singh, J. Sharma, A. Kumar, M. Mishra, G. Gupta, A. Thakur, “Reduction of Rock Salt Phase in Ag-doped Ge2Se2Te5:A Potential Material for Reversible Near Infrared Window”, Physical Review Applied, Vol. 10, Issue. 5, pp. 054070, 2018.
[9] P. Singh, A. P. Singh, N. Kanda, M. Mishra, G. Gupta, A. Thakur, “High Transmittance Contrast in Amorphous to Hexagonal Phase of Ge2Se2T25: Reversible NIR-Window”, Applied Physical Letters, Vol. 111, Issue. 26, pp. 261102, 2017.
[10] A. B. Seddon, “Chalcogenide Glasses: A Review of their Preparation, Properties and Applications”, Journal of Non-crystalline Solids, Vol. 184, pp. 44-50, 1995.
[11] M. C. Rao, K. Ravidranadh, A. C. Ferdinand, M. S. Shekhawat, “Physical Properties and Applications of Chalcogenide Glasses- A Brief Study”, International Journal of Advances in Pharmacy, Biology and Chemistry, Vol. 2, No. 2, pp. 2277-4688, 2013.
[12] E. Zhu, X. Zhao, J. Wang, C. Lin, “Compositional Dependence of Physical and Structural Properties in (Ge1-xGax)S2 Chalcogenide Glasses”, Journal of Non-Crystalline Solids, Vol. 489, pp. 45-49, 2018.
[13] M. Asobe, “Nonlinear Optical Porperties of Chalcogenide Glass Fibers and Their Applications of All-Optical Switching”, Optical Fiber Technology, Vol. 3, Issue. 2, pp. 142-148, 1997.
[14] A. Zakery, S. R. Elliott, “Optical Properties and Appliations of Chalcogenide Galsses: A Review”, Journal of Non-Crystalline Solids, Vol. 330, Issue. 1-3, pp. 1-12, 2003.
[15] W. C. Tan, G. Belev, K. Koughia, R. Johanson, S. P. O’Leary, S. Kasap, “Optical Properties Vacuum Deposited and Chlorine Doped a-Se Thin Films: Aging Effects”, Journal of Materials Science: Materials in Electronics, Vol. 18, No. 1, pp. 429-433, 2007.
[16] M. A. M. Khan, M. Zulfequarm M. Hussain, “Estimation of Density of Localized States of a-Se100-xSbx Films using Electrical Properties”, Journal of Physics and Chemistry of Solids, Vol. 62, Issue. 6, pp. 1093-1101, 2001.
[17] R. Kumar, P. Sharma, P. B. Barman, V. Sharma. S. C. Katyal, V. S. Rangra, “Thermal Stability and Crystallization Kinetics of Se-Te-Sn Alloys using Differential Scanning Calorimetry”, Journal of Thermal Analysis and Calorimetry, Vol. 110, Issue. 3, pp. 1053-1060, 2012.
[18] R. Kaur, P. Singh, K. Singh, A. Kumar, A. Thakur, “Optical Band Gap Tuning of Sb-Se Thin Films for Xerographic based Applications”, Superlattices and Microstructure, Vol. 98, pp. 187-193, 2016.
[19] P. Singh, R. Kaur, A. Kumar, A. Thakur, “Structural and Optical Properties of SbxSe100-x (x = 0,5) Thin Films”, Optical and Quantum Electronics, Vol. 49, No. 9, pp. 288, 2017.
[20] R. Kaur, P. Singh, A. Thakur, “Optical Band Gap Study of a-Se and Se-Sb Thin Films”, AIP Conference Proceedings, Vol. 1728, No. 1, pp. 020401, 2016.
[21] A. F. Qasrawi, T. S. Kayed, K. A. Elsayed, “Properties of Se/InSe Thin-Film Interface”, Journal of Elctronic Materials, Vol. 45, No. 6, pp. 2763-2768 ,2016.
[22] A. Thakur, P. S. Chandel, V. Sharma, N. Goyal, G. S. S. Saini, S. K. Tripathi, “Photoelectrical Properties in Thin Films of (Ge20Se80)0.98Sn0.02 Glassy Alloy”, Journal of Optoelectronics and Advanced Materials, Vol. 5, No. 5, pp. 1203-1208, 2003.
Citation
Harpreet Singh, "Effects of Additives on Structural and Optical Properties of Selenium Thin Films," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.549-552, 2019.
Significance of Spectral & Wavelet features in diagnosis of Alzheimer’s Disease
Research Paper | Journal Paper
Vol.7 , Issue.2 , pp.553-559, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.553559
Abstract
Alzheimer Disease is one of the leading neuro-degenerative diseases. It is the most expensive disease in the modern society which is characterized by cognitive, intellectual as well as behavioral disturbance. Due to this, the early diagnosis of the disease is essential. Electroencephalography can be used as standardized tools for diagnosis of Alzheimer Disease. This paper discusses the important aspects of Electroencephalography & spectral & wavelet based features for early diagnosis of Alzheimer’s disease. This paper discusses the use of the different spectral based features such as Relative EEG power in various bands of EEG signal. In this study, it is observed that the EEG of the Alzheimer patients slows down & the EEG of the AD infected patients is less complex as that compared to the Controlled patients. In present research work, classification accuracy of 96% is achieved by use of K nearest Neighbor classifier by combination of Spectral & Wavelet based features. EEG can be therefore used as the tool for the early & automated diagnosis of Alzheimer disease.
Key-Words / Index Term
Alzheimer Disease, Dementia, EEG, Spectral features, Wavelet features, K nearesst neighbor classifier
References
[1] Mattson M., “Pathways towards and away from Alzheimer’s disease”, Nature, Vol. 430, pp. 631–639, Aug.2004.
[2] Meek P.D., McKeithan K., and Shumock G.T.,”Economics considerations of Alzheimer’s disease”, Pharmacotherapy, Vol. 18, pp.68–73, March-April 1998,
[3] World Health Organization and Alzheimer’s disease International (2012) Dementia: a public health priority, Technical report.
[4] De Carli C, Kaye JA, Horwitz B, Rapoport SI., “Critical analysis of the use of computer-assisted transverse axial tomography to study human brain in aging and dementia of the Alzheimer type”, Neurology, Vol .40 ,pp. 872–83, 1990.
[5] D. Fo¨rstl H, Kurz A., “Clinical features of Alzheimer’s disease.” Eur ArchPsychiatry Clin Neurosci, Vol.249, pp.288–90, 1999.
[6] Bianchetti A, Trabucch M., “Clinical aspects of Alzheimer’s disease” AgingClin Exp Res, Vol 13, pp. 221–230, 2001.
[7] Béatrice Duthey, A Public Health Approach to Innovation‖, Update on 2004 Background Paper written by SaloniTanna, February 2013.
[8] Kulkarni N. (2019) EEG Signal Analysis for Mild Alzheimer’s Disease Diagnosis by Means of Spectral- and Complexity-Based Features and Machine Learning Techniques. In: Kulkarni A., Satapathy S., Kang T., Kashan A. (eds) Proceedings of the 2nd International Conference on Data Engineering and Communication Technology. Advances in Intelligent Systems and Computing, vol 828. Springer, Singapore
[9] Justin Dauwels, Francois Vialatte, and Andrzej Cichocki, “Diagnosis of Alzheimer’s disease from EEG Signals: Where Are We Standing?” Current Alzheimer Research, Vol. 7 Issue 6, pp. 487-505, September 2010. .
[10] Andrzej Cichocki, Sergei L. Shishkin, ToshimitsuMusha, Zbigniew Leonowicz , Takashi Asada, Takayoshi Kurachi, “EEG filtering Based on blind source separation (BSS) for early detection of Alzheimer’s disease‖, Clinical Neurophysiology”, Vol 116, No.3, pp.729-737, March 2005.
[11] Aapo Hyvarinen, Erkki Oja, “Independent Component Analysis: Algorithms & Applications”, Journal of Neural Networks, Vol. 13, Issue.4, pp.411-430, 2000.
[12] Co Melissant, Alexander Ypma, Edward E.E. Frietman, Corn elis J.Stam, “A method for detection of Alzheimer’s disease using ICA enhanced EEG measurement”, Artificial Intelligence in Medicine, Vol. 33, No.3, pp. 209-222, March 2005.
[13] Jaeseung Jeong, “EEG dynamics in patients with Alzheimer’s disease”, Artificial Intelligence in Medicine, Vol 33, Issue 1 pp. 209-222, 2005.
[14] Simon-Shlomo Poil, WillemdeHaan, Wiesje M.vAnder Flier, HuibertD.Mansvelder Philip Scheltens and KlausLinkenkaer-Hansen, “Integrative EEG biomarkers predict progression to Alzheimer’s disease at the MCI stage”, Frontiers in Aging Neuroscience, Vol.5, Oct 2013, pp. 1-6, Article ID 58.
[15] Raymundo Cassani, Tiago H. Falk, Francisco J .Fraga, Paulo A. M. Kanda and Renato Anghinah, “The effects of automated artifact removal algorithms on electroencephalography-based Alzheimer’s disease diagnosis”, Frontiers in Aging Neuroscience, Volume 6, Article 55, pp. 1 – 13, March 2014.
[16] Kulkarni N, Bairagi V, “EEG-based diagnosis of alzheimer disease: a review and novel approaches for feature extraction and classification techniques”, Academic Press, Cambridge, 2018.
[17] Parham Ghorbanian, David Devilbiss, “Identification of Resting & Active State EEG features of Alzheimer’s Disease Using Discrete Wavelet Transform”, Annals of Biomedical Engineering, The Journal of Biomedical Engineering Society, Vol.41, No. 6, pp.1243-1257, June 2013.
[18] Andrea Rueda, Fabio A. Gonzalez, “Extracting Salient Brain Patterns for imaging based Classification of Neurodegenerative Diseases”, IEEE Trans. Med. Imaging, Vol. 33, No.6, pp. 1262-1274, June 2014.
[19] R. Viswanathan, K. Perumal, "Segmentation Technique to Detect the AD in Hippocampus Shape using Region Growing in Support Vector Machine", International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.1, pp.56-59, 2018.
[20] Meenu Shukla, Sanjiv Sharma, "Analysis of Efficient Classification Algorithm for Detection of Phishing Site", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.3, pp.136-141, 2017
Citation
N. N. Kulkarni, K. R. Kasture, "Significance of Spectral & Wavelet features in diagnosis of Alzheimer’s Disease," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.553-559, 2019.
Smart Home Automation Using Voice Recognition
Survey Paper | Journal Paper
Vol.7 , Issue.2 , pp.560-563, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.560563
Abstract
Automation is the art that reduces human or any other entities labour its time and the cost. The sole objecting of designing this project is inventing a system for the people who are less privileged to power and use household by sitting in their chair and using their voice to improvise commands. This asset is functionally designed in a way to be helpful to them which hasn’t been profoundly implemented till date. The motivation to design this voice based home automation system especially the people suffering from disabilities like quadriplegia (who cannot move their limbs but can speak and listen) to managed household appliances to their convenience. An implementation of texting concept has also been applied for the verbally challenged. The concept of this is whenever the person needs help he/she can pronounce help and a text message would be sent to their immediate family members. This system is very useful in the case of any emergencies concerning the person.
Key-Words / Index Term
Home Automation System, Node MCU, Voice Recognition Module, Realy Circuit
References
[1] C. Perera et al.,” Context Aware Computing for The Internet of Things: A Survey,” IEEE communications surveys & tutorials, vol. 16, no. 1, first quarter 2014, pp 414 – 417.
[2] L.Tan et al.,”Future Internet: The Internet of Things” 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE), pp 376 – 380.
[3] S. D`Oro, L. Galluccio, G. Morabito and S. Palazzo, "Exploiting Object Group Localization in the Internet of Things: Performance Analysis," in IEEE Transactions on Vehicular Technology, vol. 64, no. 8, pp. 3645-3656, Aug. 2015.
[4] J. Huang, Y. Meng, X. Gong, Y. Liu and Q. Duan, "A Novel Deployment Scheme for Green Internet of Things," in IEEE Internet of Things Journal, vol. 1, no. 2, pp. 196-205, April 2014.
[5] A. P. Castellani et al., “Architecture and protocols for the Internet of Things: A case study,” in Proc. 8th IEEE Int. Conf. Pervasive Comput.Commun. Workshops (PERCOM), 2010, pp. 678–683.
[7] Rozita. T et al., “Smart GSM Based Home Automation System,” 2013 IEEE Conference on Systems, Process & Control (ICSPC2013), December 2013, Kuala Lumpur, Malaysia, pp 306 - 309.
[8] Aronson, S. (1977), ‘Bell’s Electrical Toy: What’s the Use? The Sociology of Early Telephone Use’, in De Sola Pool, I.(ed.), The Social Impact of the Telephone, MIT Press, Cambridge.
[9] Berg, A,(1990), `He, She and I.T. Designing the Home of the Future`, in Sorensen, K. and Berg, A. (eds.) Technology and Everyday Life: Trajectories and Transformations, Norwegian Research Council for Science and Humanities, Trondheim.
Citation
Sapna Yadav, Samridhi Srivastava, Megh Singhal, "Smart Home Automation Using Voice Recognition," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.560-563, 2019.
Hybrid Approach for product Recommendations using Collaborative filtering
Research Paper | Journal Paper
Vol.7 , Issue.2 , pp.564-568, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.564568
Abstract
a successful recommendation approach in data mining can be done with the use of Collaborative Filtering (CF). It deals with the information which is recommended by people. People’s Choice is one of the better aspects of future recommendations. Typically, CF methods are mostly used for solving the problem of data sparsity and cold-start problem. A novel Domain-sensitive Recommendation (DsRec) is an algorithm used for the rating prediction by exploring the user-item subgroup analysis simultaneously. The Proposed work is an extension to DsRec using Trust-based system that considers the trust of the recommender. This type of recommendation system can help to get the information of user’s preferences in different types of domains which make rating predictions trust-worthy and efficient. A trust-based recommendation is complementing the developed algorithm.
Key-Words / Index Term
Collaborative filtering, data mining , recommendation system
References
[1] Jing Liu, Member, Yu Jiang, Zechao Li, Member, Xi Zhang, and Hanqing Lu, Senior Member, IEEE “Domain-Sensitive Recommendation with User-Item Subgroup Analysis”, IEEE Transaction on knowledge and data engineering Vol. 28, NO. 4, April 2016.
[2] N. S. Barley1 & Asst. Prof. R. R. Keole, “A Review of Recommendation System in Domain Sensitive Manner”, Imperial Journal of Interdisciplinary Research (IJIR) Vol-3, Issue-5, 2017 ISSN: 2454-1362.
[3] Bhavya Sanghavi A, Rishabh Rathod A and Dharmeshkumar Mistry, Recommender Systems- “Comparison of Content-based Filtering and Collaborative Filtering”, Oct 2014.
[4] Jaimeel Shah, Lokesh Sahu “A Survey of Various Hybrid based Recommendation Method”, International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Volume 4, Issue 11, November 2014 ISSN: 2277 128X.
[5] J.Ben Schafer, Dan Frankowski, Jon Herlocker, and Shilad Sen “Collaborative Filtering Recommender Systems”. P. Brusilovsky, A. Kobsa, and W. Nejdl (Eds.): The Adaptive Web, LNCS 4321, pp. 291–324, 2007.© Springer-Verlag Berlin Heidelberg 2007.
[6] Y.Zhang, B. Cao, and D.-Y.Yeung, “Multi-domain collaborative filtering”, in Proc. 26th Conf. Annual Conference. Uncertainty Artificial Intelligence , 2010, pp. 725–732.
[7] X. Zhang, J. Cheng, T. Yuan, B. Niu, and H. Lu, “TopRec: Domain specific recommendation through community topic mining in social network”, in Proc. 22nd Int. Conf. World Wide Web, 2013, pp. 1501–1510.
[8] Y. Jiang, J. Liu, X. Zhang, Z. Li, and H. Lu, “TCRec: Product recommendation via exploiting social-trust network and product category information”, in Proc. 22nd Int. Conf. World Wide Web, 2013, pp. 233–234.
[9] Bin XuJiajun Bu Chun Chen Zhejiang Provincial Key Laboratory of Service Robot, College of Computer Science Zhejiang University “An Exploration of Improving Collaborative Recommender Systems via User-Item Subgroups”, April 16–20, 2012.
[10] J. L. Herlocker, J. A. Konstan, A. Borchers, and J. Riedl, “An algorithmic framework for performing collaborative filtering”, in Proc. 22nd Annu. Int. ACM SIGIR Conf. Res. Develop. Inf. Retrieval, 1999, pp. 230–237.
[11] G. Guo, J. Zhang, and D. Thalmann, “A simple but effective method to incorporate trusted neighbors in recommender systems”, in Proceedings of the 20th International Conference on User Modeling, Adaptation and Personalization (UMAP), 2012.
[12] Hao Ma, Haixuan Yang, Michael R. Lyu, Irwin King, “SoRec: Social Recommendation Using Probabilistic Matrix Factorization”, October 26–30, 2008, Napa Valley, California, USA. Copyright 2008 ACM 978-1-59593-991-3/08/10.
[13] Manh Cuong Pham, Yiwei Cao, Ralf Klamma, Matthias Jarke “A Clustering Approach for Collaborative Filtering Recommendation Using Social Network Analysis”, Journal of Universal Computer Science, vol. 17, no. 4 (2011), 583-604 submitted: 30/10/10, accepted: 15/2/11, appeared: 28/2/11 © J.UCS.
[14] Luo Si,Rong Jin, “Flexible Mixture Model for Collaborative Filtering”, Proceeding ICML`03 Proceedings of the Twentieth International Conference on International Conference on Machine Learning Pages 704-711 Washington, DC, USA-August 21-24, 2003 AAAI Press © 2003. ISBN:1-57735-189-4.
[15] M. Jamali and M. Ester, “A matrix factorization technique with trust propagation for recommendation in social networks”, in Proceedings of the 4th ACM Conference on Recommender Systems (RecSys), 2010, pp. 135–142.
[16] T George; S.Meregu “A scalable Collaborative Filtering framework based on Co-clustering”, Data Mining, Fifth IEEE International Conference.27-30 Nov. 2005 IEEE 03 January 2006 ,0-7695-2278-5.
[17] Slobodan Vucetic, Zoran Obradovic “Collaborative Filtering Using A Regression Based Approach, Knowledge And Information Systems”, Center for Information Science and Technology, Temple University, Philadelphia, PA, USA.
[18] Guibing Guo, Jie Zhang, Daniel Thalmann “A Simple but Effective Method to Incorporate Trusted Neighbors in Recommender Systems” Published 2012 in UMAP.
Citation
Chinmay Puranik, Grantej Otari, "Hybrid Approach for product Recommendations using Collaborative filtering," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.564-568, 2019.
Implementing AMI Network using Riverbed OPNET Modeler for DDoS attack
Research Paper | Journal Paper
Vol.7 , Issue.2 , pp.569-574, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.569574
Abstract
Smart meter networks are the spine in distribution grid for smart electrical. Here, in smart Grid, and there are number of smart meters are interconnected and two-way information flows. The distribution side, the smart grid requires the integration of intellectual electronic devices such as Automatic Metering Infrastructure (AMI). This AMI needs wireless communication technology for relay information from the control centre to the energy meters. The flow of information and power in smart grids is bidirectional which is controlled with the help of software and supporting hardware. Optimized Network Engineering Tools (OPNET) Modeler is one of the most dominant simulation tools for the analysis of communication networks. In this paper, a number of models of dissimilar structured smart meter networks were developed with network parameters which were connected with different communication as wired and wireless in which order to compute database query, file transfer to server with respect to time where normal data transfer and DDoS attack to the network. Moreover, a security model that detects the DDoS attacks was mounted on AMI. The outcome of this paper provided a guideline to the future smart meter network developer so as to evade horrible challenges faced by some of the distribution companies. A scenario for the advanced metering infrastructure (AMI), which is one of the smart grid`s application areas, was set up and the performance of the test bed was evaluated by implementing an able power management agent model.
Key-Words / Index Term
Smart Grid OPNET, AMI, DDoS Attack
References
[1]. R.C Diovu and J.T Agee ” Quantitative Analysis of Firewall Security under DDoS Attacks in Smart Grid AMI Networks” 2017 IEEE 3rd International Conference on Electro-Technology for National Development pg no. 696-703
[2]. Md. Mahmud Hasan , Hussein T. Mouftah “Cloud-Centric Collaborative Security Service Placement for Advanced Metering Infrastructures” IEEE TRANSACTIONS ON SMART GRID 2017
[3]. Beibei Li, Rongxing Lu, and Gaoxi Xiao “ HMM-Based Fast Detection of False Data Injections in Advanced Metering Infrastructure” 2017 IEEE
[4]. Tejaskumar Bhatt, Dr. Chetan Kotwal, Dr.Nirbhaykumar Chaubey “Survey on Smart Grid: Threats, Vulnerabilities and Security” IJEECS ISSN 2348-117X Volume 6, Issue 9 September 2017
[5]. C Diovu and J.T Agee “A Cloud-Based Open flow Firewall For Mitigation Against DDoS Attacks In Smart Grid Ami Networks” 2017 IEEE PES-IAS Power Africa pg no.28-33
[6]. E. Bou-Harb, C. Fachkha, M. Pourzandi, M. Debbabi, and C. Assi, “Communication Security for Smart Grid Distribution Networks,” IEEE Communication Magazine, vol. 51, no. 1, pp. 42-49, 2013.
[7]. Yonghe Guo, Chee-Wooi Ten, Shiyan Hu and Wayne W. Weaver, “Modeling Distributed Denial of Service Attack in Advanced Metering Infrastructure” Innovative Smart Grid Technologies Conference (ISGT) 2015 IEEE Power and Energy Society, pp. 1-5.
[8]. M. Rahman, Amanullah Mto “Investigation of Bandwidth Requirement of Smart Meter Network Using OPNET Modeler” Smart Grid and Renewable Energy, 2013, 4, 378-390
[9]. Opnet Modeler, OPNET Technologies Inc. http://www.opnet.com
[10]. Jun-Ho Huh , Seung-Mo Je , Kyungryong Seo “Design and Simulation of Foundation Technology for Zigbee-based Smart Grid Home Network System using OPNET Simulation” Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology Vol.5, No.4, August (2015), pp. 81-89
[11]. K. Brown and L. Christianson, “OPNET Lab Manual to Accompany Business Data and Communications,” 2005
[12]. D. Bian, Y. Wu, “Real-time Co-simulation Platform using OPAL-RT and OPNET for Analyzing Smart Grid Performance” 2015 IEEE
[13]. Jun-Ho Huh, Kyungryong Seo “Smart Grid Framework Test Bed Using OPNET and Power Line Communication” 2016 IEEE DOI 10.1109/SCIS&ISIS.2016.192
Citation
Tejaskumar Bhatt, Chetan Kotwal, Nirbhaykumar Chaubey, "Implementing AMI Network using Riverbed OPNET Modeler for DDoS attack," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.569-574, 2019.
A Survey on Reducing Handoff Latency in WLAN
Survey Paper | Journal Paper
Vol.7 , Issue.2 , pp.575-588, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.575588
Abstract
Advance Wireless communication offers fast data transfer rate,Quality of Service(QoS)and capability to travel or roam heterogeneous networks. .A Handoff technique is an important issue in Modern wireless mobile networks. Handoff delays make a serious problem,our intention is always reduce handoff delay or latency. There are several research has been done in past few years to reduce the handoff delays occur in the multiple levels of wireless communication. Because of the movability of devices handoff is an important aspect in Wireless Local Area Network(WLAN) and cellular communications or cellular networks. In WLAN this aspect is much more important due to bounded range of Access Point (APs), WLAN also provides sufficient bandwidth for real time streaming services. In the literature multiple handoff schemes have been proposed to reduce the handoff latency and also support fast handoff in IEEE 802.11 wireless networks. In this paper, we review these handoff schemes and explore their utility and downside qualitatively. In this paper, Our aim is to make a spadework for future research on reducing the handoff latency and give emphasis on requirement of fast handover for seamless connectivity. We comprise here various techniques to reduce handoff delays. Some future research ideas are also suggested here.
Key-Words / Index Term
Handoff, WLAN, Handoff Latency, Access Point, Selective Scanning, ,Neighbor Graph.
References
[1] “IEEE standard for information technology-telecommunications and information exchange between systems-local and metropolitan area networks-specific requirements - part 11: Wireless lan medium access control (mac) and physical layer (phy) specifications,”, 2007.
[2] “IEEE 802.15 WPAN task group 1a (tg1a),” 2009.
[3] “IEEE standard for local and metropolitan area networks part 16: Air interface for fixed and mobile broadband wireless access systems amendment for physical and medium access control layers for combined fixed and mobile operation in licensed bands,” , 2005.
[4] IEEE Computer Society LAN MAN standards Committee. IEEE Standard for Information Technology: Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, August 1999.
[5] IEEE. Recommended Practice for Multi-Vendor Access Point Interoperability via an Inter-Access Point Protocol Across Distribution Systems Supporting IEEE 802.11 Operation. IEEE Draft 802.1f/D3, January 2002.
[6] D. Sarddar, J. Banerjee, T. Chakraborti, A. Sengupta, M.K. Naskar, T. Jana, U. Biswas, “Fast Handofflmplementation Using Distance Measurements Between Mobile Station and APs” Students` Technology Symposium (TechSym), IEEE, Page(s): 81 – 86, 2011.
[7] N. Hegde, K. Sohraby. “On the impact of soft handoff in cellular systems”, Computer Networks, 2002, vol.38, pp.257–271.
[8] M. Etoh, Next Generation Mobile Systems 3G and Beyond, Wiley Press, 2005.
[9] C. Perkins, “IP Mobility Support for IPv4”, RFC3344, August 2002.
[10] R. hsieh, Z. G. Zhou, A. Seneviratne, “S-MIP: A seamless handoff archi-tecture for Mobile IP”, Proc. IEEE INFOCOM 2003, vol. 3, pp. 1774–1784. 2003.
[11] J. Fabini, R. Pailer, P. Reichl. “Location-based assisted handover for the IP Multimedia Subsystem”, Computer Communications, vol.31, pp. 2367–2380, 2008.
[12] D.H. Kwon, W.J. Kim, Y.J. Suh. “An efficient mobile multicast mechanism for fast handovers: A study from design and implementation in experimental networks”, Computer Communications, 2008, vol. 31, pp. 2162–2177.
[13] Y. Liao, L. Cao, "Practical schemes for smooth MAC layer handoff in 802. 1 1 wireless networks", IEEE International Symposium on World of Wireless, Mobile and Multimedia Networks, 2006.
[14] M. Shin, A. Mishra, and W. A. Arbaugh, “Improving the latency of 802.11 hand-offs using neighbor graphs,” in Proceedings of the 2nd international conference on Mobile systems, applications, and services, pp. 19–26, June 2004.
[15] B. V. Quang, R. V. Prasad, I. Niemegeers “A Survey on Handoffs - Lessons for 60 GHz based Wireless Systems” Communications surveys & Tutorials, IEEE Volume: 14 , Issue: 1 Publication , Page(s): 64 - 86,Year: 2012.
[16] S. Shin, A. S. Rawat, H. Schulzrinne, “Reducing MAC layer handoff latency in IEEE 802.11 wireless LANs”, ACM MobiWac`04, Philadelphia, Pennsylvania,Oct 2004.
[17] A. Mishra, M. Shin, W. Arbaugh “An Empirical Analysis of the IEEE 802.11 MAC Layer Handoff Process” ACM SIGCOMM Computer Communication Review, vol. 33,no. 2,2003.
[18] H. Velayos and G. Karlsson, “Techniques to reduce the IEEE 802.11b handoff time” Communications, IEEE International Conference, Page(s): 3844 - 3848 Vol.7, 2004.
[19] S. F. Hasan, N. H. Siddique and S. Chakraborty, “Intelligent Transport Systems, 802.11-based Roadside-to-Vehicle Communications”, ISBN 987-1-4614-3272-2 (eBook), Springer.
[20] K. Ramachandran, S. Rangarajan, and J. C. Lin, “Make-before-break mac layer handoff in 802.11 wireless networks,” in 2006 IEEE ICC, vol. 10, pp. 4818–4823,June 2006.
[21] Y. Liao and L. Cao, “Practical schemes for smooth MAC layer handoff in 802.11 wireless networks,” in WoWMoM, pp. 1–10, June 2006.
[22] I. Ramani and S. Savage, “SyncScan: practical fast handoff for 802.11 infrastructure networks,” in Proceeding of IEEE INFOCOM, vol. 1, pp. 13–17, March 2005.
[23] C.-M. Huang and J.-W. Li, ”An accelerated IEEE 802.11 handoff process based on the dynamic cluster chain method,” Elsevier Comput. Commun., vol. 30, no. 6, pp. 1383-1395, 2007.
[24] V.Brik, A.Mishra, S.Banerjee, Eliminating handoff latencies in 802.11 WLANs using Multiple Radios: Applications, Experience, and Evaluation, IMC 2005.
[25] “ A Fast MAC Layer Handoff Protocol for WiFi Based Wireless Networks”.
[26] T. MANODHAM, M. HAYASAKA and T. MIKI, “A Novel Handover Scheme for Improving the Performance of WLANs based on IEEE802. 11 APCC `06. Asia-Pacific Conference , Page(s): 1 – 5, 2006.
[27] N. Mustafa, W. Mahmood, A. A. Chaudhry, and M. Ibrahim, “Prescanning and dynamic caching for fast handoff at mac layer in ieee 802.11 wireless lans,” in IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, pp. 1–8, November 2005.
[28] A. Sarma, R. K. Gupta and S. Nandi, “A Zone Based Interleaved Scanning Technique for Fast Handoff in IEEE 802.11 Wireless Networks” Pervasive Systems, Algorithms, and Networks (ISPAN), 10th International Symposium, Page(s): 232 – 237, 2009.
[29] V. M. Chintala and Q.-A. Zeng, “Novel MAC Layer Handoff Schemes for IEEE 802.11 Wireless LANs” Wireless Communications and Networking Conference,WCNC 2007. IEEE, Page(s): 4435 - 4440, 2007.
[30] D. Sarddar, T. Jana,T. Patra, U. Biswas, M.K. Naskar “Fast Handoff Mechanism in WLANs Based on Neighbour Graph Information” Parallel Distributed and Grid Computing (PDGC), 2010 1st International Conference, Page(s): 334 – 338, 2010.
[31] H.-S. Kim et. al. ‘selective channel scanning for fast handoff in Wireless LAN using neighbor graph.’ Japan, . International Technical Conference on Circuits/Systems, Computers and Communication, July2004.
[32] C.-S. Li et.al. ‘A Neighbor Caching mechanism for Handoff in IEEE 802. Wireless Networks.’ Springer ,DOI 10.1007/s11227-008-0175-3, 20 March 2008.
[33] A. Doufexi, E. Tameh, A. Nix, S. Armour and A. Molina, “Hotspot wireless LANs to Enhance the Performance of 3G and Beyond Cellular Networks”, IEEE Communication Magazine, Vol. 41, pp. 58 – 65, July 2003.
[34] T.S. Rappaport, “Wireless Communications”, Pearson Education, 2003.
K. Pahlavan and P. Krishnamurthy, “Principles of Wireless Networks”, PHI, 2002.
[35] A. H.Zahram, B. liang and A. Dalch, “Signal threshold adaptation for vertical handoff on heterogeneous wireless networks”, ACM/Springer Mobile Networks and Applications (MONET) journal, Vol.11, No.4, pp 625-640,August 2006.
[36] R. Pintenet, J.Gosteau, T. Al-Gizawi, F.Lazarakis, K.Peppas and A.Alexiou, “Evaluation of interoperability mechanisms for coexisting HSDPA and WLAN enhanced with MTMR techniques”, IEEE 58th Vehicular Technology Conference, Vol.3, pp 1807-1811, 2003.
[37] S. Mohanty and I.F.Akylidiz “A Cross Layer (Layer 2+3) Handoff Management Protocol for Next-Generation Wireless Systems” IEEE TRANSACTIONS ON MOBILE COMPUTING,Vol-5,No-10 OCT 2006.
[38] Y. Kim, K. Lee and Y. Chin, “Analysis of Multi-level Threshold Handoff Algorithm”, Global Telecommunications Conference (GLOBECOM’96), vol. 2, 1996, pp. 1141-1145.
[39] S. S. Moghaddam, V. T. Vakili and A. Falahati, “New Handoff Initiation Algorithm (Optimum Combination of Hysteresis & Threshold Based Methods)”, Vehicular Technology Conference (VTC 2000), vol. 4, 2000, pp. 1567-1574.
[40] V. T. Vakili and S. S. Moghadddam, “Optimum Selection of Handoff Initiation Algorithm and Related Parameters” , Communication Technology Proceedings (WCC - ICCT 2000), vol. 1, 2000, pp. 563-567.
[41] S. B. Oubira, M. Frikha, S. Tabbane “Handoff Management In 4G Networks “ Ecole Superieure des Communications de Tunis,Tunisia.
[42] A. E. Leu, B. L. Mark, "Local Averaging for Fast Handoffs in Cellular Networks" IEEE Transactions On Wireless Communications, Vol. 6, No.3, March 2007, pp. 866 - 874. ISSN : 0975-4024 129 Debabrata Sarddar et al. / International Journal of Engineering and Technology Vol.2 (2), 2010, 124-130 .
[43] M. Emmelmann, "Influence of Velocity on the Handover Delay associated with a Radio-Signal-Measurement-based Handover Decision," in Proc. of IEEE Vehicluar Technology Conference, pp. 2282 - 2286, 2005.
[44] M. Zonoozi and P. Dassanayake, "Handover delay in cellular systems," in Proc. of Personal Wireless Communications, 1997. IEEE International Conference on, Mumbai, India, December, 17-19 1997, pp. 24 - 27.
[45] M. Akar, U Mitra, " Optimum Handoff Control: Incorporating Handoff Delay", in Proc. of IEEE Wireless Communications & Networking Conference, 2000, pp. 484 - 489.
[46] N. Zhang and J. M. Holtzman, "Analysis of Handover algorithms using Both Absolute and Relative Measurements", in Proc. ofIEEE VTC 94, 1994, pp. 82 - 86.
[47] B. Singh, K. K. Aggarwal and S. Kumar, "Hysteresis plus Timer based Handover Initiation Algorithm for Microcellular Systems", IETE Technical Review, Vol., No.3, May - June 2004, pp. 181189.
[48] A. E. Leu, B. L. Mark, "An Efficient Timer-based hard handoff algorithm for cellular networks", in Proc. of IEEE Wireless Communications Networking Conference, 2003, vol. 2, pp. 12071212.
[49] P. Marichamy, S. Chakraborti and S. L. Maskara, "Performance Evaluation of Handoff Detection Schemes", in Proc. of IEEE TENCON, 2003, pp 643-646.
Citation
D. Sarddar, U. Ghosh, Rajat Pandit, "A Survey on Reducing Handoff Latency in WLAN," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.575-588, 2019.
A Survey on Recent Advances to Read Handwritten Devanagari Script
Survey Paper | Journal Paper
Vol.7 , Issue.2 , pp.589-595, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.589595
Abstract
In the realm of advances in Processing Capabilities as well as Algorithms and their Efficiencies, transliteration mechanisms between Handwritten and Digital data namely called as Recognition Systems or Machine Reading Systems have been able to reach reliable precision. Devanagari and its variant scripts are widely used in the Indian Subcontinent. Being used by the second largest population in the world, it is practical to have research for Devanagari as well. While the current advances in recognition of Devanagari suggest requirement of more work and scope for accuracy levels, this survey aims to enlist the approaches taken in research to read handwritten Devanagari script. Citing works from different papers using different classifiers and techniques, it attempts to compare results and also imply the need of taking research forward. The survey contains methodologies followed in recent times, mentions data collection strategies or datasets available, uses classifiers and their recognition rates respectively.
Key-Words / Index Term
Devanagari, Recognition, Segmentation, Pre-processing, Classification
References
[1] V.P. Agnihotri, “Offline Handwritten Devanagari Script Recognition”, International Journal Information Technology and Computer Science, pp. 37-42, 2012.
[2] A.N. Holambe, Dr. R.C.Thool, Dr. C.M.Jagade, “Printed and Handwritten Character & Number Recognition of Devanagari Script using Gradient Features”, International Journal of Computer Applications, Vol.2, Issue 9, pp. 0975-8887, 2010.
[3] A.Gaur, S.Yadav, “Handwritten Hindi Character Recognition using K-Means Clustering and SVM”, In the Proceedings of the 2015 IEEE 4th Symposium on Emerging Trends and Technologies in Libraries and Information Sciences, 2015.
[4] Niranjan Joshi, G.Sita, A.G. Ramakrishnan, Deepu V., Sriganesh Madhvanath, “Machine Recognition of Online Handwritten Devanagari Characters”, In the Proceedings of the 2005 8th International Conference on Document Analysis and Recognition (ICDAR’05), IEEE, 2005.
[5] P.B. Khanale, S.D. Chitnis, “Handwritten Devanagari Character Recognition using Artificial Neural Network”, Journal of Artificial Intelligence 4 (1), 2011.
[6] A. Dixit, A. Navghane, Y. Dandawate, “Handwritten Devanagari Character Recognition using Wavelet Based Feature Extraction and Classification Scheme”, In the Proceedings of 2014 IEEE Indian Conference (INDICON), 2014
[7] V.J. Dongre, V.M. Mankar, “A review of Research on Devanagari Character Recognition”, International Journal of Computer Applications, Vol.12, 2010.
[8] T. Mondal, U. Bhattacharya, S.K. Parui, K. Das, “Online Handwritten Recognition of Indian Scripts - the first benchmark”, In the Proceedings of the IEEE 12th International Conference on Frontiers in Handwriting Recognition, 2010 .
[9] R. Jayadevan, S.R. Kolhe, P.M. Patil, U. Pal, “Offline Recognition of Devanagari Script: A Survey”, IEEE Transactions on Systems, Man and Cybernetics- Part C: Applications and Reviews, Vol. 41, 2011.
[10] Shreya N. Patankar, Leena N. Ragha, “Zonal Moments Based Handwritten Marathi Barakhadi Recognition”, International Journal of Engineering Research and Technology (IJERT), Vol. 1, Issue 6, August 2012.
[11] J. Ryu, H.I. Koo, N.I. Cho, “Word Segmentation Method for Handwritten Documents based on Structured Learning”, IEEE Signal Processing Letters, Vol. 22, 2015.
[12] Shalaka Deore, Leena Ragha, “Moment Based Online and Offline Handwritten Character Recognition”, CiiT International Journal of Biometric and Bioinformatics, Vol. 3, March 2011, ISSN: 0974-9675.
Citation
Gauri Kolte, Jennifer Fernandes, Prashant Vishwakarma, Samira Nikharge, Shalaka Deore, "A Survey on Recent Advances to Read Handwritten Devanagari Script," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.589-595, 2019.
Ameliorate Large Video Enigma for Promulgation
Survey Paper | Journal Paper
Vol.7 , Issue.2 , pp.596-600, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.596600
Abstract
The usability of images and videos is increased in a remarkable speed which built the fear of insecurity in the minds of end users. To revamp the security and bandwidth, allocation, while promulgation of data. A new concept has put forward to provide two levels of security by minimizing the size of the video using the compression algorithm and to encrypt it by using the Blow fish algorithm. This proposed Algorithm takes less memory Uses simple operations like XOR and additions, This algorithm improves significant efficiency
Key-Words / Index Term
Promulgation, Feistal network, Key expansion, Enigma
References
[1] Vaibhav Poonia, Dr. Narendra Singh Yadav, “Analysis of modified Blowfish Algorithm in different cases with various parameters”, International Conference on Advanced Computing and Communication Systems (ICACCS -2015), Jan. 05 – 07, 2015..
[2] Mohammad Ali Bani Younes and Aman Jantan ,Image Encryption Using Block-Based Transformation Algorithm, IAENG International Journal of Computer Science, 35:1, IJCS_35_1_03
[3] Pia Singh and Prof. Karamjeet Singh “Image Encryption And Decryption Using Blowfish Algorithm In Matlab”, International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013K.A.Sugeng,
[4] M.Dinesh And Dr.P.Suveetha Dhanaselvam,” Real Time Image Encryption And Decryption Using Blowfish Algorithm”, International Journal Of Emerging Technology In Computer Science & Electronics (Ijetcse) Issn: 0976-1353 Volume 22 Issue 2 – May 2016.
[5] Ankita Verma, Paramita Guha, Sunita Mishra,’’ Comparative Study Of Different Cryptographic Algorithms’’, International Journal Of Emerging Trends & Technology In Computer Science (Ijettcs), Volume 5, Issue 2, March - April 2016.
[6] Pia Singh, Prof. Karamjeet Singh,” Image Encryption And Decryption Using Blowfish Algorithm In Matlab”, nternational Of Scientific & Engineering Research, Volume 4, Issue 7, July-2013.
[7] S.G.K.D.N. Samaratunge, ―”New EnigmaTechnique for Palette Based Images”,In Second International Conference onIndustrial and InformationSystems, pp. 335-340, Aug. 8 –11,2007.
[8] J. He, S. Tang and T. Wu, ―”An Adaptive Image EnigmaBasedon Depth-Varying Embedding”, In Congress on Image and SignalProcessing, vol. 5, pp. 660-663, 27-30 May 2008.
[9] S Roy and D.G. Akka, “On complementary edge magic of certaingraphs”, American Journal of Mathematics and Statistics 2012,2(3):22-26.
[10] Tingyuan Nie and Teng Zhang,“ A Study of DES and Blowfish Encryption Algorithm”, IEEE, 2009.
Citation
Dinesh S, Padmavathi H G, C.S. Madhu, Divyashree H S, Bharath Raj D, "Ameliorate Large Video Enigma for Promulgation," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.596-600, 2019.