Volume-8 ~ Issue-1
- Citation
- Abstract
- Reference
- Full PDF
Keywords: RFID, Smart Tags, RFID Reader, Transponder, Antenna, Middleware, Traceability.
[1] A Soppera & T Burbridge, "Wireless Identification — Privacy and Security", BT Technology Journal, Vol.23, No.4, pp.54 -64,
(2005).
[2] Bitkom, "RFID: Technology, Systems and Applications", RFID Journal, Whitepaper, http://www.rfidjournal.com, (2005).
[3] Cardullo MW & William LP, "Transponder Apparatus and System", US 3713148, (Published May 21, 1970, Issued Jan 23, 1973).
[4] ISECOM, "Hacking Exposed Linux: Linux Security Secrets & Solutions", (3/ed.), p.298, McGraw-Hill Osborne Media, (2008).
[5] Juels A., Molnar D., Wagner D., "Security and Privacy Issues in E-passports", SecureComm 2005, 1st Intl. Conf. on Security &
Privacy for Emerging Areas in Communications Networks, pp.74-88, (2005).
[6] Lahiri S., "RFID System", RFID Sourcebook, p.9, (2006).
[7] O'Connor, Mary Catherine, RFID Journal LLC, http://www.rfidjournal.com, (Published: March 18, 2009).
[8] Radiant Waves: Total RFID Solutions, Web: http://www.radiantwave.com/rfid_how.htm, (Accessed on: 30-09-2012).
[9] Sen D, Sen P & Das AM, "RFID for Energy and Utility Industries", PennWell, pp.1-48, (2009).
[10] Southall M, Javick P, Lichtenberg J, & Cusack BA, "Radio Frequency Identification: Transforming the Dynamics of Supply and
Demand in Publishing", Publishing Research Quarterly, Vol.26, No.1, pp.1-10, (2010).
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Artificial Neural Network, Back-propagation Neural Network, Bangla Sign Language, Gestures Recognition, Sign language Recognition.
[1] Stephan Liwicki, Mark Everingham, "Automatic Recognition of Finger spelled Words in British Sign Language," in Proc. IEEE
Computer Society Conference on Computer Vision and Pattern Recognition Workshops, pp. 50-57, Miami, FL, USA, June, 2009.
[2] T. Takahashi, F. Kishino, "Gesture coding based in experiments with a hand gesture interface device," ACM SIGCHI Bulletin, Vo l.
23, pp. 67-73, 1991.
[3] K. Murakami, H. Taguchi, "Gesture recognition using recurrent neural networks," in Proceedings of the Conference on Human
Factors and Computing Systems, pp. 237-242,1991.
[4] J. Kramer, L. J. Leifer, "A "talking glove‟ for nonverbal deaf individuals," Technical Report No. CDR 19900312, Center for De sign
Research, Stanford University, U.S.A., 1990.
[5] J. Kramer, "The TalkingGlove (RTM): hand-gesture-to-speech using an instrumented glove and a tree-structured neural classifying
vector quantizer," Ph.D. Thesis, Department of Mechanical Engineering, Stanford University, U.S.A., 1996.
[6] S. Begum, M. Hasanuzzaman, "Computer Vision-based Bangladeshi Sign Language Recognition System" The 12th International
Conference of Computers and Information Technology (ICCIT) '09, Bangladesh.
[7] H. Zabiri, N. Mazuki, "A Black-Box Approach in Modeling Valve Stiction," International Journal of Mathematical, Physical and
Engineering Sciences 4:1 2010, 2010.
[8] Principe, J., "Neural Networks and Adaptive Systems", John Wiley and Sons, NY, 1999.
[9] A. Sozen, E. Arcaklioglu, "Solar potential in Turkey," Applied Ener gy, 80(1), pp. 35–45, 2004.
[10] V. O. Oladokun, A. T.Adebanjo, O. E. Charles-Owaba, "Predicting Students‟ Academic Performance using Artificial Neural
Network: A Case Study of an Engineering Course," The Pacific Journal of Science and Technology, vol. 9, no. 1, 2008.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Cloud Computing: Overview & CurrentResearch Challenges |
Country | : | India |
Authors | : | Mohsin Nazir |
: | 10.9790/0661/0811422 | |
Keywords: Cloud Architecture, Cloud Computing, Software as a Service (SaaS), Platform as a Service (PaaS),Infrastructure as a Service (IaaS), Mobile Cloud Computing (MCC).
[1] A Platform Computing Whitepaper. ―Enterprise Cloud Computing: Transforming IT.‖ Platform Computing, pp6, 2010.
[2] B.P. Rimal, Choi Eunmi, I. Lumb, ―A Taxonomy and Survey of Cloud Computing Systems‖, Intl. Joint Conference on INC, IMS
and IDC, 2009, pp. 44-51,Seoul, Aug, 2009. DOI: 10.1109/NCM.2009.218
[3] B. R. Kandukuri, R. Paturi V, A. Rakshit, ―Cloud Security Issues‖, In Proceedings of IEEE International Conference on Services
Computing, pp. 517-520, 2009.
[4] Cloud Computing. Wikipdia. Available at http://en.wikipedia.org/wiki/Cloud_computing
[5] Cong Wang, Qian Wang, KuiRen, and Wenjing Lou, ―Ensuring Data Storage Security in Cloud Computing,‖ 17th International
workshop on Quality of Service, USA, pp.1-9, July 13-15, 2009, ISBN: 978-1-4244-3875-4
[6] C. Weinhardt, A. Anandasivam, B. Blau, and J. Stosser.―Business Models in the Service World.‖IT Professional, vol. 11, pp. 28-33,
2009.
[7] Daniel Oliveira and Eduardo Ogasawara. Article: Is Cloud Computing the Solution for Brazilian Researchers?. International Journal
of Computer Applications 6(8):19–23, September 2010.
[8] D. Oliveira, F. Baião, and M. Mattoso, 2010, "Towards Taxonomy for Cloud Computing from an e-Science Perspective", Cloud
Computing: Principles, Systems and Applications (to be published), Heidelberg: Springer-Verlag.
[9] Dr. Gurdev Singh, ShanuSood, Amit Sharma, ―CM- Measurement Facets for Cloud Performance‖, IJCA, , Lecturer, Computer
science & Engineering, Eternal University, Baru Sahib (India), Volume 23 No.3, June 2011.
[10] Ertaul, L. and Singhal, S. 2009. Security Challenges in Cloud Computing. California State University, East Bay. Academic paper
http://www.mcs.csueastbay.edu/~lertaul/Cloud%20Security%20CamREADY.pdf
- Citation
- Abstract
- Reference
- Full PDF
|
Keywords: Distributed system, Election, Coordinator, Priority.
[1] Sinha P.K, Distributed Operating Systems Concepts and Design, Prentice-Hall of India private Limited, 2008.
[2] Tanenbaum A.S Distributed Operating System, Pearson Education, 2007.
[3] Heta Jasmin Javeri, Sanjay Shah ―"A Comparative Analysis of Election Algorithm in Distributed System‖ IP multimedia communication", a special issue from IJCA
[4] Sachi Choudhary, Dipesh Sharma―"A Comparative Analysis in Terms of Message Passing & Complexity of Different Coordinator Selection Algorithms in Distributed System", a special issue from IJARCET, Volume 1, Issue 7, September 2012
[5] Deepali P. Gawali―"Leader Election Problem in Distributed Algorithm", a special issue from IJCST Vol. 3, Issue 1, Jan. - March 2012
[6] Muhammad Mahbubur Rahman, Afroza Nahar―"Modified Bully Algorithm using Election Commission"
[7] H.Garcia Molina "Election in a distributed Computing System". IEEE Trans. Comp, 1982, vol31, no. 1, pp. 48 -59. 1982
- Citation
- Abstract
- Reference
- Full PDF
Index Terms: Vector image model, Edge mapping model, Edge detection technique, Boundary detection
[1] Krit Somkantha, Nipon Theera-Umpon, and Sansanee "Boundary Detection in Medical Images Using Edge Following Algorithm Based on Intensity Gradient and Texture Gradient Features", IEEE Transaction On Biomedical Engineering . Vol. 58, No. 3, March 2011.
[2] M. Kass, A. Witkin and D. Terzopoulos "Snakes: Active contour models", Int. J. Comput. Vis., vol. 1, pp.321 - 331, 1987.
[3] T. Chan and L. Vese "Active contours without edges", IEEE Trans. Imag. Process, vol. 10, no. 2, pp.266 - 277, 2001.
[4] V. Caselles , R. Kimmel and G. Sapiro "Geodesic active contours", Int. J. Comput. Vis., vol. 22, no. 1, pp.61 - 79, 1997.
[5] C. Xu and J. L. Prince "Snakes, shapes, and gradient vector flow", IEEE Trans. Imag. Process, vol. 7, no. 3, pp.359 - 369, 1998.
[6] B. Li and T. Acton "Active contour external force using vector field convolution for image segmentation", IEEE Trans. Imag. Process, vol. 16, no. 8, pp.2096 - 2106, 2007.
[7] N. Eua-Anant and L. Udpa "A novel boundary extraction algorithm based on a vector image model", Proc. IEEE Sym. Circ. and Syst., pp.597 - 600, 1996.
[8] J.-D. Lee, H.-R. Su, P. E. Cheng, M. Liou, J. Aston, A. C. Tsai and C.Y. Chen "MR image segmentation using a power transformation approach", IEEE Trans. Med. Imag., vol. 28, no. 6, pp.894 - 905, 2009.
[9] J. Carballido-Gamio, S. J. Belongie and S. Majumdar "Normalized cuts in 3-D for spinal MRI segmentation", IEEE Trans. Med. Imag., vol. 23, no. 1, pp.36 - 44, 2004. .
[10] J. F. Canny "A computational approach to edge detection", IEEE Trans. Pattern Anal. Mach. Intell., vol. PAMI-8, no. 6, pp.679 - 698, 1986.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: MANET‟s; Denial of Services; DSR; AODV; TORA
[1] David B. Johnson and David A. Maltz. Dynamic source routing in ad hoc wireless networks. Technical report, Carnegie Mellon
University, 1996.
[2] Mehran Abolhasan, Tadeusz Wysocki, and rykDutkiewicz. A review of routingprotocols for mobile ad hoc networks. Technical
report, Telecommunication and Information Research Institute, University of Wollongong, Wollongong, NSW 2522; Motorola
Australia Research Centre, 12 Lord St., Botany, NSW 2525, Australia,2003.
[3] Xiaoyan Hong, Kaixin Xu, and Mario Gerla. Scalable routing protocols for mobile ad hoc networks. 2002.
[4] Charles E. Perkins, Elizabeth M. Belding-Royer, Samir R. Das. Ad hoc On-Demand Distance Vector (AODV) Routing. Technical
report, Nokia Research Center; University of California, Santa Barbara; University of Cincinnati, November 2001. draft -ieftaodv-
09.txt - work in progress.
[5] David B. Johnson, Yih-Chun Hu, David A. Maltz, Jorjeta G. Jetcheva. The Dynamic Source Routing Protocol for Mobile Ad Hoc
Networks (DSR).
[6] Shuyao Yu, Youkun Zhang, Chuck Song, and Kai Chen. A security architecture for Mobile Ad Hoc Networks.
[7] S R Chaudhary, A Al Khwildi, Y Casey, H Aldelou, H S Al Raweshidy. A Performance Comparison of Multi On-Demand Routing
in Wireless AdHocNetworks.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Embedded Extended Visual Cryptography Scheme |
Country | : | India |
Authors | : | Jerripothula Sandeep, Abdul Majeed |
: | 10.9790/0661/0814147 | |
Index Terms: VCS, random shares, covering shares, secret sharing.
[1] A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612–613, 1979.
[2] G. R. Blakley, "Safeguarding cryptographic keys," in Proc. National Computer Conf., 1979, vol. 48, pp. 313 –317.
[3] M. Naor and A. Shamir, "Visual cryptography," in Proc. EUROCRYPT' 94, Berlin, Germany, 1995, vol. 950, pp. 1 –12, Springer-
Verlag, LNCS.
[4] M. Naor and B. Pinkas, "Visual authentication and identification," in Proc. CRYPTO'97, 1997, vol. 1294, pp. 322 –336, Springer-
Verlag LNCS.
[5] T. H. Chen and D. S. Tsai, "Owner-customer right protection mechanism using a watermarking scheme and a watermarking
protocol," Pattern Recognit., vol. 39, pp. 1530–1541, 2006.
[6] P. Tuyls, T. Kevenaar, G. J. Schrijen, T. Staring, and M. Van Dijk, "Security displays enabling secure communications," in Proc.
First Int. Conf. Pervasive Computing, Boppard Germany, Springer-Verlag Berlin LNCS, 2004, vol. 2802, pp. 271–284.
[7] C. Blundo, A. De Bonis, and A. De Santis, "Improved schemes for visual cryptography," Designs, Codes and Cryptography, vol.
24, pp. 255–278, 2001.
[8] G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, "Visual cryptography for general access structures," Inf. Computat., vol.
129, pp. 86–106, 1996.
[9] N. K. Prakash and S. Govindaraju, "Visual secret sharing schemes for color images using halftoning," in Proc. Int. Conf.
Computational Intelligence and Multimedia Applications (ICCIMA 2007), 2007, vol. 3, pp. 174–178.
[10] H. Luo, F.X.Yu, J. S. Pan, and Z. M. Lu, "Robust and progressive color image visual secret sharing cooperated with data hidin g," in
Proc. 2008 Eighth Int. Conf. Intelligent Systems Design and Applications, 2008, vol. 3, pp. 431–436.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Two Stage Algorithm for Denoising of Speech Signal |
Country | : | India |
Authors | : | Shajeesh. K. U., Sachin Kumar. S., K. P. Soman. |
: | 10.9790/0661/0814853 | |
Keywords: Speech Enhancement, Spectral Subtraction, Savitzky Golay Filter, Quality Evaluation Metric, Speech Denoising.
[1] P. Krishnamoorthy and S. R. M. Prasanna, "Enhancement of noisy speech by temporal and sp ectral processing", Speech
Communication, Volume 53, Issue 2, February 2011.
[2] S. V. Vasighi and P. J. W. Rayner, "Detection and suppression of impulsive noise in speech communication systems,IEE Proc. of
Communications, Speech and Vision, vol. 137, Pt. 1, no. 12, pp. 38-46, February 1990.
[3] J. R. Deller, J. H. Hansen, and J. G. Proakis, "Discrete Time Processing of Speech Signals", 1st edition, Upper Saddle River , NJ,
USA: Prentice Hall PTR, 1993.
[4] M. Berouti, R. Schwartz, and J. Makhoul, "Enhancement of speech corrupted by acoustic noise," Proc. IEEE Int. Conf. Acoustics,
Speech,Signal Processing, pp. 208–211, March 1979.
[5] Rainer Martin, "Noise Power Spectral Density Estimation Based on Optimal Smoothing and Minimum Statistics," IEEE Transactions
on Speech and Audio Processing, vol. 9, no. 5, July 2001.
[6] Mukul Bhatnagar, A Modified Spectral Subtraction Method Combined with Perceptual Weighting for Speech Enhancement, MS
Thesis, The University of Texas at Dallas, August 2002.
[7] A. Savitzky and M. J. E. Golay, "Soothing and differentiation of data by simplified least squares procedures," Anal. chem., vo l. 36,
pp. 1627–1639, 1964.
[8] J. Riordon, E. Zubritsky, and A. Newman, "Top 10 articles," Anal. Chem., vol. 72, no. 9, pp. 24A– 329A, May 2000.
[9] Ronald W. Schafer, "What Is a Savitzky-Golay Filter?", IEEE Signal Processing Magazine, July 2011.
[10] Shajeesh K. U., Sachin Kumar S., Pravena D. and K. P. Soman, "Speech Enhancement based on Savitzky–Golay Smoothing Filter,"
International Journal of Computer Applications, Volume 57, No.21, November 2012.