Volume 2, Issue 4, April 2010

Affine Registration of label maps in Label Space [ Full-Text ]

Yogesh Rathi, James Malcolm, Sylvain Bouix, Allen Tannenbaum and Martha E Shenton

Two key aspects of coupled multi-object shape analysis and atlas generation are the choice of representation and subsequent registration methods used to align the sample set. For example, a typical brain image can be labeled into three structures: grey matter, white matter and cerebrospinal fluid. Many manipulations such as interpolation, transformation, smoothing, or registration need to be performed on these images before they can be used in further analysis. Current techniques for such analysis tend to trade off performance between the two tasks, performing well for one task but developing problems when used for the other. This article proposes to use a representation that is both flexible and well suited for both tasks. We propose to map object labels to vertices of a regular simplex, e.g. the unit interval for two labels, a triangle for three labels, a tetrahedron for four labels, etc. This representation, which is routinely used in fuzzy classification, is ideally suited for representing and registering multiple shapes. On closer examination, this representation reveals several desirable properties: algebraic operations may be done directly, label uncertainty is expressed as a weighted mixture of labels (probabilistic interpretation), interpolation is unbiased toward any label or the background, and registration may be performed directly. We demonstrate these properties by using label space in a gradient descent based registration scheme to obtain a probabilistic atlas. While straightforward, this iterative method is very slow, could get stuck in local minima, and depends heavily on the initial conditions. To address these issues, two fast methods are proposed which serve as coarse registration schemes following which the iterative descent method can be used to refine the results. Further, we derive an analytical formulation for direct computation of the “group mean” from the parameters of pairwise registration of all the images in the sample set. We show results on richly labeled 2D and 3D data sets.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

An Intelligent Call Admission Control Decision Mechanism for Wireless Networks [ Full-Text ]

Ramesh Babu H.S., Gowrishankar and Satyanarayana P.S

The Call admission control (CAC) is one of the Radio Resource Management (RRM) techniques plays instrumental role in ensuring the desired Quality of Service (QoS) to the users working on different applications which have diversified nature of QoS requirements. This paper proposes a fuzzy neural approach for call admission control in a multi class traffic based Next Generation Wireless Networks (NGWN). The proposed Fuzzy Neural Call Admission Control (FNCAC) scheme is an integrated CAC module that combines the linguistic control capabilities of the fuzzy logic controller and the learning capabilities of the neural networks .The model is based on Recurrent Radial Basis Function Networks (RRBFN) which have better learning and adaptability that can be used to develop the intelligent system to handle the incoming traffic in the heterogeneous network environment. The proposed FNCAC can achieve reduced call blocking probability keeping the resource utilisation at an optimal level. In the proposed algorithm we have considered three classes of traffic having different QoS requirements. We have considered the heterogeneous network environment which can effectively handle this traffic. The traffic classes taken for the study are Conversational traffic, Interactive traffic and back ground traffic which are with varied QoS parameters. The paper also presents the analytical model for the CAC .The paper compares the call blocking probabilities for all the three types of traffic in both the models. The simulation results indicate that compared to Fuzzy logic based CAC, Conventional CAC, The simulation results are optimistic and indicates that the proposed FNCAC algorithm performs better where the call blocking probability is minimal when compared to other two methods.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

New Visual Cryptography Algorithm For Colored Image [ Full-Text ]

Sozan Abdulla

Visual Cryptography is a special encryption technique to hide information in images, which divide secret image into multiple layers. Each layer holds some information. The receiver aligns the layers and the secret information is revealed by human vision without any complex computation. The proposed algorithm is for color image, that presents a system which takes four pictures as an input and generates three images which correspond to three of the four input pictures. The decoding requires only selecting some subset of these 3 images, making transparencies of them, and stacking them on top of each other, so the forth picture is reconstructed by printing the three output images onto transparencies and stacking them together. The reconstructed image achieved in same size with original secret image.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Maintainability Estimation Model for Object-Oriented Software in Design Phase (MEMOOD) [ Full-Text ]

S. W. A. Rizvi and R. A. Khan

Measuring software maintainability early in the development life cycle, especially at the design phase, may help designers to incorporate required enhancement and corrections for improving maintainability of the final software. This paper developed a multivariate linear model ‘Maintainability Estimation Model for Object-Oriented software in Design phase’ (MEMOOD), which estimates the maintainability of class diagrams in terms of their understandability and modifiability. While, in order to quantify class diagram’s understandability and modifiability the paper further developed two more multivariate models. These two models use design level object-oriented metrics, to quantify understandability and modifiability of class diagram. Such early quantification of maintainability provides an opportunity to improve the maintainability of class diagram and consequently the maintainability of final software. All the three models have been validated through appropriate statistical measures and contextual interpretation has been drawn.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Deblured Gaussian Blurred Images [ Full-Text ]

Salem Saleh Al-amri, N.V. Kalyankar and Khamitkar S.D

This paper attempts to undertake the study of Restored Gaussian Blurred Images. by using four types of techniques of deblurring image as Wiener filter, Regularized filter ,Lucy Richardson deconvlutin algorithm and Blind deconvlution algorithm with an information of the Point Spread Function (PSF) corrupted blurred image with Different values of Size and Alfa and then corrupted by Gaussian noise. The same is applied to the remote sensing image and they are compared with one another, So as to choose the base technique for restored or deblurring image.This paper also attempts to undertake the study of restored Gaussian blurred image with no any information about the Point Spread Function (PSF) by using same four techniques after execute the guess of the PSF, the number of iterations and the weight threshold of it. To choose the base guesses for restored or deblurring image of this techniques.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Plagiarism Detection Using Graph-Based Representation [ Full-Text ]

Ahmed Hamza Osman, Naomie Salim and Mohammed Salem Binwahlan

Plagiarism of material from the Internet is a widespread and growing problem. Several methods used to detect the plagiarism and similarity between the source document and suspected documents such as fingerprint based on character or n-gram. In this paper, we discussed a new method to detect the plagiarism based on graph representation; however, Preprocessing for each document is required such as breaking down the document into its constituent sentences. Segmentation of each sentence into separated terms and stop word removal. We build the graph by grouping each sentence terms in one node, the resulted nodes are connected to each other based on order of sentence within the document, all nodes in graph are also connected to top level node” Topic Signature “. Topic signature node is formed by extracting the concepts of each sentence terms and grouping them in such node. The main advantage of the proposed method is the topic signature which is main entry for the graph is used as quick guide to the relevant nodes. which should be considered for the comparison between source documents and suspected one. We believe the proposed method can achieve a good performance in terms of effectiveness and efficiency.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Improving Supply Chain Coordination by Linking Dynamic Procurement Decision to Multi-Agent System

                                                                                                                                                                                [ Full-Text ]

Yee Ming Chen

The Internet has changed the way business is conducted in many ways. For example, in the field of procurement, the possibility to directly interact with a trading partner has given rise to new mechanisms in the supply chain management. One such interactive dynamic procurement, which lets both buyer and seller software agents bid by potential buyer agents instead of static procurement by vendors. Dynamic procurement decision could provide the buying and selling channel to buyer, to avoid occurring condition that seller could not deliver on the contract promise. Using NYOP(Name Your Own Price) to be the core of dynamic procurement negotiation algorithm sets up multi-agent dynamic supply chain system, to present the DSINs(Dynamic Supply Chain Information Networks) by JADE, and to present the dynamic supply chain logistic simulation by eM-Plant. Finally, evaluating supply chain performance with supply chain performance metrics (such as bullwhip, fill rate), to be the reference of enterprise making deciding in the future.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Crowd simulation influenced by agent’s socio-psychological state [ Full-Text ]

F. Cherif and R. Chighoub

The aim our work is to create virtual humans as intelligent entities, which includes approximate the maximum as possible the virtual agent animation to the natural human behavior. In order to accomplish this task, our agent must be capable to interact with the environment, interacting with objects and other agents. The virtual agent needs to act as real person, so he should be capable to extract semantic information from the geometric model of the world where he is inserted, based on his own perception, and he realizes his own decision. The movement of the individuals is representing by the combination of two approaches of movement which are, the social force model and the based-rule model. These movements are influenced by a set of socio-psychological rules to give a more realistic result.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Combination of Subtractive Clustering and Radial Basis Function in Speaker Identification [ Full-Text ]

Ibrahim A. Albidewi and Yap Teck Ann

Speaker identification is the process of determining which registered speaker provides a given utterance. Speaker identification required to make a claim on the identity of speaker from the Ns trained speaker in its user database. In this study, we propose the combination of clustering algorithm and the classification technique – subtractive and Radial Basis Function (RBF). The proposed technique is chosen because RBF is a simpler network structures and faster learning algorithm. RBF finds the input to output map using the local approximators which will combine the linear of the approximators and cause the linear combiner have few weights. Besides that, RBF neural network model using subtractive clustering algorithm for selecting the hidden node centers, which can achieve faster training speed. In the meantime, the RBF network was trained with a regularization term so as to minimize the variances of the nodes in the hidden layer and perform more accu-rate prediction.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Crosstalk Noise Modeling for RC and RLC interconnects in Deep Submicron VLSI Circuits [ Full-Text ]

P.V.Hunagund and A.B.Kalpana

The crosstalk noise model for noise constrained interconnects optimization is presented for RC interconnects. The proposed model has simple closed-form expressions, which is capable of predicting the noise amplitude and the noise pulse width of an RC interconnect as well as coupling locations (near-driver and near-receiver) on victim net. This paper also presents a crosstalk noise model for both identical and non identical coupled resistance–inductance–capacitance (RLC) interconnects, which is developed based on a decoupling technique exhibiting an average error of 6.8% as compared to SPICE. The crosstalk noise model, together with a proposed concept of effective mutual inductance, is applied to evaluate the effectiveness of the shielding technique.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Visual Infrared Video Fusion for Night Vision using Background Estimation [ Full-Text ]

Anjali Malviya and S. G. Bhirud

Video fusion is a process that combines visual data from different sensors to obtain a single composite video preserving the information of the sources. The availability of a system, enhancing human ability to perceive the observed scenario, is crucial to improve the performance of a surveillance system. The infrared (IR) camera captures thermal image of object in night-time environment, when only limited visual information can be captured by RGB camera. The fusion of data recorded by an IR sensor and a visible RGB camera can produce information otherwise not obtainable by viewing the sensor outputs separately. In this paper we consider the problem of fusing two video streams acquired by an RGB camera and an IR sensor. The pedestrians, distinctly captured by IR video, are separated and fused with the RGB video. The algorithms implemented involve estimation of the background, followed by detection of object from the IR Video, after necessary denoising. Finally a suitable fusion algorithm is employed to combine the extracted pedestrians with the visual output. The obtained results clearly demonstrate the effectiveness of the proposed video fusion scheme, for night vision.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Handling Overload Conditions In High Performance Trustworthy Information Retrieval Systems [ Full-Text ]

Sumalatha Ramachandran, Sharon Joseph, Sujaya Paulraj and Vetriselvi Ramaraj

Web search engines retrieve a vast amount of information for a given search query. But the user needs only trustworthy and high-quality information from this vast retrieved data. The response time of the search engine must be a minimum value in order to satisfy the user. An optimum level of response time should be maintained even when the system is overloaded. This paper proposes an optimal Load Shedding algorithm which is used to handle overload conditions in real-time data stream applications and is adapted to the Information Retrieval System of a web search engine. Experiment results show that the proposed algorithm enables a web search engine to provide trustworthy search results to the user within an optimum response time, even during overload conditions.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Audio enabled information extraction system for cricket and hockey domains [ Full-Text ]

S.Saraswathi, Narasimha Sravan.V, Sai Vamsi Krishna.B.V and Suresh Reddy.S

The proposed system aims at the retrieval of the summarized information from the documents collected from web based search engine as per the user query related to cricket and hockey domain. The system is designed in a manner that it takes the voice commands as keywords for search. The parts of speech in the query are extracted using the natural language extractor for English. Based on the keywords the search is categorized into 2 types: - 1.Concept wise – information retrieved to the query is retrieved based on the keywords and the concept words related to it. The retrieved information is summarized using the probabilistic approach and weighted means algorithm.2.Keyword search – extracts the result relevant to the query from the highly ranked document retrieved from the search by the search engine. The relevant search results are retrieved and then keywords are used for summarizing part. During summarization it follows the weighted and probabilistic approaches in order to identify the data comparable to the keywords extracted. The extracted information is then refined repeatedly through the aggregation process to reduce redundancy. Finally the resultant data is submitted to the user in the form of audio output.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

BiLingual Information Retrieval System for English and Tamil [ Full-Text ]

S.Saraswathi, Asma Siddhiqaa.M, Kalaimagal.K and Kalaiyarasi.M

This paper addresses the design and implementation of BiLingual Information Retrieval system on the domain, Festivals. A generic platform is built for BiLingual Information retrieval which can be extended to any foreign or Indian language working with the same efficiency. Search for the solution of the query is not done in a specific predefined set of standard languages but is chosen dynamically on processing the user’s query. This paper deals with Indian language Tamil apart from English. The task is to retrieve the solution for the user given query in the same language as that of the query. In this process, a Ontological tree is built for the domain in such a way that there are entries in the above listed two languages in every node of the tree. A Part-Of-Speech (POS) Tagger is used to determine the keywords from the given query. Based on the context, the keywords are translated to appropriate languages using the Ontological tree. A search is performed and documents are retrieved based on the keywords. With the use of the Ontological tree, Information Extraction is done. Finally, the solution for the query is translated back to the query language (if necessary) and produced to the user.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

A Metrics Based Model for Understandability Quantification [ Full-Text ]

Mohd Nazir, Raees A. Khan and Khurram Mustafa

Software developers and maintainers need to read and understand source programs and other software artifacts. The increase in size and complexity of software drastically affects several quality attributes, especially understandability and maintainability. False interpretation often leads to ambiguities, misunderstanding and hence to faulty development results. Despite the fact that software understandability is vital and one of the most significant components of the software development process, it is poorly managed. This is mainly due to the lack of its proper management and control. The paper highlights the importance of understandability in general and as a factor of software testability. Two major contributions are made in the paper. A relation between testability factors and object oriented characteristics has been established as a first contribution. In second contribution, a model has been proposed for estimating understandability of object oriented software using design metrics. In addition, the proposed model has been validated using experimental try-out.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Mobile Zigbee Sensor Networks [ Full-Text ]

Er. Anantdeep, Er. Sandeep kaur and Er. Balpreet Kaur

OPNET Modeler accelerates network R&D and improves product quality through high-fidelity modeling and scalable simulation. It provides a virtual environment for designing protocols and devices, and for testing and demonstrating designs in realistic scenarios prior to production. OPNET Modeler supports 802.15.4 standard and has been used to make a model of PAN. Iterations have been performed by changing the Power of the transmitter and the throughput will has been analyzed to arrive at optimal values.An energy-efficient wireless home network based on IEEE 802.15.4, a novel architecture has been proposed. In this architecture, all nodes are classified into stationary nodes and mobile nodes according to the functionality of each node. Mobile nodes are usually battery-powered, and therefore need low-power operation. In order to improve power consumption of mobile nodes, effective handover sequence based on MAC broadcast and transmission power control based on LQ (link quality) are employed. Experimental results demonstrate that by using the proposed architecture, communication time and power consumption of mobile nodes can be reduced by 1.2 seconds and 42.8%, respectively.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Effect of Crosstalk on Permutation in Optical Multistage Interconnection Networks [ Full-Text ]

Er. Sandeep Kaur, Er. Anantdeep and Er. Deepak Aggarwal

Optical MINs hold great promise and have advantages over their electronic networks.they also hold their own challenges. More research has been done on Electronic Multistage Interconnection Networks, (EMINs) but these days optical communication is a good networking choice to meet the increasing demands of high-performance computing communication applications for high bandwidth applications. The electronic Multistage Interconnection Networks (EMINs) and the Optical Multistage Interconnection Networks (OMINs) have many similarities, but there are some fundamental differences between them such as the optical-loss during switching and the crosstalk problem in the optical switches. To reduce the negative effect of crosstalk, various approaches which apply the concept of dilation in either the space or time domain have been proposed. With the space domain approach, extra SEs are used to ensure that at most one input and one output of every SE will be used at any given time. For an Optical network without crosstalk, it is needed to divide the messages into several groups, and then deliver the messages using one time slot (pass) for each group, which is called the time division multiplexing. This Paper discusses the permutation passability behavior of optical MINs. The bandwidth of optical MINs with or without crosstalk has also been explained. The results thus obtained shows that the performance of the networks improves by allowing crosstalk to some extent.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

An Efficient Watermarking Algorithm to Improve Payload and Robustness without Affecting Image Perceptual Quality [ Full-Text ]

Er. Deepak Aggarwal, Er. Sandeep Kaur and Er. Anantdeep

Capacity, Robustness, & Perceptual quality of watermark data are very important issues to be considered. A lot of research is going on to increase these parameters for watermarking of the digital images, as there is always a tradeoff among them. . In this paper an efficient watermarking algorithm to improve payload and robustness without affecting perceptual quality of image data based on DWT is discussed. The aim of the paper is to employ the nested watermarks in wavelet domain which increases the capacity and ultimately the robustness against attacks and selection of different scaling factor values for LL & HH bands and during embedding not to create the visible artifacts in the original image and therefore the original and watermarked image is similar.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Mobile Commerce and Applications: An Exploratory Study and Review [ Full-Text ]

Khawar Hameed, Kamran Ahsan and Weijun Yang

Mobile commerce is enabling the development of additional revenue streams for organizations through the delivery of chargeable mobile services. According to the European Information Technology Observatory, the total amount of revenue generated by mobile commerce was reported to be less than £9 million in the United Kingdom in 2001. By 2005 this had, at least, doubled and more recent industry forecasts project significant global growth in this area. Mobile commerce creates a range of business opportunities and new revenue streams for businesses across industry sectors via the deployment of innovative services, applications and associated information content. This paper presents a review of mobile commerce business models and their importance for the creation of mobile commerce solutions.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Preserving Privacy and Sharing the Data in Distributed Environment using Cryptographic Technique on Perturbed data [ Full-Text ]

P. Kamakshi and A. Vinaya Babu

The main objective of data mining is to extract previously unknown patterns from large collection of data. With the rapid growth in hardware, software and networking technology there is outstanding growth in the amount data collection. Organizations collect huge volumes of data from heterogeneous databases which also contain sensitive and private information about and individual .The data mining extracts novel patterns from such data which can be used in various domains for decision making .The problem with data mining output is that it also reveals some information, which are considered to be private and personal. Easy access to such personal data poses a threat to individual privacy. There has been growing concern about the chance of misusing personal information behind the scene without the knowledge of actual data owner. Privacy is becoming an increasingly important issue in many data mining applications in distributed environment. Privacy preserving data mining technique gives new direction to solve this problem. PPDM gives valid data mining results without learning the underlying data values .The benefits of data mining can be enjoyed, without compromising the privacy of concerned individuals. The original data is modified or a process is used in such a way that private data and private knowledge remain private even after the mining process. In this paper we have proposed a framework that allows systemic transformation of original data using randomized data perturbation technique and the modified data is then submitted as result of client’s query through cryptographic approach. Using this approach we can achieve confidentiality at client as well as data owner sites. This model gives valid data mining results for analysis purpose but the actual or true data is not revealed.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Intelligent System for Speaker Identification using Lip features with PCA and ICA [ Full-Text ]

Anuj Mehra, Anupam Shukla, Mahender Kumawat, Rajiv Ranjan and Ritu Tiwari

Biometric authentication techniques are more consistent and efficient than conventional authentication techniques and can be used in monitoring, transaction authentication, information retrieval, access control, forensics, etc. In this paper, we have presented a detailed comparative analysis between Principle Component Analysis (PCA) and Independent Component Analysis (ICA) which are used for feature extraction on the basis of different Artificial Neural Network (ANN) such as Back Propagation (BP), Radial Basis Function (RBF) and Learning Vector Quantization (LVQ). In this paper, we have chosen “TULIPS1 database, (Movellan, 1995)” which is a small audiovisual database of 12 subjects saying the first 4 digits in English for the incorporation of above methods. The six geometric lip features i.e. height of the outer corners of the mouth, width of the outer corners of the mouth, height of the inner corners of the mouth, width of the inner corners of the mouth, height of the upper lip, and height of the lower lip which extracts the identity relevant information are considered for the research work. After the comprehensive analysis and evaluation a maximum of 91.07% accuracy in speaker recognition is achieved using PCA and RBF and 87.36% accuracy is achieved using ICA and RBF. Speaker identification has a wide scope of applications such as access control, monitoring, transaction authentication, information retrieval, forensics, etc.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Prediction of Retained Capacity and EODV of Li-ion Batteries in LEO Spacecraft Batteries [ Full-Text ]

S. Ramakrishnan, S. Venugopalan and A. Ebenezer Jeyakumar

In resent years ANN is widely reported for modeling in different areas of science including electro chemistry. This includes modeling of different technological batteries such as lead acid battery, Nickel cadmium batteries etc. Lithium ion batteries are advance battery technology which satisfy most of the space mission requirements. Low earth orbit (LEO)space craft batteries undergo large number of charge discharge cycles ( about 25000 cycles)compared to other ground level or space applications. This study is indented to develop ANN model for about 25000 cycles, cycled under various temperature, Depth Of Discharge (DOD) settings with constant charge voltage limit to predict the retained capacity and End of Discharge Voltage (EODV). To extract firm conclusion and distinguish the capability of ANN method, the predicted values are compared with experimental result by statistical method and Bland Altman plot.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Survey and Comparison of Optical Switch   Fabrication Techniques and Architectures [ Full-Text ]

Ravinder Yadav and Rinkle Rani Aggarwal

The main issue in the optical transmission is switching speed. The optical packet switching faces many significant challenges in processing and buffering. The generalized multilevel protocol switching seeks to eliminate the asynchronous transfer mode and synchronous optical network layer, hence the implementation of IP over WDM (wave length division multiplexing). Optical burst switching attempts to minimize the need for processing and buffering by aggregating flow of data packets in to burst. In this paper there is an extensive overview on current technologies and techniques concerning optical switching.