Call for Comming Issue
 

Volume 2, Issue 5 May 2014

S.No. Title Page No.
01
A Survey of Image Enhancement Techniques
Sandeep Singh, Sandeep Sharma
Abstract : This paper has focused on the different image enhancement techniques. Image enhancement has found to be one of the most important vision applications because it has ability to enhance the visibility of images. It enhances the perceivability of poor pictures. Distinctive procedures have been proposed so far for improving the quality of the digital images. To enhance picture quality image enhancement can specifically improve and limit some data presented in the input picture. It is a kind of vision system which reductions picture commotion, kill antiquities, and keep up the informative parts. Its object is to open up certain picture characteristics for investigation, conclusion and further use. The main objective of this paper is to discover the limitations of the existing image enhancement strategies.
001-005
[PDF]
02
Analytical Modeling of Hybrid CMOS-SET Based Moore and Mealy Logical Circuit
Jayanta Gope1, Bikash Gupta2 and Rupesh Anand3
Abstract: Low power consuming nano devices have been a dominant issue from the very inception of nano device research. The improved e-beam lithography technique has been the blessings to the device engineers and many novel technologies were invented including the Single Electron Transistor technology during post CMOS era. It showed enormous scope in dealing scaling limits of CMOS technology but the detailed research revealed is fragility like room temperature operation, low gain and background charges. Simultaneously Scientists came up with the idea to cope up with this problem by hybridizing CMOS-SET. Their efforts paid off by successful implementation of this logic. Here our attempt was to employ the same technology for complex architecture; thus the Moore and Mealy model was chosen. To confirm the acceptability of the proposed model it was simulated in T-Spice simulation software and the results were of good trade-off.
006-012
[PDF]
03
Analytical Research in the Geographical Area for classifying Childhood Obesity Using ID3 Algorithm
G. Dona Rashmi1, K. Uma Maheswari2, Dr.V. Narayani 3
Abstract : Childhood obesity is a condition where excess body fat negatively affects a child's health or wellbeing. As methods to determine body fat directly are difficult, the diagnosis of obesity is often based on BMI. Due to the rising prevalence of obesity in children and its many adverse health effects it is being recognized as a serious public health concern. Obesity in children leads to obesity in adulthood. So try to make children to lead a healthy life by having normal BMI. This paper classifies childhood obesity under the age of 7-17 Years in a particular area using spatial data mining ID3 Algorithm.
013-017
[PDF]
04
Survey on Cloud computing Services and Portability
Gangalam Swathi1, M Vamshi Krishna2, P.JhansiRani3
Abstract: The computer world is changing every day, moreover hardware and software computation is becoming very large and complex.At this point, cloud computing has emerged as a solution to fill need for supporting and processing large volumetric data using distributed and clustered computers. The cloud computing is the delivery of computing as a service. The cloud computing systems can handle big amount of data as on demand service basis. In recent year cloud computing has been an emerging computing model in the IT industry. such as Amason,google,salesforce.com.Cloud computing is emerging as a model of “everthing as a service” (XaaS).In this paper, we discussed about cloud computing services and its major service providers and also taxonomy for describing cloud computing architecture and several deployment types that can be instantiated in the cloud and finally focused on portability services of cloud for users.
018-024
[PDF]
05
Real Time Alert System for Natural Disaster
Shaik Javed Parvez1,Latha.M2,R,Balakrishna3
Abstract : Online Chat Application has received much attention recently. An important characteristic of Online Chat Application is its real-time nature. We investigate the real-time interaction of events such as tsunami, earthquakes, cyclone in Online Chat Application and propose an algorithm to monitor chats and to detect a target event. To detect a target event, we devise a classifier of chats based on features such as the keywords in a chat, the number of words, and their context. Subsequently, we produce a probabilistic spatiotemporal model for the target event that can find the center of the event location. We regard each Online Chat Application user as a sensor and apply particle filtering, which are widely used for location estimation. The particle filter works better than other comparable methods for estimating the locations of target events. As an application, we develop a natural disaster reporting system for generally use in Japan. Because of the numerous natural disaster and the large number of Online Chat Application users throughout the country, we can detect an earthquake with high probability (93 percent of earthquakes of Japan Meteorological Agency (JMA) seismic intensity scale 3 or more are detected) merely by monitoring chats. Our system detects natural disaster promptly and notification is delivered much faster than JMA broadcast announcements.
025-030
[PDF]
06
Using Wavelet Neural Networks to Forecast IIP Growth with Yield Spreads
M. Yasin Pir1, Firdous Ahmad Shah2 M. Asger3
Abstract: In this paper, we discuss results of forecasting nonstationary financial time series such as IIP using yield spread between long and short-term rates with Wavelet Neural Networks. Using the yields on securities with maturities ranging from three months to ten years, we analyzed four different long minus short yield spreads (policy horizon and non-policy horizon) . We observed the predictive power of each of these spreads for economic activity within aggregate and time scale framework using Wavelet Neural Networks gives slightly better forecasting ability than Neural Networks and significantly better results can be obtained than other conventional techniques. We also recommend the use of lagged IIP for greater efficiency that enables the yield spread to produce better IIP forecasts..
031-036
[PDF]
07
Customized Search: Using Web Mash-up and Web Usage Mining
Ravi Kumar Mondeti1, Manoj Valesha2, Vivek Sadhwani3, Gresha Bhatia (Mentor)4
Abstract : Nowadays, web search has become very easy. The options of search engines have increased for web Users. Indeed having so many choices, the user satisfaction is still not achieved. User has to search from all the search engines to get the desired results. Our approach is to make User web search more effective and easier. Customized Search means the Integration of various web based Search services on the basis of analyzed User web logs. Using this application we will try to shortlist three Image search engines and make a mash-up application of them. The aim is to enhance the quality of the internet usage. Our experimental results demonstrate that our approach can improve user satisfaction by giving customized results of search from three search engines.
037-040
[PDF]
08
Securing Mobile Applications Using Model Driven Architecture
1NARSIMHA KAMATH A and 2AKSHEY BHAN
Abstract: The problem of supporting the secure execution of potentially malicious third-party applications has received a considerable amount of attention in the past decade. Mobile applications are prone to severe attacks by intruders. The resulting attacks, frequently reported by the media, can lead to decreased trust in an application or an organization that uses them. Although some application environments have become increasingly standardized and secure, there is considerable room for concern and significant need to provide improved security for mobile applications. In this paper we discuss about emerging security threats in mobile applications, agents causing security attacks and discuss an architectural solution to overcome security attacks..
041-048
[PDF]
09
Integration of Wireless Sensor Networks and Cloud Computing
Swathi B S1, Dr. H S Guruprasad2
Abstract : Cloud environments are mainly used for storage and processing of data. Cloud computing provides applications, platforms and infrastructure over the internet. Wireless Sensor Network is an very important technology in which sensor are placed in distributed manner to monitor physical and environment changes such as temperature, pressure etc. Combining these two technology helps in easy management of remotely connected sensor nodes and the data generated by these sensor nodes. For security and easy access of data, cloud computing is widely used in distributed/mobile computing environment. This paper discusses the integration of Wireless Sensor Network and Cloud computing with their applications, challenges and solutions.
049-053
[PDF]

 

 

 

 

©  2010 All Rights Reserved to IPASJ