i-manager's Journal on Information Technology (JIT)


Volume 1 Issue 3 June - August 2012

Research Paper

A Module for Enhancing Recognition System for QR Code Scanned Image

Furat Nidhal* , Yasmine Mazin Tabra**
* Associate Lecturer, Baghdad University, Iraq National Cancer Research Center
** Assistant Lecturer, Al-Nahrain University, College of Information Engineering.
Tawfeeq, F. N., and Tabra, Y. M. (2012). A Module For Enhancing Recognition System For Qr Code Scanned Image. i-manager’s Journal on Information Technology, 1(3),1-4. https://doi.org/10.26634/jit.1.3.1904

Abstract

A QR code is a type of barcode that can hold more information than the familiar kind scanned at checkouts around the world. The “QR” stands for “quick response”, a reference to the speed at which the large amounts of information they contain can be decoded by scanners. They are being widely used for advertising campaigns, linking to company websites, contest sign-up pages and online menus. In this paper, we propose an efficient module to extract QR code from background and solve problem of rotation in case of inaccurate image taken from mobile camera.

Research Paper

Performance Analysis of Different MANET Specific TCP variants

Debajyoti Pal*
Department of Information Technology, Camellia Institute of Technology, India.
Pal, D. (2012). Performance Analysis Of Different MANET Specific TCP Variants. i-manager’s Journal on Information Technology, 1(3), 5-8. https://doi.org/10.26634/jit.1.3.1906

Abstract

Transmission Control Protocol (TCP) is implemented in the transport layer of a MANET, which enjoys the advantage of reliable data transmission over the Internet. However, due to certain unique characteristics of a MANET, modification of classical TCP has been done so as to improve its performance in such an environment. Accordingly, several MANET specific TCP versions like TCP Reno, TCP New Reno, TCP Tahoe and TCP Vegas have come into prominence. This paper evaluates the performance of the different TCP versions for the same network topology over certain fixed parameters like number of packets generated/node, average packet loss, average delay incurred by the packets while in transit from source to destination and the processing time taken by the intermediate nodes. For routing purpose, we have assumed Ad-Hoc On Demand Distance Vector Routing (AODV) as the standard. To address the common issues of congestion control as with TCP, the experiment has been carried out under different network loading conditions that have been achieved by slowly increasing the node density.

Research Paper

Moving Object Detection, Tracking and Classification Using Neural Networks

Hamsa A.Abdullah*
Assistance Lecturer, College of Information Engineering, AL-Nahrain University, Baghdad, Iraq.
Abdullah, H. A. (2012). Moving Object Detection, Tracking And Classification Using Neural Networks. i-manager’s Journal on Information Technology, 1(3), 9-19. https://doi.org/10.26634/jit.1.3.1908

Abstract

Moving object detection and tracking (D&T) are important initial steps in object recognition, context analysis and indexing processes for visual surveillance systems. It is a big challenge for researchers to make a decision on which D&T algorithm is more suitable for which situation and/or environment and to determine how accurately object D&T (real-time or non-real-time) is made. There is a variety of object D&T algorithms (i.e. methods) and publications on their performance comparison and evaluation via performance metric. This paper discusses a hybrid technique for detecting and tracking moving pedestrians in a video sequence. The technique comprises two sub-systems: the first one for detecting and tracking moving objects in the visual field, and the second one for classifying the moving objects being tracked as human or cars by using MLP neural network. Experiments measuring the neural network s accuracy at classifying unseen computer generated and real moving objects are presented, along with potential applications of the technology.

Research Paper

Users Satisfaction in Library Services in Nehru Institute of Engineering and Technology (NIET) at Coimbatore: A study

C.S Chandra Mohan Kumar* , J. Dominic**
* Department of Library Science, Karpagam University, Coimbatore, Tamil Nadu, India.
** Central Library, Karunya University, Coimbatore, Tamil Nadu, India.
Kumar, C. M. C. S., and Dominic, .J. (2012). Users Satisfaction In Library Services In Nehru Institute Of Engineering And Technology (NIET) At Coimbatore: A Study. i-manager’s Journal on Information Technology, 1(3), 20-24. https://doi.org/10.26634/jit.1.3.1909

Abstract

The knowledge of information communication technology (ICT) facilities utilized to the e- resources at the Nehru institute of Technology. A questionnaire was prepared to elicit opinion from the (ICT) users. Response was gathered from 80 UG students form the engineering college. The availability of the right information at the right time and the right from all most importance to the users for their knowledge and development infrastructures activities. It has been in this study to know about the status of ICT infrastructure in the engineering college library in the Coimbatore region. The survey provides information about the resource users benefits of e-resources.

Research Paper

An Approach To Enhance Level Of Security To The ATM Customers By Hiding Face Biometric Data Using Steganography

K. Lavanya* , C. Naga Raju**
* Assistant Professor in IT, L.B.R.College of Engineering, Mylavaram.
** Principal & Professor in CSE, PACE Institute of Technology & sciences, Ongole.
Lavanya. K., and Raju, N. C. (2012). An Approach To Enhance Level Of Security To The ATM Customers By Hiding Face Biometric Data Using Steganography. i-manager’s Journal on Information Technology, 1(3), 25-30. https://doi.org/10.26634/jit.1.3.1911

Abstract

Automated teller machine allows the banks customers to carry out banking transactions like, deposits, transfers, balance enquiries, and withdrawal. Criminal activities at ATM’s have become a nationwide issue. In order to certify safe and secure transactions banks has to meet certain standards. This paper focuses on preventing such activities and enhancing the level of security at ATMs. Biometric authentication technique is proven to address the problems of traditional methods which are presently used in ATMs. Face recognition has received substantial attention from researchers in biometrics. In this approach, a face recognition system for personal identification and verification can be done using Principal Component Analysis (PCA). To enhance the level of security user’s biometric data itself hidden with steganography measures. Spatial based LSB Steganography methods is used for hiding biometric data into another covered image and then receiver can detect the secret message.