Design and Evaluation of Parallel Processing Techniques for 3D Liver Segmentation and Volume Rendering
Ensuring Software Quality in Engineering Environments
New 3D Face Matching Technique for an Automatic 3D Model Based Face Recognition System
Algorithmic Cost Modeling: Statistical Software Engineering Approach
Prevention of DDoS and SQL Injection Attack By Prepared Statement and IP Blocking
Component Based Software Development is a development paradigm by assembling software systems from a number of components. This approach promises high quality, low budget software with shorter time to market. Software development process models used for writing the traditional programs cannot be used for assembling the application using reusable components. The traditional models need new methodologies to support component — based development. Many component based software development models have been proposed by researchers. This paper discusses the advantages and limitations of current models for developing component based systems.
Multicasting is one of the most needed field in networking. Technology of this routing is widely used in application of internet. For example Video conferencing, Disaster recovery to distribute collaborative computing etc. In this article, design a new mesh based multicast routing protocol for dynamically reconfigured wireless network is discussed. DVMRP in wireless networks causes un-controlled overhead problem. To Overcome this problem new mesh based on demand routing protocol is designed.
There are two reasons for creating a motion detecting algorithm; either the result is intended for technical applications, or it is intended as a biological model. Depending on which of these two goals one has in mind, the outcome will be different. For a technical application, speed and reliability are crucial aspects. For biological models, the focus is not so much on speed as on biological realism [2]. The model presented in this paper belongs to technical application so the resolution considerations have not been taken into account. Even so the system has a resolution up to 640 x 480. The proposed project in this paper uses a webcam to record the video stream, take a snap shot - if there is a movement- and then send it to the user's email. The motion detection can be found by calculating the difference in picture color with the next picture for each pixel.
The manual execution of reassembling a fragmented image is very difficult and it requires great amount of time. To overcome this difficulty a new technique was introduced in the existing system called “The novel integrated color based image fragments reassembly technique”. This technique is divided into four steps, which is based on color. Initially, the spatial adjacent image fragment is discovered. The second operation is to discovery of matching contour segments of adjacent image fragments. The next step is to find the appropriate geometrical transformation for an image fragments contour alignment. Finally the overall image assembly is done via novel based algorithms. Still it requires more time to assemble the fragment images. In this proposed system, the same reassembly technique is applied but additionally the shape alignment algorithm is used to utilize the shape of the fragment contours in order to perform matching. This will produce very satisfactory reassembly results and also it can lead to more efficient, significant reduction in human effort.
Threshold based segmentation is a popular technique in the preprocessing phase of image processing applications. In Abutaleb's two dimensional entropy, it is combined with local properties of the image to compute the optimal threshold. Yang Xiao et al. simplification on this procedure worked well with the inclusion of spatial correlation features which reduces the time complexity of the methodology. Seetharama Prasad et al. improvised further in the process of obtaining the varying similarity measure. In this paper fuzzy membership degrees of gray values are employed for conditional probabilities of the image object and background in the computation of entropy criterion function with local properties of the image as spatial correlation parameters are used in the obtainment of optimal threshold of the image. For low contrast images contrast enhancement is assumed. Experimental results demonstrate a quantitative improvement against existing techniques by calculating the parameter efficiency η based on the misclassification error and variations in various yielding towards ground truth threshold on two dimensional histogram of image.
Recent advancements in machine learning caused interest in the development of smart environments to emerge and assist with valuable functions such as activity monitoring and intervention. In order to monitor the activities of smart home residents, there is a need of designing technologies that recognize and track the activities that people perform at home. Machine learning techniques can perform this task, but the software algorithms rely upon large amounts of sample data that is correctly matched with the corresponding activity. The data stream captured by recording inhabitant-device interactions in an environment can be mined to discover significant patterns, which an intelligent agent could use to automate device interactions. For this, an automated approach is proposed for activity tracking that identifies frequent activities that naturally occur in an individual's routines. With this capability, the occurrences of regular activities are monitored and also can detect the changes in an individual's patterns.
Network coding has recently attracted attention as a substantial improvement to packet retransmission schemes in wireless multicast broadcast services (MBS). In this paper, it is concentrating on increasing the efficiency of bandwidth and reducing the retransmission of packets on wireless multicast broadcast services. In the existing system they used three main schemes: ONCR (Opportunistic network coding retransmission), FNCR (Full network coding retransmission) and ANCR (Adaptive network coding retransmission). First two schemes are not efficient because, in ONCR it will transmit the packets which are not intent to the receiver. In FNCR, it decreases the bandwidth efficiency because of retransmitting all the packets in addition with the required packets. In order to overcome the above drawbacks, Adaptive network coded schemes are used to improve the bandwidth efficiency in MBS using a combination of opportunistic and full network coded retransmission. It can be applied for the single-hop wireless broadcast services. In the proposing system, this transmission scheme is applied for the multi-hop wireless broadcast service. It has the advantage of more effective bandwidth usage and reducing the retransmission.
The intrusion response component of an overall intrusion detection system is responsible for issuing a suitable response to an anomalous request. In the existing system, Intrusion Detection mechanism consists of two main elements, specifically tailored to a DBMS: Anomaly Detection (AD) system and an anomaly response system. In anomaly response system conservative actions, fine-grained actions, and aggressive actions methods are used. The proposed system mainly concentrates on response policies by using policy matching and policy administration. For the policy matching problem, The authors propose two algorithms that efficiently search the policy database for policies that match an anomalous request. They also extend the PostgreSQL DBMS with our policy matching mechanism, and report experimental results. The other issue that we address is that of administration of response policies to prevent malicious modifications to policy objects from legitimate users. They propose a novel Joint Threshold Administration Model (JTAM) that is based on the principle of separation of duty. The key idea in JTAM is that a policy object is jointly administered by at least k database administrator (DBAs), that is, any modification made to a policy object will be invalid unless it has been authorized by at least k DBAs out of L. They present design details of JTAM which is based on a cryptographic threshold signature scheme, and show how JTAM prevents malicious modifications to policy objects from authorized users.
Search queries on large databases, often return a large number of results, only a small subset of which is relevant to the user. Ranking and categorization, which can also be combined, have been proposed to alleviate this information overload problem. Results categorization of large databases is the main focus of this work. A natural way to organize biomedical citations is according to their MeSH annotations. MeSH is a comprehensive concept hierarchy used by PubMed. In this paper, the authors present the BioNav system, a novel search interface that enables the user to navigate large number of query results by organizing them using the MeSH concept hierarchy. First, the query results are organized into a navigation tree. At each node expansion step, BioNav reveals only a small subset of the concept nodes, selected such that the expected user navigation cost is minimized. In contrast, previous works expand the hierarchy in a predefined static manner, without navigation cost modeling. They shows that the problem of selecting the best concepts to reveal at each node expansion is NP-complete and propose an efficient heuristic as well as a feasible optimal algorithm for relatively small trees. They shows experimentally that BioNav outperforms state-of-the-art categorization systems by up to an order of magnitude, with respect to the user navigation cost. The Medline dataset are retrieved from US National library of Medicine.