Academic Coding Guideline Model OCG - Open Coding Guidelines For Windows (An Organized Code Creation Model)
Every software company has its own set of guidelines that increases code readability, reuse and helps in its storage in organized storage structure .These guidelines also help in the determination of various attributes of code such as complexity, duplicity, warnings, memory leaks, coverage etc. However coding guidelines/approaches as such are not present in the field of academics. Scholars of educational institutions generally concentrate mostly on logic (brute force quality approach) while coding, against writing documentable clean code or understanding code’s attributes. Also end evaluation/delivery in a software company is dependent on clean code with various attributes such scenario is not possible in academic framework all together and mostly is done manually. The paper tries to bridge this gap by analyzing the role of an organized code creation model and its effect on various stakeholders in academic Eco-system and suggesting one such open source Code Guideline Model OCG and providing its implementation through a template.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Automatic Line Scratch Detection and Removal in Digitized Film Sequence
Video restoration or old film restoration is challenging but sometimes necessary process. Line scratches in old videos appearas thin bright or dark lines which are roughly vertical and straight. We propose, Frame – By – Frame line scratch detection algorithm to detect scratches from old films. For false detection temporal algorithm is used. Some assumptions and hypothesis from old scratch removal strategies are eliminated from Frame-By-Frame line scratch detection algorithm so that variety of line scratches can be detected. Contrario methodology and local statistical estimation is used in combinatorial way for robustness. Using these technologies over detection and confusion creating areas are greatly reduced. Vertical structure in video can cause false detection but temporal filtering algorithm eliminates false detection by considering and analyzing unity of underlying scenes. We contribute for removal of scratches using pixel filling technique. This concept of detecting and eliminating line scratch from video contribute fine methods for video restoration.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Design of memory controller based on AMBA AHB protocol
The performance of a computer system is heavily dependent on the characteristics of it’s interconnect architecture. A poorly designed system bus can throttle the transfer of instructions and data between memory and processor, or between peripheral devices and memory. This communication bottleneck is the focus of attention among many microprocessor and system manufacturers have adopted a number of bus standards. Hence memory access time has been a bottleneck which limits system performance. Memory controller (MC) is designed to tackle this problem. The Advanced Microcontroller Bus Architecture (AMBA) specification defines an on chip communications standard for designing high-performance embedded microcontrollers. This paper focuses on how to build an AMBA Advanced High performance Bus (AHB) based memory controller that can work efficiently in multi- master and multi- slave communication model.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Dynamic allocation and parallel optimization theory in Sharon – nephele cloud
In present year ad-hoc parallel data processing has emerged to be one of the killer applications for Infrastructure-as-a-Service (IAAS) clouds. Major Cloud computing companies have started to integrate frameworks for parallel data and making it easy for customers to access these. However, the processing frameworks which are currently used have been designed for static, homogeneous cluster setups and disregard the particular nature of a cloud. Consequently, the allocated compute resources may be inadequate for big parts of the submitted job and unnecessarily increase processing time and cost. In this project the data processing framework to explicitly exploit the dynamic resource allocation offered by today’s IAAS clouds for both, task scheduling and execution is constructed. Particular tasks of a processing job can be assigned to different types of virtual machines which are automatically instantiated and terminated during the job execution.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Remote Learning: Android Operated Educational Robot Arm with 6 DOF
This paper addresses an intelligent optimal control for a flexible robot arm that is driven by a permanent-magnet synchronous servo motor. An intelligent optimal control of robot arm with 5 axes with servo gripper is proposed by the instructions given through Android device (android app on smart phone). This proposal was addressed to fourth-year engineering students and combines knowledge from android java programming and robotic control to complete an automation project task. The educational robotic arm initially learns to pick up a randomly placed target from a target surface and move it to a predefined destination after which it repeats the contouring process under the presence of the target. This paper presents an off-line trajectory generation algorithm and, therefore, it possesses significant industrial implications, as no hardware changes are needed for its implementation. The proposed method has been experimented with Dexter ER-1 Robotic Arm for optimum project based learning.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Securing AODV against worm hole attack using token based approach
In present scenario, ad hoc network become the prominent mode of communication for mobile devices. Hence, becoming a elementary field of research. Since ad hoc networks are infrastructure less networks and the nodes in ad hoc networks are connected by a wireless links. As nodes are connected by wireless links, its becomes easier for attacker to disrupt in the ad hoc networks. Therefore security is the major issue in ad hoc networks as compared to wired network. In this paper, we are discussing the various attacks which are possible in MANET due to fabrication and worm hole attack in AODV and how to secure AODV against wormhole attack using token based approach. The propose method reduces the packet loss due to malicious nodes to a considerable extent and hence enhance the performance.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A medical image encryption and decryption approach using chaos and LSB
Steganography is a captivating area of research in the new modern world. Steganography is a form of covert communication in which a secret message is invisible within a carrier message. Various image Steganography techniques have been proposed. The user data should be made secret in order to have the user’s privacy and security. This novel algorithm represents the encryption and decryption of medical data of the patient and the patient’s medical image using LSB and chaotic systems. In this paper, investigate diverse Steganography techniques and tools. The chaotic signal generation and the result analysis are done by using the Matlab 7.10.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Off-line Human Signature Recognition System Based on Histogram Analysis using MATLAB
Handwritten signatures are considered as the most natural method of authenticating a person’s identity. Human signatures can be handled as an image and used in a scanned document is a promising facility for many banking and insurance related business activities. The signatures of the same person vary with time, age of the person and also because of the emotional state of a person. This paper present an off-line human signature recognition system based on histogram analysis. The main steps of constructing a signature recognition system are discussed and experiments on the values of cumulative distribution function (CDF). The off-line signature recognition and verification is implemented using MATLAB.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Optimizing the QoS evaluation in service based systems
In service based systems, QoS are the basic construct that aims to facilitate the quality and usability of service based system. Service based systems takes a very long time to get the result under workload, of quality evaluation when dealing with a workflow with several thousand services and multiple parameters. To address this need, we introduce a tool-supported framework for the development and to improve the evaluation performance of QoS by optimizing the QoS requirements. OQoSE approach develops adaptable service based systems which increases the evaluation result of QoS efficiently. OQoSE method which used to review every service and parameter time then it is used to discover the probabilities that are adaptable under various services with multiple parameters.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Secure chaotic modulation schemes using henon map
Future communication should operate at higher data rates, be more reliable, and operate in increasingly crowded frequency allocations. New technologies are being tried in this direction and chaotic communication is one among them. Equivalently, chaotic signals decorrelate rapidly with themselves. The autocorrelation function of a chaotic signal has a large peak at zero and decays rapidly. Same random sequence can be obtained provided we know the exact initial condition for the process. The nonlinear, unstable and aperiodic characteristic of chaotic signals has numerous features that make it attractive for communication use. Chaotic communication is rather a new field in communication research. During the past 15 years, there has been a tremendous interest worldwide in possibility of exploiting chaos in wideband communication system. In this direction already 4 generations of chaotic communication is evolved. In this project we have implemented five different types of chaotic modulation. Demodulation is either coherent or non coherent, based on the type of modulation. For coherent demodulation we used correlator receiver and adaptive filter receiver. We have made a comparison among different types of modulation techniques.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]