Introduction Digital image is an array which contains many pixel values. The neighbor pixels may be correlated to each other pixel so it contains redundant bits. These redundant bits are removed from the images for reduce the size of image by using different compression algorithms. There are two components : redundancy reduction and irrelevant reduction in image compression. The less …
Read More »Kamran Khan
Information Technology Use in Agriculture
Introduction The Importance of Agriculture Agriculture is a main source for the survival of human begin. In agriculture field, plants are more important because these plants are used to produce several food grain and through by products such as cereals, powers, organic products without food the life cycle would not possible. Agriculture products export to other country and the farmer …
Read More »A Study on Machine Learning in Big Data
Introduction In recent years, as cloud computing, mobile Internet, and Internet of Things rapidly increases the data exponentially. How to learn and deal with these structured, semi-structured and unstructured large-scale massive data as well as the abilities of quickly acquiring valuable information becomes a problem worthy of attention yet of urgent solution [1]. Machine learning is a core research area …
Read More »Analysis of Clone Detection Approaches in Static Wireless Sensor Networks
Introduction The Wireless Sensor Network (WSN) is a collection of wireless sensor nodes which is small in size. WSN consists with base station which can communicate with sensor nodes by using radio link. Data is collected at the wireless sensor node, compressed and transmitted to the base station at once [1]. WSN may be deployed in harsh surroundings to complete …
Read More »A Systematic Review on the Suspicious Profiles Detection on Online Social Media Data
Introduction Human behavior and social interactions are greatly influenced by the digital and multimedia technology. In the age of information and internet, online data is growing in an exponential manner. Research reveals that a variety of social media platforms on Internet such as Twitter, Facebook, YouTube, Tumblr, Blogs and discussion articles are in constant use by activist groups for dispersion …
Read More »Development of Program in VB to Compute Tractor Parameters on Automatic Steering
Introduction Today’s Indian agricultural is mechanized in terms of agricultural machinery, new implements but, still required labors or tractor drivers so, we can say that it’s not automated yet. That’s why next coherent step is automation in Indian agriculture sector. Steering agricultural machinery in fields to perform various production operations is a tedious job for tractor drivers. Agricultural engineers have …
Read More »A Framework for Integration of A Patients’ Body Area Network With Iot
Introduction The term Internet of Things (IoT) refers to the interconnecting of physical devices over the internet. The basic idea is the integration of physical things (embedded devices with sensors and actuator) to the cyber-world (internet). An example of such a system in a health-care is a patient attached to various physiological sensors, which continuously and consistently monitor patients’ vital …
Read More »A Soft Approach to Estimate Woody Volume of a Live Tree
Introduction Wood is essential as a construction material, pulp and paper manufacture, fuel and energy and for a wide variety of other uses. Woody volume of tree is a significant parameter in tree management system. It is most widely used measure of wood quantity and is usually estimated for the assessment of economic /commercial utilization potential. The wood volume of …
Read More »An Automated Complex Word Identification from Text: A Survey
Introduction The process of recognizing difficult words from text is the main task of Complex Word Identification (CWI). In this task, the difficult words are substituted with simpler words aim to enhancement of reader’s understanding. CWI is useful in Lexical Simplification integrated with text simplification requires accurate identification of complex words from sentence. CWI can assist non native speakers by …
Read More »Tools, Strategies and Models for Incorporating Software Quality Assurance in Risk Oriented Testing
Introduction Software projects can get delayed due to improper definition of evolutionary scope, unplanned and untracked project resources, unclear roles and responsibilities and lack of software quality assurance by auditing and reviewing. Software quality management is an ongoing process to establish a kind of environment that can allow middle and top management for jointly facilitating software testing is again evolutionary …
Read More »A Survey on Accelerated Mapreduce for Hadoop
Introduction The amount of data generated in the digital world has grown rapidly in last few years. Storage and processing of this huge amount of data is a difficult task, yet an essential one. Various efforts are being made to store and process this huge information in a quick and efficient way. Thus, there is a need of an efficient …
Read More »Comparative Study of AODV and ODMRP Routing Protocols
Introduction Mobile nodes are also combination of few components such as processing unit, storage memory along with transmission and receiving capability. MANET provides special phenomena to provide different level of network services with optimum efforts. Although, MANET doesn’t rely on any infrastructure, but route discovery is also important practice for communication. Routing in MANET plays very important and crucial role …
Read More »Identifying Various Roadways Obstacles in Infrastructure less Environment Using Depth Learning Approach
Introduction The automobile is one of the greatest inventions that have become an essential part of our daily activities. However, it can bring about disaster and can even kill us through accidents. Vehicle accident is a vital problem in today’s world. Many a time, accidents and unusual traffic congestion take place due to careless and impatient nature of drivers. In …
Read More »Linear Cryptanalysis of Substitution Ciphers Using Particle Swarm Optimization
Introduction In cryptology procedure for ensuring the secrecy and authenticity of information are studied. Traditional symmetric and asymmetric methods are not suitable when the needed level of security is high.The two main branches of cryptology are cryptography and crypt analysis. In cryptography, designs of such techniques are studied but for crypt analysis, the defeating of such techniques is studied to …
Read More »Optical Flow Estimation Using Total Least Squares Variants
Intoduction Motion Estimation in Robotics Nowadays, robotics is receiving a lot of consideration. Robots can perform tasks in unstructured settings, assist humans, interact with users and offer their services properly. One of the key issues pertaining mobile robots is to register their position. Customarily, onboard sensors to collect environmental data for localization and mapping purposes solve this problem. Many robotic …
Read More »Constructive and Clustering Methods to Solve Capacitated Vehicle Routing Problem
Introduction Vehicle Routing Problem (VRP) is a real life constraint satisfaction problem to find minimal travel distances of vehicles to serve customers.1 Capacitated VRP (CVRP) is the simplest form of VRP considering equal vehicle capacity constraint.2 In CVRP, all customers have known demands and known locations for the delivery. The delivery for a customer cannot be split. In other words, …
Read More »Design of a Gray Encoder and Counter Using D-FFs and MUXs
Introduction The reflected Binary Code (RBC) is the unfamiliar and original name of Gray Code (GC). As the original name implies, the values of the second half of a GC set are equivalent to the first half but in reverse order. This with the exception for the most significant bit (MSB) which is inverted i.e. 0 changes to 1.1-3 GCs …
Read More »Website Design of Indian Central Universities: Issues and Challenges
Introduction The indigenous and indispensable role of Information and Communication Technology (ICT) across the vertical and horizontal horizons has increased. The demand, dependence and availability of web-based information has become a lifeline for many organizations to survive. The information presented over the web must be reliable, fast, accessible, understandable, and beneficial for the prospective users. The globalization of present era …
Read More »Cardiovascular Disease Prediction Using Data Mining Techniques: A Review
Introduction Cardiovascular diseases remain the foremost causes of preventable deaths globally and continue to grow in prominence, because of their attendant burden, disparities, and costs. Evidence indicates that cardiovascular diseases are already epidemic in low- and middle-income as well as high-income regions of the world and have become deep-rooted in most societies in recent decades. Heart disease and stroke kills …
Read More »A Survey on User Authentication Techniques
Introduction Cryptography is the art of providing security for information and resources by implementing suitable technologies. In Information security, cryptography plays a vital role in achieving confidentiality, integrity, authentication and non-repudiation. Identification and authentication of a user to the system is equally important as privacy in our lives. Increase in usage of electronic communication, needs to have electronic techniques for providing …
Read More »Survey on Packet Marking Algorithms for IP Traceback
Introduction Distributed Denial of service (DDoS) attacks are becoming a major problem now a days. This type of attacks not only allows the authorized users from accessing the specific network services or resources but also propel a large amount of traffic on the network. There is a huge growth of internet users day to day. As the number of users …
Read More »Iris Biometric Modality: A Review
Introduction The difficulty with the traditional use of passwords, usernames or to possess tokens like (identity cards, keys etc.) for the security purpose is that they can easily be evaded by hackers and the rogue employees. Due to these apparent security issues related to use of passwords as security measures, biometric recognition system is becoming the standard model when trying …
Read More »Geographical Information Based Expert System to Estimate Submersible Pump System Specifications
Introduction Groundwater pumping in the agricultural sector increased in Punjab state to meet the growing needs of agricultural sector. Both surface and ground water contribute towards irrigation; however surface water supply being inadequate, ground water is the main source of irrigation. Also the increased exploitation of ground water is due to cultivation of high water consuming crops in most parts …
Read More »Intrusion Detection System Based on Data Mining Techniques
Introduction An intrusion detection system (IDS) is a software tool that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system. Intrusion detection is primarily focused on identifying possible incidents, logging information …
Read More »Research Summary of A Study for the Estimation of Legacy Programs for Effective Re engineering
Introduction The working terminology of a legacy system was created some 20 to 30 years ago by legacy software engineers which was typically written in COBOL, FORTRAN, C or C++ and was called as a legacy program. Its relevance has never lost its grounds. Legacy frameworks are thought to be conceivably risky by numerous software engineers. These programs face certain …
Read More »Enhanced K-Means Clustering Algorithm Using Collaborative Filtering Approach
Introduction Data mining is a technique that is used to extract and mine the important information from mass of data. Data mining is used as information Discovery in Database, information engineering. As we that clustering is an unsupervised learning method well-known in the area of data mining. For creating subgroups that are handier than individual datum, clustering is used as …
Read More »Component Based Software Development Life Cycle Models: A Comparative Review
Introduction Software development process has evolved a long way from traditional waterfall model to highly manageable component oriented software. Initially softwares were developed from scratch using functional (procedural) approach. It was a top-down approach which breaks functional requirements into sub functions and building a program for functionality. Later a huge change in software industry came with the introduction of object …
Read More »A Tpa-Authentication Scheme for Public Cloud Using Kerberos Protocol
Introduction Cloud computing is an art of computer science which provides all the capabilities like services, platform and infrastructure. Cloud providers provide all this services. The aim of cloud computing is to have resource consumption is minimize way. The cloud computing makes desktop just an application using platform. All the services, which are available in any desktop, can be used …
Read More »A Review on IoT Security Issues and Countermeasures
Introduction Internet of things (IoT) that refers to uniquely identifiable objects, things, and their virtual representations in an internet-like structure, was first proposed in 1998 [1]. IoT is a system in which all the things are connected to the internet through the information capturing devices for the purpose of intelligent identification and management [2]. These devices are provided with the …
Read More »A Novel Approach to Address Sensor Interoperability Using Gabor Filter
Introduction Biometric means identity verification of persons according to their physical or behavioral characteristics. Many physical body parts and personal features have been used for biometric systems: fingers, hands, irises, faces, ears, voices, gaits, odors, feet, signatures, and DNA [1, 2]. A biometric system contains mainly a sensor module, a feature extraction module and a pattern matching module. A Sensor …
Read More »Hybrid Intrusion Detection System for Private Cloud & Public Cloud
Introduction Cloud computing is an emerging technology in the IT sector. It is a collection of sources that are conveyed on demand over the network for enabling resource sharing in terms of manageable computing services and scalability. By the help of third party, cloud basically provides services to other organizations. The third party provides resources and services on rent and …
Read More »A Review on Electronic Dictionary and Machine Translation System Developed in North-East India
Introduction Natural language is the most important communication media for all human beings. Natural language processing is one of the interdisciplinary research areas in Computer Science, Computational Linguistic and Artificial Intelligence. It is a very attractive method for interactions between computers and natural languages. The purpose of NLP is to design and develop software that will analyze, understand, and produce …
Read More »Agile Practices in Indian Organizations
Introduction In India, very little is known about the Agile methodology and software companies need (out of Agile or heavyweight). Due to the lack of any survey, vendors as well as companies are facing problems regarding adaptation of an appropriate Agile methodology. Survey goal was not only to gain understanding of features but also to collect statistics about usage and …
Read More »Major challenges of Mobile Adhoc Networks
Introduction MANET is an assembly of affordable, small and strong devices. MANET is rapidly growing network. MANET is adaptive and self organizing in nature. Devices are connects with each other and performs communication for sharing of data and services. Adhoc networks allow device to maintain their connection and facilitate to remove or adding devices from network. The topology of ADHOC …
Read More »Comparative study on Classification of Digital Images
Introduction A digital image is the replica of the scene, what we see from the naked eye. It can be broadly classified into two categories: natural / photographic images and computer graphic images. A natural image is captured from digital camera or still camera while CG images are produced from software’s like MAYA, 3D studio max, light scape etc [1]. …
Read More »Plastic Money Security Issues in India
Introduction to Plastic Money and frauds The use of plastic money was started around 1950 as an alternate to the paper notes or currency [3]. Plastic money is not the plastic currency but the plastic cards in place of the paper notes or the cash. Plastic money is the current need of the attaining ‘cashless economy’ restricting the black money …
Read More »Wavelet Statistical Feature based Malware Class Recognition and Classification using Supervised Learning Classifier
Introductıon The analysis of texons played a major role in classification the pattern classification techniques and applications in the areas of image processing are growing increasingly. The image processing and pattern classification represents the state of art developments in the field. Texture pattern recognition is the task of classify input feature vector data in to classes based on the selected …
Read More »Breast Cancer Detection using Image Processing Techniques
Introduction Breast cancer is one of the frequent diagnosis diseases among women. It can be detected by clinical breast examination, yet the detection rate endures to be very low. Additionally, the abnormal areas that cannot be felt can be quite challenging to check using traditional techniques but can be easily seen on a conventional mammogram or with ultrasound. Mammography is …
Read More »An Automated Testing Model using Test Driven Development Approach
Introduction Software testing is a method to find out the errors and defect of application under test and give a suitable solution for that. Now a day’s software testing plays an important role in software development process. The main purpose of software testing is to ensure that the developed software or application has a good quality. Two methods available for …
Read More »An Optimal Resource Provisioning Algorithm for Cloud Computing Environment
Introduction Cloud computing depicts a computing infrastructure, which is accessible to various user applications. The infrastructure incorporates networked computing systems in which various computational applications and resources are available as on demand service to the users [1]. This computing system is a virtualized system that is formed by processing elements that agree to work together by pooling their resources. A …
Read More »I-v Fuzzy Shortest Path in a Multigraph
Introduction The ‘Multigraph’ [3,11-13,15,21-32,39] is a generalized data structure of ‘graph’ where multiple links might exist between a pair of nodes. For example, in a data communication model such as in Adhoc Network or MANET, the multipath or multiroute features are very common. Two neighboring routers in a network constellation may share multiple direct connections between them (instead of simply one), therefore as to scale back the bandwidth as compared if one association is employed. …
Read More »Secure ASP.NET Web Application by Discovering Broken Authentication and Session Management Vulnerabilities
Introduction World Wide Web has evolved from a position that delivers static pages to a proclamation that supports distributed applications, met with as internet applications and become a well-known of the most universal technologies for information and service delivery around Internet. The increasing currency of World Wide Web application can be showing several factors, including remote accessibility, cross-platform compatibility, hasty …
Read More »Software Upgradation Model Based on Agile Methodology
Introduction In software engineering, the software development model can be either traditional that include waterfall, prototype, incremental models etc or agile software development models that include SCRUM, crystal etc. There exists no such model currently, which dictates how to enhance existing software. In fact, to update existing software to higher level we don’t have any specific model even though the …
Read More »Enhanced Content Based Double Encryption Algorithm Using Symmetric Key Cryptography
Introduction The term “Cryptography”, originated from the Greek word which means “Hidden Writing”. It plays an important role in data security. Every organization needs a secure transfer of confidential information over the network and cryptography provides a way to secure data communication with different cryptographic algorithms. Some algorithms which provide secure communication are like DES, AES SHA1 and MD5. Cryptography …
Read More »Detection and Isolation of Zombie Attack under Cloud Environment
Introduction Cloud Computing is a largest-scale distributed computing paradigm that is driven by economies of scale i.e. a group of managed computing control, vague, dynamically-scalable, virtualized, storage, platforms and the services are delivered on demand to outside customers over the Internet. Cloud is the network which is formed through cloud service and computing model is the service provided in the …
Read More »Classification of Human Organ Using Image Processing
Introduction Digital Image Processing is a technique of performing image processing on digital images using algorithms which categorise the digital signal in the input data. The base of DIP are mathematical and probabilistic formulas, but human intuition also plays the vital role in selecting the techniques based on the requirement. In medical imaging the body is scanned through magnetic resonance …
Read More »A New Distributed Intrusion Detection System in Computer Network: An Approach to Detect Malicious Intrusion Threats at Initial Stage
Introduction In the recent decades with the rapid growth of the Internet and its related technology, many types of network and software applications have emerged. Also, same time, widely spread of Wide Area Network and Local Area Network application areas in many sectors of business such as industry, finance, security and healthcare sectors has made us more dependent on the …
Read More »Intelligent Information Retrieval Using Hybrid of Fuzzy Set and Trust
Introduction Search engines are used widely for web information retrieval. The search results precision is low due to imprecise and vague search queries. Research has been done in web information retrieval for improving the precision of search results. [1][2][3][4][5][6][7][8][9] Fuzzy set has been used in the framework of web information retrieval to deal with vague and imprecise web data. [10] …
Read More »Automatic Feedback Generation in Software Performance Engineering: A Review
Introduction Among non-functional attributes of software, performance is one of the key attribute. It deals with the efficiency of system in dealing with time constraints and resource allocation under certain environmental conditions. Response time, throughput and utilization are some key performance indices. Most of the problems that projects report after their release are not crashes or incorrect responses, but rather …
Read More »Assessment of Accuracy Enhancement of Back Propagation Algorithm by Training the Model using Deep Learning
Introduction Deep learning is a branch of the rapidly growing field of machine learning. Machine learning is a field of computer science which makes use of AI concepts, to enable computers to learn from problem solutions and make use of the knowledge for new problems. Machine learning have proven useful in a mining structured, semi-structured and unstructured data. The values …
Read More »