Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 31 - 60 of 14723

Full-Text Articles in Computer Engineering

Theoretical Concepts & Applications Of Independent Component Analysis, Sonali Mishra, Nitish Bhardwaj, Dr. Rita Jain Sep 2020

Theoretical Concepts & Applications Of Independent Component Analysis, Sonali Mishra, Nitish Bhardwaj, Dr. Rita Jain

International Journal of Computer Science and Informatics

This paper deals with the study of Independent Component Analysis. Independent Component Analysis is basically a method which is used to implement the concept of Blind Source Separation. Blind Source Separation is a technique which is used to extract set of source signal from set of their mixed source signals. The various techniques which are used for implementing Blind Source Separation totally depends upon the properties and the characteristics of original sources. Also there are many fields nowadays in which Independent Component Analysis is widely used. This paper deals with the theoretical concepts of Independent Component Analysis, its principles and ...


A Comparative Analysis Of Ecdsa V/S Rsa Algorithm, Amanpreet Kaur, Vikas Goyal Sep 2020

A Comparative Analysis Of Ecdsa V/S Rsa Algorithm, Amanpreet Kaur, Vikas Goyal

International Journal of Computer Science and Informatics

Elliptic curve Cryptography with its various protocols implemented in terms of accuracy and fast observation of results for better security solution. ECC applied on two finite fields: prime field and binary field. Because it is public key cryptography so, it also focus on generation of elliptic curve and shows why finite fields are introduced. But for accurate observation we do analysis on category of cryptographic primitives used to solve given security problem. RSA & ECDSA both have basic criteria of production of keys and method of encryption and decryption in basic application as per security and other properties which are authentication ...


Improving Spam Email Filtering Efficiency Using Bayesian Backward Approach Project, M. Sheshikala Sep 2020

Improving Spam Email Filtering Efficiency Using Bayesian Backward Approach Project, M. Sheshikala

International Journal of Computer Science and Informatics

Unethical e-mail senders bear little or no cost for mass distribution of messages, yet normal e-mail users are forced to spend time and effort in reading undesirable messages from their mailboxes. Due to the rapid increase of electronic mail (or e-mail), several people and companies found it an easy way to distribute a massive amount of undesired messages to a tremendous number of users at a very low cost. These unwanted bulk messages or junk e-mails are called spam messages .Several machine learning approaches have been applied to this problem. In this paper, we explore a new approach based on ...


Data Warehousing Applications: An Analytical Tool For Decision Support System, Mohammed Shafeeq Ahmed Sep 2020

Data Warehousing Applications: An Analytical Tool For Decision Support System, Mohammed Shafeeq Ahmed

International Journal of Computer Science and Informatics

Data-driven decision support systems, such as data warehouses can serve the requirement of extraction of information from more than one subject area. Data warehouses standardize the data across the organization so as to have a single view of information. Data warehouses (DW) can provide the information required by the decision makers. The data warehouse supports an on-line analytical processing (OLAP), the functional and performance requirements of which are quite different from those of the on-line transaction processing (OLTP) applications traditionally supported by the operational databases. Data warehouses provide on-line analytical processing (OLAP) tools for the interactive analysis of multidimensional data ...


Cloud Computing Applications And Security Issues: An Analytical Survey, Arati Kothari Sep 2020

Cloud Computing Applications And Security Issues: An Analytical Survey, Arati Kothari

International Journal of Computer Science and Informatics

Cloud computing, a rapidly developing information technology has becoming a well-known the whole world. Cloud computing is Internet-based computing, whereby shared resources, software and information, are provided to computers and devices on-demand, like the electricity grid. Cloud computing is the product of the fusion of traditional computing technology and network technology like grid computing, distributed computing parallel computing and so on. Companies, such as Amazon, Google, Microsoft and so on, accelerate their paces in developing Cloud Computing systems and enhancing their services to provide for a larger amount of users. However, security and privacy issues present a strong barrier for ...


The Mathematical Analysis Of Column Oriented Database, Amit Kumar Dwivedi, Vijay Kumar Sharma Sep 2020

The Mathematical Analysis Of Column Oriented Database, Amit Kumar Dwivedi, Vijay Kumar Sharma

International Journal of Computer Science and Informatics

There are two obvious ways to map a two-dimension relational database table onto a one-dimensional storage interface: store the table row-by-row, or store the table column-by-column. Historically, database system implementations and research have focused on the row-by row data layout, since it performs best on the most common application for database systems: business transactional data processing. However, there are a set of emerging applications for database systems for which the row-by-row layout performs poorly. These applications are more analytical in nature, whose goal is to read through the data to gain new insight and use it to drive decision making ...


Spinning Led Display Using Radio Frequency, Apeksha Sarode, Deepali Madhukar Salunke, Akshaydutta Laxmidutta Shukla, Manvi Mukesh Sonawadekar Sep 2020

Spinning Led Display Using Radio Frequency, Apeksha Sarode, Deepali Madhukar Salunke, Akshaydutta Laxmidutta Shukla, Manvi Mukesh Sonawadekar

International Journal of Computer Science and Informatics

The project consists of Spinning LED display using RF which displays the messages send by the user at the handheld device. if there are no inputs from the user for the system, the message that is programmed in the microcontroller will be displayed continuously. The circuit needs to be mounted on a mechanical structure that rotates at high speed. The display consists of 7 LEDs only in a vertical row. By moving them fast enough, message can be displayed which appears to be generated by a 7*n matrix of LEDs and not a single column of LEDs, where n ...


Linear Feedback Shift Register Based Unique Random Number Generator, Harsh Kumar Verma, Ravindra Kumar Singh Sep 2020

Linear Feedback Shift Register Based Unique Random Number Generator, Harsh Kumar Verma, Ravindra Kumar Singh

International Journal of Computer Science and Informatics

Linear Feedback Shift Register based Unique Random Number Generator is an enhancement of Random Number generator with the additional property that any number generated by a unique random number generator can’t be duplicated. As per users demand for not duplicated random numbers in some applications like transferring a random number over the network on the behalf of actual character of the message for security point of view, existence of unique random number generators are very essential. In this paper LFSR [1] (Linear Feedback Shift Register) is used to implement the proposed concept of unique random number generator. Using LFSR ...


Applying Rough Set Theory To Genetic Algorithm For Web Service Composition, Cariappa M.M, Mydhili .K. Nair Sep 2020

Applying Rough Set Theory To Genetic Algorithm For Web Service Composition, Cariappa M.M, Mydhili .K. Nair

International Journal of Computer Science and Informatics

Rough set theory is a very efficient tool for imperfect data analysis, especially to resolve ambiguities, classify raw data and generate rules based on the input data. It can be applied to multiple domains such as banking, medicine etc., wherever it is essential to make decisions dynamically and generate appropriate rules. In this paper, we have focused on the travel and tourism domain, specifically, Web-based applications, whose business processes are run by Web Services. At present, the trend is towards deploying business processes as composed web services, thereby providing value-added services to the application developers, who consumes these composed services ...


Intelligent Car Parking System, S. Avinash Sep 2020

Intelligent Car Parking System, S. Avinash

International Journal of Computer Science and Informatics

Due to the proliferation in the number of vehicles on the road, traffic problems are bound to exist. This is due to the fact that the current transportation infrastructure and car parking facility developed are unable to cope with the influx of vehicles on the road. In India, the situation are made worse by the fact that the roads are significantly narrower compared to the west. Therefore problems such as traffic congestion and insufficient parking space inevitably crops up. In his paper we describe an Intelligent Car Parking System, which identifies the available spaces for parking using sensors, parks the ...


Holes In Wireless Sensor Networks, Rajat Bhardwaj, Hitesh Sharma Sep 2020

Holes In Wireless Sensor Networks, Rajat Bhardwaj, Hitesh Sharma

International Journal of Computer Science and Informatics

Nowadays the science and technology has enriched man’s life. In today’s world everything depends upon the technology. One of such technology is sensor technology. Now in every field sensor technology is used. The Wireless Sensor Network has reduced the work of groups of people to one individual person. Wireless sensor network makes the work easy to monitor in the hazardous environments like wild forests, war fields, etc. During that, many of the problems occur. One of such problems is the Hole Formation in Wireless Sensor Networks. The holes are formed in the Wireless Sensor Networks when a group ...


Client Relationship Management System For Patent Services, Supriya .A.B, Mr. Omprakash Sringeri Sep 2020

Client Relationship Management System For Patent Services, Supriya .A.B, Mr. Omprakash Sringeri

International Journal of Computer Science and Informatics

Client Relationship Management (CRM) system is used to manage the services provided by a company to its customers. CRM is a multi-disciplinary concept. Its successful implementation involves many aspects. CRM systems have been developed for various fields such as sales management, product management etc., but has not evidently been adopted for providing patent services, where a person or a company can submit his or their work, search for existing patents using key words, etc. Current companies providing patent services, have their own interfaces, which have few limitations. As a result, CRM system for patent servicing is developed where a separate ...


Continuous Integration For Enterprise Systems Using Heterogeneous Techniques, Raksha Sv Sep 2020

Continuous Integration For Enterprise Systems Using Heterogeneous Techniques, Raksha Sv

International Journal of Computer Science and Informatics

Continuous integration is an extensive experience in the Enterprise and system architectures, it is the concept of integrating new code into existing code and then utilizing the testing techniques defined by Extreme Programming. This practice yields units of code that are continually tested during development. Using continuous integration, a programmer integrates new code into existing code after the existing code has been relentlessly built. Therefore, the release of the change is done when it is and everyone knows about the new functionality at the time of the release. While this is dynamic, it should not pose problems since the code ...


Computer Aided Analysis Of Lung Ct Based On Transform Domain Features, V. Minnal Sep 2020

Computer Aided Analysis Of Lung Ct Based On Transform Domain Features, V. Minnal

International Journal of Computer Science and Informatics

As Many CADx systems have been developed to detect lung cancer based on spatial domain features that process only the pixel intensity values, the proposed scheme applies frequency transform to the lung images to extract frequency domain features and they are combined with spatial features so that the features that are not revealed in spatial domain will be extracted and the classification performance can be tuned up. The proposed CADx comprises of four stages. In the first stage, lung region is segmented using Convexity based active contour segmentation. At second stage ROIs are extracted using spatially constrained KFCM clustering. Followed ...


Association Rule Mining For Gene Expression Data, O. V. Kale, B. F. Momin Sep 2020

Association Rule Mining For Gene Expression Data, O. V. Kale, B. F. Momin

International Journal of Computer Science and Informatics

Microarray technology has created a revolution in the field of biological research. Association rules can not only group the similarly expressed genes but also discern relationships among genes. We propose a new row-enumeration rule mining method to mine high confidence rules from microarray data. It is a support-free algorithm that directly uses the confidence measure to effectively prune the search space. Experiments on Leukemia microarray data set show that proposed algorithm outperforms support-based rule mining with respect to scalability and rule extraction.


Fuzzy Set Approaches To Data Mining Of Association Rule, Shivangi Sengar, Sakshi Priya, Urvashi Khatuja Sep 2020

Fuzzy Set Approaches To Data Mining Of Association Rule, Shivangi Sengar, Sakshi Priya, Urvashi Khatuja

International Journal of Computer Science and Informatics

Data mining on large databases has been a major concern in research community due to the difficulty of analyzing huge volume of data. This paper focuses on the large set area i.e. on fuzzy sets and knowledge discovery of data. Association rules* provide information in accessing significant correlations in large databases. We have combined an extended techniques developed in both fuzzy data mining and knowledge discovery model in order to deal with the uncertainty found in typical data.


Role Of Remote Sensing And Gis In Forestry, Megha Gupta, Ankita Khare, Srashti Pathak Sep 2020

Role Of Remote Sensing And Gis In Forestry, Megha Gupta, Ankita Khare, Srashti Pathak

International Journal of Computer Science and Informatics

The Earth is constantly under observation from dozens of satellites orbiting the planet and collecting data. They are engaged in something called "remote sensing”: the act of obtaining information about something without being in direct contact with it. Now-a-days the field of Remote Sensing and GIS has become exciting and glamorous with rapidly expanding opportunities. Many organizations spend large amounts of money on these fields. Here the question arises why these fields are so important in recent years. Two main reasons are there behind this. Now-a-days scientists, researchers, students, and even common people are showing great interest for better understanding ...


Automatic Eye Template Generation And Tracking, Richa Mehta, Manish Shrivastava Sep 2020

Automatic Eye Template Generation And Tracking, Richa Mehta, Manish Shrivastava

International Journal of Computer Science and Informatics

Eye blinking is a physiological necessity for humans. This method automatically locates the user’s eye by detecting eye blinks. A system is the improvement of driver carefulness and accident reduction. The driver’s face is tracked while he is driving and he is warned if there seems to be an alerting fact that can result in an accident such as sleepy eyes, or looking out of the road. Furthermore, with a facial feature tracker, it becomes possible to play a synthesized avatar so that it imitates the expressions of the performer. For a user who is incapable of using ...


Action Recognition Using Feature Transform Descriptor From Mined Dense Spatio Temporal, N. R . Vikram, P. M. Ashokkumar Sep 2020

Action Recognition Using Feature Transform Descriptor From Mined Dense Spatio Temporal, N. R . Vikram, P. M. Ashokkumar

International Journal of Computer Science and Informatics

Action recognition in video sequence has been a major challenging research area for number of years. Apriori algorithm and SIFT descriptor based approach for action recognition is proposed in this paper. Here, two phases can be carried out for accurate and updating of action recognition. In the first phase, the input should be the video sequence. For preprocessing the sequences frame can be formatted by background modeling for every successive frame. After modeling the background, the corners are detected for every frame and compound features are extracted. Data mining is performed by using Apriori algorithm as well as with the ...


The Human Activity Detection From Video Surveillance Based On Hmm For Future Development In Computer Environment, Kanchan Gaikwad, Vaibhav Narawade Sep 2020

The Human Activity Detection From Video Surveillance Based On Hmm For Future Development In Computer Environment, Kanchan Gaikwad, Vaibhav Narawade

International Journal of Computer Science and Informatics

Visual investigation of human activities related to the detection, tracking and recognition of people, and, more generally, the perceptive of human activities, from image sequences. Recognizing human activities from image sequences is an active area of research in computer vision. Human activity recognition (HAR) research has been on the rise because of the rapid technological development of the image-capturing software and hardware. In this paper, we propose a new approach for human action recognition from video. Here we use the HMM algorithm for recognition of activity from video. The result of this method is good as compare to other method ...


An Integration Approach For Heterogeneous Distributed Database Transaction Protocols, Dharavath Ramesh, Saritha Vemuri, Vijay Kumarv Sep 2020

An Integration Approach For Heterogeneous Distributed Database Transaction Protocols, Dharavath Ramesh, Saritha Vemuri, Vijay Kumarv

International Journal of Computer Science and Informatics

Integration is commonly used for summarizing information held in very large databases which are encountered in data warehousing, large scale transaction management, and statistical databases. Such applications often involve distributed databases that have developed independently and therefore may exhibit incompatibility, heterogeneity, and data inconsistency. We are here concerned with the integration that has heterogeneous classification schemes where local ontology’s, in the form of such classification schemes, may be mapped onto a common ontology. Existing transaction protocols typically rely on compensating transactions to handle exceptional conditions. In this paper, we develop an approach that can handle data inconsistencies and identify ...


Ontology Techniques For Web Data, A.Eswara Rao, G. V. S. Sowmya, P.N. Sailakshmi Sep 2020

Ontology Techniques For Web Data, A.Eswara Rao, G. V. S. Sowmya, P.N. Sailakshmi

International Journal of Computer Science and Informatics

This paper p r e s e n t s techniques for knowledge description and formalization, ontologies are used to represent user profiles in personalized web data. However, when representing user profiles, many models or techniques have utilized only knowledge from either a global knowledge base or a user local information. In this paper, a personalized ontology model is proposed for knowledge representation and reasoning over user profiles. This model learns ontological user profiles from both a world knowledge base and user local instance repositories. The ontology model is evaluated by comparing it against benchmark models in web information gathering ...


Design Of Configurable Ip Core For Error Detection And Correction, Ajilesh Rk, Anand K, Nandakumar. R, Sreejeesh.S. G Sep 2020

Design Of Configurable Ip Core For Error Detection And Correction, Ajilesh Rk, Anand K, Nandakumar. R, Sreejeesh.S. G

International Journal of Computer Science and Informatics

This paper addresses the design & implementation of configurable Intellectual Property (IP) core for double error detection and single error Correction. The encoding /decoding algorithms considered in this can be implemented with a simple and faster hardware. The block can be used for coding and decoding word having any length and correct single bit error occurred and detect double bit error, during transmission. The user can define the word length and the hamming bits required.


Object Tracking By Normalized Cross Correlation And Pca Based Template Updating: Comparative Analysis, M.H. Sidram, N. U. Bhajantri Sep 2020

Object Tracking By Normalized Cross Correlation And Pca Based Template Updating: Comparative Analysis, M.H. Sidram, N. U. Bhajantri

International Journal of Computer Science and Informatics

The principle behind to detect and track non-stationary object via a sequence of frames is addressed. The proposed strategy pushed the Normalized Cross-Correlation (NCCR) to track object by matching the template and updating the template is encouraged through Principal Component Analysis (PCA). This work remarked with exhaustive experiment and witnessed with comparative analysis over dataset related to outdoor environment. The system kernel reveals the capability to track the object and outcome is fairly acceptable to great extent under different light conditions.


Conation Of A Standard Interruption-Lenient Manner For Web Servers, Sk. Johny Basha, B. Bhanu Pratap, E. Srinivas, K.S.S. Ram Prasad Sep 2020

Conation Of A Standard Interruption-Lenient Manner For Web Servers, Sk. Johny Basha, B. Bhanu Pratap, E. Srinivas, K.S.S. Ram Prasad

International Journal of Computer Science and Informatics

Now-a-days, more and more information systems are linked to the Internet and offer Web interfaces to the general public or to a limited set of users. This paper proposes a standard manner to implement interruption-lenient Web servers. This manner is based on idleness and diversification principles in order to increase the system resilience to assaults: usually, an assault targets particular software, running on a particular platform, and fails on others. The manner is composed of redundant proxies that mediate client requests to a redundant bank of diversified application servers. The idleness is deployed here to increase system availability and integrity ...


Classification And Prediction In Customer Relationship Management Using Back Propagation, Leela Rani Komma Reddy, G Loshma Sep 2020

Classification And Prediction In Customer Relationship Management Using Back Propagation, Leela Rani Komma Reddy, G Loshma

International Journal of Computer Science and Informatics

Customer Relationship Management provides a customer classification and prediction which is used for the optimization of business process. The classification and prediction which is used for the optimization of business process. This classification and prediction in CRM will help the company to study, analyze and forecast customers pattern of consumption, business transaction and purchasing CRM has become major activity in the enterprise based business organization using the CRM. CRM is an important activity in the enterprise business organization like banking industry, insurance industry, retail industry and manufacture industry. In the system we are using data mining techniques to implement customer ...


Dynamic Detection Of Design Inconsistency During Software Development Using Daid Approach, Suma. V, Arfa Baig, Divyashree B J, N B Sonali, S Akshaya Sep 2020

Dynamic Detection Of Design Inconsistency During Software Development Using Daid Approach, Suma. V, Arfa Baig, Divyashree B J, N B Sonali, S Akshaya

International Journal of Computer Science and Informatics

Evolution of software has lead to the fast growth of technology whose impact can be witnessed in all the domains of scientific and engineering applications. Hence engineering high quality software is one of the core challenges of all IT industries. The software models which are being used for the development of the software products may lead to inconsistencies. Nevertheless, theexistence of several methodologies during the development process in order to overcome inconsistencies operates at static mode leading towards expensive nature of rework on those inconsistencies. Therefore, this paper presents a dynamic model which resolves the aforementioned issue by capturing inconsistencies ...


Multiple Find And Replace Tool For Text Editors, Vignesh Prabu, Sivagnanam Mutharasu, Rama Jayam Sep 2020

Multiple Find And Replace Tool For Text Editors, Vignesh Prabu, Sivagnanam Mutharasu, Rama Jayam

International Journal of Computer Science and Informatics

In text editors like Notepad and vi editor, we can find a string and replace it with another one. It is not possible to find multiple strings and replace with a single string. This paper reveals other 2 approaches: Finding multiple strings and replacing it with a single string, finding single string and replacing it with multiple strings. Java based string manipulations have been carried out on the contents of the file to implement our functionalities. Thus, our tool provides excellent portability option.


Android Application For Measuring Human Body Temperature And Forcasting Future Illness, S Prabhakaran, Dhaneshwari Kumari, Ria Ahuja Sep 2020

Android Application For Measuring Human Body Temperature And Forcasting Future Illness, S Prabhakaran, Dhaneshwari Kumari, Ria Ahuja

International Journal of Computer Science and Informatics

Android Application for measuring human body temperature is a new age mobile thermometer. This kind of application already exists but requires manual feeding temperature. In our project, we propose an application which will measure the body temperature automatically while the user is operating the mobile device. It has an in-built function which can trigger alert messages whenever the temperature becomes critical more than normal human body temperature. The display segment of the device is made up of capacitive touch screen, which can act upon the bioelectricity produced by human body with each and every touch. This application requires Android Operating ...


Remote Sensing Image Classification Using Artificial Bee Colony Algorithm, Srideepa Banerjee, Akanksha Bharadwaj, Daya Gupta, V.K. Panchal Sep 2020

Remote Sensing Image Classification Using Artificial Bee Colony Algorithm, Srideepa Banerjee, Akanksha Bharadwaj, Daya Gupta, V.K. Panchal

International Journal of Computer Science and Informatics

Remote Sensing has been globally used for knowledge elicitation of earth’s surface and atmosphere. Land cover mapping, one of the widely used applications of remote sensing is a method for acquiring geo-spatial information from satellite data. We have attempted here to solve the land cover problem by image classification using one of the newest and most promising Swarm techniques of Artificial Bee Colony optimization (ABC). In this paper we propose an implementation of ABC for satellite image classification. ABC is used for optimal classification of images for mapping the land-usage efficiently. The results produced by ABC algorithm are compared ...