Volume 13, Issue 1, May 2012

Oghma – Peer 2 Peer Secure Media [Full Text]

Raimund K. Ege

Video content delivery to handheld devices with broadband 4G Internet connectivity is becoming common place. The amount of multimedia consumed is ever increasing. However, the openness of delivery demands adaptive and robust management of intellectual property rights. In this article we describe a framework and its implementation to address the central issues in content delivery: a scalable peer-to-peer-based content delivery model, paired with a secure access control model that enables data providers to secure a return from making their original content available. We describe our prototype implementation written in Java that includes a client for the Android mobile platform. 


Feature Extraction of an Iris for PatternRecognition [Full Text]

Sulochana B. Sonkamble and Dr. Ravindra C. Thool

In this paper, we propose a new approach for feature extraction of an iris. Feature extraction is the most important step to improve the accuracy of biometric- based person identification System. The iris-pattern-based systems have recently shown very high accuracies in verifying an individual’s identity.This paper gives a new approach to extract the region of interest of an iris and it’s feature extraction.We have selected 100 iris images from CASIA database and 100 images from our database which are captured from 50 different male and female volunteers with the help of the system setup kept in our research laboratory. The proposed system consists of five modules iris localization and segmentation method using gradient vectors, normalization, feature extraction and matching. The system uses the Canny Edge Detection Algorithm and Circular Hough transform to detect the inner and outer boundary for localization of an iris. The efficient iris segmentation technique using gradient vector is to be used for extracting the iris region. The extracted iris region can be normalizing into a rectangular block of fixed dimensions. The Gabor wavelet transform techniques have been applied on the data set to get feature vectors of an iris which are to be used for the recognition. The extracted features are stored in a vector contains the biometric information of an individual. The Euclidian Distance method is proposed for comparing the iris pattern. Two iris templates are to be used for testing. The performance of the system can be increased by training the more feature vectors of extracted iris images. 


Error Coding for Wireless Communication [Full Text]

Trushita Chaware and Nileema Pathak

802.16 wireless communication system uses one of different types of Channel Coding methods (Forward Error Correcting methods), but the mandatory channel coding scheme is based on Convolutional Turbo Coding (CTC). Concatenated Reed Solomon codes and Convolution Codes also can be used. Drawback of this implementation is requirement of complex interleaver at the encoder and a complex decoding algorithm. The Turbo Product Code (TPC) is a relatively new code that offers a wide range of flexibility in terms of performance, complexity, and code rate. In TPC the use of interleaver can be avoided and also the decoding process can be simplified. The use of extended Bose-Chaudhuri-Hocquenghem (eBCH) as a constituent code of TPC is proposed to achieve multiple error correction at a higher code rate and data rate. An eBCH code has more powerful random error correcting capability over the AWGN channel compared to other codes. Implementation of TPC (eBCH) with QPSK modulation, AWGN channel type and 1/3 or higher code rate in 802.16 systems is proposed in this paper. 


Enhanced IT Project Risk Management Process Framework [Full Text] 

Pradnya Purandare

Last 20 years although the numbers of IT projects are increasing, the failures have not been reduced as much as required. It is necessary that the software projects incorporate the Risk management practices in its life cycle. The Risk Management process is an essential part of the project management process. These standards are systematic and help identifying, analyzing and reducing the projects risks. The PMI PMBOK® and ISO both project risk management standards were studied. The researcher found that there is a scope for improvement within the framework suggested by PMI PMBOK® and ISO for the Risk management process framework. Their limitations and strengths were enablers for the proposed solution. Researcher proposed enhanced framework for IT Project Risk Management, based on the best practices, processes proposed by PMI PMBOK® and ISO. 


Analysis and diagnosis of the different defects of the bearings and gearings by vibration analysis [Full Text]

Abdelkader Benbouaza, Bachir El Kihel and Fabienne Delaunois

To detect the different shortcomings of the rotating machines, the conditional maintenance by vibratory analysis is the best tool of surveillances and diagnosis. The bearings and the gearing are among the mechanical organs the more used in most industrial domains, they are conceived to function on very long terms, it remains true that one there ready hardly of attention in a lot of cases. In conditions of ideal or bad use, the deterioration due to the fatigue of the rolling, a bad lubrication provokes several shortcomings. These shortcomings are the reason of a great deal of breakings of machines. In order to solve this problematic, a test bed is finalized in our laboratory, it allows us to do an analysis separate or combined on the different deficient bearings and gears.