Version-6 (July-August 2017)
Ver-1 Ver-2 Ver-3 Ver-4 Ver-5 Ver-6 Ver-7
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Study on Hotel Reservation Trends of Mobile App Via Smartphone |
Country | : | India |
Authors | : | C. Prom& Rosy || Dr. R. Ponnusamy |
: | 10.9790/0661-1904060108 |
Abstract: This article offers a study of the current use of the internet as a marketing tool, by the hotel industry. Mobile at the Forefront of Hotel Technology happen in 40 years, but when it comes to technology, 40-years is like going back to the days of Moses or the Roman Empire." Richard Goodwin... and it's true. While the mobile phone has been around since the 70's, it wasn't really until the launch of Apple's iPhone in 2.007 that the mobile space rapidly changed forever. Apple's iPhonc was responsible for popularising applications with millions of consumers, helped make touchscreen.............
Keywords: Hotel Technology', Alice app, Nano hotel booking, Roombler, Smartphone..
[1]. Journals of Travel and tourism marketing Volume 30,Issue 2, April 2013,
[2]. Tourism and Hotel Industry in Indo-China & Southeast Asia: Development, Marketing, and Sustainability Third International Conference June 1998
[3]. Barnes, J. O. and Cumby, J.A., 1993. The cost of quality in service-oriented companies: making better customer service decisions through improved cost information, ASB Conference.
[4]. Berthon. P., Pitt. L.F. and Watson, R.T., 1996, The World Wide Web as an advertising medium: towards an understanding of conversion efficiency. Journal of Advertising Research, January/February, pp.43 -54.
[5]. The top most popular hotel software. Published July 19th, 2016 by Jennifer Champagne in Hotel Management..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Multi-Focus Image Fusion Methods – A Survey |
Country | : | India |
Authors | : | Dr. R.Maruthi || Dr.I.Lakshmi |
: | 10.9790/0661-1904060925 |
Abstract: TMulti-focus image fusion is a technique of combining two images of the same scene with diverse focuses into a single image. The single fused image has greater depth of field than each of the input images. The multi-focus image fusion technique seeks to provide an effective activity level measurement to evaluate the clarity of source images. It finds application in various fields such as remote sensing, optical microscopy, medical diagnostics, forensic and defense departments. This review article presents an exhaustive list of methods that can be applied in the multi-focus image fusion process..............
Keywords: Image fusion, multi-focus, fusion methods, frequency domain, spatial domain[1]. A. B. Siddiqui, M. A. Jaffar, A. Hussain and A. M. Mirza, Block-based pixel level multi-focus image fusion using particle swarm optimization,, International Journal of Innovative Computing, Information and Control , vol.7, no.7(A), pp.3583-3596, 2011
[2]. Shutao Li, Bin Yang, Region-based multi-focus Image fusion, Image Fusion Algorithms and Applications 2008, Pages 343-365
[3]. J. Yang, Y. Ma, W. Yao, W. T. Lu (2008). A Spatial domain and frequency domain integrated approach to fusion multifocus images, ISPRS Congress Beijing 2008 Proceedings of Commission VII.
[4]. Yu Song; Mantian Li; Qingling Li; Lining Sun; , A New Wavelet Based Multi-focus Image Fusion Scheme and Its Application on Optical Microscopy, Robotics and Biomimetics, 2006. ROBIO '06. IEEE International Conference on , vol., no., pp.401-405, 17-20 Dec. 2006.
[5]. Jamal Saeedi, Karim Faez, Saeed Mozaffari, Multi-focus Image Fusion Based on Fuzzy and Wavelet Transform, Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications Lecture Notes in Computer Science Volume 5856, 2009, pp 970-977
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Network Boosters in 4G LTE |
Country | : | India |
Authors | : | H.P. Bramhaprakash || Dr. Manjaiah D H |
: | 10.9790/0661-1904062629 |
Abstract: Versatile systems have bit by bit advanced from 1980's till date to a level where the need of the general population request system of higher execution, higher limit and simplicity of getting to from anyplace on the planet. Because of this need of interest in the execution of versatile systems there are many reviews completed to discover the exit plan to surpass the points of confinement of the present system independent of the place from where it is gotten to. There is a fast progression in remote correspondence innovation giving the system benefits anyplace and at whatever time.............
Keywords: Cognitive Radio, Femtocell, Bandwidth, Spectrum, 4G, 5G.
[1] Ericsson White Paper (2013) 5G radio access.
[2] Raaf B., Tiirola, E., Marsch P., Wichman R., (2011) Vision for Beyond 4G Broadband Radio Systems 22nd International Symposium on Personal, Indoor and Mobile Radio Communications IEEE pp 2369 - 2373.
[3] D.D Clark, C.Partige, J.C. Ramming, J T Wroclawski, "A knowledge plane for the Internet", in:Proceedings of the SIGCOMM 2003, Karlsruhe,Germany, and August 25-29, 2003.
[4] Q, Mahmoud, Cognitive Networks-Towards Self-Aware networks, John Wiley and Sons, 2007, ISBN9780470061961.
[5] A.H.Khan, M.A.Qadeer,J.A.Ansari,S. Waheed, "4Gas a Next Generation Network", International Conference on Future Computer and Communication, 2009
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The emergent need to reduce the huge investment cost on computing resources and the awarenessabout global warming have moved the traditional IT paradigm toshift towards green cloud computing paradigm. By using cloud enabled technologies, users utilize IT resources on a rental basis with an on-demand elastic manner instead of purchasing the IT resources. Elasticity is one of the key characteristics of Cloud computing which supports to access resources in a green aware elastic manner. Realizing the significance of the green awareness and elasticity in cloud computing..............
Keywords: Cloud Computing, Elasticity, Resource Management, Green Cloud, Infrastructure
[1] http://www.gartner.com/newsroom/id/3384720 [Last Accessed 4.2.2017]
[2] P. Mell, T. Grance, "The NIST Definition of Cloud Computing", National Institute of Standards and Technology, Information Technology Laboratory, Technical Report, Version 15, 2009.
[3] P. Mell, T. Grance, "The NIST Definition of Cloud Computing", Tech. rep., U.S. National Institute of Standards and Technology (NIST), 2011. Special Publication 800-145, http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf.
[4] N. R. Herbst, S. Kounev, and R. Reussner, "Elasticity in cloud computing: what it is, and what it is not," in Proceedings of the 10th International Conference on Autonomic Computing (ICAC'13), pp. 23-27, San Jose, Calif, USA, June 2013.
[5] COHEN R. Defining Elastic Computing, September 2009. http://www.elasticvapor.com/2009/09/defining-elastic-computing.html
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Practically every side of our lives is packed by information. Malware is the annoying project that influences PC operation and sensitive data of the host framework. The goal is to protect such information and keep malware from imparting fake data into network stack. The new strategy cryptographic provenance verification utilizes a property known as information provenance respectability which enhances the trustiness of the framework and its information. The framework security is improved at kernel level. CPV makes utilization of trusted stage module for discovery of fake data. With CPV.............
Keywords: Cryptography, CPV, data, malware, provenance, security
[1] J.S. Bridle, "Probabilistic Interpretation of Feedforward Classification Network Outputs, with Relationships to Statistical Pattern Recognition," Neurocomputing—Algorithms, Architectures and Applications, F. Fogelman-Soulie and J. Herault, eds., NATO ASI Series F68, Berlin: Springer-Verlag, pp. 227-236, 1989. (Book style with paper title and editor)
[2] W.-K. Chen, Linear Networks and Systems. Belmont, Calif.: Wadsworth, pp. 123-135, 1993. (Book style)
[3] H. Poor, "A Hypertext History of Multiuser Dimensions," MUD History, http://www.ccs.neu.edu/home/pb/mud-history.html. 1986. (URL link *include year)
[4] K. Elissa, "An Overview of Decision Theory," unpublished. (Unplublished manuscript)
[5] R. Nicole, "The Last Word on Decision Theory," J. Computer Vision, submitted for publication. (Pending publication)
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Survey on Human Action Recognition |
Country | : | India |
Authors | : | Ayush Purohit || Shardul Singh Chauhan |
: | 10.9790/0661-1904064350 |
Abstract: Human Action Recognition is one of the important research area in computer vision and image processing field. A machine can be interacted and controlled by gestures and facial expression using the visual modality. Human action recognition can be seen as a bridge for machines to understand human body language, an intelligent interacting system between machines and humans which limits majority of input devices such as keyboard and mouse. Thus, producing an accurate and meaningful information on human activities and behaviours is one of the important tasks in pervasive computing. In this survey, we tried to focus on advancement of action recognition after yr. 2010..
Keywords: Human Action recognition, Gesture Recognition, Human Computer Interaction.
[1] Karl-Friedrich Kraiss, Advanced Man-Machine Interaction Fundamental & Implementation, © Springer-Verlag Berlin Heidelberg, 2006.
[2] Aggarwal, J., Ryoo, M., Human activity analysis: A survey, ACM Computing Surveys 43, 1-43, 2011.
[3] Guangchun Cheng, Yiwen Wan, Abdullah N. Saudagar, Kamesh, Advances in Human Action Recognition: A Survey, arXiv: 1501.05964v1 [cs.CV] 23 Jan 2015.
[4] Daniel Weinlanda, Remi Ronfardb, Edmond Boyerc, A Survey of Vision-Based Methods for Action Representation, Segmentation and Recognition, volume 115, Issue 2, February 2011, Pages 224-241.
[5] Volker Kruger, Danica Kragic, Ales Ude, Christopher Geib, The Meaning of Action: A review on action recognition and mapping, Taylor and Francis Online, volume 21, Issue 13, 2007.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The exponential growth of information in the internet over the last decade forces the researchers to think alternate solutions to provide better user service, reduce network bandwidth and reduced user perceived latency. Web Cache is the most promising technique for improving the web performance. Cache replacement is one of the important attributes to be addressed for better results. This paper proposes traditional cache replacement polices LRU, LFU and RR and examines its effectiveness in conjunction with different Cache Size. The results shows that LRU is most promising than other two methods in terms of HR , BHR and LSR and cache Size is definitely influence the effectiveness of the Cache Replacement Algorithms.
Keywords: web log mining, caching, hit ratio, byte hit ratio, Latency Saving Ratio, LRU, LFU, RR
[1] 17 06 2017 http://www.internetlivestats.com/
[2] Sofi, Ayaz Ahmad, and Atul Garg. "Analysis of various techniques for improving Web performance." (2015).
[3] Podlipnig, Stefan, and Laszlo Böszörmenyi. "A survey of web cache replacement strategies." ACM Computing Surveys (CSUR) 35.4 (2003): 374-398.
[4] Balamash, Abdullah, and Marwan Krunz. "An overview of web caching replacement algorithms." IEEE Communications Surveys & Tutorials 6.2 (2004).
[5] Wong, Kin-Yeung. "Web cache replacement policies: a pragmatic approach." IEEE Network 20.1 (2006): 28-34
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Day by day the aging population is increasing and it has become an important challenging issue of monitoring the elderly person's daily activities like eating and drinking to assist in maintaining the nutritional and fluid levels as prescribed by the schedule from the physician or care takers. On this context, a system that recognizes vision based eating/drinking activities of elderly people to prevent from dehydration and malnutrition has become very much essential especially in developed societies. In this paper, first human face and hand poses are segmented using skin segmentation...........
Keywords: Eating Activity, Drinking Activity, elderly people, hand movement, activity recognition.
[1] J. Vogt, K. Luyten, J.V. den Bergh, K. Coninx and A. Meier, Putting dementia into context: a selective literature review of assistive applications for users with dementia and their caregivers, International Conference on Human-Centered Software Engineering, pp. 181-198, 2012.
[2] D. Vergados, A. Alevizos, A. Mariolis and M. Caragiozidis, Intelligent services for assisting independent living of elderly people at home, International Conference on Pervasive Technologies Related to Assistive Environments, vol. 97, pp. 1-4, 2008.
[3] Z. Lin, A. R. Hanson, L. J. Osterweil and A. Wise, Precise process definitions for activities of daily living: a basis for real-time monitoring and hazard detection, Workshop on Software Engineering in Health Care, pp. 13-16, 2011.
[4] C.A. Frantzidis and P.D. Bamidis, Description and future trends of ICT solutions offered towards independent living: the case of LLM project, International Conference on Pervasive Technologies Related to Assistive Environments, vol. 59, pp. 1-8, 2009.
[5] R. Watson, Measuring feeding difficulty in patients with dementia: perspectives and problems, Journal of Advanced Nursing, vol.18, no. 1, pp. 25-31, 1993.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Eyelid Phase Shift and Difference Map Algorithm for Gaze Pattern Estimation |
Country | : | India |
Authors | : | K. Rathi || Dr. K. Srinivasan |
: | 10.9790/0661-1904066474 |
Abstract: Eye gaze provides a vital sign for vision-based intelligent systems to recognize the human visual attention, emotion, feelings and so on. A different gaze estimation method employs local or global features as eye. But it failed to work well under natural light and it is still hard to obtain accurate gaze pattern for human vision recognition. In order to improve the gaze pattern estimation, Eyelid Phase shift Momentum based Difference MapAlgorithm (EPSM-DMA) is introduced. The EPSM-DMA technique captures the various eye images from the dataset. Initially, the Eyelid Phase shift Momentum technique is applied in EPSM-DMA to measure the movement of the eyelid for detecting the gaze pattern...........
Keywords: Eye gaze estimation, eyelid phase shift momentum, Difference map algorithm, Euclidean space, Bayes' theorem, Pattern matching.
[1] Feng Lu,Xiao Chen, and Yoichi Sato, "Appearance-Based Gaze Estimation via Uncalibrated Gaze Pattern Recovery", IEEE Transactions on Image Processing, Volume 26, Issue 4, April 2017, Pages 1543 - 1553
[2] Feng Lu, Yue Gao and Xiaowu Chen, "Estimating 3D Gaze Directions Using UnlabeledEye images via Synthetic Iris Appearance Fitting", IEEE Transactions on Multimedia, Volume 18, Issue 9, 2016 , Pages 1772 - 1782
[3] Feng Lu and Xiaowu Chen, "Person-independent eye gaze prediction from eye images using Patch-based features", Neuro computing, Elsevier, Volume 182, 2016, Pages 10–17
[4] Fares Alnajar, Theo Gevers, Roberto Valenti, Sennay Ghebreab, "Auto-Calibrated Gaze Estimation Using Human Gaze Patterns", International Journal of Computer Vision, Springer, 2017, Pages 1–14
[5] Yusuke Sugano, Yasuyuki Matsushita, Yoichi Sato, "Appearance-Based Gaze Estimation Using Visual Saliency", IEEE Transactions on Pattern Analysis and Machine Intelligence, Volume 35, Issue 2, 2013, Pages 329 - 341
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Managing attendance is a very important record-keeping activity in any institution. The lapses recorded in traditional methods of recording and managing attendance has therefore necessitated the development of an automated system for this task. The integration of Radio Frequency Identification(RFID) with fingerprint biometric technology was used to enhance the security level and integrity of the records. The system does not only speed up the process of taking attendance but reduces error and allows for faster verification of student attendance, all with minimal human interaction.
Keywords: RFID, Fingerprint, Arduino Uno, Automation
[1]. Arulogun O. T., Olatunbosun A., Falolujo O. A., Olaniyi O. M. (2013). RFID-Based Students Attendance Management System. International Journal of Scientific & Engineering Research. 4(2) pp.1 - 9 [online]
[2]. Available from: https://www.ijser.org/researchpaper/rfid-based-students-attendance-management-system.pdf [Accessed 2nd August, 2017]
[3]. Emmanuel Adetiba, Oghenetega Iortim, Anthony T. Olajide, Richard Awoseyin (2013). An Online Biometrics-based Class Attendance Management System, African Journal of Computing & ICT 6(3),pp.25 - 38 [online]
[4]. Available from: https://www.ajocict.net/uploads/V6N3P3-2013_Adetiba_et_al_-_OBCAMS_-_An_Online_Biometrics-based_Class_Attendance.pdf[Accessed 2nd August, 2017]
[5]. Gunjan Talaviya, Rahul Ramteke, A. K. Shete (2013). Wireless Fingerprint Based College Attendance System Using Zigbee Technology. International Journal of Engineering and Advanced Technology(IJEAT), 2(3),pp.201 - 203 [online]