Volume 1, Issue 1, December 2009
Secure Watermarking Scheme for Color Image Using Intensity of Pixel and LSB Substitution [ Full-Text ]
Nagaraj V. Dharwadkar and B. B. Amberker
In this paper a novel spatial domain LSB based watermarking scheme for color Images is proposed. The proposed scheme is of type blind and invisible watermarking. Our scheme introduces the concept of storing variable number of bits in each pixel based on the actual color value of pixel. Equal or higher the color value of channels with respect to intensity of pixel stores higher number of watermark bits. The Red, Green and Blue channel of the color image has been used for watermark embedding. The watermark is embedded into selected channels of pixel. The proposed method supports high watermark embedding capacity, which is equivalent to the size of cover image. The security of watermark is preserved by permuting the watermark bits using secret key. The proposed scheme is found robust to various image processing operations such as image compression, blurring, salt and pepper noise, filtering and cropping.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Study on Feature Selection Techniques in Educational Data Mining [ Full-Text ]
M. Ramaswami and R. Bhaskaran
Educational data mining (EDM) is a new growing research area and the essence of data mining concepts are used in the educational field for the purpose of extracting useful information on the behaviors of students in the learning process. In this EDM, feature selection is to be made for the generation of subset of candidate variables. As the feature selection influences the predictive accuracy of any performance model, it is essential to study elaborately the effectiveness of student performance model in connection with feature selection techniques. In this connection, the present study is devoted not only to investigate the most relevant subset features with minimum cardinality for achieving high predictive performance by adopting various filtered feature selection techniques in data mining but also to evaluate the goodness of subsets with different cardinalities and the quality of six filtered feature selection algorithms in terms of F-measure value and Receiver Operating Characteristics (ROC) value, generated by the NaïveBayes algorithm as base-line classifier method. The comparative study carried out by us on six filter feature section algorithms reveals the best method, as well as optimal dimensionality of the feature subset. Benchmarking of filter feature selection method is subsequently carried out by deploying different classifier models. The result of the present study effectively supports the well known fact of increase in the predictive accuracy with the existence of minimum number of features. The expected outcomes show a reduction in computational time and constructional cost in both training and classification phases of the student performance model.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Logarithmic Barrier Optimization Problem Using Neural Network [ Full-Text ]
A. K. Ojha, C. Mallick and D. Mallick
The combinatorial optimization problem is one of the important applications in neural network computation. The solutions of linearly constrained continuous optimization problems are dif¬ficult with an exact algorithm, but the algorithm for the solution of such problems is derived by using logarithm barrier function. In this paper we have made an attempt to solve the linear constrained optimization problem by using general logarithm barrier function to get an approximate solution. In this case the barrier parameters behave as temperature decreasing to zero from sufficiently large positive number satisfying convexity of the barrier function. We have developed an algorithm to generate decreasing sequence of solution converging to zero limit.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Using Design Sketch to Teach Bubble Sort in High School [ Full-Text ]
Chih-Hao Liu, Yi-Wen Jiu, and Jason Jen-Yen Chen
Bubble Sort is simple. Yet, it seems a bit difficult for high school students. This paper presents a pedagogical methodology: Using Design Sketch to visualize the concepts in Bubble Sort, and to evaluate how this approach assists students to understand the pseudo code of Bubble Sort. An experiment is conducted in Wu-Ling Senior High School with 250 students taking part. The statistical analysis of experimental results shows that, for relatively high abstraction concepts, such as iteration number, Design Sketch helps significantly. However, it is not so for low abstraction concepts such as compare, swap, and iteration.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Modeling and Application of Series Elastic Actuators for Force Control Multi Legged Robots [ Full-Text ]
Arumugom S., Muthuraman S. and Ponselvan V.
Series Elastic Actuators provide many benefits in force control of robots in unconstrained environments. These benefits include high force fidelity, extremely low impedance, low friction, and good force control bandwidth. Series Elastic Actuators employ a novel mechanical design architecture which goes against the common machine design principal of “stiffer is better”. A compliant element is placed between the gear train and driven load to intentionally reduce the stiffness of the actuator. A position sensor measures the deflection, and the force output is accurately calculated using Hooke’s Law (F=Kx). A control loop then servos the actuator to the desired output force. The resulting actuator has inherent shock tolerance, high force fidelity and extremely low impedance. These characteristics are desirable in many applications including legged robots, exoskeletons for human performance amplification, robotic arms, haptic interfaces, and adaptive suspensions. We describe several variations of Series Elastic Actuators that have been developed using both electric and hydraulic components.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Realization of Semantic Atom Blog [ Full-Text ]
Dhiren R. Patel and Sidheshwar A. Khuba
Web blog is used as a collaborative platform to publish and share information. The information accumulated in the blog intrinsically contains the knowledge. The knowledge shared by the community of people has intangible value proposition. The blog is viewed as a multimedia information resource available on the Internet. In a blog, information in the form of text, image, audio and video builds up exponentially. The multimedia information contained in an Atom blog does not have the capability, which is required by the software processes so that Atom blog content can be accessed, processed and reused over the Internet. This shortcoming is addressed by exploring OWL knowledge modeling, semantic annotation and semantic categorization techniques in an Atom blog sphere. By adopting these techniques, futuristic Atom blogs can be created and deployed over the Internet.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Web Based Cross Language Plagiarism Detection [ Full-Text ]
Chow Kok Kent and Naomie Salim
As the Internet help us cross language and cultural border by providing different types of translation tools, cross language plagiarism, also known as translation plagiarism are bound to arise. Especially among the academic works, such issue will definitely affect the student’s works including the quality of their assignments and paper works. In this paper, we propose a new approach in detecting cross language plagiarism. Our web based cross language plagiarism detection system is specially tuned to detect translation plagiarism by implementing different techniques and tools to assist the detection process. Google Translate API is used as our translation tool and Google Search API, which is used in our information retrieval process. Our system is also integrated with the fingerprint matching technique, which is a widely used plagiarism detection technique. In general, our proposed system is started by translating the input documents from Malay to English, followed by removal of stop words and stemming words, identification of similar documents in corpus, comparison of similar pattern and finally summary of the result. Three least-frequent 4-grams fingerprint mathching is used to implement the core comparison phase during the pla-giarism detection process. In K-gram fingerprint matching techinique, although any value of K can be considered, yet K = 4 was stated as an ideal choice. This is because smaller values of K (i.e., K = 1, 2, or 3), do not provide good discrimination between sentences. On the other hand, the larger the values of K (i.e., K = 5, 6, 7...etc), the better discrimination of words in one sentence from words in another. However each K-gram requires K bytes of storage and hence space-consuming becomes too large for larger values of K. Hence, three least-frequent 4-grams are the best option to represent the sentence uniquely.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Optimal Design of Fuzzy Based Power System Stabilizer Self Tuned by Robust Search Algorithm
[ Full-Text ]
M. Mary Linda and N. Kesavan Nair
In the interconnected power system network, instability problems are caused mainly by the low frequency oscillations of 0.2 to 2.5 Hz .The supplementary control signal in addition with AVR and high gain excitation systems are provided by means of Power System Stabilizer (PSS). Conventional power system stabilizers provide effective damping only on a particular operating point. But fuzzy based PSS provides good damping for a wide range of operating points. The bottlenecks faced in designing a fuzzy logic controller can be minimized by using appropriate optimization techniques like Genetic Algorithm, Particle Swam Optimization, Ant Colony Optimization etc.In this paper the membership functions of FLC are optimized by the new breed optimization technique called Genetic Algorithm. This design methodology is implemented on a Single Machine Infinite Bus (SMIB) system. Simulation results on SMIB show the effectiveness and robustness of the proposed PSS over a wide range of operating conditions and system configurations.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Enhancing Multi-Agent Based Simulation with Human-Agents Interactive Spatial Behaviour [ Full-Text ]
Yee Ming Chen, Bo-Yuan Wang and Hung-Ming Shiu
We are exploring the enhancement of models of agent behaviour with more "human-like" decision making strategies than are presently available. Our motivation is to developed with a view to as the decision analysis and support for electric taxi company under the mission of energy saving and reduction of CO2, in particular car-pool and car-sharing management policies. In order to achieve the object of decision analysis for user, we provide a human-agents interactive spatial behaviour to support user making decision real time. We adopt passenger average waiting time and electric taxi average idle time as the performance measures and decision support fro electric taxi company. Finally, according to the analysis result, we demonstrate that our multi-agent simulation and GUI can help users or companies quickly make a quality and accurate decision to reduce the decision-making cost and time.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Novel Channel Coding for Progressive Transmission of Medical Images [ Full-Text ]
P. Jagatheeswari and M. Rajaram
A novel channel coding scheme for progressive transmission of large images is proposed. The transmission time, low distortion reconstructed image and low complexity are most concerned in this paper. In the case of medical data transmission, it is vital to keep the distortion level under control as in most of the cases certain clinically important regions have to be transmitted without any visible error. The proposed system significantly reduces the transmission time and error. The progressive transmission is based on the process that the input image is decomposed into many subblocks each to be coded, compressed, and transmitted individually. Therefore, firstly the image is segmented into a number of subblocks and then the discrete wavelet transform decomposes each subblock into different time-frequency components. Finally the components are coded for error control and transmitted. The complete system is coded in VHDL. In the proposed system, we choose a 3-level Haar wavelet transform to perform the wavelet transform for each subblock. It is simple, faster and easier to implement when compared with other transform method. The channel coding used here is Hamming code which is a simpler and efficient forward error control code.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Advanced Technology in Speech Disorder Therapy of Romanian Language [ Full-Text ]
Mirela Danubianu, Iolanda Tobolcea, and Stefan Gheorghe Pentiuc
One of the key challenges of the society development is related to public health and one of its specific targets includes better treatments of diseases. It is true that there are affections which by their nature do not endanger the life of a person, but they may have negative implications during his/her lifetime. Various language or speech disorders are part of this category. Discovered and treated in time, they can be corrected, most often in childhood. Because the Romanian language is a phonetic one that has its own special linguistic particularities, there is a real need to develop advanced information systems, which can be used to assist and help specialists in different speech disorders therapy. The aim of this paper is to present a few CBTS developed for the treatment of various language and speech disorders specific to the Romanian language.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
The Effected Oxide Capacitor in CMOS Structure of Integrated Circuit Level 5 Micrometer Technology
[ Full-Text ]
S. Rodthong and B. Burapattanasiri
This article present the effected oxide capacitor in CMOS structure of integrated circuit level 5 micrometer technology. It has designed and basic structure of MOS diode. It establish with aluminum metallization layer by sputtering method, oxide insulator layer mode from silicon dioxide, n+ and p+ semiconductor layer, it has high capacitance concentrate. From the MOS diode structure silicon dioxide thickness 0.5 micrometer, it will get capacitance between aluminum metal layer and p+ semiconductor at 28.62 pF, the capacitance between aluminum metal layer and n+ semiconductor at 29.55 pF. In this article establish second metal layer for measurement density values of first aluminum metal layer with second aluminum metal layer, it has density values at 16 pF.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Novel Feature Extraction for Robust EMG Pattern Recognition [ Full-Text ]
Angkoon Phinyomark, Chusak Limsakul, and Pornchai Phukpattaranont
Varieties of noises are major problem in recognition of Electromyography (EMG) signal. Hence, methods to remove noise become most significant in EMG signal analysis. White Gaussian noise (WGN) is used to represent interference in this paper. Generally, WGN is difficult to be removed using typical filtering and solutions to remove WGN are limited. In addition, noise removal is an important step before performing feature extraction, which is used in EMG-based recognition. This research is aimed to present a novel feature that tolerate with WGN. As a result, noise removal algorithm is not needed. Two novel mean and median frequencies (MMNF and MMDF) are presented for robust feature extraction. Sixteen existing features and two novelties are evaluated in a noisy environment. WGN with various signal-to-noise ratios (SNRs), i.e. 20-0 dB, was added to the original EMG signal. The results showed that MMNF performed very well especially in weak EMG signal compared with others. The error of MMNF in weak EMG signal with very high noise, 0 dB SNR, is about 5-10% and closed by MMDF and Histogram, whereas the error of other features is more than 20%. While in strong EMG signal, the error of MMNF is better than those from other features. Moreover, the combination of MMNF, Histrogram of EMG and Willison amplitude is used as feature vector in classification task. The experimental result shows the better recognition result in noisy environment than other success feature candidates. From the above results demonstrate that MMNF can be used for new robust feature extraction.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Spherical Layout Implementation using Centroidal Voronoi Tessellations [ Full-Text ]
Martín Larrea, Dana Urribarri, Sergio Martig and Silvia Castro
The 3D tree visualization faces multiple challenges: the election of an appropriate layout, the use of the interactions that make the data exploration easier and a metaphor that helps in the process of information understanding. A good combination of these elements will result in a visualization that effectively conveys the key features of a complex structure or system to a wide range of users and permits the analytical reasoning process. In previous works we presented the Spherical Layout, a technique for 3D tree visualization that provides an excellent base to achieve those key features. The layout was implemented using the TriSphere algorithm, a method that discretized the spheres's surfaces with triangles to achieve a uniform distribution of the nodes. The goal of this work was centered in a new algorithm for the implementation of the Spherical layout; we called it the Weighted Spherical Centroidal Voronoi Tessellations (WSCVT). In this paper we present a detailed description of this new implementation and a comparison with the TriSphere algorithm.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Fair Exchange of Digital Signatures using RSA-based CEMBS and Offline STTP [ Full-Text ]
Jamal A. Hussein and Mumtaz A. AlMukhtar
One of the essential security services needed to safeguard online transactions is fair exchange. In fair exchange protocols two parties can exchange their signatures in a fair manner, so that either each party gain the other’s signature or no one obtain anything useful. This paper examines security solutions for achieving fair exchange. It proposes new security protocols based on the "Certified Encrypted Message Being Signature" (CEMBS) by using RSA signature scheme. This protocol relies on the help of an "off-line Semi-Trusted Third Party" (STTP) to achieve fairness. They provide with confidential protection from the STTP for the exchanged items by limiting the role and power of the STTP. Three different protocols have been proposed. In the first protocol, the two main parties exchange their signatures on a common message. In the second protocol, the signatures are exchanged on two different messages. While in the third one, the exchange is between confidential data and signature.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Retail Market analysis in targeting sales based on Consumer Behaviour using Fuzzy Clustering - A Rule Based Model [ Full-Text ]
D. Bhanu and S. Pavai Madeshwari
Product Bundling and offering products to customers is of critical importance in retail marketing. In general, product bundling and offering products to customers involves two main issues, namely identification of product taste according to demography and product evaluation and selection to increase sales. The former helps to identify, analyze and understand customer needs according to the demographical characteristics and correspondingly transform them into a set of specifications and offerings for people. The latter, concerns with how to determine the best product strategy and offerings for the customer in helping the retail market to improve their sales. Existing research has focused only on identifying patterns for a particular dataset and for a particular setting. This work aims to develop an explicit decision support for the retailers to improve their product segmentation for different settings based on the people characteristics and thereby promoting sales by efficient knowledge discovery from the existing sales and product records. The work presents a framework, which models an association relation mapping between the customers and the clusters of products they purchase in an existing location and helps in finding rules for a new location. The methodology is based on the integration of popular data mining approaches such as clustering and association rule mining. It focusses on the discovery of rules that vary according to the economic and demographic characteristics and concentrates on marketing of products based on the population.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
New Model of Network - A Future Aspect of the Computer Networks [ Full-Text ]
Ram Kumar Singh and T. Ramajujam
As the number and size of the Network increases, the deficiencies persist, including network security problems. But there is no shortage of technologies offered as universal remedy – EIGRP,BGP, OSPF, VoIP, IPv6, IPTV, MPLS, WiFi, to name a few. There are multiple factors for the current situation. Now a day during emergent and blossoming stages of network development is no longer sufficient when the networks are mature and have become everyday tool for social and business interactions. A new model of network is necessary to find solutions for today's pressing problems, especially those related to network security. In this paper out factors leading to current stagnation discusses critical assumptions behind current networks, how many of them are no longer valid and have become barriers for implementing real solutions. The paper concludes by offering new directions for future needs and solving current challenges.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Frame Selected Approach for Hiding Data within MPEG Video Using Bit Plane Complexity Segmentation
[ Full-Text ]
Hamid A. Jalab, A. A Zaidan and B. B. Zaidan
Bit Plane Complexity Segmentation (BPCS) digital picture steganography is a technique to hide data inside an image file. BPCS achieves high embedding rates with low distortion based on the theory that noise-like regions in an image’s bit-planes can be replaced with noise-like secret data without significant loss in image quality. . In this framework we will propose a collaborate approach for select frame for Hiding Data within MPEG Video Using Bit Plane Complexity Segmentation. This approach will invent high secure data hidden using select frame form MPEG Video and furthermore we will assign the well-built of the approach; during this review the author will answer the question why they used select frame steganography. In additional to the security issues we will use the digital video as a cover to the data hidden. The reason behind opt the video cover in this approach is the huge amount of single frames image per sec which in turn overcome the problem of the data hiding quantity, as the experiment result shows the success of the hidden data within select frame, extract data from the frames sequence. These function without affecting the quality of the video.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Towards Expeditious and Unswerving Routing to Corroborate Nascent Internet [ Full-Text ]
Shishir Kumar and Mahesh kumar
The internet is now-a-days experiencing a stress due to some inherent problems with the main interdomain routing protocol, boarder gateway protocol (BGP), the amount of time it takes to converge, number of update message exchanged followed by a failure to stabilize, the amount of time required to get a valid alternate path following the failure, the way size of routing table increasing, and security issues like integrity and privacy of routing tables and routing updates exchanged among the routers, are of our primary concern. In our proposed research work we plan to address aforementioned issues related to internet routing specially in boarder gateway protocol to enable BGP to offer expeditious unswerving routing to corroborate nascent internet. We plan to make some changes in the design of boarder gateway protocol and may introduce addition of extra features in BGP to help support above mentioned objective.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Analysis on the Study of QoS-Aware Web Services Discovery [ Full-Text ]
T. Rajendran and P. Balasubramanie
Web service technology has gained more important role in developing distributed applications and systems on the Internet. Rapid growth of published Web services makes their discovery more and more difficult. There exist many web services which exhibit similar functional characteristics. It is imperative to provide service consumers with facilities for selecting required web services according to their non-functional characteristics or QoS. The QoS-based web service discovery mechanisms will play an essential role in SOA, as e-Business applications want to use services that most accurately meet their requirements. However, representing and storing the values of QoS attributes are problematic, as the current UDDI was not designed to accommodate these emerging requirements. To solve the problems of storing QoS in UDDI and aggregating QoS values using the tModel approach. The aim is to study these approaches and other existing QoS tModel representation for their efficiency and consistency in service discovery. This paper discusses a broad range of research issues such as web service discovery or web service selection based on QoS in the E-Business domain.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Fast Fraction-Integer Method for Computing Multiplicative Inverse [ Full-Text ]
Hani M. AL-Matari and Sattar J. Aboud and Nidal F. Shilbayeh
Multiplicative inverse is a crucial operation in public key cryptography, and been widely used in cryptography. Public key cryptography has given rise to such a need, in which we need to generate a related public and private pair of numbers, each of which is the inverse of the other. The basic method to find multiplicative inverses is Extended-Euclidean method. In this paper we will propose a new algorithm for computing the inverse, based on continues subtract fraction from integer and divide by fraction to obtain integer that will be used to compute the inverse d. The authors claim that the proposed method more efficient and faster than the existed methods.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Application of Radial Basis Network Model for HIV/AIDs Regimen Specifications [ Full-Text ]
P. Balasubramanie and M. Lilly Florence
HIV/AIDs Regimen specification one of many problems for which bioinformaticians have implemented and trained machine learning methods such as neural networks. Predicting HIV resistance would be much easier, but unfortunately we rarely have enough structural information available to train a neural network. To network model designed to predict how long the HIV patient can prolong his/her life time with certain regimen specification. To learn this model 300 patient’s details have taken as a training set to train the network and 100 patients medical history has taken to test this model. This network model is trained using MAT lab implementation.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Alternate methods of evaluation for web sites concordant to IAS/IFRS Standards [ Full-Text ]
Bostan I., Mates D., Grosu V., and Iancu E.
This work has as the principal theme, the study, analysis and implementation of the methodology for use the web sites in e-commerce. The authors try to deal with particular methodological and applied aspects inherent in the analysis of data from the interaction of man-Internet (Web-mining). The research methodology of this work will be focused on a prevalent optic multidisciplinary research based on the pillars of data mining and Web mining. The explosion of Internet and electronic commerce has made the most of business to have its own website. A company may engage internal costs for the development and operation of their website. The website can be designed for internal access (in which case it can be used for presentation and data storage company poli-cies with references of customers) or for external access (they are created and used for promotional and advertis-ing products and services company). The objective of this research, primarily concerns the definition of a reper-toire of tools in analyzing e-business through the development process for web-usage mining; 2nd objective is ori-ented to management, recognizing and evaluating the web-sites in accountancy, as property intangible, which is a special case and very little studied in economic literature financial specialty, the authors try to achieve a national and international accounting treatment of the creation and development of web-sites. This paper is intended to have a predominantly interdisciplinary character, trying to connect decision theory viewpoint of knowledge, the theme of the interaction between humans and Internet and particularly in evaluating their in accounting firm. We chose this theme in an effort to tell us more about electronic commerce, especially the way this activity can be managed, evaluated and accounted, considering its importance for both the dealer (who is trying to promote and sell their products using a minimum cost), but also for the client (which, besides the fact that they can save time, have the opportunity and price comparison quality products on the market).
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Design of an Automated Intrusion Detection System incorporating an Alarm [ Full-Text ]
Awodele Oludele, Ogunnusi Ayodele, Omole Oladele and Seton Olurotimi
Security and safety are two intertwined terms. It is a common belief that when a place or system is secure, it is safe. This paper shows a means of integrating three devices for physical intrusion detection. This paper thus suggests a means of increasing the level of security in an enclosed area with the use three of the four security layers necessary for optimum security. This paper intends to show that a system with more than one security device in place tends to prevent unauthorized access. This paper would be illustrating the implementation of this in an enclosed area whose security level must be kept on the high at all times.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
E-commerce between a large firm and a SME supplier: a screening model [ Full-Text ]
Alderete María Verónica
This paper derives a model of screening contracts in the presence of positive network effects when building an electronic commerce network (e-commerce) between a large firm and a small and medium sized enterprise (SME) supplier based on Compte (2008). Compte (2008) main insight is that when several potential candidates compete for the task, the principal will in general improve the performance of his firm by inducing the member candidates to assess their competence before signing the contract (through an appropriate choice of contracts). The large firm (principal) must choose between different SME suppliers (agents) to build a business to business e-commerce network. In the presence of positive network externalities, we show that social surplus increases.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Speech Recognition Oriented Vowel Classification Using Temporal Radial Basis Functions [ Full-Text ]
Mustapha Guezouri, Larbi Mesbahi and Abdelkader Benyettou
The recent resurgence of interest in spatio-temporal neural network as speech recognition tool motivates the present investigation. In this paper an approach was developed based on temporal radial basis function “TRBF” looking to many advantages: few parameters, speed convergence and time invariance. This application aims to identify vowels taken from natural speech samples from the Timit corpus of American speech. We report a recognition accuracy of 98.06% in training and 90.13 in test on a subset of 6 vowel phonemes, with the possibility to expend the vowel sets in future.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Teaching Result Analysis Using Rough Sets and Mining [ Full-Text ]
P. Ramasubramanian, K. Iyakutti, P. Thangavelu, and J. Joy Winston
The development of IT and WWW provides different teaching strategies, which are chosen by teachers. Students can acquire knowledge through different learning models. The problem based learning is a popular teaching strategy for teachers. Based on the educational theory, students increase their learning motivation, which can increase learning effectiveness. In this paper, we propose a concept map for each student and staff. This map finds the result of the subjects and also recommends a sequence of remedial teaching. Here, rough set theory is used for dealing with uncertainty in the hidden pattern of data. For each competence the lower and upper approximations are calculated based on the brainstorm maps.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Performance Analysis of AIM-K-means & K-means in Quality Cluster Generation [ Full-Text ]
Samarjeet Borah and Mrinal Kanti Ghose
Among all the partition based clustering algorithms K-means is the most popular and well known method. It generally shows impressive results even in considerably large data sets. The computational complexity of K-means does not suffer from the size of the data set. The main disadvantage faced in performing this clustering is that the selection of initial means. If the user does not have adequate knowledge about the data set, it may lead to erroneous results. The algorithm Automatic Initialization of Means (AIM), which is an extension to K-means, has been proposed to overcome the problem of initial mean generation. In this paper an attempt has been made to compare the performance of the algorithms through implementation.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Speed Control of Multi Level Inverter Designed DC Series Motor with Neuro-Fuzzy Controllers [ Full-Text ]
G. Madhusudhana Rao and B. V. SankerRam
This paper describes the speed control of a DC series motor for an accurate and high-speed performance. A neural network based controlling operation with fuzzy modeling is suggested in this paper. The driver units of these machines are designed with a Multi-level inverter operation and are controlled by a common current control mechanism for an accurate and efficient driving technique for DC series motor. The neuro-fuzzy logic control technique is introduced to eliminate uncertainties in the plant parameters of the DC Series motors, and also considered as potential candidate for different applications to prove adequacy of the proposed control algorithm through simulations. The simulation result with such an approach is made and observed efficient over other controlling technique.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Penetration Testing: A Roadmap to Network Security [ Full-Text ]
Nitin A. Naik, Gajanan D. Kurundkar, Santosh D. Khamitkar and Namdeo V. Kalyankar
Network penetration testing identifies the exploits and vulnerabilities those exist within computer network infrastructure and help to confirm the security measures. The objective of this paper is to explain methodology and methos behind penetration testing and illustrate remedies over it, which will provide substantial value for network security Penetration testing should model real world attacks as closely as possible. An authorized and scheduled penetration testing will probably detected by IDS (Intrusion Detection System). Network penetration testing is done by either or manual automated tools. Penetration test can gather evidence of vulnerability in the network. Successful testing provides indisputable evidence of the problem as well as starting point for prioritizing remediation. Penetration testing focuses on high severity vulnerabilities and there are no false positive.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Network Traffic Management [ Full-Text ]
Namdeo V. Kalyankar
The purposes of this paper have to discuss issues related to Network Traffic Management. A relatively new category of network management is fast becoming a necessity in converged business Networks. Mid-sized and large organizations are finding they must control network traffic behavior to assure that their strategic applications always get the resources they need to perform optimally. Controlling network traffic requires limiting bandwidth to certain applications, guaranteeing minimum bandwidth to others, and marking traffic with high or low priorities. This exercise is called Network Traffic Management.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Multi-Agent Model using Secure Multi-Party Computing in e-Governance [ Full-Text ]
Durgesh Kumar Mishra and Samiksha Shukla
Information management and retrieval of all the citizen occurs in almost all the public service functions. Electronic Government system is an emerging trend in India through which efforts are made to strive maximum safety and security. Various solutions for this have been proposed like Shibboleth, Public Key Infrastructure, Smart Cards and Light Weight Directory Access Protocols. Still, none of these guarantee 100% security. Efforts are being made to provide common national identity solution to various diverse Government identity cards. In this paper, we discuss issues related to these solutions.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Modified Minimum Connected Dominating Set formation for Wireless Adhoc Networks [ Full-Text ]
Mano Yadav, Vinay Rishiwal, G. Arora and S. Makka
Nodes of minimum connected dominating set (MCDS) form a virtual backbone in a wireless adhoc network. In this paper, a modified approach is presented to determine MCDS of an underlying graph of a Wireless Adhoc network. Simulation results for a variety of graphs indicate that the approach is efficient in determining the MCDS as compared to other existing techniques.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Routing in Wireless Adhoc Networks: A New Horizon [ Full-Text ]
Mano Yadav , Vinay Rishiwal and K. V. Arya
A lot of work has been done on routing protocols for mobile ad hoc networks, but still standardization of them requires some more issues less addressed by the existing routing protocols. In this paper a new paradigm of maintaining multiple connections in adhoc routing protocols has been highlighted which may be crucial for efficient routing in mobile ad hoc networks. The problem of multiple connections has been hardly worked on in adhoc networks. In this paper the solution of route maintenance if nodes are maintaining multiple connections has been proposed. This idea not only helps to solve the multiple connections problem, but also take care of proper bandwidth distribution to different connections as per different traffic types. Study has been incorporated on existing AODV with changes. Simulation studies have been performed over packet delivery ratio, throughput and message overheads. Results show that the proposed solution for multiple connections is efficient and worth implementing in existing as well as new protocols.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Sequence-conditioned channel estimation in ultra wideband time-selective fading channels without receiver CSI [ Full-Text ]
Nihar Panda, Debabala Swain, Siba P. Panigrahi, S. M. Rout, M. Singh and P. K. Nayak
This communication is an interim result while studying the behavior of estimation techniques for ultra wideband channels. Initial results are encouraging and this work shows a considerable increase in Bandwidth with expense of affordable loss in BER.