November - 2013 (Volume-3 ~ Issue-11 ~ Part-4)

Paper Type

::

Research Paper

Title

::

A New Routing Technique Based on Fuzzy Logic for Multi-Hop Wireless Mesh Networks

Country

::

India

Authors

::

Er. Pushpender ||, Prof. (Dr.) Sohan Garg

Page No.

::

01-08

::
10.9790/3021-031140108
aned
::
0.4/3021-031140108 aned
iosrjen   3021-0311-0408 iosrjen

WMN technology is different from traditional wireless networks due to its several characteristics such as increased reliability, low installation costs, large coverage area, automatic network connectivity etc. WMN is multi-hop network consisting of routers and gateways and mobile nodes. Routing in such a heterogeneous environment has put enormous challenges to participating nodes and routers to deliver packet from one corner to other. The difficulty in managing or controlling the link quality and reliability in wireless mesh networks makes it very hard to find and maintain a good and stable path from the source to the destination. Also, the wireless medium is broadcast in nature, transmission on one link may interfere with the transmissions on the neighboring links. This broadcast medium contention brings fundamental constraints on the routing performance, such as throughput, delay, mobility, bandwidth etc. It is very challenging to achieve optimal routing performance. In WMN, any node may compromise the routing protocol functionality by disrupting the route discovery process. In this paper, we understand the various routing problems related to throughput, bandwidth, and mobility. In this paper, we have proposed a new routing technique that is totally network dependent and will remove all the routing problems in WMNs.

 

Keywords: - Bandwidth, Mobility, Wireless Mesh Networks, Mobile Ad hoc network, topology, AODV, DSR

[1] Haque, I.T. Randomized Routing Algorithms in Mobile Ad Hoc Networks; VDM Verlag: Saarbrücken, Germany, 2009.
[2] Ramachandran, K.N.; Sheriff, I.; Belding, E.M.; Almeroth, K.C. Routing stability in static wireless mesh networks. Lect. Notes Comput. Sci. 2007, 4427/2007, 73–82.
[3] Clausen, T.; Jacquet, P. Optimized link state routing protocol, Internet Engineering Task Force.Request for Comments 3626, October 2003.
[4] Perkins, C. Ad-hoc On-demand Distance Vector Routing. In Proceedings of the MILCOM, Orlando, FL, USA, 2–5 November 1997.
[5] Bicket, J.; Aguayo, D.; Biswas, S.; Morris, R. Architecture and Evaluation of an Unplanned 802.11b Mesh Network; ACM MobiCom: Cologne, Germany, 2005.

 

Paper Type

::

Research Paper

Title

::

A New Approach for Segmentation and Classification of Textures by using Square Primitive Pattern

Country

::

India

Authors

::

M. Radhika Mani ||, K. Chandra Shekar

Page No.

::

09-15

::
10.9790/3021-031140915
aned
::
0.4/3021-031140915 aned
iosrjen   3021-0311-0415 iosrjen

The Texture classification is an important task in the field of object recognition. The texture classification is highly dependent on the segmentation of objects in the input image. So, the present paper proposes a morphological approach to detect the objects and extract the edges of the detected objects. Then the present paper measures recurrence of the square primitive pattern (SPP) in each of the 3×3 local window. Based on this measurement, the textures are precisely classified. This is proved by the experimental results conducted on different textures.

 

Keywords: - About five key words in alphabetical order, separated by comma

[1] J.F. Canny, ―A computational approach to edge detection", IEEE Trans. Pattern Anal. Machine Intell., 8(6), 1986, 769-798, 1986Y.
[2] R. Deriche, ―Using Canny's criteria to derive a recursively implemented optimal edge detector‖, Int. J. Computer Vision, 1(2), 1987, 187-197.
[3] M. Kass, A.Witkin and D. Terzopoulos, ―Snakes: Active contour models‖, Int. J. Computer Vision, 1(4), 1987, 321-331.
[4] L.D. Cohen, ―On active contour models and balloons‖, CVGIP: Image Understanding, 53(2), 1991, 211- 218.
[5] K. R. McCloy, ―Analysis and removal of the effects of crop management practices in remotely sensed images of agricultural fields,‖ Int. J. Remote Sens., 23, 2002, 403–416.

 

Paper Type

::

Research Paper

Title

::

Determining Experimental Transition Strengths of 52V by Two-Step Gamma Cascades

Country

::

Vietnam ‎

Authors

::

Nguyen An Son ||, Pham Dinh Khang ||, Nguyen Duc Hoa ||, Vuong Huu Tan ||, Nguyen Xuan Hai ||,

Dang Lanh ||, Pham Ngoc Son ||, Ho Huu Thang

Page No.

::

16-21

::
10.9790/3021-031141621
aned
::
0.4/3021-031141621 aned
iosrjen   3021-0311-0421 iosrjen

In this paper, the results showed experimental transition strengths of 52V by two-step gamma cascades, lifetime levels, width levels and branch ratio. 51V nucleus was activated by thermal neutron at the 3rd horizontal channel of Dalat nuclear reactor, and the 51V(nth, 2 gamma)52V reaction was applied in this research. The two-step gamma cascades were collected by event-event gamma coincidence system. The Summation of Amplitude Coincidence Pulses method (SACP) was treated with the experimental data. The results were not affected by background based on SACP method. This method got intensities, energies of two-step cascades directly. The experimental gamma transition strengths were applied to the single particle model. In comparison with the electromagnetic transition probabilities, and rule of multi orders, the spin and parity of intermediate levels were calculated and refreshed.

 

Keywords: - Two-step gamma cascade, 51V (nth, 2 gamma)52V, Gamma transition strength, Lifetime, Branch ratio, Spin and parity.

[1] Chart of the nuclides, 7th edition 2006.
[2] http://www-nds.iaea.org/pgaa/PGAAdatabase/LANL/isotopic/23V51.
[3] P. Van Assche, U. Gruber, B. P. Maier, H. R. Koch and O. W. B. Chult, J. Vervier, Level scheme and gamma transition in 52V, Nuclear physics 79 (1966), pp 565-567.
[4] D. H. White, B. G. Saunders, W. John and R. W. Jewell, Neutron-capture gamma ray studies of low-lying 52V levels, Nuclear physics 72 (1965), pp 241-253.
[5] J. B. M. De Haas, K. Abrahams, T. A. A. Tielens, H. Postma, W. J. Huiskamp, The 51V(n,)52V reaction studied with polarized neutrons and polarized vanadium nuclei, Nuclear Physics A419, (1984) 101-104.

 

Paper Type

::

Research Paper

Title

::

Influence of the maximum temperature of the thermal cycle on the properties and structure of the HAZ of steel S700MC

Country

::

Poland

Authors

::

Jacek Górka

Page No.

::

22-28

::
10.9790/3021-031142228
aned
::
0.4/3021-031142228 aned
iosrjen   3021-0311-0428 iosrjen

In this paper an influence of simulated thermal cycle on properties and HAZ structure of 10 mm thick S700MC steel plates. Simulation and recording of thermal cycles were tested on laboratory stand equipped in thermovision camera and resistant heat source. Simulation was prepared for simple and complex thermal cycle. Specimens were tested on impact, strength test and also hardness and metallographic tests. Results of researches gave the possibilities to show an influence of welding thermal cycle on properties and HAZ structure of S700MC steel. It was possible also to indicate an optimal linear energy range for welding with high quality.

 

Keywords: - HAZ, S700MC steel welding, TMCP welding thermal cycle

[1] Park K. S., Cho Y. H.: Comparison of fatigue properties of welded TMCP steels and normalized steel, Pohang University of Science and Technology, Pohang, Korea 2003.
[2] TMCP steel plates for building structures. Nippon Steel Corporation.
[3] Sueyoshi T., Ishikawa N., Iwase A.: The role of niobium in the retardation of the early stage of austenite recovery in hot-deformed steels. Materials Science and Engineering, vol. 250 (1998), No. 1, pp. 2-7.
[4] Yurioka N.: TMPC steels and their welding. Welding in the World. Vol. 35, 6/1995

[5] Zając Z., Langeborg R., Siwecki T.: The role of nitrogen in microalloyed steels. Microalloying 95. Pitsburg 1995

 

Paper Type

::

Research Paper

Title

::

Efficient Motion Estimation for Video Coding Using Depth Information

Country

::

South Korea

Authors

::

Soon-kak Kwon

Page No.

::

29-33

::
10.9790/3021-031142933
aned
::
0.4/3021-031142933 aned
iosrjen   3021-0311-0433 iosrjen

This paper presents the reducing method of the complexity in motion estimation for video coding by using the depth information. We obtain two regions of each picture within video sequence from distance information calculated by depth camera. Background region has large distance, but object region has small distance. If a current block is the object region, then motion is searched within the object region of reference picture. Also if a current block is the background region, then motion is searched within the background region of reference picture. From simulation results, we can see that the proposed method compared to the full search method remains the almost same as the motion estimated difference signal and significantly reduces the searching complexity.

 

Keywords: - Depth Information, Motion Estimation, Searching Complexity

[1] S.-k. Kwon, A. Tamhankar, and K. R. Rao, Overview of H.264/MPEG-4 Part 10, Journal of Visual Communications and Image Representation, 17( 2), 2006, 186-216.
[2] K. Ugur, K. Andersson, A. Fuldseth, G. Bjøntegaard, L. P. Endresen, J. Lainema, A. Hallapuro, J. Ridge, D. Rusanovskyy, C. Zhang, A. Norkin, C. Priddle, T. Rusert, J. Samuelsson, R. Sj¨oberg, and Z. Wu, High Performance, Low Complexity Video Coding and the Emerging HEVC Standard, IEEE Trans. Circuit Syst. Video Technology, 20(12), 2010, 1688-1697.
[3] W.-J. Han, J. Min, I.-K. Kim, E. Alshina, A. Alshin, T. Lee, J. Chen, V. Seregin, S. Lee, Y. M. Hong, M.-S. Cheon, N. Shlyakhov, K. McCann, T. Davies, and J.-H.Park, Improved Video Compression Efficiency through Flexible Unit Representation and Corresponding Extension of Coding Tools, IEEE Trans. Circuit Syst. Video Technology, 20( 12), 2010, 1709-1720.
[4] F. Bossen, V. Drugeon, E. Francois, J. Jung, S. Kanumuri, M. Narroschke, H. Sasai, J. Sole, Y. Suzuki, T. K. Tan, T. Wedi, S. Wittmann, and P. Yin, Y. Zheng, Video Coding using a Simplified Block Structure and Advanced Coding Techniques, IEEE Trans. Circuit Syst. Video Technology, 20(12), 2010, 1667-1675.

[5] S. Zhu and K.-K.Ma, A New Diamond Search Algorithm for Fast Block-Matching Motion Estimation, IEEE Trans. Circuit Syst. Video Technology, 10(2), 2000, 287-290.

 

Paper Type

::

Research Paper

Title

::

Design and Implementation plan of E-Tourism and Development: Sample Approach in KSA

Country

::

Saudi Arabia ‎

Authors

::

Prakash Kuppuswamy ||, Yahya Alqahtani

Page No.

::

34-39

::
10.9790/3021-031143439
aned
::
0.4/3021-031143439 aned
iosrjen   3021-0311-0439 iosrjen

In recent decades the tourism sector has grown rapidly to become a pillar of the global economy, political cooperation, social change and far - reaching advances in technology; both in communications and infrastructure. Tourism has closely been connected to progress of Information Communication Technology for over 30 years. With increasing complexity of tourism business models and tasks, there is a clear need of the next generation in tourism sector. Therefore, we proposing here new structure e-tourism which can support flexible automation, integration, computation, storage, and collaboration. In every year, millions of pilgrims visiting our Holy City, But on the part of tourism and development, Saudi Arabia is less than Europe, America and Asia in the sector of tours and travel development. There is no much significance research proposal or article on e-tourism & development in our Saudi Kingdom. This paper deals with e-tourism, innovation and designing proposal suitable for Kingdom of Saudi Arabia. Also we discussed about problems and solutions related to the e-tourism sector adoptable by the industry and government organization in Saudi Arabia.

 

Keywords: - E-tourism, Travel Agent, Web portal, Customer, ICT etc.,

[1] Teresa Garín-Muñoz, Teodosio Pérez-Amaral, "Internet Usage for Travel and Tourism. The Case of Spain", 21st European Regional ITS Conference, Cophenhagen, 13-15 Sep, 2010.
[2] Konstantinos G. Zografos, Michael A. Madas, "A travel & tourism information system providing real-time, value-added logistical services on the move", International conference, USA 2002.
[3] Helmut Berger, Michael Dittenbach, Dieter Merkl, Anton, Bogdanovych, ,Simeon Simoff, Carles Sierra, "Opening new dimensions for e-Tourism", 13 November 2006, Springer-Verlag London Limited 2006.
[4] M.G. Jaatun, G. Zhao, and C. Rong, "A Semantic Grid Oriented to E-Tourism", pp. 485‐496, CloudCom, LNCS 5931, , 2009.
[5] Maria Mavri, Vasilis Angelis, "Forecasting the Growth of e-Tourism Sector: The Case Study of Mediterranean Countries", Online at http://mpra.ub.uni-muenchen.de/25439/MPRA Paper No. 25439, posted 25, September 2010.

 

Paper Type

::

Research Paper

Title

::

Design A New Approach In Mobile Ad – Hoc Network Routing With Bandwidth Efficient Protocol

Country

::

India

Authors

::

Pallavi Kaura ||, Er. Harshit

Page No.

::

40-44

::
10.9790/3021-031144044
aned
::
0.4/3021-031144044 aned
iosrjen   3021-0311-0444 iosrjen

Ad hoc wireless networks consist of mobile nodes that communicate with each other without an infrastructure. A reduction in routing overload and efficient use of resources are two very important issues in these networks. In this paper, a new routing algorithm called POSITION BASED HYBRID ROUTING ALGORITHM (PBHRA)with BANDWIDTH. The main goal is effective use of static bandwidth by reducing the routing overload but also battery life, density, cost and delay time are efficiently used by reducing the amount of data to be held and the number of operations to be done for routing by any node in the network. In order to achieve above goals, the principle of DYNAMIC SOURCE ROUTING (DSR) protocol has been utilized.

 

Keyworkds: - Ad – Hoc, Routing, Wireless Routing, MATLAB

[1] Amandeep and Gurmeet Kaur, "Performance Analysis of ADOV Routing Protocols in MANETs" International Journal of Engineering Science and Technology(IJEST) ISSN: 0975-5462, Vol.4 No. 08 August 2012, pp: 3620 – 3625.
[2] A.K. Sharma and N. Bhatia, "Behavioral Study Of MANET Routing Protocols by using NS-2" International Journal Of Computation Engineering and Management, April 2011, Volume 12
[3] Mamoun Hussen Mamoun, "Location Aided Hybrid Routing Algorithm for MANET" in International Journal Of Engineering and Technology IJET/IJENS Vol. 11, No. 01, pp: 51-57, Feb 2011
[4] Resul Kara, Ibrahim Ozcelik and Huseyin Ekiz, "A new routing algorithm in MANETs: Position based hybrid routing" Scientific Research and Essays, 2010.
[5] Hossein Ashtiani, Shahpour Alirezaee, Seyed Mohsen Mir Hossein, Hamid Khoaravi, "PNR: New Position Based Routing Algorithm for Mobile Ad hoc Networks" Proceedings of the world congress on Engineering 2009 Vol. 1 WCE 2009, July 1 – 3, 2009 London, UK.

 

Paper Type

::

Review Paper

Title

::

Digital Video Watermarking Using Dwt And Pca

Country

::

India ‎

Authors

::

Supriya A. Patil ||, Prof. Navin Srivastava

Page No.

::

45-49

::
10.9790/3021-031144549
aned
::
0.4/3021-031144549 aned
iosrjen   3021-0311-0449 iosrjen

Digital Watermarking may be a technology used for the copyright protection of digital applications. During this paper, a comprehensive approach for watermarking digital video is introduced, and a hybrid digital video watermarking scheme based on Discrete Wavelet Transform (DWT) and Principal Component Analysis (PCA). PCA helps in reducing correlation among the wavelet coefficients obtained from wavelet decomposition of each video frame thereby dispersing the watermark bits into the uncorrelated coefficients. The video frames are first decompose using DWT and also the binary watermark is embedded in the principal components of the low frequency wavelet coefficients. An imperceptible high bit rate watermark embedded is robust against various attacks that will be carried out on the watermarked video, like filtering, geometric attacks and contrast adjustment.

 

Keywords: - Binary Watermark., Digital Video, Discrete Wavelet Transform , Inverse DWT, Inverse PCA, Principal Component Analysis.

[1] Yeo and M.M. Yeung, "Analysis and synthesis for new digital video applications," icip, International Conference on Image Processing (ICIP'97),vol. 1, pp.1,1997.

[2] M. Natarajan , G. Makhdumi1,"Safeguarding the Digital Contents: Digital Watermarking," DESIDOC Journal of Library & Information Technology, Vol. 29, May 2009, pp. 29-35.

[3] C.I. Podilchuk, E.J. Delp "Digital watermarking: algorithms and applications," Signal Processing Magazine, Vol 18,pp. 33-46,IEEE, July 2001.

[4] G. Doërr, J.L. Dugelay, "Security Pitfalls of Frame-by-Frame Approaches to Video Watermarking," Signal Processing, IEEE, Transactions, vol. 52, pp. 2955 – 2964, 2004.

[5] M. K. Thakur, V. Saxena, J. P.Gupta, "A Performance Analysis of Objective Video Quality Metrics for Digital Video Watermarking," Computer Science and Information Technology (ICCSIT), 2010, 3rd IEEE International Conference ,Vol. 4, pp. 12 - 17,2010.

 

Paper Type

::

Research Paper

Title

::

Cache Oblivious Matrix Transpositions using Sequential Processing

Country

::

India

Authors

::

korde P.S. ||, and Khanale P.B

Page No.

::

50-55

::
10.9790/3021-031145055
aned
::
0.4/3021-031145055 aned
iosrjen   3021-0311-0455 iosrjen

Matrix transpositions is a fundamental operation in linear algebra and in Fast Fourier transforms and applications in numerical analysis, image processing and graphics. The optimal cache oblivious matrix transpositions makes Ο (1+N2 / B) cache misses. In this paper we implement divide and conquer based algorithm for matrix transposition through recursive process.

 

Keywords: - Cache Memory; Cache oblivious; Cache hit; Cache miss; Tag.

A Locality Preserving Cache Memory Matrix Multiplication