Design and Evaluation of Parallel Processing Techniques for 3D Liver Segmentation and Volume Rendering
Ensuring Software Quality in Engineering Environments
New 3D Face Matching Technique for an Automatic 3D Model Based Face Recognition System
Algorithmic Cost Modeling: Statistical Software Engineering Approach
Prevention of DDoS and SQL Injection Attack By Prepared Statement and IP Blocking
A wide range of applications have been developed in recent years pertaining to surveillance networks, which include defense, environmental protection, manufacturing, weather forecasting, and structural monitoring. The following research aims to present a novel method of resource allocation in surveillance networks (e.g. Wireless Sensor Networks) by using stochastic modeling techniques and reconfigurable System-on-a-Chip (SoC) systems. The basic idea behind the proposed framework is that a set amount of system resources (e.g. processing power, transmission bandwidth, system memory, etc.) can be dynamically allocated to different nodes within the system depending on the application or needs at any given time. The allocation of these resources is based on a stochastic approach which models resource demands by utilizing known and unknown random distributions. These distributions are analyzed using their associated polynomial expansions for known distributions and importance sampling for unknown distributions. An example of this would be using the Hermite Polynomial Chaos (PC) representation of random processes for Gaussian and log-normal distributions. The proposed framework results in intelligent surveillance networks with the ability to allocate resources in real-time.
The law of software entropy dictates that even when a system start to function in a well-designed state, requirement of user changes and user demand new functionality. As the requirements of users change with the passage of time, it becomes mandatory to make changes in software. The new changes may result with the introduction of new bugs in the system. After some time it requires regular maintenance. To find whether software can be maintained, reengineer, or retire and build again, two metrics are proposed in this work. Proposed software reengineering metric (RRC and RRCM) can be used to calculate reengineering requirement cost of entire software and reengineering requirement cost of each Module. UML diagrams are used to identify different components of the software. The results obtained after applying the proposed metric become the basis for the decision whether there will be requirement of maintenance, reengineering or retirement of software.
In this study, we propose some greedy algorithms for the multi-processor job scheduling problem. A given list of jobs are arranged according to the time duration for processing. Depending on the job processing times, some jobs are divided into multi-threads while others remain as single thread jobs. Multi-thread jobs are processed based on the concept of gang scheduling. A lower bound for the total processing time is computed. The results of the proposed algorithm is presented using a percentage gap from the optimal solution using this lower bound.
Though the solitons are more robust than linear transmission systems, the effect of soliton self-frequency shift reduces the stability of the soliton transmission system. In this paper we investigated the propagation of ultra-short solitons in fiber-optic systems in the presence of the soliton self-frequency shift effect. We also demonstrated that both the self-frequency shift and the background instability can be effectively controlled using spectral filters of moderate strength together with nonlinear gain devices with gain proportional to the second and fourth power of the amplitude.
Quality of service is how well the network satisfies the user requirements. IEEE 802.11e is the quality of service extension of wireless LAN standard IEEE 802.11. IEEE 802.11e achieves quality of service by service differentiation using the parameters Arbitration interframe space and contention window. They are set to different initial values for different flows to achieve service differentiation. But the procedure used to change contention window is same for all the flows. In this paper the contention window is adjusted differently for different flows to improve the performance of voice. Network simulator, NS2, is used for simulation.
Gout is a disease of antiquity but is increasing once again in prevalence despite availability of reasonably effective treatments. This may be related to a combination of factors, including diet, obesity, and diuretic use. Allergic reactions, noncompliance, drug interactions, and sometimes inefficacy all limit the effective use of current hypouricemic agents. The objective of this paper is to show that for every color space there exists an optimum Gout skin detector scheme so that the performance of all these skin detectors schemes is the same, and then process the Random segmentation blocks algorithm in order to recognition Gout skin A theoretical proof is provided and experiments are presented which show that the separability of the skin and no skin classes is independence of color space and some parameters chosen (experimentation for 80 gout image for different types and 80 other Dermatological disorders images) for testing are Energy, Entropy, Average and Variance. 160 patients were randomly placed in three groups and treated topically along 7-weeks with either gout in foot or hand or other parts body. The recognition results for testing program by Random segmentation blocks algorithm shows superior efficacy for gout skin detection (the testing stage contain all 160 images to recognized only gouts images).
This paper examines the application of Visual Basic Computer Programming Language to Simulate Numerical Iterations, the merit of Visual Basic as a Programming Language and the difficulties faced when solving numerical iterations analytically, this research paper encourage the uses of Computer Programming methods for the execution of numerical iterations and finally fashion out and develop a reliable solution using Visual Basic package to write a program for some selected iteration problems.
E-health system has been used as communication system that enables to deliver medical service over the Internet. The medical information’s accessible in e-health systems are highly sensitive and distributed that demands strong authentication and authorization mechanisms for communication between the healthcare professionals, consumers and providers. Internet is an open system that provides anybody can access any information. Hence, e-health users demand safe communication and user privacy over Internet. This paper introduces two secure communication protocols based on message passing and Mobile agent for online e-health system. Certificate based Authentication and Attribute based Policy assigned Authorization framework (CAAPA) for Mobile e-health systems is proposed based on message passing technique. Token based Cross Verification (TCV) protocol is proposed for secure services in e-health System over Internet based on Mobile agent. Both protocols offer user friendly, well-built secure mechanism that gives confident to the users and healthcare professional to access the E-health system. CAAPA is efficient in terms of maintaining strong user privacy and the communication overhead is high. TCV is efficient in terms of maintaining strong user privacy and consumes less communication overhead.
Object Oriented Software Engineering has been emerging field for software development process. Although maintenance may be turn out to be easier for Object Oriented System. But it is unlikely that the maintenance burden will be completely disappearing. Still, maintenance consumes a large portion of software development cost. Therefore it is worthwhile to develop Object Oriented System keeping maintainability as a key issue in design phase. This paper examines the role of clustering technique of data mining in maintenance of software system using object oriented metrics. The presented work evaluates the K-means clustering method by applying it to the commercial software system. The experimental work of software maintenance for the sample data is being simulated on Matlab.
The real application in wireless Sensor network (WSN) requires connectivity between nodes to transmit the collected data to a sink node. The primary design goal of low rate wireless mesh personal area networks (LR-WMPANs) is low cost, low power consumption and support of simple devices such as sensors and actuators. Zigbee is a standard for wireless personal area network (WPAN) based on IEEE 802.15.4. It is a new standard uniquely designed for low rate wireless personal area networks. The main research objectives of this paper are to evaluate the adequateness of the IEEE 802.15.4 protocols for supporting WSN applications and the identification of open issues in the standard specifications. Zigbee uses Ad-hoc On-demand Distance Vector (AODV) as a routing protocol. Finally, this paper presents a performance of the Ad-hoc On-demand Multipath Distance Vector (AOMDV) as a routing protocol, comparing experimental and simulation results. Performance comparison of AOMDV with AODV using ns-2 simulations shows that AOMDV is able to effectively cope with mobility-induced route failures.