Volume-10 ~ Issue-1
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Credit Card Duplication and Crime Prevention Using Biometrics |
Country | : | India |
Authors | : | Prithika.M, P.Rajalakshmi |
: | 10.9790/0661-01010107 |
Abstract: A phenomenal growth in the number of credit card transactions, especially for on-line purchases, has also led to a substantial rise in fraudulent activities. Credit card fraudulent transactions are very easy to conduct, while very difficult to recover, compared to the fraud cases in hard-products transactions. In real life, fraudulent transactions could be interspersed with genuine transactions and simple pattern matching techniques are not often sufficient to detect the fraudulent transactions efficiently. Moreover, surrogate representations of identity can be easily forgotten, lost, guessed, stolen, or shared. Further it can be hacked through malicious websites or prone to security breaches. Implementation of efficient fraud detection systems has thus become imperative for all credit card companies in order to minimize their losses. In this paper, we propose a IRPV (Iris Recognition and Palm Vein) recognition technology which will help add even more security to existing biometric devices that may be susceptible to fraud. The techniques used are Palm vein technology, along with iris recognition. It is difficult to crack, because each person's vein pattern is unique. Thus, biometric systems impart higher levels of security when appropriately integrated into applications requiring user authentication. The experimental results show that the detection rate would prove 99.995% compared to traditional methods.
Index Terms - Credit Card Fraud, Iris Recognition, Palm Vein technology.
[1] Benson Edwin Raj, S.; Portia, A.A.; , "Analysis on credit card fraud detection methods," Computer, Communication and Electrical Technology (ICCCET), 2011 International Conference on , vol., no., pp.152-156, 18-19 March 2011
[2] Murdoch, Steven J.; Drimer, Saar; Anderson, Ross; Bond, Mike; , "Chip and PIN is Broken," Security and Privacy (SP), 2010 IEEE Symposium on , vol., no., pp.433-446, 16-19 May 2010
[3] Nasir, M.H.N.; Hamid, S.; Hassan, H.; , "Thread-Level Parallelism & Shared-Memory Pool Techniques for Authorization of Credit Card System," Communications and Information Technologies, 2008. ISCIT 2008. International Symposium on , vol., no., pp.447-452, 21-23 Oct. 2008
[4] Xiangqian Wu; Enying Gao; Youbao Tang; Kuanquan Wang; , "A Novel Biometric System Based on Hand Vein," Frontier of Computer Science and Technology (FCST), 2010 Fifth International Conference on , vol., no., pp.522-526, 18-22 Aug. 2010
[5] Shitu Luo; Yanling Wang; Yin Liu; Xiaopin Hu; , "Research on geomagnetic-matching technology based on improved ICP algorithm," Information and Automation, 2008. ICIA 2008. International Conference on , vol., no., pp.815-819, 20-23 June 2008
[6] Nguyen, M.H.; Ho, D.N.; Luu, D.H.; Moldovyan, A.A.; Moldovyan, N.A.; , "On functionality extension of the digital signature standards," Advanced Technologies for Communications (ATC), 2011 International Conference on , vol., no., pp.6-9, 2-4 Aug. 2011
[7] Zuguang Xuan; Zhenjun Du; Rong Chen; , "Comparison Research on Digital Signature Algorithms in Mobile Web Services," Management and Service Science, 2009. MASS '09. International Conference on , vol., no., pp.1-4, 20-22 Sept. 2009 doi: 10.1109/ICMSS.2009.
[8] "Statistics for General and On-Line Card Fraud," http://www.epaynews.com/statistics/fraud.html , Mar. 2007.
[9] S. Ghosh and D.L. Reilly, "Credit Card Fraud Detection with a Neural-Network," Proc. 27th Hawaii Int'l Conf. System Sciences: Information Systems: Decision Support and Knowledge-Based Systems,vol. 3, pp. 621-630, 1994.
[10] M. Syeda, Y.Q. Zhang, and Y. Pan, "Parallel Granular Networks for Fast Credit Card Fraud Detection," Proc. IEEE Int'l Conf. Fuzzy Systems, pp. 572-577, 2002.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Video face recognition is a widely used method in which security is essential that recognizes the human faces from subjected videos. Unlike traditional methods, recent recognition methods consider practical constraints such as pose and illumination variations on the facial images. Our previous work also considers such constraints in which face recognition was performed on videos that were highly subjected pose and illumination variations. The method asserted good performance however; it suffers due to high computational cost. This work overcomes such drawback by proposing a simple face recognition technique in which a cost efficient Active Appearance Model (AAM) and lazy classification are deployed. The deployed AAM avoids nonlinear programming, which is the cornerstone for increased computational cost. Experimental results prove that the proposed method is better than the conventional technique in terms of recognition measures and computational cost.
Keywords — Active Appearance Model (AAM), lazy classification, shape, model, appearance, recognition, computation.
[1] Wu-Jun Li, Chong-Jun Wang, Dian-Xiang Xu and Shi-Fu Chen, "Illumination Invariant Face Recognition Based on Neural Network Ensemble", In Proceedings of 16th IEEE International Conference on Tools with Artificial Intelligence, pp. 486-490, November 2004. [2] Majumdar and Ward, "Pseudo-Fisher face Method for Single Image Per Person Face Recognition", In Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, Las Vegas, NV, pp. 989-992, 2008.
[3] GenciCapi, "A Robotic System for Intelligent Real Time Face Recognition", ICGST International Journal on Automation, Robotics and Autonomous Systems, Vol. 9, No. 1, pp. 25-29, July 2009.
[4] Rehab F. Abdel-Kader, Rabab M. Ramadan and Rawya Y. Rizk, "Rotation Invariant Face Recognition Based on Hybrid LPT/DCT Features", International Journal of Electrical and Computer Engineering, Vol. 3, No. 7, pp. 488-493, 2008.
[5] Shaohua Kevin Zhou and Rama Chellappa, "Image-based face recognition under illumination and pose variations", Journal of the Optical Society of America A, Vol. 22, No. 2, pp. 217-229, 2005.
[6] Brunelli and Poggio, "Face recognition: Features versus templates", IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 15, No. 10, pp.1042-1052, 1993.
[7] LaurenzWiskott, Jean-Marc Fellous, Norbert Kruger, and Christoph von der Malsburg, "Face Recognition by Elastic Bunch Graph Matching", IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol.19, pp. 775-779, 1997.
[8] Edwards, Cootes and Taylor, "Face recognition using active appearance models", In Proceedings of the 5th European Conference on Computer Vision, Vol. 2, Freeburg, Germany,pp. 581-595, 1998.
[9] Zhao, Chellappa, Phillips and Rosenfeld, " Face Recognition: A Literature survey", Journal of ACM Computing Surveys, Vol. 35, No. 4, pp. 1-72, December 2003.
[10] SushmaJaiswal, Sarita Singh Bhadauria, Rakesh Singh Jadon and Tarun Kumar Divakar, "Brief description of image based 3D face recognition methods", 3D Research, Vol. 1, No. 4, pp. 1-15, 2010 .
- Citation
- Abstract
- Reference
- Full PDF
Abstract: DNA sequencing generates a large number of reads of lengths varying from 100bp to 1000bp, when sequenced using different methods of sequencing. These reads are further assembled to form contigs which are useful in annotation. The library generation using different amplification technique is involved in DNA sequencing process, which generates several identical reads, which are redundant, resulting in degraded quality of sequencing, besides also causing longer time for assembly. Existing computationally complex algorithms use string processing. The paper discusses the signal processing approach with application of Wavelet Transforms, designed to find exact and near exact identical reads. The string processing approach for pattern matching in search of similar patterns is computationally very expensive because the order of complexity of String comparisions is exponential in nature. Whereas Wavelet Transforms translates the sequence in co-efficients which are half of the length of the original sequence. On applying Wavelet Transforms repeatedly on the sequence, the sequence get transformed to half the length of the sequence used for transformations. Thus the order of complexity reduces to O(log n), which is much efficient compared to string processing.
Keywords – Haar wavelets, identical reads, pattern recognition, signal processing, wavelets,.
1] Sanger, F.et al. DNA sequencing with chain-terminating inhibitors. Proc. Natl. Acad. Sci. 1977, 74: 5463–5467.
[2] Ronaghi, M. Pyrosequencing Sheds Light on DNA Sequencing Genome Res. 2001, 11: 3-11
[3] Metzker, M. L. et al. Emerging Technologies in DNA Sequencing. Genome Res. 2005, 15: 1767-1776
[4] Dong, H. et al. Artificial duplicate reads in sequencing data of 454 Genome Sequencer FLX System Acta Biochim Biophys Sin 2011, 43: Issue6: 496–500
[6] Gomez-Alvarez V. et al. Systematic artifacts in metagenomes from complex microbial communities. ISME J, 2009, 3 : 1314–1317
[7] Meher,J. K. et al. Wavelet Based Lossless DNA Sequence Compression for Faster Detection of Eukaryotic Protein Coding Regions , I.J. Image, Graphics and Signal Processing 2012, 7, 47-53
[8] Daubechies, I. Ten Lectures On Wavelets, 1992
[9] Aggarwal, C. C. On the Use of Wavelet Decomposition for String Classification, Springer - Data Mining and Knowledge Discovery, 2005, 10, 117–139
[10] Castleman, K.R. Digital Image Processing, (Englewood Cliffs: Prentice-Hall, 1996)
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Power Optimization in MIMO-CN with MANET |
Country | : | India |
Authors | : | Mr. Mohit P Bhadla, Mr. Divyang Shah |
: | 10.9790/0661-01012529 |
Abstract: Cooperative communication has derived an interest for wireless network. Most existing works on cooperative communications are focused on link-level physical layer issues such as topology control, routing and network capacity are largely ignored Although there have been extensive studies on applying cooperative networking in multi-hop ad hoc networks, most works are limited to the basic three-node relay scheme and single-antenna systems. These two limitations are interconnected and both are due to a limited theoretical understanding of the optimal power allocation structure in MIMO cooperative networks (MIMO-CN) In Proposed system we use Cooperative diversity. It is a cooperative multiple antenna technique for improving or maximizing total network channel capacities for any given set of bandwidths which exploits user diversity by decoding the combined signal of the relayed signal and the direct signal in wireless multi hop networks.
Keywords - BB-CPR Algorithm, Co-Operative Networks, MIMO, MANET with Co-Operative Communication, Relaying strategies
[1] J. Laneman, D. Tse, and G. Wornell, "Cooperative Diversity in Wireless Networks: Efficient protocols and Outage Behavior," IEEE Trans. Info. Theory, vol. 50, no. 12,2004, pp. 3062–80.
[2] P. H. J. Chong et al., "Technologies in Multihop Cellular Network," IEEE Commun. Mag., vol. 45, Sept. 2007, pp. 64–65.
[3] K. Woradit et al., "Outage Behavior of Selective Relaying Schemes," IEEE Trans. Wireless Commun., vol. 8, no. 8, 2009, pp. 3890–95.
[4] Y. Wei, F. R. Yu, and M. Song, "Distributed Optimal Relay Selection in Wireless Cooperative Networks with Finite-State Markov Channels," IEEE Trans. Vehic. Tech.,vol. 59, June 2010, pp. 2149–58
[5] Q. Guan et al., "Capacity-Optimized Topology Control for MANETs with Cooperative Communications," IEEE Trans. Wireless Commun., vol. 10, July 2011, pp. 2162–70.
[6] P. Santi, "Topology Control in Wireless Ad Hoc and Sensor Networks," ACM Computing Surveys, vol. 37, no. 2, 2005, pp. 164–94.
[7] T. Cover and A. E. Gamal, "Capacity Theorems for the Relay Channel," IEEE Trans. Info. Theory, vol. 25, Sept. 1979, pp. 572–84. [8] Q. Guan et al., "Impact of Topology Control on Capacity of Wireless Ad Hoc Networks," Proc. IEEE ICCS, Guangzhou, P. R. China,
[9] P. Gupta and P. Kumar, "The Capacity of Wireless Networks," IEEE Trans. Info. Theory, vol. 46, no. 2, 2000, pp. 388–404.
[10] M. Burkhart et al., "Does Topology Control Reduce Interference?," Proc. 5th ACM Int'l. Symp. Mobile Ad Hoc Networking and Computing, Tokyo, Japan, May
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The occurrence of traffic congestion at the intersections in cities is one of major problem. The present traffic light controlling system could not sufficient to tackle the traffic congestion due to the lack of efficiency in the designing. The main design problems of present traffic light controller system are:
Keywords — Embedded Technology, GSM phone interface, Sensor assembly, Smart Traffic Light Control
[1] Shilpa S. Chavan(Walke), Dr. R. S. Deshpande, J. G. Rana (2009) "Design of Intelligent Traffic Light Controller using Embedded System", Second International Conference on emerging trends in Engineering and Technology.
[2] Cai Bai-gen, ShangGuan Wei, Wang Jian & Chen Rui (2009) "The Research and Realization of Vehicle Detection System Based on Wireless Magneto-resistive Sensor", Second International Conference on Intelligent Computation Technology and Automation.
[3] Tavladakis and Voulgaris (1999) "Development of an autonomous adaptive traffic control system", In ESIT '99 - The European Symposium on Intelligent Techniques.
[4] Thorpe (1997) "Vehicle traffic light control using sarsa", Master's thesis, Department of Computer Science, Colorado State University.
[5] Findler and Stapp (1992) "A distributed approach to optimized control of street traffic signals", Journal of Transportation Engineering.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Switched capacitor (SC) based modulator is prone to various non-idealities; especially at the circuit designing stage where the integrator plays an important role and effects the overall performance of the sigma delta modulator. The non idealities take account of sampling jitter which includes the effect of switching circuitry, sampling noise. Opamp parameter include noise, finite dc gain, finite band width, slew rate, saturation voltage. Each non idealities is modeled mathematically and simulation is carried out in the MATALAB SIMULINK® environment with the help of sigma delta toolbox. The simulation analysis of each model is carried out individually. At last overall performance of the modulator with all nonidealities is carried out compared with the ideal modulator and satisfactory results were found out for second order sigma delta modulator for signal bandwidth of 4 KHz.
Keywords: Sigma Delta modulator (ΣΔ), Behavioral Analysis, Switch Capacitor (SC),Genetic Algorithm(GA).
[1] Dragi.a Milovanović , Milan Savić , Miljan Nikolić, "Second-Order Sigma-Delta Modulator in Standard CMOS Technology", SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 1, No. 3, November 2004, 37 – 44
[2] E. Janssen, A. van Roermund, "Look-Ahead Based Sigma-Delta Modulation", Analog Circuits and Signal Processing, DOI 10.1007/978-94-007-1387-1_2, © Springer Science+Business Media B.V. 2011
[3] Shashant Jaykar, Prachi Palsodkar, Pravin Dakhole, "Modeling of Sigma-Delta Modulator Non-Idealities in MATLAB/SIMULINK", 2011 International Conference on Communication Systems and NetworkTechnologies, 978-0-7695-4437-3/11 $26.00 © 2011 IEEE DOI 10.1109/CSNT.2011.112
[4] E. Farshidi, S. M. Sayedi, "A Second-order Low Power Current- Mode Continuous-Time Sigma-Delta Modulator," ASICON'07, Proceeding of the 7th IEEE International Conference on ASIC, Guilin, China, pp.293- 296, Oct. 2007
[5] E. Boser and B. A. Wooley, "The Design of Sigma-Delta Modulation Analog-to-Digital Converters", IEEE J. Solid- State Circ., vol. 23, pp. 1298-1308, Dec. 1988.
[6] S. Brigati, F. Francesconi, P. Malcovati, D. Tonietto, A. Baschirotto and F. Maloberti, "MODELING SIGMA-DELTA MODULATOR NONIDEALITIES IN SIMULINK®," IEEE International Symposium, pp 384 - 387 vol.2, 1999.
[7] Abdelghani Dendouga , Nour-Eddine Bouguechal, Souhil Kouda and Samir Barra, "Modeling of a Second Order Non-Ideal Sigma- Delta Modulator", International Journal of Electrical and Compute Engineering 5:6 2010
[8] G. Temes, "Finite amplifier gain and bandwidth effects in switched capacitor filters," IEEE J. Solid-State Circuits, vol. 15, pp. 358361, June1980.
[9] H. Zare-Hoseini and I. Kale, "On the effects of finite and nonlinear DCgain on the switched-capacitor delta-sigma modulators," in Proc. IEEE Int. Symp. Circuits Systems, May 2005, pp. 2547–2550.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Design of Predicate Filter for Predicated Branch Instructions |
Country | : | India |
Authors | : | Kanmani , Jayaprakash M |
: | 10.9790/0661-01014350 |
Abstract: Implementing innovative hardware feature is one of the techniques to increase processor performance. Branch Prediction is a strategy in computer architecture design, for mitigating the cost, usually associated with conditional branches. In this paper, the feasibility of a novel idea called predicate filter is being presented. The predicate filter acts like a preprocessor on the instruction prefetch queue to eliminate in advance the instructions that need not be executed because of invalid predicate. The simulation of the predicate filter design has been carried out, demonstrating the feasibility of predicate filter.
Keywords: predicate filter, branch prediction and instruction pipelining.
[1] Advanced Computer Architecture: A Design Space Approach, by · Dezso Sima, Terence Fountain, and Peter Kacsuk, 1997.
[2] Lam M. S. and Wilson R. P., Limits of control flow on parallelism, Proceedings of the 19th International Symposium on Computer Architecture, June 1992
[3] DeRosa J. A. and Levy H. M., An Evaluation of Branch Architectures, Proceedings of the 14th International Symposium on Computer Architecture, June 1987
[4] Riesman E. M. and Foster C. C., The Inhibition of Potential Parallelism by Conditional Jumps.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Suppression and Generalization – Based Privacy Preserving Updates to Confidential Databases |
Country | : | India |
Authors | : | I. Kavitha |
: | 10.9790/0661-01015154 |
Abstract: The data owners directly read the contents of the database simply it breaks the privacy of the user's data. If the users access the database content directly then the confidentiality of the data owners has been violated. So both privacy and confidentiality of the database are considered to be a major problem. In the existing system the privacy information gets lost in large amount and does not provide any security mechanism. It is impossible to consider every possible inference and also drastically reduces the quality of the data. The proposed system considers the privacy information is more valuable both in research and business areas. So the data sharing is common in order to provide the data remain k-anonymous even after the updates. The proposed system includes a Commutative Homomorphic Encryption Scheme is used to make the data privacy and confidentiality of the database. This system provides the security of data using RSA algorithm. This system accepts precise inference only and suppresses the sensitive information in order to prevent inference. The proposed system has several important properties which overcomes the drawbacks of the existing system. The properties are anonymous authentication, privacy preservation, confidential access, anonymity maintenance, data management, secure computation, data integrity and also access control.
Keywords - Privacy, confidentiality, anonymity, data management, secure computation..
[1]. J.W. Byun, T. Li, E. Bertino, N. Li, and Y. Sohn, ―Privacy-Preserving Incremental Data Dissemination‖, Computer Security vol. 17, no. 1, pp. 43-68, 2009.
[2]. B.C.M. Fung, K. Wang, A.W.C. Fu, and J. Pei, ―Anonymity for Continuous Data Publishing‖, Proc. Extending Database Technology Conf. (EDBT), 2008.
[3]. Y. Han, J. Pei, B. Jiang, Y. Tao, and Y. Jia, ―Continuous Privacy Preserving Publishing of Data Streams‖, Proc. Extending Database Technology Conf. (EDBT),2008.
[4]. K. Wang and B. Fung, ―Anonymizing Sequential Releases‖, Proc. ACM Knowledge Discovery and Data Mining Conf. (KDD), 2006.
[5]. S. Zhong, Z. Yang, and R.N. Wright, ―Privacy-Enhancing k-Anonymization of Customer Data‖, Proc. ACM Symp. Principles of Database Systems (PODS), 2005.
[6]. G.Aggarwal, T.Feder, K.Kenthapadi, R.Motwani, R.Panigraphy, D.Thomas,A.Zhu, ―Anonymizing Tables‖, Stanford University.
[7]. Paul F.Syverson, David M.Goldschlag, and Michael G.Reed, ―Anonymous Connections and Onion Routing‖, IEEE Symposium on Security and Privacy, 1997.
[8]. Elisa Bertino, Fellow and Ravi Sandhu, ―Database Security – Concepts, Approaches and Challenges‖, IEEE Transactions on Dependable And Secure Computing, VOL. 2, NO. 1, JANUARY-MARCH 2005.
[9]. Rakesh Agrawal, Alexandre Evfimievski, Ramakrishnan Srikant, ― Information Sharing Across Private Databases‖, IBM Almaden Research Center 650 Harry Road, San Jose, CA 95120.
[10]. Weiping Wang, Jianzhong Li, Chunyu Ai and Yingshu Li, ―Privacy Protection on Sliding Window of Data Streams‖, Georgia State University.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Digital images are prone to a variety of noise. The varieties include Speckle noise, Gaussian noise, Salt and pepper noise. It is a difficult task to separate noise from an image while maintaining the desired information and quality of an image. To obtain significant results, various algorithms have been proposed. This paper deals with comparison of two approaches i.e. filtering approach and wavelet based approach accounting Peak Signal to Noise Ratio and Root Mean Square Error as performance parameters. This paper proves that Wavelet Transform method is very effective for all types of noise. Results of this paper have been simulated on MATLAB.
Keywords – Median filter, Average filter, Wiener filter, Gaussian filter, Speckle noise, Gaussian noise, Salt & Pepper noise Wavelet Transform.
[1] R.C. Gonzalez and R.E. Woods "Digital Image Processing."
[2] K.P. Soman and K.I. Ramachandran, "Insight into Wavelets from Theory to Practice".
[3] M. Sifuzzaman, M.R. Islam, M.Z. Ali, "Application of Wavelet Transform and its Advantages Compared to Fourier Transform", Journal of Physical Sciences, Vol.13,2009.
[4] Suresh Kumar, Papendra Kumar, Manoj Gupta, Ashok Kumar Nagawat, "Performance Comparison of Median and Wiener Filter in Image De-noising", International Journal of Computer Application, Vol.12 – No.4, November 2010.
[5] Sarita Dangeti, "De-noising Techniques: a Comparison", M.S. Thesis, Louisiana State University, 2003.
[6] S. Grace Chang, Bin Yu, Martin Vetterli, "Adaptive Wavelet Thresholding for De-noising and Compression", IEEE Transactions on Image Processing, Vol.9, No.9, September 2000.
[7] Javier Portilla, Vasily Strela, Martin J. Wainwright, Eero P. Simoncelly, " Image De-noising using Scale Mixtures of Gaussians in Wavelet Domain ", IEEE Transactions on Image Processing, Vol.12, No.11, November 2003.
[8] S. Sudha, G. R. Suresh, R. Sukanesh, " Wavelet based Image De-noising using Adaptive Thresholding ", International Conference on Computational Intelligence and Multimedia Applications, 2007.
[9] J. N. Ellinas, T. Mandadelis, A. Tzortzis, L. Aslanoglou," Image De-noising using Wavelets ", T. E. I. of Piraeus, Department of Electronic Computer Systems.
[10] Shi Zhong, Vladimir Cherkassky, " Image De-noising using Wavelet Thresholding and Model Selection ", IEEE, Proceedings 2000.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The objective of this project is to create a web browser which will provide information in the form of audio. It is a desktop application .This web browser connects with different sites and converts text into speech. In market numbers of convertors are available which converts different file formats such as word, doc, txt, .dat into speech. This is an innovative idea to create a web browser that converts text from different file formats (word, doc, txt, .dat, PDF, rtf, html etc) to speech. This will reduce the reading effort. Different file formats can be opened in the browser which will read the text available in it. In this browser, History will be available in the form of images which will help the user to recall previously performed activities .It will also shows date and time along with the images. This will help the user to keep update with previous work done by him.
Keywords –speech , text, record, browser, audio, image history.
[1] Hussein Mohsen, Karim Jahed, Marwan Fawaz " Multi-Purpose Speech Recognition and Speech Synthesis System" IEEE Multidisciplinary Engineering Education Magazine, Vol. 6, No. 4, December 2011
[2] O'Malley M.H. Berkeley Speech Technol., CA, USA "Text-To-Speech Conversion Technology" Vol. 3, Issue 8, August 1990
[3] El-Imam,Y.A. IBM Kuwait Sci. Center, Safat, Kuwait Banat, K. "Text-To-Speech Conversion On A Personal Computer" Micro, IEEE, Vol. 10,Issue 4, August 1990
[4] L. R. Rabiner, (1989). "A tutorial on hidden Markov models and selected applications in speech recognition," Proc. of the IEEE, vol. 77, no. 2, pp. 257–286.
[5] L.M. Friesen, R.V. Shannon, D. Başkent, and X. Wang, (2001). ''Speech recognition in noise as a function of the number of spectral channels: Comparison of acoustic hearing and cochlear implants,'' Journal of the Acoustical Society of America, vol. 110, pp. 1150-1163.
[6] T. Scarlatos and F. Gallarotti, "iSign: Making the Benefits of Reading Aloud Accessible to Families with Deaf Children ," in Proc. of the Sixth IASTED International Conference on Computer Graphics and Imaging, Hawaii, USA, 2003.
[7] (2005). EduSpeak [Online]. Available: http://www.eduspeak.com/products/eduspeak.shtml.
[8] P. Duhamel and M. Vetterli (1990). "Fast Fourier transforms: a tutorial review and a state of the art," Signal Processing 19, pp. 259–299.
[9] G. Strang, (1999). "The discrete cosine transform," SIAM Review, vol. 41, no.1, pp. 135–147.
[10] W.H. Press, S.A. Teukolsky, W.T. Vetterling, and B.P. Flannery, Numerical Recipes: The Art of Scientific Computing (3rd ed.). New York: Cambridge University Press, 2007, ch.16.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Survey: Problems Related to Human in Software Projects |
Country | : | Egypt |
Authors | : | Mohammed A. Othman, Sherif A. Mazen, 3Ehab Ezzat |
: | 10.9790/0661-01016770 |
Abstract: The human factor is the most significant success factor of any project, in this paper we will explain some important problems related to managing human factor in software projects; and we will survey on all important problems that face projects managers and affect project outcomes. This survey will help to concentrate on the most important problems and Proceed to introduce guides and solutions to overcome these problems. this paper is the starting point toward develop a new framework for managing technical people in software projects, this research will cover the most significant problems which arise during projects management specifically in software projects in technical team; these problems almost lead to projects failure, or delivered out of budget and/or planned time, some of these problems related to team selection, team evaluation, time management ,workload distribution, poor planning, and tasks allocations and distribution, in this survey we will explain and introduce the most important studies, researches, publications, and ideas related to team management in software development.
Keywords: Software Project Management, Technical Team Management (TTM), Software Projects (SWP).
[1] Bradley L. Kirkman, Kevin B. Lowe, and Dianne P. Young "High-Performance Work Organzations", Center for Creative Leadershi ©1999 [2] B.N. Singh, Bhim Singh, Ambrish Chandra, and Kamal Al-Haddad, "Digital Implementation of an Advanced Static VAR Compensator for Voltage Profile Improvement, Power Factor Correction and Balancing of Unbalanced Reactive Loads", Electric Power Energy Research, Vol. 54, No. 2, 2000, pp. 101-111. [3] Ian Somerville, "Software Engineering 7th Edition , Ch.25. [4] Daniel J. Paulish, Anita D. Carleton, "Case Studies of Software-process-improvement Measurement" IEEE,Volume 27 Issue 9, September 1994 Page 50-57 . [5] Nianfang Ji, Jie Wang" A Software Project Management Simulation Model Based on Team Climate Factors Measurement", IEEE 0018- 9162/94 1994.
[6] New Zealand Management, "When IT Projects Fail", Volume 50, Issue 2, page 18. Available from Business Source Premier Database at http://www.ebscohost.com [Accessed Dec 25, 2011] [7] Glaser, J "Management's role in IT project failures" Healthcare Financial Management, October, 2004. [8] Fichter, Darlene "Why Web Projects Fail "[Online Journal] Online, Volume 27, Issue 4, page 43. Available from computer source database at http://www.ebscohost.com [Accessed July 25, 2011], 2003.
[9] Gross, Grant "FBI trying to salvage $170 million software package [Online] IDG News Service. Available from: http://www.computerworld.com/printthis/2005/0 ,4814,98980,00.html [Accessed July 31, 2011] [10] Jenster, P and Hussey,"Create a common culture between IT and business people to reduce project failures "Computer Weekly, March 22, 2005.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Review of Paper Currency Recognition System |
Country | : | India |
Authors | : | Amol A. Shirsath, S. D. Bharkad |
: | 10.9790/0661-01017176 |
Abstract: This paper presents the review of paper currency recognition system. It is applied in various field such as foreign exchange, automatic selling of things and in banks. The recognition system mainly consists of three parts. The image of interest is first pre-processed by reducing dimensionality and extracting the feature by applying image processing toolbox of MATLAB, known as feature extraction. The second part is currency recognition, where classifier such as neural network is used. And lastly the result is displayed. Recognition ability depends on the currency note characteristics of particular country and extraction of features.
Keywords - Classifier , Currency recognition, Feature extraction, Foreign exchange, Preprocessing.
[1] Parminder Singh Reel, Gopal Krishan, Smarti Kotwal, Image Processing based Heuristic Analysis for Enhanced Currency Recognition, International Journal of Advancements in Technology, Vol 2, No 1, January 2011.
[2] Faiz M. Hasanuzzaman, Xiaodong Yang and Yingli Tian, Robust & Effective Component based Banknote Recognition by SURF Features, NSF grant IIS-0957016.
[3] H. Hassanpour, A. Yaseri, G. Ardeshiri, Feature Extraction for Paper Currency Recognition, IEEE Transactions, 1-4244-0779-6/07, 2007.
[4] T Ojala,M Pietikainen, and D Harwood, A comparitive study of texture measures with classification based on feature distributions, Pattern recognition, Vol.29, No. 1, 1996, pp.51-59.
[5] Junfang Guo, Yanyun Zhao, Anni Cai, A Reliable Method for Paper Currency Recognition Based on LBP, IEEE Transactions, Proceedings of IC-NIDC2010, 978-1-4244-6853-9/10.
[6] M. Iosifescu, Finite Markov Processees and Their Applications, Wiley, New York, NY, 1980.
[7] G. Trupti Pathrabe, Mrs. Swapnili Karmore, A Novel Approach of Embedded System for Indian Paper Currency Recognition, International Journal of Computer Trends and Technology- May to June Isue 2011, ISSN: 2231-2803.
[8] Rafael C. Gonzalez, Richard E. Woods, Steven L. Eddins, Digital Image Processing Using MATLAB,2012.
[9] Fumiaki Takeda, Toshihiro Nishikage, and Yoshiyuki Matsumoto, Characteristics Extraction of Paper Currency using Symmetrical Masks Optimized by GA and Neuro-Recognition of Multi-National Paper Currency, IEEE Transactions, 0-7803-4859-1/98, 1998.
[10] Nadim Jahangir, Ahsan Raja Chowdhury, Bangladeshi Banknote Recognition By Neural Network with Axis Symmetrical Masks, IEEE Transactions, 1-4244-1551-9/07.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Comparative Analysis of Collaborative Filtering Technique |
Country | : | India |
Authors | : | Urmila Shinde, Rajashree Shedge |
: | 10.9790/0661-01017782 |
Abstract: Today it is almost impossible to retrieve information with a keyword search when the information is spread over several pages. The Semantic Web is an extension of the current web in which information is given well-defined meaning. Web personalization is the one application of semantic web usage mining. In this report we have explored comparison of various collaborative filtering techniques. Those techniques are memory based, model based and hybrid collaborative filtering. Our study shows that the performance of hybrid collaborative filtering technique is better than memory based and model based collaborative filtering technique. We have introduced normalization step, which will improve accuracy of traditional collaborative filtering techniques.
Keywords: Collaborative Filtering, Hybrid Collaborative Filtering, Semantic web mining, Web mining, Web personalization,
[1] Anil Sharma, Suresh Kumar, Manjeet Singh M.Tech (IS) Scholar, CSE, A.I.T. - G, New Delhi, India "Semantic Web Mining For Intelligent Web Personalization" in proceeding of Journal of Global Research in Computer Science Volume 2, No. 6, June 2011.
[2] Suresh Joseph" A Imputed Neighborhood based Collaborative Filtering System for Web Personalization" in proceeding of International Journal of Computer Applications (0975 – 8887)Volume 19– No.8, April 2011
[3] Boddu Raja Sarath Kumar1, Barre John Ratnam2 & Maddali Surendra Prasad Babu3 "Improvement Of Personalized Recommendation Algorithm Based On Hybrid Collaborative Filtering" International Journal of Computer Science & CommunicationVol. 1, No. 2, July-December 2010.
[4] Zeeshan Khawar Malik, Colin Fyfe "Review Of Web Personalization" in proceeding of Journal Of Emerging Technologies in Web Intelligence, Vol. 4, No. 3, August 2012.
[5] Boddu Raja Sarath Kumar "An Implementation of Content Boosted Collaborative Filtering Algorithm" in proceeding of International Journal of Engineering Science and Technology Vol. 3 No. 4 Apr 2011
[6] P. Resnick, N. Iacovou, M. Suchak, P. Bergstrom, and J. Riedl, "Grouplens: an open architecture for collaborative filtering of netnews," in proceedings of the ACM Conference on Computer Supported Cooperative Work, pp. 175–186, New York, NY, USA, 1994.
[7] T. Hofmann, "Latent Semantic Models For Collaborative Filtering," ACM Transactions on Information Systems, vol. 22, no. 1, pp. 89–115, 2004.
[8] L. H. Ungar and D. P. Foster "Clustering Methods For Collaborative Filtering," in Proceedings of the Workshop on Recommendation Systems, AAAI Press, 1998.
[9] G. Shani, D. Heckerman, and R. I. Brafman, "An MDP-Based Recommender System," n proceeding journal of Machine Learning Research, vol. 6, pp. 1265–1295, 2005.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Mining Approach for Updating Sequential Patterns |
Country | : | India |
Authors | : | Bhagyshri Lachhwani, Mehul P Barot |
: | 10.9790/0661-01018388 |
Abstract: We are given a large database of customer transactions, where each transaction consists of customer-id, transaction time, and the items bought in the transaction. The discovery of frequent sequences in temporal databases is an important data mining problem. Most current work assumes that the database is static, and a database update requires rediscovering all the patterns by scanning the entire old and new database. We consider the problem of the incremental mining of sequential patterns when new transactions or new customers are added to an original database. In this paper, we propose novel techniques for maintaining sequences in the presence of a) database updates, and b) user interaction (e.g. modifying mining parameters). This is a very challenging task, since such updates can invalidate existing sequences or introduce new ones.
[1] M. J. Zaki. Efficient enumeration of frequent sequences. In 7th CIKM, 1998
[2] Florent Masseglia; Pascal Poncelet; Maguelonne Teisseire;, ―Incremental mining of sequential patterns in large databases,‖ Data & Knowledge Engineering, pp. 97-121, 2003
[3] S. Parthasarathy; M. Zaki; M. Ogihara; S. Dwarkadas; , ―Incremental and interactive sequence mining,‖ In Proceedings of the 8th International Conference on Information and Knowledge Management (CIKM' 99), pp. 251–258, 1999
[4] J. Ayres; J. Gehrke; T. Yiu; J. Flannick; , ―Sequential pattern mining using a bitmap representation,‖ In Proceedings of ACM SIGKDD International Confer ence on Knowledge Discovery and Data Mining, pp. 429–435, 2002