i-manager's Journal on Software Engineering (JSE)


Volume 4 Issue 3 January - March 2010

Research Paper

An Intelligent Service System Based On Soundex and Multi-Layer Neural Network Algorithms

Lubna Badri* , Bilal Deya**, Rami Zuhdi***
*-*** Faculty of Engineering, Philadelphia University, Jordan.
Lubna Badri, Bilal Deya and Rami Zuhdi (2010). An Intelligent Service System Based On Soundex and Multi-Layer Neural Network Algorithms. i-manager’s Journal on Software Engineering, 4(3),1-6. https://doi.org/10.26634/jse.4.3.1111

Abstract

The aim of this research is to develop an intelligent service system to receive, manage, and serve text messages sent by system users asking for files stored in a system database. The proposed system needs to understand the received text message and takes the decision about the required files. The system handles files and a corresponding computer program and a corresponding computer-readable storage, which can be used for handling e-mail attachments and sent the requested files to the user email. To improve the designed text message recognition system, the combination of two methods have been used, a supervised learning multilayer neural networks trained with back propagation and Soundex algorithms. Experimental results show that the combination of two classification techniques to recognize and manipulate the received text message improves the classification accuracy.

Research Paper

Fault Tolerance and Reliability of Mesh Multi-computer Networks – A Review

Mostafa Abd-el-barr*
Professor, Department of Information Science, CFW, Kuwait University.
Mostafa Abd-el-barr (2010). Fault Tolerance and Reliability of Mesh Multi-computer Networks – A Review. i-manager’s Journal on Software Engineering, 4(3),7-17. https://doi.org/10.26634/jse.4.3.1112

Abstract

Multi-computer systems (MCSs) are efficient in solving computing-intensive problems. A MCS consists of a number of processing elements (PEs) and an interconnection network (IN). A fault in any PE and/or the IN can lead to losses in sensitive data and/or the overall throughput. In this paper, we provide a review of the fault tolerance and reliability assessing techniques of mesh MCSs. A number of fault-tolerant routing techniques are analyzed including the dimension ordering, the turn model, and the block-fault model. In reliability analysis, we consider the sub-mesh reliability exact and approximate models and the task-based reliability computation.  It is expected that some of the techniques and algorithms covered in this paper can have applications in the domain of wireless mesh networks.

Article

Discrete Wavelet Transform with Enhancement Filter for ECG Signal

Khaled Daqrouq* , Abd Alrahman Qawasmi**, Milhled Alfaouri***
Assistant Professor, Department of Communications and Electronics Engineering, Philadelphia University, Amman, Jordan
**-*** Associate Professors, Department of Communications and Electronics Engineering, Philadelphia University, Amman, Jordan
Khaled Daqrouq,Abd Alrahman Qawasmi and Mikhled Alfaouri (2010). Discrete Wavelet Transform with Enhancement Filter for ECG Signal. i-manager’s Journal on Software Engineering. 4(3),18-22. https://doi.org/10.26634/jse.4.3.1113

Abstract

ECG is a very important tool for the primary diagnosis of heart disease;   it gives a full picture about the electrophysiology of the heart and the ischemic changes that may occur like the myocardial infarction, conduction defects and arrhythmia. For this reason ECG signal must be clearly represented and filtered to remove all noise and artifacts from the signal. ECG is one of the biosignal that is considered a non-stationary signal and needs a hard work in denoising. In this paper a new approach  of denoising of EGG signal is proposed in using Wavelet Transform WT. Different ECG signals are used to evaluate the method using MATLAB’ software. The presented method showed better results than conventional methods particularly in ECG signal case.

Research Paper

Local feature descriptive modeling for natural images for image retrieval system

P.V.N. Reddy* , K. Satya Prasad**
* Professor & H.O.D of Electronics & Communications Engineering, Alfa College of Engineering &Technology, Allagadda, Andhra Pradesh.
** Professor of Electronics & Communications Engineering & Director of Evaluation, J.N.T.U Kakinada, Kakinada, Andhra Pradesh.
P.V.N. Reddy and K. Satya Prasad (2010). Local feature descriptive modeling for natural images for image retrieval system.i-manager’s Journal on Software Engineering, 4(3),23-27. https://doi.org/10.26634/jse.4.3.1114

Abstract

In this paper a retrieval study for natural image learning environment is proposed.  The content of this paper is a result of projects called Image content-based retrieval on a natural image database. The objective of this project is to develop an image content-based search engine, which can perform identity check of a natural image. It is well known that conventional natural image databases can only be retrieved by text-based query. In this paper we use the shape, color, and other features extracted from a captured natural image to search the natural image database. The developed technique is able to perform scale, translation, and rotation invariant matching between natural images. Currently, the database contains several hundreds of natural images. In future, we shall enhance the capability of the search engine to deal with more than 30,000 natural image species, which is the total amount of natural image species along the coast.

Research Paper

Analysis of Inductive Effects of On-chip and On-board Return Current Path for Performance Degradation Modeling in VLSI design

Sourabh Sthapak* , Jeffrey Fan**
* Ph.D. Student, Florida International University, U.S.A.
** Assistant Professor, Department of Electrical and Computer Engineering, Florida International University, Miami, FL, USA.
Sourabh Sthapak and Jeffrey Fan (2010). Analysis of Inductive Effects of On-chip and On-board Return Current Path for Performance Degradation Modeling in VLSI design. i-manager’s Journal on Software Engineering, 4(3), 28-35. https://doi.org/10.26634/jse.4.3.1115

Abstract

As the dimension of interconnects in Integrated circuits has become dominant, the inductive effects of the wires cannot be ignored anymore. At high frequency, the return current distributes itself close to the signal path and any increase in the inductance of the return path hampers signal integrity. The multi-layered power distribution network (PDN) is stressed when many devices draw current simultaneously, creating noise in the supply rails. This high speed current not only causes ground bounce and power supply sag but it also needs a low inductance return path. Since high frequency involved in contemporary signaling makes the interconnects to behave as lossy transmission lines, the chip may sustain less noise margin due to environmental or process variations. If the inductive effort is considered, the design will be more robust and variability-free, thus improving the defect tolerance. In this paper, a SPICE based analysis of “on-board” high speed return current path is conducted and techniques and results are then extended for “on-chip” return current path analysis. In addition to avoiding operational failures, a priori knowledge of signal and its respective return path would greatly help to simplify interconnect designing and routing.

Research Paper

Association Rule Mining with Neural Network for Brain Tumor Classification

P. Rajendran* , M. Madheswaran**
*Assistant Professor, Department of Computer Science and Engineering, K. S. Rangasamy College of Technology, Tamilnadu, India.
**Department of Electronics & Communication Engineering,Muthayammal Engineering College, Rasipuram, Tamilnadu, India.
P. Rajendran and M. Madheswaran (2010). Enhanced Graphical Password Based Authentication Using Persuasive Cued Click-Points. i-manager’s Journal on Software Engineering, 4(3), 36-43. https://doi.org/10.26634/jse.4.3.1116

Abstract

In the recent past, the development of computer aided diagnosis systems has been prepared to assisting the physicians for better decision making. This has motivated the research in creating vast amount of image database in the hospitals and health care centers. It has been reported that the brain tumor is one of the major causes leading to higher incidence of death in human. Physicians face challenging task in extracting the features and decision making form. The computerized tomography (CT), which is found to be the most reliable method for early detection of tumors. Due to the high volume of CT images to be used by the physicians, the accuracy of decision making tends to decrease. This has further increased the demand to improve the automatic digital reading for decision making. This paper proposes the tumor detection in brain images. The authors investigate the use of different data mining techniques namely, neural network and association rule mining for anomaly detection and classification. The method proposed makes use of association rule mining technique to classify the CT scan brain images into three categories namely normal, benign and malignant. It combines the low-level features extracted from images and high level knowledge from specialists. The developed algorithm can assist the physicians for efficient classification with multiple keywords per image to improve the accuracy. The results show that the classification accuracy has been obtained as 75% for the classifier using association rule and 70% for neural network classifier, making it a suitable scheme for image mining applications.

Research Paper

On the Signature Analysis of Analog-to-Digital Converters

Vadim Geurkov* , L. Kirischian**
*,** Associate Professor, Department of Electrical and Computer Engineering, Ryerson University, Toronto, Canada.
Vadim Geurkov and L. Kirischian (2010). On the Signature Analysis of Analog-to-Digital Converters. i-manager’s Journal on Software Engineering, 4(3), 44-49. https://doi.org/10.26634/jse.4.3.1117

Abstract

Analog-to-digital converters (ADCs) have been an essential part of many systems employed in mission critical applications. Their fault tolerance has been an increasingly important issue. The notion of fault tolerance includes fault detection (or testing). Automatic test equipment (ATE) has been extensively used to perform sophisticated testing of ADCs. However, ATE can not be utilized in the field due to extremely high cost. In addition, the bandwidth of the ATE is normally lower than the bandwidth of the ADC being tested, which makes it difficult to accomplish at-speed testing requirements. It is important, therefore, to embed test hardware into ADC itself. The methods employed at ATE are complex and inconvenient for built-in realization. More advantageous are the methods exploiting accumulation of output responses. The size of the accumulator depends on the number of responses. In order to achieve greater fault coverage, this number is kept large, complicating the implementation. On the other hand, signature analysis used in digital systems testing is well suited for compaction of “lengthy” responses, and it is characterized by small hardware overhead and low aliasing probability. In this work, we apply a signature analysis principle for the compaction of output responses of an ADC. The permissible tolerance bounds for a fault-free ADC are determined, and the aliasing rate is estimated. Examples are given.

Research Paper

A Seamless Handover scheme for wireless Network using SIGMA

B. Jaiganesh* , R. Ramachandran**
* Research Scholar, ECE Department, Sathyabama University, Chennai, India.
** Principal, Sri Venkateswara College of Engineering, Chennai, India.
B. Jaiganesh and R. Ramachandran (2010). A Seamless Handover Scheme For Wireless Network Using Sigma. i-manager’s Journal on Software Engineering, 8(3),50-64. https://doi.org/10.26634/jse.4.3.1118

Abstract

Wireless etworks ecome more widely used to support advanced services. A researcher has been interested in having Internet connectivity in space for quite some time. This would allow scientists with direct Internet access to data and  devices on the satellites. The rotation of Low Earth Orbiting (LEO)  satellites around the Earth result in handover  of satellites  between  ground  stations. Two types of handover can be observed in space: Link layer and Network layer. Researchers have been developing a Seamless IP diversity-based Generalized Mobility Architecture (SIGMA) to ensure smooth handovers of end to end connections between nodes on Earth and satellites. In this paper, we provide a survey of  the various types of handovers in the space environment, followed by simulation results of SIGMA handover performance in a space environment.

Research Paper

Color Image Restoration for an Effective Steganography

D.P. Gaikwad* , S.J. Wagh **
* Department of Computer Engineering, AISSM'S College of Enginering, Pune.
** Department of Computer Engineering, MAE College of Engineering, Pune.
D.P. Gaikwad and S.J. Wagh (2010). Color Image Restoration for an Effective Steganography.i-manager’s Journal on Software Engineering, 4(3),65-71. https://doi.org/10.26634/jse.4.3.1119

Abstract

The word steganography comes from the Greek Steganos, which mean covered or secret and graphy mean writing or drawing. There are many techniques in steganography such as least significant bit insertion (LSB), masking and filtering, and transformation techniques. The LSB technique is common, which randomly select the pixels of the cover-object that is used to hide the secret message. It is possible to combine the techniques by encrypting message using cryptography and then hides the encrypted message using steganography. The resulting stego-image can be transmitted without revealing that secret information is being exchanged. Furthermore, even if an attacker were to defeat the steganographic technique and detect the message from the stego-object, he would still require the cryptographic decoding key to decipher the encrypted message. In this paper we proposed the image restoration technique in Stenography. In this paper we blur image before hiding the message image using special Point Spread Function and randomly generated key. We have used two input key values as parameters of PSP. At the time of blurring the image, the different new third key value is generated for different message images. These keys are used at the time of the deblurring of  the message image which are kept secrete. For recovering the real message image we need to get image from stego image and then restore it. It is very difficult to restore message image without knowing PSF and third key value. We found, this technique is less time consuming, simple and robust.