Interaction helps us to understand what is going on in the interaction between user and system. They address the translations between what the user wants and what the system does. The interaction takes place within a social and organizational context that affects both user and system. We are working on topic in which we can explain the though process of a person what exactly a person is thinking at a particular time, this research topic is very new in its area, if results come favorable than it will be a new revolution. Attention to human-machine interaction is important because poorly designed human-machine interfaces can lead to many unexpected problems. Accidents in aviation have resulted from manufacturers' decisions to use non-standard flight instrument and/or throttle quadrant layouts: even though the new designs were proposed to be superior in regards to basic human–machine interaction, pilots had already ingrained the "standard" layout and thus the conceptually good idea actually had undesirable result, about half of work has been completed and within next two year, this will be a great revolution in field of Computer Science.
- Page(s): 01-02
- Date of Publication: October 2013
- Katty PidrizScholar, Monash University, VIC, Australia
References
1. Ergoweb. "What is Cognitive Ergonomics?". Ergoweb.com. Retrieved August 29, 2011. 2. NRC: Backgrounder on the Three Mile Island Accident". Nrc.gov. Retrieved August 29, 2011. 3. www.threemileisland.org/downloads 4. Green, Paul (2008). Iterative Design. Lecture presented in Industrial and Operations Engineering 436 (Human Factors in Computer Systems, University of Michigan, Ann Arbor, MI, February 4, 2008. 5. Kaptelinin, Victor (2012): Activity Theory. In: Soegaard, Mads and Dam, Rikke Friis (eds.). "Encyclopedia of Human-Computer Interaction". The Interaction-Design.org Foundation. Available online at https://www.interaction-design.org/encyclopedia/activity_theory.html
Katty Pidriz "Human–Computer Interaction" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 10, pp.03-11 2013
Executing software configuration management (SCM) in an organization lifts a variety of integration troubles. Every software configuration management system understands an exact Software configuration management model. For an organization, adopting a precise software configuration management model through the acquirer of a software configuration management system means to acclimatize the software process such that the model fits in. Additionally, adopting a software configuration management model is enduring commitment as the current software configuration management model does not integrate well with each other. Other integration harms happen in the software development environment, where obtainable tools must be unlimited to access software configuration management items.
- Page(s): 03-11
- Date of Publication: October 2013
- Agha Salman Haider(Lecturer Jazan University, Kingdom of Saudi Arabia)
- Syed Nusrat(Research Scholar), Shri JJT University, Jhunjhunu, Rajasthan, India
References
1. Sommerville (1996), Software configuration management, Springer, p 8. 2. Appleton and Berczuk (2003), Software configuration management patterns, Addison-Wesley Professional, 2003, p 8. 3. Hoek and Westfehtel (2003), Software configuration management, Springer, 2003, p 24. 4. Regan (2011), Introduction to Software Process Improvement, Springer, p 119. 5. Ramesh (2005), Managing Global Software Projects, Tata McGraw-Hill Education, p 87. 6. Chang, Handbook of software engineering & knowledge engineering, World Scientific, p 523. 7. Solvberg, Steinholtz and Bergman (1990), advanced information systems engineering, Springer, p 80. 8. Lori B. Alperin and Beverly I. Kedzierski. AI-based software maintenance.In IEEE AI Applications Conference, February 1987 9. Roberto Bisiani, F. Alleva, F. Correrini, A. Florin, F. Lecouat, and R.Lerner. The Agora Programming Environment. Technical Report CMUCS-87-113, Carnegie-Mellon University, Department of Computer Science,March 1987
Agha Salman Haider, Syed Nusrat "An Overview of Software Configuration Management" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 10, pp.03-11 2013
Ad-hoc networks are characterized by a lack of infrastructure, and by a random and quickly changing network topology; thus the need for a robust dynamic routing protocol that can accommodate such an environment. Consequently, many routing algorithms have come in to existence to satisfy the needs of communications in such networks. This project work presents a performance comparison between two categories of routing protocols, table-driven (Proactive) and on-demand (Reactive) routing protocols, this two categories were illustrated by using two different examples of routing protocols, first example is DSDV (Destination Sequenced Distance-Vector) from the Proactive family and the second example is AODV (Ad Hoc On-Demand Distance Vector) from the Reactive family. Both protocols were simulated by using NS-2 (network simulator-2) package. Both routing protocols were compared in terms of average throughput (packets delivery ratio) and packet loss ratio, while varying number of nodes and by using the Trace file. Although DSDV perfectly scales to small networks with low node speeds, AODV is preferred due to its more efficient use of bandwidth.
- Page(s): 12-21
- Date of Publication: October 2013
- Puja SharmaComputer Science Department Shobhit University/M.Tech student Meerut, India
- Vijay MaheshwariComputer Science Department Shobhit University Meerut, India
References
[1] S. Murthy and J. J. Garcia-Luna-Aceves, “An Efficient Routing Protocol for Wireless Networks" ACM Mobile Networks and APP.J, Special Issue on Routing in Mobile Communication Networks, 1996. [2] C. E. Perkins, E. M. Belding-Royer, and S. Das, “Ad hoc on-demand distance vector (AODV) routing,” RFC 3561, July 2003, Category: Experimental, work in progress. [3] C.E. Perkins and P. Bhagwat, “Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers,” Comp. Commun. Rev., Oct. 1994. [4] V. D. Park and M. S. Carson, “A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks,” Proc. INFOCOM ’97, Apr. 1997. [5] C. Siva Ram Murthy and B. S. Manoj, “Ad Hoc Wireless Networks, Architectures and Protocols,” first Indian reprint 2005. [6] L. R. Ford Jr. and D. R. Fulkerson, Flows in Networks, Princeton Univ. Press, 1962 [7] MehranAbolhasan, TadeuszWysocki, ErykDutkiewicz "A review of Routing Protocols for Mobile Ad Hoc Networks". [8] ImrichChlamtac, Marco Conti, and Jennifer J. N. Liu "Mobile Ad Hoc Networking: Imperatives and challenges". [9] Y.-H. Wang, C.M. Chung, and C.-C.Chuang "Ad Hoc Routing Protocol Setup with On-Demand Backup Node". [10] D. D. Perkins, H. D. Hughes, and C. B. Owen "Factors Affecting the Performance of Ad Hoc Networks".
Puja Sharma , Vijay Maheshwari "Study and Implementation of Ad-Hoc Routing Protocols " International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 10, pp. 12-21 2013
Today Biology is playing an significant role in the todays scientific advancement on human body solutions. For example Finger print reader and eye scanners. It provides basis for more scientific solutions for recognition of human identity. In today’s era biotechnology identifies a lot more detailed research in the field of biological hand shake with Technology. In this paper we describe how biological Identification leads to secure voting system in India or anywhere else in the world. Keywords: Biometric Identification, voting system Private Cloud, UID
- Page(s): 22-29
- Date of Publication: October 2013
- Dr.Chandikaditya Kumawat Academic Coordinator School of Engg. & Technology Sangam University, Bhilwara, Rajasthan, India
- Shantanu ChaudharyB.E(I.T.), M.B.A.(Finance) M.Tech (Pursuing), Sangam University, Bhilwara, Rajasthan, India
- Prabhati BhowmickMsc.(Botany)(Pursuing) MDS University, Ajmer, Rajasthan, India
References
Dr.Chandikaditya Kumawat, Shantanu Chaudhary, Prabhati Bhowmick "Biometric Solution of Fake Voting Problem: Implimented using Adhar Card & Cloud" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 10, pp.22-29 2013
A Mobile-Ad-Hoc-Network (MANET) is a collection of wireless nodes that can be set up dynamically anywhere and anytime without using any pre-existing network infrastructure. Nodes within each other’s radio range communicate directly via wireless links, while those that are far apart use other nodes as relays in a multi-hop routing fashion. Traditionally Ad-Hoc routing protocols are typically used to deal with the dynamic nature of these networks, which is mainly due to mobility. These protocols typically suffer from a number of shortcomings, such as high routing over head and limited scalability. This motivates the work presented in this paper, which provides a comparison of AODV and DSR protocols in Mobile-Ad-Hoc-Network where mobile clients are connected to the wireless network and they are varying with a constant speed .Based on extensive simulations; we present a comparative analysis covering performance metrics such as PDF, Average End-to End Delay, and Packet Loss in 1. Deferent scenario in all these cases AODV is best result compare to DSR
- Page(s): 30-34
- Date of Publication: October 2013
- Upendra Kumar KarheriyaResearch Student in NITM Gwalior, India
- Prof.S S DhakadAsst. Professor in NITM Gwalior, India
- Bharat Raj PandeyAsst. Professor in NITM Gwalior, India
References
[1] Pirzada, A.A., Portmann, M., Indulska, J., “PerformanceComparison of Multi-Path AODV and DSR protocols in Hybrid Mesh Networks”, 14th IEEE International Conferenceon Networks, vol. 02, Pages: 1-6, 2006. [2] ShafinazBuruhanudeen, Mohammed Othman, MazlizaOthman, BorhanuddinMohd Ali, “Mobility Models,Broadcasting Methods and Factors Contributing Towardsthe Efficiency of the MANET Routing Protocols: Overview”,IEEE International Conference on Telecommunications andMalaysia International Conference on Communications,Pages: 226-230, 2007. [3]. SaniirR.Das, Cliarles E. Perkins, Elizabeth M.Roycr.“Performance Comparison of Two On-demand RoutingProtocols for Ad Hoc Networks” IEEE INFOCOM 2000. [4] C.E.Perkins, E.M.Belding-Royer and I.D.Chakeres, “Adhoc On- Demand Distance Vector (AODV) Routing”,IETF Internet Draft, draft-perkins-manet-aodvbis-01.txt.January 2004. [5] Ru Li, Yan-qiao Wei, Huan-yu Li, Rui-lin Yang; Su-ping Wang, Hao-hong Wang, "Mobility Management for Global IPConnectivity of MANET in Emergency Situations", 5th IEEEConsumer Communications and Networking Conference, Pages: 217-221, 2008. [6] Mbarushimana, C., Shahrabi, A.,” Comparative Study ofReactive and Proactive Routing Protocols Performance inMobile Ad Hoc Networks”, 21st International Conferenceon Advanced Information Networking and ApplicationsWorkshops, Vol. 2, Pages: 679-684, 2007. [7]“Modified Routing Algorithm for AODV in constrained Condition” by G.S.Tomar , Member IEEE. [8]. Amit N. Thakare Mrs. M. Y. Joshi “PerformanceAnalysis of AODV & DSR Routing Protocol in MobileAd hoc Networks”. [9]. “The network simulator– ns-2.” [Online]. Available: https://www.isi.edu/nsnam/ns/index.html [10] “Performance Analysis of AODV & DSR RoutingProtocol in Mobile Ad hoc Networks” Amit N. Thakare,Mrs. M. Y. Joshi
Upendra Kumar Karheriya, Prof.S S Dhakad, Bharat Raj Pandey "Performance Analysis of Different Routing Protocol for 802.11 in MANET" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 10, pp.30-34 2013
The IP-based virtual private network (VPN) is rapidly becoming the foundation for the delivery of New World services, and many service providers are offering value-added applications on top of their VPN transport networks. Emerging services such as e-commerce, application hosting, and multimedia applications will enable service providers to generate new incremental revenue and maintain long-term competitive advantage. Two unique and complementary VPN architectures based on IP Security (IPsec) and Multiprotocol Label Switching (MPLS) technologies are emerging to form the predominant foundations for delivery of New World services. This white paper examines these two VPN architectures, their similarities and differences, and the benefits they offer. It concludes with a unified view of IP VPNs that combine both IPsec and MPLS based on their respective strengths. Multiprotocol Label Switching (MPLS) is an emerging technology which ensures the reliable delivery of the Internet services with high transmission speed and lower delays. The key feature of MPLS is its Traffic Engineering (TE) which is used for effectively managing the networks for efficient utilization of network resources. Due to lower network delay, efficient forwarding mechanism, scalability and predictable performance of the services provided by MPLS technology makes it more suitable for implementing real-time applications such as Voice and video.
- Page(s): 35-42
- Date of Publication: October 2013
- Prahlad MeghwalPacific University, Udaipur, Rajasthan, India
- Mahendra Kumar BairwaSITE,Nathwdara, Rajasthan, India
References
[1] Khan. F., ―Traffic Engineering with Multipoint Label Switching‖. E.Tech, 04 pp. 61-67, July 2004. [2] Fang L.; Bita N.; Le R.; Miles J., ‖Interprovider IP- MPLS services: requirements, implementations, and Challenges‖. Communications Magazine, IEEE , vol.43,no.6, pp.119- 128,June 2005. [3] Daugherty B.; Metz C.,‖ Multiprotocol label Switching and IP, Part1: MPLS VPNs over IP Tunnels‖. IEEE Internet Computing, pp. 68-72, May-June 2005. [4] Azher I.; Aurengzeb M.; Masood K.,‖ Virtual Private Network Implementation over Multiprotocol Label Switching‖.Engineering Sciences and Technology, pp. 1-5, Aug 2005. [5] Shah. S. A. A.; Ahmed. L.,‖MPLS Feasibility for General & Core IP Networks using Open Source System‖. SecondInternational on Electrical Engineering, pp. 1-6, March 2008. [6] D. Awduche, J. Malcolm, J. Agogbua, M. O'Dell and J. McManus, "Requirements for Traffic Engineeringover MPLS", RFC 2702, Sept. 1999. [7] D. Awduche, L. Berger, D. Gan, T. Li, G. Swallow and V. Srinivasan, "Extension to RSVP for Traffic Engineering", Internet draft 1999
Prahlad Meghwal , Mahendra Kumar Bairwa "Multi-protocol Label Switching Virtual Private Networks" International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.2 issue 10, pp.35-42 2013
Biodiesel is non-toxic, biodegradable, produced from renewable sources and contributes a minimal amount of net greenhouse gases, such as CO2, SO2 and NO emissions to the atmosphere. The study was carried out to produce biodiesel from waste/recycled oils to reduce the cost of biodiesel, waste and pollution. Some important variables such as volumetric ratio, types of reactants and catalytic activities were selected to obtain a high quality biodiesel fuel within the specifications of the American Standard for Biodiesel Testing Method (ASTM D 6751) and European Norm (EN 14214). The highest biodiesel yield was obtained (71.2%) under the conditions of 1:1 volumetric oil-to-methanol weight ratio, 0.5% NaOH catalyst at 50°C reaction temperature and 320 rpm stirring speed. The results showed that biodiesel produced from different oil to methanol ratios, alcohol types and shaking time exhibited considerable differences. There was also a considerable difference of biodiesel yield produced by using methanol, ethanol and 1-butanol. The biodiesel yield increased in the order of 1-butanol ❮ ethanol ❮ methanol. There was a little difference in viscosity, acid value and chemical elements (Fe, Mg, Ca, Na, P etc.) at different parameters.
- Page(s): 43-52
- Date of Publication: October 2013
- Mahendra MeenaM.Tech Scholar,Department of Mechanical Engg, People’s College of Research & Technology, Bhopal, India
- Md. YounusAssociate Professor, Department of Mechanical Engg, People’s College of Research & Technology, Bhopal, India
- Priyank LohiyaM.Tech Scholar, Department of Mechanical Engg, Sagar Institute of Research & Technology, Bhopal, India
References
[1]. Ayhau D (2009). Progress and recent trends in biodiesel fuels. Energy Convers. Manage. 50: 14-34. [2].Abreu FR, Lima DG, Hamu CW, Suarz PAZ (2004). Utilization of metal complexes as catalysts in the transesterification of Brazilian vegetable oils with different alcohols. J. Mol. Catal. A: Chem. 209: 29-33. [3]. AL-Widyan MI, AL-Shyaukh AO (2002). Experimental evaluation of the transesterification of waste palm oil into biodiesel. Bioresour. Technol. 85: 253-256. [4]. Bagley ST, Gratz JF, Jonson LD, Mcdonald, JH (1998). Effects of an oxidation catalytic converter and a biodiesel fuel on the chemical, mutagenic and particle size characteristics of emissions from a diesel engine. Environ. Sci. Technol. 32: 1183-1191. [5]. Bouaid A, Martinez M, Jose A (2009). Production of biodiesel from bioethanol and Brassica carinata oil: Oxidation stability study. Bioresour. Technol. 100: 2234-2239. [6]. Cardone M, Prati MV, Rocco V, Seggiani M, Senatore A, Vitolo S (2002). Brassica carinata as an alternative oil crop for the production of biodiesel in Italy: engine performance and regulated and unregulated exhaust emissions. Environ. Sci. Technol. 36: 4656-4662. [7]. Demirbas A (2008). Biodiesel from waste cooking oil via base-catalytic and supercritical methanol transesterification. Energy Convers. Manage. 50: 923-927. [8]. Dorado MP, Ballesteros E, Arnal JM, Gomez J, Gimenez, FJL (2003). Testing waste olive oil methyl ester as a fuel in a diesel engine. Energy Fuels, 17: 1560-1565. [9]. Encinar JM, Gonales JF, Rodriguez JJ, Tejedor A (2002). Biodiesel fuels from vegetables Oils: Transesterification of Cynara cardunculus L. oils with ethanol. Energy Fuels, 19: 443-450. [10]. Haas MJ, Scott KM, Alleman TL, Mccormick RL (2001). Engine performance of biodiesel fuel prepared from soybean soapstock: a high quality renewable fuel produced from a waste feedstock. Energy Fuels, 15: 207-1212. [11]. Harten B (2003). Uso de centrífugas para los procesos de biodiesel. Aceites Grasas, 13: 98-105. Hossain ABMS, Boyce AN (2009a). Biodiesel production from waste sunflower cooking oil as an environmental recycling process and renewable energy. Bulgarian J. Agric. Sci. 15(4): 313-318. [12]. Hossain ABMS, Boyce AN (2009b). Comparative study of biodiesel production from pure palm oil and waste palm oil. Arab Gulf J. Sci. Res. 27(1-2): 33-38.Hossain ABMS, Salleh A, Boyce AN, Prathim P, [13].Naqiuddin M (2008). Biodiesel production from algae as renewable energy. Am. J. Biochem. Biotechnol. 4(3): 250-254. [14].Kinney AJ, Clemente TE (2004). Modifying soybean oil for enhanced performance in biodiesel blends. Fuel Processing Technol. 86: 1137-1147. [15].Knothe G, Matheaus, AC, Ryan III TW (2003). Cetane numbers of branched and straight -chain fatty esters determined in an ignition quality tester. Fuel, 82: 971-975. [16].Murugesan A, Umarani C, Chinnusamy TR, Krishnan M, Subramanian R, Neduzchezhain N (2009). Production and analysis of bio-diesel from non-edible oils-A review. Ren. Sust. Energy Rev. 13: 825-834. [17].Monyem A, Van-gerpen JH (2001). The effect of biodiesel oxidation on engine performance and emissions. Biomass and Bioenergy, 20: 317-325. [18].Monyem A, Van-gerpen JH, Canakci M (2001). The effect of timing and oxidation emissions from biodiesel-fueled engines. Trans. ASAE, 44: 35-42. [19].Mushrush G, Beal EJ, Spencer G, Wynne JH, Lloyd CL, Hughes JM, Wali CL, Hardy DR (2001). An environmentally benign soybean derived fuel as a blending stock or replacement for home heating oil. J. Environ. Sci. Health, 36: 613-622.
Mahendra Meena, Md. Younus, Priyank Lohiya "Experimental Investigation on Production of Biodiesel from Waste Soyabean Oil" International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.2 issue 10, pp.43-52 2013
This paper presents the behavioral design and the function characteristics of a general purpose RISC processor. The RISC processor design is based on the study and evaluation of a variety of assembly instruction sets. The designed RISC processor is a pipeline RISC processor with 5 stages of pipelining. A variety of instructions have been implemented for the proposed design and care has been taken to provide a control mechanism for structural, data and timing hazards. The processor‟s architecture features 8 internal general-purpose registers, 16 bit instruction words, each of which can hold a 16 external address lines and 16 bit data word, to external memory. The entire processor was modeled as a bottom up approach in the design methodology. The design has been done in VHDL and synthesized using hardware tool Xilinx 13.1. The features of this processor include 16-bit architecture and multi-cycle implementation of the data path. The design has been done at the behavioral levels of VHDL. A number of MIPS instruction set have been implemented. The individual components were analyzed, designed, synthesized and tested at each level of implementation. Finally the individual components integrated in a top-level simulation by appropriate port mapping.
- Page(s): 53-60
- Date of Publication: October 2013
- Surendra BajiaResearch Scholar JNU Jaipur, Rajasthan, India
References
[1] Galani Tina, R. D. Daruwala, “Performance Improvement of MIPS Architecture by Adding New Features”, IJARCSSE, Volume 3, Issue 2, February 2013; ISSN: 2277 128X. [2] R. Uma, “Design and Performance Analysis of 8-bit RISC Processor using Xilinx Tool”, IJERA, ISSN: 2248-9622 Vol. 2, Issue 2, Mar-Apr 2012 [3] “Low Power Code Generation for a RISC Processor by Register Pipelining” Stefan Steinke, Ruediger Schwarz, Lars Wehmeyer, Peter Marwedel, University of Dortmund, Dept. of Computer Science, Otto-Hahn-Strasse 1644221 Dortmund, Germany. [4] Madhavi Anupoju, M. Sunil Prakash, “Performance Evolution of 16 Bit Processor in FPGA using State Encoding Techniques”. IJSR, India Online ISSN: 2319-7064. [5] Viral Makwana ,Vandana Shah, Roma Patel “ 32*32 Bit Matrix Coprocessor Design Using VHDL FPGA Device For Advanced RISC Machine Operations” International Journal of Advanced Engineering Technology E-ISSN 0976-3945. [6] Sivrama P. Dandamudi “Guide to RISC Processor for programmers and engineers”, ISBN 0-387-21017-2, Springer, 2005. [7] Gaganpreet Kaur “VHDL Basic to Programming”, ISBN 978-81-317-3211-3, Pearson Education, 2011 [8] J. Bhaskar “A VHDL Primer- Third Edition”, ISBN-13 978-81-203-2366-7, PHI Learning, 2009
Surendra Bajia "Power and Delay Optimization of Customized 16-Bit Low Power RISC Processor Using VHDL" International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.2 issue 10, pp.53-60 2013
In image classification, an image is classified according to its visual content. An important application is image retrieval-searching through an image dataset to obtain those images with particular visual content. The SVM is a powerful technique for remote sensing image classification. In this paper, we propose a simple procedure or a function which is usually gives a reasonable results. The main goal of this paper includes: 1. Train a visual classifier for different image classes 2. Achieve the performance of the classifier 3. Visual content used for Mapping (feature in image) 4. Obtain the train image data. The SVM is to produce a model (based on the training data) which predicts the target values of the test data given only the test data attributes. Note that this SVM approach guide to achieve the highest accuracy. Also, we intent to solve challenging or difficult problems in remote sensing image data sets.
- Page(s): 61-67
- Date of Publication: October 2013
- T. Balaji Assistant Professor, Dept. of Computer Science, Govt. Arts College, Melur - 625106, India
- M. Sumathi Associate Professor, Dept. of Computer Science Sri Meenakshi Govt. College for Women, Madurai - 625 002, India
References
[1] T.Balaji and M.Sumathi, “Relational Features of Remote Sensing Image Classification using Effective K-Means Clustering”, IJoART, pp. 103 – 107, August 2013. [2] C.C. Chang and C-J Lin., “A Library for SVM”, May 2013. [3] M. Pal, and P. M. Mather, “Support Vector Machines for classification in remote sensing”, International Journal of Remote Sensing, vol. 26, pp. 1007–1011, 2012. [4] Chih-Wei Hsu, “A Practical Guide to Support Vector Classification”, pp. 1-16, April 2012. [5] C. Cortes and V. Vapnik, “Support Vector Networks”, Machine Learning, Vol-20, pp. 273-297, 2012. [6] Yan LI, Li YAN, “Remote Sensing image Classification Development in the Past Decade”, Wuhan university, pp. 1-6, 2011. [7] Chih-Wei Hsu, “A Practical Guide to Support Vector Classification”, pp. 1-16, April 2011. [8] Steve R. Gunn, “Support Vector Machines Classification”, University of Southampton, May 2008. [9] S.S. Keerthi and C-J Lin., “Asymptotic Behaviors of SVM with Gaussian Kernel”, Neural Computation, Vol-15, pp. 1667-1689, 2011. [10] Andrea Vedaldi and Andrew Zisserman, “Image Classification Practical”, pp. 1-7, 2011. [11] Lu, D. and Weng, Q., “A survey of Image Classification Methods and Techniques for Improving Classification Performance”, International journal of remote Sensing, pp. 823-870, 2010.
T. Balaji, M. Sumathi "High Emphatic Feature Selection Classification Algorithm for SVM in Remote Sensing Images" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 10, pp.61-67 2013
For identification of a particular human being signatures prove to be an important biometric. The signature of a person is an important biometric attribute of a human being which can be used to authenticate human identity. However human signatures can be handled as an image and recognized using computer vision and neural network techniques. With modern computers, there is need to develop fast algorithms for signature recognition. There are various approaches to signature recognition with a lot of scope of research. In this paper, off-line signature recognition & verification using neural network is proposed, where the signature is captured and presented to the user in an image format. Signatures are verified based on parameters extracted from the signature using various image processing techniques. This paper evolutes the performance of signature verification technique based on the angle, energy and chain code feature of signature.
- Page(s): 68-73
- Date of Publication: October 2013
- Imran HussainM.TECH , I.T.M. Bhilwara, Rajasthan, India
- Vikash ShrivastavaSr. Technical Architect I.T I- GATE Global Limited, Noida (U.P.)
- Rajesh JatoliyaSr. Lecturer, C.S. Department ITM, Bhiwara, Rajasthan, India
- Vivek Kr. ShrivastavaAsst. Prof. & HOD-IT ITM,Bhilwara Rajasthan, Rajasthan, India
References
[1] K. Han, and I.K. Sethi, “Handwritten Signature Retrieval and Identification”, Pattern Recognition 17, 1996, pp. 83-90. [2] S. Chen, and S. Srihari, “Use of Exterior Contour and ShapeFeatures in Off-line Signature Verification”, 8th International Conference on Document Analysis and Recognition (ICDAR ‟05), 2005, pp. 1280-1284. [3] A. Kholmatov, and B. Yanikoglu, “Identity Authentication using improved online signature verification method”, Pattern Recognition Letters, 2005, in press. [4] M. Hanmandlu, M.H.M. Yusof, and V.K. Madasu, “Off-line Signature Verification using Fuzzy Modeling”, Pattern Recognition 38, 2005, pp. 341-356. [5] M.K. Kalera, S. Srihari, and A. Xu, “Off-line signature verification and identification using distance statistics”,International Journal of Patern Recognition and Artificial Intelligence 18(7), 2004, pp. 1339-1360. [6] E.J.R. Justino, F. Bortolozzi, and R. Sabourin. “A comparison of SVM and HMM classifiers in the off-line signature verification”, Pattern Recognition Letters 26, 2005, pp. 1377-1385. [7] H. Srinisvasan, M. J. Beal and S.N. Srihari, “Machine Learning approaches for Person Identification and Verification”,SPIE Conference on Homeland Security, 2005, pp. 574-586. [8] H, Lv, W. Wang, C. Wang and Q. Zhuo, “Off-line Chinese Signature Verification based on Suppor Vector Machines”,Pattern Recohnition Letters 26, 2005, pp. 2390-2399. [9] M. Blumenstein, X.Y. Liu, and B. Verma, “A Modified Direction Feature for Cursive Character Recognition”,International Joint Conference on Neural Networks (IJCNN ‟04), 2004, pp. 2983-2987. [10] L.E. Martinez, C.M. Travieso, J.B. Alonso, and M. Ferrer,“Parametrization of a forgery Handwritten Signature Verification using SVM”, IEEE 38th Annual 2004 International Carnahan Conference on Security Technology,2004, pp. 193-196. [11] Kalenova,” Personal Authentication using SignatureRecognition”,D.2005. [12] Plamondon, “The Handwritten Signature as a Biometric Identifier: Psychophysical Model & System Design” IEE Conference Publications, R.1995,Issue CP408, 23-27. [13] Jain, A., Griess, F., and Connel1, S. “Online Signature Recognition”, Pattern Recognition, vol.35,2002, pp 2963-2972. [14] OZ, C. Ercal, F. and Demir, Z. Signature Recognition and Verification with ANN. [15] Ozgunduz, E., Karsligil, E., and Senturk,,”Off-line Signature Verification and Recognition by Support VectorMachine”, T. 2005 .Paper presented at the European Signal processing Conference. [16] Aykanat C. et. al ,(Eds). 2004. Proceedings of the 19th International Symposium on Computer and Information Sciences, ISCIS 2004. Springer-Verlag Berlin Heidelberg New York. pp. 373-380. [17] Pacut, A. and Czaja,”Recognition of Human Signatures. Neural Network”, A. 2001,in proceedings of the International Conference on Neural Network, IJCNN‟01, vol.2, pp 1560-1564. [18] Miguel A. Ferrer, Jesu´s B. Alonso, and Carlos M. Travieso,” Offline Geometric Parameters for Automatic Signature Verification Using Fixed-Point Arithmetic”, IEEE Transactions on Pattern analysis and Machine Intelligence Vol. 27, No. 6, June 2005. [19] Shashi kumar , K.B.raja, R.K. Chhotary, Sabyasachi Pattanaik, “Off-line Signature Verification Based on Fusion of Grid and Global Features Using Neural Networks”, Shashi Kumar et. al. / International Journal of Engineering Science and Technology Vol. 2(12), 2010, 7035-704 [20] José F. Vélez, Ángel Sánchez and A. Belén Moreno,”Robust Offline Signature Verification using compression networks and positional cuttings”,Escuela Superior de Ciencias Experimentales y TecnologíaUniversidad Rey Juan Carlosc/ Tulipán, s/n 28933 - Móstoles (Madrid), SPAIN. [21] Ismail A. Ismail 1, Mohamed A. Ramadan 2, Talaat S. El-Danaf 3 And Ahmed H. Samak ,”An Efficient Off-line Signature Identification Method Based On Fourier Descriptor and Chain Codes”, IJCSNS International Journal of Computer Science and Network Security, Vol.10 No.5, May 2010.
Imran Hussain, Vikash Shrivastava, Rajesh Jatoliya, Vivek Kr. Shrivastava "Performance Evaluation of Energy, Angle, Chain Code and Their Mixed Method over Different Training Subsets" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 10, pp.68-73 2013
Network coding is a relatively new concept that originated from information theory. In the recent past, a number of eye opening work have been conducted along the directions of applying this new tool for both (a) attacking classic computer science problems (e.g., Steiner trees, matrix rank computation) and (b) defining new fields of research (e.g., network error correction, optimal information network design). However, few opportunities exist for experts from the fields of information theory and computer science to meet in a common room, to involve in an in-depth dialog on the subject of profound interest to both of them --- network coding. This workshop is intended to serve as such a unique venue. Ad hoc network typically refers to any set of networks where all devices have equal status on a network and are free to associate with any other ad hoc network device in link range. ad hoc network often refers to a mode of operation of IEEE 802.11 wireless networks. it also refers to a network device's ability to maintain link status information for any number of devices in a 1-link (aka "hop") range, and thus, this is most often a layer 2 activity.
- Page(s): 74-78
- Date of Publication: October 2013
- Niranjan SinghM.tech CSE Central University of Rajasthan, Ajmer, Rajasthan
References
[1] S. Li, R. Yeung, and N. Cai, "Linear Network Coding"(PDF), in IEEE Transactions on Information Theory, Vol 49, No. 2, pp. 371–381, 2003 [2]R. Dougherty, C. Freiling, and K. Zeger, "Insufficiency of Linear Coding in Network Information Flow" (PDF), in IEEE Transactions on Information Theory, Vol. 51, No. 8, pp. 2745-2759, August 2005 ( erratum) [3]Ahlswede, Rudolf; N. Cai, Shuo-Yen Robert Li, and Raymond Wai-Ho Yeung (2000). "Network Information Flow". IEEE Transactions on Information Theory, IT-46 46 (4): 1204–1216. doi:10.1109/18.850663. [4] T. Ho, R. Koetter, M. Medard, D. R. Karger and M. Effros, "The Benefits of Coding over Routing in a Randomized Setting" in 2003 IEEE International Symposium on Information Theory. [5]https://arxiv.org/abs/1212.2291 [6] https://www.ericsson.com/technology/research_papers/wireless_access/doc/Multi-User%20ARQ.pdf [7] https://securenetworkcoding.wikidot.com/ [8] https://home.eng.iastate.edu/~yuzhen/publications/ZhenYu_INFOCOM_2008.pdf [9] https://netcod.org/papers/11AcedanskiDMK-final.pdf [10] https://www-bcf.usc.edu/~dimakis/RC_Journal.pdf [12] en.wikipedia.org/wiki/Linear_network_coding. [11] Chai Keong Toh, Ad Hoc Mobile Wireless Networks, Prentice Hall Publishers , 2002. [12]P. Gupta and P.R. Kumar. Capacity of wireless networks. IEEE Transactions on Information Theory, Volume 46, Issue 2, March 2000, doi:10.1109/18.825799 [13]Jinyang Li, Charles Blake, Douglas S. J. De Couto, Hu Imm Lee, and Robert Morris, Capacity of Ad Hoc Wireless Networks, in the proceedings of the 7th ACM International Conference on Mobile Computing and Networking, Rome, Italy, July 2001 [14] ee.washington.edu/research/funlab/network_coding [15]antd.nist.gov/wahn_ssn.shtml [16] birs.ca/events/2013/2-day-workshops/13w2169 [17] Paventi, jared. “How does a Wireless Keyboard Work.” Ehow. Web. 26 Oct. 2013. [18] en.wikipedia.org/wiki/Wireless [19] whatis.techtarget.com/definition/interface-device-IDF
Niranjan Singh "Network Coding in Wired and wireless Ad-hoc Networks " International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 10, pp.74-78 2013