Enforcing socially selfish awareness routing among users
In the real world, most people are socially selfish; i.e., they are willing to forward packets with whom they have social ties but not to others, which varies with the strength of the social tie. A Social Selfishness Aware Routing (SSAR) algorithm to allow user selfishness and for having better routing performance in an efficient way is proposed. To select a forwarding node, SSAR considers both users’ willingness to forward and their contact based approaches, which results in a better forwarding method than purely contact-opportunities. SSAR also formulates the packet forwarding process as a Multiple Knapsack Problem with Assignment Restrictions (MKPAR) to satisfy user demands for selfishness and performance. Trace-based simulations show that SSAR allows users to maintain selfishness and it achieves better routing performance with low transmission cost.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Face detection and recognition system in bank robbery using CFV modules based on video recordings
In this paper, It examines the Face detection and recognition system using three fast CFV modules which are face skin verification module, face symmetry verification module, and eye template verification module. The three verification modules can eliminate the tilted faces, the backs of the head, and any other non-face moving objects in the video. Only the frontal face images are sent to face recognition engine. The frontal face detection reliability can be adjusted by simply setting the verification thresholds in the verification modules. Then three hybrid feature sets are applied to face recognition. Experiments demonstrated that the frontal face detection rate can be achieved as high as 95% in the low quality video images. The overall face recognition rate and reliability are increased at the same time using the proposed ensemble classifier in the system. An ensemble classifier scheme is proposed to congregate three individual Artificial Neural Network classifiers trained by the three hybrid feature sets.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
On the realization of a secure, high capacity data embedding technique using joint top-down and down- top embedding approach
The rapid development of network technologies has lead to vast multimedia data being transmitted over the networks. However, the data being transmitted can be tampered or attacked by some malicious attackers during transit. To provide security to multimedia data steganography is being used as a potential tool, where the secret data to be transmitted is embedded in a cover medium (Image) in order to avert the attackers. This paper presents a secure and high capacity stegnographic technique where secret data is embedded in intermediate significant bit planes besides least significant bit plane. The embedding scheme uses alternate top-down and down-top approach to improve the quality of stego-image. The security of the embedded data is taken care of by embedding data in all locations under the control of secret key. The experimental results show that proposed scheme performs better than some existing schemes.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Text dependent writer identification using support vector machine
Writer identification is the process of identifying the writer of the document based on their handwriting. Recent advances in computational engineering, artificial intelligence, data mining, image processing, pattern recognition and machine learning have shown that it is possible to automate writer identification. This paper proposes a model for text-dependent writer identification based on English handwriting. Features are extracted from scanned images of handwritten words and trained using pattern classification algorithm namely support vector machine. It is observed that accuracy of proposed writer identification model with Polynomial kernel show 94.27% accuracy.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Variation of the Convergence Speed on Basis of the Local Search Method Used in a Memetic Algorithm. Applying to the Scheduling Tasks Problem
In this paper, we study the variation of the convergence speed on basis of the local search method used in a memetic algorithm (MA); for this reason we compared two memetic algorithms MA1 and MA2 implemented with two different local search methods are descent and simulated annealing successively applied to the scheduling tasks problem. Then we will make a comparison between these two algorithms (MA1, MA2) results, with the genetic algorithm and other metaheuristics previously used to solve the same problem to get an idea on the most efficient methods in term of completion time work for this problem and choose the most effective.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A correlation based fuzzy model for network intrusion detection
The network intrusion becomes ever growing problem. The complexity present in the collected network data set is absence of clear boundary between anomaly connection and normal connection. However fuzzy logic can well address this problem. In earlier works, combining fuzzy logic and data mining to develop fuzzy rules are explored to address this problem. In this paper, a new fuzzy model is developed to detect anomaly connections. The developed model is tested with NSLKDD data set. The model gives better result.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Learning-based compiler level optimization of branching statement layout using execution patterns and dynamic code reordering
Code layout is an important factor that determines the performance of any application. For branching intensive loops where decisions have to be made among several branching paths (as in real time systems), an optimized layout of the conditional statements can increase the performance largely. Current methods can predict branches dynamically using speculative execution which can be resource intensive. Static branch prediction techniques are not as accurate. In this work a compiler based optimization for branching instructions by code reordering has been proposed. The proposed design consists of a code reordering component that along with the compiler can dynamically generate layout-optimized code, by reordering the conditions in the source program. The reordering is done base on dynamic run-time execution patterns. Based on the current execution pattern and the history, the most optimal program can be run, minimizing evaluation of conditions.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Singular Value Decomposition (SVD) Before Covariance Based PCA for Image De-noising
This paper describes an efficient approach of using (SVD) before covariance PCA. Singular Value Decomposition (SVD) is a method of finding insignificant pixel values from an image. Though covariance PCA is used to de-correlate the original data set by extracting principle components of data set but there also left some noises. Singular Value Decomposition (SVD) is a method that discards insignificant pixel values from an image without affecting the quality of the image. In this method a pixel and its nearest neighbors are considered as the training samples recognized by using block matching regarded as Local Pixel Grouping (LPG). Experimental result shows that the use of SVD before covariance based PCA demonstrate that the de-noising performance of image is improved compared with state-of-art de-noising algorithm.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
An approach to Handle Man in Middle Attack in Cluster based Architecture
This paper presents wireless ad hoc network which communicate with each other by forming a multi-hop radio network and maintaining connectivity in a decentralized manner. The principle behind ad hoc networking is multi-hop relaying, which means that the messages are transmitted by the other nodes if the target node is not directly reachable. For communications with the nodes which are not within the radio range of nodes to the route must be taken from the intermediate nodes to reach the destination. These intermediate nodes acts as router which receives the data coming from the source and forwards the data to destination This situation is of potential security concern as there can be attack possible by the intermediate node like Man in Middle Attack. Hence an authentication procedure is be used for authenticating the mobile nodes to each other and proper encryption decryption mechanisms is also employed. Also intermediate nodes can act as malicious nodes which must be removed or alternate route should be found which does not include nodes already used in previous route. Thus we have developed architecture will provide secure routing mechanism which will use two kinds of encryption techniques. Then the possible attacks are being analyzed and removed from the architecture.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Effect of investment in information technology system on providing desired services of accounting information system
Today, with advances in information and communication technologies and the emergence of information management system, using of these technologies in organizations is inevitable. Therefore, only managers who can invest in areas related to information technology and management system of information will be successful in enterprise management system. However, it is an important discussion that how these investments should be performed or how much it is invested? Moreover, managers must be aware of the effectiveness of using information technology and information management systems. Actually, Information Technology impacts necessary indicators for the success of today’s organization. Therefore, this study investigates the application of IT systems (IT) and management information systems (MIS) on effectiveness of these systems based on users’ view. Among the key indicators of information technology system, some indicators are selected as follows: increasing the speed of work performance, increasing accuracy of work performance, timely retrieval of information, more storage and faster access to information. In addition, the effect of these indices on providing good services in the financial reporting is investigated.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]