Wednesday 20 November 2013

Beyond The Sampling Theorem- Compressive Sensing and its Applications

Vol. 7 No. 4

Year: 2013

Issue : Apr-Jun

Title : Beyond The Sampling Theorem- Compressive Sensing and its Applications

Author Name : Md. Aisha Sulthana, R Balamurali

Synopsis :

The compressive sensing (or compressive sampling, CS) theorem states that a sparse signal can be perfectly reconstructed even though it is sampled at a rate lower than the Nyquist rate. It has gained an increasing interest due to its promising results in various applications. There are two popular reconstruction methods for CS: basis pursuit (BP) and matching pursuit (MP).Introductory papers on CS often concentrated either on mathematical fundamentals or reconstruction algorithms for CS. Newcomers in this field are required to study a number of papers to fully understand the idea of CS. This paper aims to provide both the basic idea of CS and how to implement BP and MP, so that newcomers no longer need to survey multiple papers to understand CS and can readily apply CS for their works.

An Efficient Fuzzy Technique For Detection Of Brain Tumor

Vol. 7 No. 4

Year: 2013

Issue : Apr-Jun

Title : An Efficient Fuzzy Technique For Detection Of Brain Tumor

Author Name : P.G.K. Sirisha, R. Pradeep Kumar Reddy , C. Naga Raju

Synopsis :

In this epoch Medical Image segmentation is one of the most challenging problems in the research field of MRI scan image classification and analysis. The importance of image segmentation is to identify various features of the image that are used for analyzing, interpreting and understanding of images. Image segmentation for MRI of brain is highly essential due to accurate detection of brain tumor. This paper presents an efficient image segmentation technique that can be used for detection of tumor in the Brain. This innovative method consists of three steps. First is Image enhancement to improve the quality of the tumor image by eliminating noise and to normalize the image. Second is fuzzy logic which produce optimal threshold to avoid the fuzziness in the image and makes good regions regarding Image and tumor part of the Image. Third is novel OTSU technique applied for separating the tumor regions in the MRI. This method has produced better results than traditional extended OTSU method.

Payload Capacity Enhancement In The Field Of Steganography By Using Mobile Application Based Stego Technique

Vol. 7 No. 4

Year: 2013

Issue : Apr-Jun

Title : Payload Capacity Enhancement In The Field Of Steganography By Using Mobile Application Based Stego Technique

Author Name : Chandrakant Badgaiyan

Synopsis :

The data world has become completely digitized and information moves through channels from one place to other. In this scenario data security has caught everybody’s attention. Since private network is not the solution of data security all the time and none of the medium used for data transfer is fully secured which encouraged information hiding techniques like Encryption and Steganography. The advantage of steganography over encryption is that messages do not attract attention to themselves. Plainly visible encrypted messages—no matter how unbreakable—will arouse suspicion, hence cryptography protects the contents of a message only, whereas steganography can protect both messages and communicating parties. In all existing Steganographic techniques, there is a restriction with respect to payload capacity is that the amount of data to be embedded into cover file can go beyond the size of cover file. In this paper we are going to check the enhancement of the payload capacity of steganography in any covert communication by using Mobile Apps as cover file and a small modification in approach of hiding data into cover file. Millions of mobile applications are downloaded on mobile phones daily from all part of world. This technique has overcome the problem of other Steganographic techniques like limited payload capacity with added advantage of mobility and portability as it runs on mobile phones instead of PC. This technique is developed in J2ME platform, Mobile Application is a Maze game, payload type is image having various file formats and tested on Nokia Supernova 7610 series phones.

Performance Evaluation Of Some Greedy Based Multi-Processor Scheduling Algorithms

Vol. 7 No. 4

Year: 2013

Issue : Apr-Jun

Title : Performance Evaluation Of Some Greedy Based Multi-Processor Scheduling Algorithms

Author Name : Ruwanthini Siyambalapitiya, Manjula Sandirigama

Synopsis :

Multi-processor scheduling problem has been shown to be NP-hard and therefore, no exact optimal solution algorithms could be constructed. In this study, we present the computational experience and performance evaluation of some greedy based algorithms to solve the multi-processor scheduling problem. These algorithms are approximation algorithms in which we compute lower bounds and percentage gaps to show that our solutions are close to relevant optimal solutions. We shall also show that the performance of these algorithms improves as the problem size grows. We make use of the principle of cumulative moving averages to show that the algorithms can be applied to large scale problem instances as well. These algorithms are very fast so that they can be applied to solve large scale problems found in practice, without much computational burden.

An Algorithmic Engineering Model for Application Testing Metrics

Vol. 7 No. 4

Year: 2013

Issue : Apr-Jun

Title : An Algorithmic Engineering Model for Application Testing Metrics

Author Name : James E. Osler II

Synopsis :

This work provides an epistemological rational for the transformative process of qualitative data into quantitative outcomes through the Tri–Squared Test as an efficient technique for the rapid testing of software applications. The design of fixed-parameter algorithms for software problems can prove to be beneficial to the engineer who has to efficiently and rapidly design a tool. This novel methodology provides elegance and has a wide range of applicability to practically address important and relevant problems in the “trial and error” process of application development. This research is the continuation of a dynamic mixed methods approach that is a transformative process which changes qualitative data into quantitative outcomes through the Tri–Squared statistical measure first introduced in i-Manager’s Journal of Mathematics.

Thursday 25 July 2013

Mobile Robot Path Planning: A review

Vol. 7 No. 3

Year: 2013
 
Issue:
Jan-Mar

Title : Mobile Robot Path Planning: A review
 
Author Name : Mohan Awasthy, M. Kowar

Synopsis :

This paper reviews the development in the area of vision for path planning of mobile robot. The paper deals with the two major components namely indoor navigation and outdoor navigation Each component has further been subdivided on the basis of structured and unstructured environment. The cases of geometrical and topological models have been dealt separately.

 

Intrusion Detection System in Network Using Particle Swarm Optimization (PSO)

Vol. 7 No. 

Year: 2013
 
Issue:
Jan-Mar

Title : Intrusion Detection System in Network Using Particle Swarm Optimization (PSO)
   
Author Name : B. Mahalakshmi, S .Anandamurugan

Synopsis :

The network intrusion detection techniques are important to prevent our systems and networks from malicious behaviors. However, traditional network intrusion prevention such as firewalls, user authentication and data encryption have failed to completely protect networks and systems from the increasing the attacks and malwares. Existing system has proposed a new hybrid intrusion detection system by using intelligent dynamic swarm based rough set (IDS-RS) for feature selection and simplified swarm optimization for intrusion data classification. The purpose of this new local search strategy is to get the better solution from the neighborhood of the current solution produced by Simplified Swarm Optimization SSO. Inorder to improve the performance of SSO and Rough Set Theory, Particle Swarm Optimization (PSO) and Enhanced Adaboost is used. It is also used to improve the detection rate and to reduce the false alarm rate.

A Comparative Study of Prediction in Seabed Mapping

Vol. 7 No. 3

Year: 2013
 
Issue:
Jan-Mar

Title : A Comparative Study of Prediction in Seabed Mapping
 
Author Name : Ghedhban Swadi, Karim Al-jebory, Dave Holifield

Synopsis :

In this paper, the performance of two dynamic neural network based predictors in seabed mapping is investigated. The two types of predictors are; the Focused Time- Delay Neural Network (FTDNN) based predictor and the Nonlinear Autoregressive Network with Exogenous Inputs (NARX) predictor. A testing platform has been developed that consists of seabed simulator and sonar simulator. Results show the NARX predictor outperforms the FTDNN predictor.

Security Enhancement of Image Hiding Technique in Mobile Application Using SMS Module

Vol. 7 No. 3

Year: 2013
 
Issue:
Jan-Mar

Title : Security Enhancement of Image Hiding Technique in Mobile Application Using SMS Module
 
Author Name : Chandrakant Badgaiyan
 
Synopsis :

Field of data security has attracted everybody’s attention due to digitization of whole world. Now shopping on internet, sending e-mails, transfer of documents, and all other type of data like text, image, audio or video is a common habit and need of mankind. But neither the medium used for data transfer is secured nor the storage media from hackers which encouraged data hiding techniques like Encryption and Steganography.  On the other hand the world is being mobile day by day and almost all type of services is being ported on mobile phones whether it is messaging services, internet services, entertainment services, sensor based services or financial services in form of various mobile applications. Millions of These applications are downloaded on mobile phones daily from all part of world.  In this paper, we are going to accomplish covert communication of images using mobile application as cover data and in order to provide authentication check to our technique we used SMS module concept. SMS module allows only registered or authorised user to download the application and has many other advantages. This technique has overcome the problem of other Steganographic techniques like limited payload capacity with added advantage of mobility and portability as it runs on mobile phones instead of PC. Proposed technique was developed in J2ME platform and tested on Nokia C5 series phones.