An Advanced Moving Object Detection Algorithm for Automatic Traffic Monitoring In Real-World Limited Bandwidth Networks

Size: px
Start display at page:

Download "An Advanced Moving Object Detection Algorithm for Automatic Traffic Monitoring In Real-World Limited Bandwidth Networks"

Transcription

1 An Advanced Moving Object Detection Algorithm for Automatic Traffic Monitoring In Real-World Limited Bandwidth Networks K.G.S. Venkatesan 1, Dr. V. Khanaa 2, M.Sriram 3, Lekha Sri 4 Associate Professor, Dept. of C.S.E., Bharath University, Chennai. Tamil Nadu, India 1. Dean of Information Technology, Bharath University, Chennai, Tamil Nadu, India 2. Assistant Professor, Dept. of C.S.E., Bharath University, Chennai, Tamil Nadu, India 3. Dept. of C.S.E., Bharath University, Chennai, Tamil Nadu, India 4. ABSTRACT : Machine-controlled motion detection technology is Associate in nursing integral element of intelligent transportation systems, and is especially essential for management of traffic and maintenance of traffic police investigation systems. Traffic police investigation systems mistreatment video communication over real-world networks with restricted information measure typically encounter difficulties attributable to network congestion and/or unstable information measure. This is often particularly problematic in wireless video communication. This has necessitated the event of a rate management theme that alters the bit-rate to match the procurable network information measure, thereby manufacturing variable bit-rate video streams. However, complete and correct detection of moving objects beneath variable bit-rate video streams could be a terribly tough task. During this paper, we tend to propose Associate in nursing approach for motion detection that utilizes Associate in nursing analysis - primarily based radial basis perform network as its principal element. This approach is applicable not solely in high bit-rate video streams, however in low bit- rate video streams, as well. The planned approach consists of a varied background generation stage and a moving object detection stage. Throughout the assorted background generation stage, the lower-dimensional Eigen-patterns and also the adjustive background model are established in variable bit -rate video streams by mistreatment the planned approach so as to accommodate the properties of variable bit-rate video streams. Throughout the moving object detection stage, moving objects are extracted via the planned approach in each low bit -rate and high bit- rate video streams; detection results are then generated through the output worth of the planned approach. The detection results created through our approach indicate it to be extremely effective in variable bit-rate video streams over real-world restricted information measure networks. Additionally, the planned methodology will be simply achieved for period of time application. Quantitative and qualitative evaluations demonstrate that it offers blessings over different state- of-the -art ways. For example, and accuracy rates created via the planned approach were up to eighty six.38% and 89.88% beyond those created via different compared ways. KEYWORDS : Intelligent transportation systems, moving object detection, neural network, principal element analysis, variable bit-rate. I. INTRODUCTION IN RECENT years, intelligent transportation systems (ITS) became a crucial element of traffic management for the alleviation of traffic jam, advancement of transportation safety, and improvement of traffic flow. These systems integrate the utilization of advanced technologies such as intelligent computing, network communications, visual-based analysis, economical device physical science, and so on. One crucial issue of ITS that supports these tasks is that the ability to extract data concerning moving objects in traffic police investigation systems. Hence, automatic motion detection is a crucial component of traffic management [1]. It facilitates the gathering of elaborate data concerning traffic conditions, and it's additionally the primary essential method within the development of traffic police investigation systems which give object classification and pursuit, behavior recognition, activity analysis, and so on. Moreover, the applications of motion detection in traffic police investigation systems are several, and span from Copyright to IJIRCCE /ijircce

2 description and analysis of traffic things to pedestrian collision prediction and driver help [2]. According to previous analysis, existing approaches for motion detection in traffic police investigation systems will be divided loosely into the 3 categories: temporal distinction, optical flow, and background subtraction. Though temporal distinction approaches could also be adjustive to environmental changes, their use typically leads to incomplete detection of the shapes of moving objects. This is often very true once objects that are unmoving or feature restricted quality are gift. Optical flow approaches are utilized to sight moving objects by mistreatment the papered motion within the image plane with correct approximation [3]. Sadly, these ways inevitably end in the generation of noise and excess procedure burden. With the exception of the above-named classes, background subtraction approaches are wide used for the detection of moving objects attributable to their ability to accomplish correct detection of moving objects whereas exhibiting solely moderate procedure complexness. This is often achieved by scrutiny the variations between element options of this image and people of the reference background model of the previous image [4]. In this paper, we tend to propose a brand new theme that uses the Principal element Analysis-based Radial Basis perform Network, so as to sight moving objects in variable bit-rate video streams over real-world net-works with restricted information measure. The planned methodology is capable of providing the foremost complete and correct detection results of moving objects in each low bit-rate and high bit-rate video streams as compared with previous state- of- the- art back-ground subtraction ways. The key options of our planned methodology are organized into 2 planned stages as follows: 1) The initial planned stage involves the generation of assorted backgrounds. To accomplish this, the lower dimensional Eigen-patterns and a background model capable of adapting to completely different bit-rate video streams are made through the utilization of the PCA-based RBF network [5]. 2) Moving objects are detected within the second stage. To do so, every incoming element is mapped to the adjustive background model generated throughout the previous stage. By doing therefore, motion detection is accomplished fully and accurately in variable bit-rate video streams. II. BACKGROUND In the traffic recording platform, the video supply captured by traffic cameras is transmitted by wireless communication to a traffic analysis station when the video supply is compressed as bit- rate video streams within the video encoder. So as to attain the important -time video communication and avoid the network congestion within the restricted information measure of real-world networks, variable-bit-rate encryption for video streaming is typically created by using the video rate management technique [10]. Because of this, the video decoder within the traffic analysis station typically produces varied video qualities supported the cur-rent bit- rate of video streams. However, effective detection of moving objects in such environments will be problematic for many previous progressive background subtraction ways [9]. These fluctuations vary from low bit rate to high bit rate over a brief span of your time. The background models generated by previous background subtraction ways regard the stable background signals of the tree as background once in operation in low bit rate video streams. How-ever, once spare network information measure exists, the speed control theme will increase the bit rate of the streams to match the obtainable network information measure. Thus, high bit rate video streams are the result. It demonstrates that the previous back-ground subtraction ways simply mistake the high quality background signals as moving objects once they operate in high bit rate video streams. Copyright to IJIRCCE /ijircce

3 Video source Traffic recording Video encoder Encoderbuffer Surveillance Variable camera bit rate video streams Video detector wireless channel Variable bit rate video streams Rate control Traffic analysis station Motion detection Low video quality (a) (b) High video quality Low video quality (c) Detection results Limited networks bandwidth may lead to different video qualitiesmotion detection based on availability video quality Fig 1 : System overview of automatic motion detection via wireless communication in real-world networks with limited bandwidth. The rate management theme compensates by manufacturing low bit rate video streams. This will have a damaging impact on motion detection, as is illustrated in that shows that the signal of a moving vehicle within the low bit rate video stream may well be misinterpreted as background by previous background subtraction strategies. III. PAPERED PCA BASED RBF NETWORK APPROACH In this section, we tend to propose fully unique moving object segmentation approach that utilizes the PCA-based RBF network so as to completely and accurately sight moving objects in variable bit-rate video streams over real- world networks with restricted information measure. the fundamental part of the theme uses a PCA technique associate degreed a three- layer RBF network with an input layer, a hidden layer, associate degreed an output layer. The schematic of the network is bestowed [11]. Our PCA-based RBF network approach is performed in 2 stages: a numerous background generation stage and a moving object detection stage. Throughout the papered numerous background generation (VBG) stage, the properties of variable bit-rate video streams square measure accommodated effectively by exploitation the PCA-based RBF network through 2 papered method: a discriminative options extraction method associate degreed an adaptational background modeling process. Every incoming frame is split into equal-sized blocks, whereat the lower-dimensional Eigen-patterns square measure generated by the discriminative options extraction method by exploitation the PCA technique inside a lower-dimensional feature house for expressing the properties of variable bit- rate video streams. The adaptational background model method produces associate degree adaptational background model by utilizing the RBF network so as to facilitate the properties of variable bit-rate video streams. Afterward this data is transmitted as impulse to the hidden layer neurons for creation of the RBF structure [16]. After the papered VBG stage has been achieved, the moving object detection (MOD) stage will begin. Complete and correct motion detection is accomplished by utilizing the PCA -based RBF network via our papered two-procedure approach, that consists of a feature choice procedure associate degreed an object extraction procedure. The papered feature choice procedure eliminates unnecessary blocks from equal- sized blocks of incoming in close that the block options square measure classified as happiness to the background and afterward eliminated through use of the PCA Copyright to IJIRCCE /ijircce

4 technique in lower-dimensional feature house. currently that we've eliminated the blocks of background through the papered feature choice procedure, we will be able to sight moving objects inside solely those blocks that are thought to be happiness to the moving objects category. This can be accomplished by exploitation the article extraction procedure via the papered RBF network [18]. The motion detection flow diagram of papered PCA-based RBF network and illustrates the assorted back-ground generation stage and therefore the moving object detection stage. A. Numerous Background Generation : Discriminative options extraction process, So as to support a good vary of digital video process needs, the papered PCA-based RBF network is operated in color house. Thus, element consists of light ( ), blue-difference intensity ( ), and red-difference intensity ( ), the mixture of that determines the intensity of every element for every incoming video frame. To ensure adherence to the properties of variable bit-rate video streams throughout the discriminative options extraction method, the lower-dimensional Eigen-patterns area unit created from the statistic of every incoming frame by the optimum paperion vectors via the PCA technique. The optimum paperion vectors area unit dependent upon the most determinant of the overall scatter matrix of the papered samples [20]. B. Background Model Process : Motion detection in variable bit-rate video streams is incredibly troublesome to accomplish. It's vital to create certain that everyone the properties of variable bit-rate video streams area unit memorized through the adjustive back-ground model within the hidden layer of the RBF network. So as to get the adjustive background model via the RBF net-work, the euclidian distance is employed to calculate the gap between the intensity values of every incoming component and people of the corresponding background candidates to the transposition of the worth. Note that the block size are often set to sixteen, through empirical observation. In accordance with the PCA technique, the optimum paperion vectors area unit obtained [22]. C. Moving Object Detection 1) Feature choice Procedure: once the structure of the PCA-based RBF network had been established within the papered VBG stage, the incoming component is transferred to the input of the PCA-based RBF network within the color area throughout the papered MOD stage. Moving objects detected by exploitation ancient ways throughout lowto-high bit-rate variation sometimes exhibit serious whole generation because of misjudgment of most background signals as happiness to moving objects in high bit-rate environments. To beat this drawback, every incoming frame is split into size blocks, where-upon we tend to compare the similarity of every block by exploitation the PCA technique for elimination of extra blocks, that area unit indicated as happiness to the background category. 2) Object Extraction Procedure: once the feature choice procedure has been completed, all blocks that are deter-mined as happiness to the background category area unit eliminated and therefore the object extraction procedure will by selection operate in barely those blocks that area unit renowned to contain moving objects [23]. IV. EXPERIMENTAL RESULTS This explores the qualitative and quantitative evaluations accustomed comprehensively compare our PCA-based RBF network methodology to alternative progressive background sub-traction ways, as well as the SDE methodology, the MSDE methodology, the GMM methodology, the SSD methodology, and therefore the MTD methodology. This comparison is achieved through synthesis of video sequences of variable bit- rate by the utilization of Joint Model (JM) H.264/AVC reference computer code equipped by the JVT committee (Joint Video Team of ISO/IEC MPEG and ITU- T VCEG). Finally, the performance analysis of the papered methodology is rumored so as to demonstrate the procedure speed for time period applications [25]. A. Qualitative analysis: Copyright to IJIRCCE /ijircce

5 Subsequently, we tend to gift the results of a qualitative visual scrutiny so as to assess and compare the subjective effects of the detected binary objects mask of the various ways in relevance differing bit-rate video sequences. As incontestible through qualitative analysis, the utilization of the papered PCA-based RBF network methodology offers vital enhancements in detection results over those created by the opposite compared ways. These enhancements occurred systematically in each low and high bit-rate video streams over Real world networks with restricted information measure [28]. As are often discovered in, the CAM sequence options vital fluctuations in quality because of adaptation of the bitrate by the speed management theme to match the accessible net-work information measure [29]. Detection results for this case were generated through use of the SDE, MSDE, GMM, SSD, MTD, and PCA-based RBF network ways. The background models of the SDE, MSDE, GMM, SSD, and MTD ways regard these fluctuant signals as background in high bit-rate video streams once manufacturing detection results for frames 205 to 668. The SDE and MSDE ways use the filter techniques to pro-duce incomplete background models in high bit-rate environments. In relevance the GMM methodology, the utilization of mixture Gaussians techniques overly collects fluctuant signals in high bit-rate video streams [35]. Moreover, the SSD and MTD ways manufacture straightforward background models via the temporal average because the main criteria and maintain many reference frames as back-ground models, respectively. Each of those ways manufacture inadequate background models in high bit-rate video streams [36]. However, once network congestion is detected, the speed management theme decreases the bit-rate to match the accessible network information measure. Thus, low bit-rate video streams area unit created, as illustrated by frames 1383 to Once conferred with low bit-rate video streams, the SDE, MSDE, GMM, SSD, and MTD ways all mistake the signals of the moving vehicle as back-ground signals. This ends up in a failure to find the moving vehicle. In distinction, our PCAbased RBF network methodology accomplishes detection that's considerably a lot of complete and correct for all bitrates, as are often seen in frames 205 to As are often discovered in, the CP sequence options a shift in video quality from low to high because of a rise of the bit-rate by the speed management theme to match the free network information measure. Detection results for this case were generated through use of the SDE, MSDE, GMM, SSD, MTD, and PCA-based RBF network ways [39]. The stable background signals area unit thought to be such by the background models of the SDE, MSDE, GMM, SSD, and MTD ways in low bit-rate video streams once detection is conducted in frames fifty eight to eighty three. The data in low bit-rate environments is inadequate to ascertain complete background models for the SDE and MSDE ways that use filter techniques, also as for the GMM methodology that uses a mix Gaussians techniques. However, since spare network information measure is gift, the speed management theme should adapt the bit-rate to utilize the accessible network information measure [41]. This ends up in the assembly of high bit-rate video streams from frame 1118 to border Once conferred with high bit-rate video streams, the SDE, MSDE, and GMM ways mistake most high - quality fluctuant background signals as moving objects, so generating excessive noise. In distinction with the SDE, MSDE, and GMM ways, the SSD and MTD ways could attain passable detection results as shown in frame 1118 to border However, the generation of either noise or ghost trails cannot be avoided in these ways, as are often seen in frame 1118 and frame Neither methodology will to deal with such mass fluctuant signals in high bit-rate video streams as a result of the SSD methodology uses the temporal average because the main criteria, and therefore the MTD methodology holds many reference frames. In distinction, the papered PCA-based RBF network methodology attains superior detection results, demonstrating its effectualness in each low bit-rate and high bit-rate video streams, as shown in frame fifty eight to border 1133 [40]. As are often discovered in, the RD sequence options vital and frequent variation in video quality because of shifting of the bit-rate by the speed management theme to match the gettable network information measure [45]. Detection results for this case were generated through use of the SDE, MSDE, GMM, SSD, MTD, and PCA -based RBF network ways [48]. Due to the frequent changes in video stream bit-rate, the SDE, MSDE, GMM, SSD, and MTD ways cannot manufacture background models applicable for the detection moving objects in frames ninety five to 474. The detection results mirrored in frames one hundred and one to 474 indicate that the SDE, MSDE, and GMM ways generate unsatisfactory results with serious noise. Moreover, the detection results mirrored in frames 237 to 474 indicate that the SSD and MTD ways generate incomplete results once encountering frequent bit-rate variation in video streams [44]. Copyright to IJIRCCE /ijircce

6 Ultimately, our PCA-based RBF network methodology is in a position to utterly and accurately find moving objects in each low bit- rate and high bit-rate video streams. This can be because of its ability to accommodate bit-rate variation for all take a look at frames of the RD sequence [52]. B. Performance Results : The process speeds of the papered PCA-based RBF network technique, that was enforced by victimization C artificial language on associate degree Intel Core i5 three.10 gigacycle per second processor with four GB of RAM, running a Windows XP software system. we'veverified process speeds that area unit over thirty two FPS for every CIF check sequence. A lot of significantly, this means that the papered PCA-based RBF network technique will satisfy the process needs of period applications [51]. V. CONCLUSION AND FUTURE WORK In this paper, we tend to gift a brand new approach for the detection of moving objects by using a PCA-based RBF network for realistic traffic scenes in variable bit-rate video streams over real-world networks with restricted information measure. The pro-posed approach is split into 2 essential stages: a varied background generation stage and a moving object detection stage. throughout the assorted background generation stage, the lower- dimensional Eigenpatterns and also the reconciling background model area unit made via the PCA-based RBF network approach by victimization the papered 2 processes to satisfy the necessities of variable bit-rate video streams. Moreover, the structure of the PCA -based RBF network is formed during this stage. A two-process procedure supported the PCAbased RBF network approach is enforced throughout the papered moving object fiction stage to utterly and accurately detect moving objects in each low and high bit-rate video streams. Quantitative evaluations victimization the results of simulation experiments in variable bit-rate video streams clearly indicate that the PCA-based RBF network approach accomplishes the foremost complete and correct motion detection when put next with alternative progressive ways. These evaluations conjointly show that our approach attains a well higher degree of detection accuracy in each low bitrate and high bit- rate video streams. Moreover, our study demonstrates that the papered PCA-based RBF network approach will satisfy the process needs for period video applications in ITS. To the simplest of our information, we tend to area unit the primary analysis cluster to with success propose a motion detection approach for traffic police investigation systems with variable bit-rate video streams over real-world networks with restricted information measure. VI. ACKNOWLEDGEMENT The author would like to thank the Vice Chancellor, Dean-Engineering, Director, Secretary, Correspondent, HOD of Computer Science & Engineering, Dr. K.P. Kaliyamurthie, Bharath University, Chennai for their motivation and constant encouragement. The author would like to specially thank Dr. A. Kumaravel for his guidance and for critical review of this manuscript and for his valuable input and fruitful discussions in completing the work and the Faculty Members of Department of Computer Science &Engineering. Also, he takes privilege in extending gratitude to his parents and family members who rendered their support throughout this Research work. REFERENCES 1. L. L. Presti, S. Sclaroff, and M. L. Cascia, Path modeling and retrieval in distributed video surveillance databases, IEEE Trans. Multimedia, Vol. 14, No. 2, PP , Apr M. Saini, X. Wang, P. K. Atrey, and M. Kankanhalli, Adaptive work-load equalization in multi-camera surveillance systems, IEEE Trans.Multimedia, Vol. 14, No. 3, PP , Jun S. C. Huang and F. C. Cheng, Motion detection with pyramid structure of background model for intelligent surveillance systems, ELSEVIEREng. Appl. Artif. Intell., Vol. 25, No. 7, PP , Oct N. Buch, S. A. Velastin, and J. Orwell, A review of computer vision techniques for the analysis of urban traffic, IEEE Trans. Intell. Transp.Syst., Vol. 12, No. 3, PP , Sep M.-L. Shyu, Z. Xie, M. Chen, and S.-C. Chen, Video semantic event/concept detection using a subspace-based multimedia data mining framework, IEEE Trans. Multimedia, Vol. 10, No. 2, PP , Feb N. Li, J. J. Jain, and C. Busso, Modeling of driver behavior in real world scenarios using multiple noninvasive sensors, IEEE Trans. Multimedia, vol. 15, no. 5, pp , Aug Copyright to IJIRCCE /ijircce

7 7. S. C. Huang, F. C. Cheng, and Y. S. Chiu, Efficient contrast enhance-ment using adaptive gamma correction with weighting distribution, IEEE Trans. Image Process., vol. 22, no. 3, pp , Mar K.G.S. Venkatesan. Dr. V. Khanaa, Dr. A. Chandrasekar, Autonomous System( AS ) for mesh network by using packet transmission & failure detection, Inter. Journal of Innovative Research in computer & comm. Engineering, V ol. 2, Issu e 1 2, PP , D ec em b er B. Sundarraj, K.G.S. Venkatesan, M. Sriram, Vimal Chand, An Iaas cloud system with Federation Threshold,, International Journal of Innovative Research in computer & communication Engineering, Vol. 3, Issu e 3, P P , Ma rch K.G.S. Venkatesan and M. Elamurugaselvam, Design based object oriented Metrics to measure coupling & cohesion, International journal of Advanced & Innovative Research, Vol. 2, Issue 5, PP , S. Sathish Raja and K.G.S. Venkatesan, spam zombies scrutinizer in sending network Infrastructures, International journal of Scientific & Engineering Research, Vol. 4, Issue 4, PP , April K.G.S. Venkatesan, Comparison of CDMA & GSM Mobile Technology, Middle-East Journal of Scientific Research, 13 (12), PP , P. Indira Priya, K.G.S.Venkatesan, Finding the K-Edge connectivity in MANET using DLTRT, International Journal of Applied Engineering Research, Vol. 9, Issue 22, PP , K.G.S. Venkatesan and M. Elamurugaselvam, Using the conceptual cohesion of classes for fault prediction in object-oriented system, International journal of Advanced & Innovative Research, Vol. 2, Issue 4, PP , April Ms. J.Praveena, K.G.S. Venkatesan, Advanced Auto Adaptive edge-detection algorithm for flame monitoring & fire image processing, International Journal of Applied Engineering Research, Vol. 9, Issue 22, PP , K.G.S. Venkatesan. Dr. V. Khanna, Inclusion of flow management for Automatic & dynamic route discovery system by ARS, International Journal of Advanced Research in computer science & software Engg., Vol.2, Issue 12, PP. 1 9, December Needhu. C, K.G.S. Venkatesan, A System for Retrieving Information directly from online social network user Link, International Journal of Applied Engineering Research, Vol. 9, Issue 22, PP , K.G.S. Venkatesan, R. Resmi, R. Remya, Anonymizimg Geographic routing for preserving location privacy using unlinkability and unobservability, International Journal of Advanced Research in computer science & software Engg., Vol. 4, Issue 3, PP , March Selvakumari. P, K.G.S. Venkatesan, Vehicular communication using Fvmr Technique, International Journal of Applied Engineering Research, Vol. 9, Issue 22, PP , K.G.S. Venkatesan, G. Julin Leeya, G. Dayalin Leena, Efficient colour image watermarking using factor Entrenching method, International Journal of Advanced Research in computer science & software Engg., Vol. 4, Issue 3, PP , March Dr. K.P. Kaliyamerthie, K.G.S. Venkatesan, S. Sriram, N. Vijay, Richard Solomon, Neighborhood based framework, Active Learning,, International Journal of Innovative Research in computer & communication Engineering, Vo l. 3, Issu e 3, P P , Ma rch K.G.S. Venkatesan. Kausik Mondal, Abhishek Kumar, Enhancement of social network security by Third party application, International Journal of Advanced Research in computer science & software Engg., Vol. 3, Issue 3, PP , March R. Karthikeyan, K.G.S. Venkatesan, M.L. Ambikha, S. Asha, Assist Autism spectrum, Data Acquisition method using Spatio-temporal Model, International Journal of Innovative Research in computer & communication Engineering, V ol. 3, Issu e 2, PP , Fe bru a ry K.G.S. Venkatesan, Dr. Kathir. Viswalingam, N.G. Vijitha, Associate Adaptable Transactions Information store in the cloud using Distributed storage and meta data manager, International Journal of Innovative Research in computer & communication Engineering, V ol. 3, I s su e 3, PP , Ma rch K.G.S. Venkatesan, Dr. V. Khanaa, Jay Prakash Thakur, Banbari Kumar, Mining User profile Exploitation cluster from computer program Logs, International Journal of Innovative Research in computer & communication Engineering, V ol. 3, Issu e 3, PP , Ma rch K.G.S. Venkatesan. Kishore, Mukthar Hussain, SAT : A Security Architecture in wireless mesh networks, International Journal of Advanced Research in computer science & software Engineering, Vol. 3, Issue 3, PP , April K.G.S. Venkatesan, Planning in FARS by dynamic multipath reconfiguration system failure recovery in wireless mesh network, International Journal of Innovative Research in computer & comm. Engineering, V ol. 2, I s su e 8, Au gu s t B. Sundarraj, K.G.S. Venkatesan, Vimal Chand, A Stochastic Model to Investigate Data center performance & QOS in IaaS cloud computing systems,, International Journal of Innovative Research in computer & communication Engineering, V ol. 3, I s su e 3, PP , Ma rch K.G.S. Venkatesan, AR. Arunachalam, S. Vijayalakshmi, V. Vinotha, Implementation of optimized cost, Load & service monitoring for grid computing, International Journal of Innovative Research in computer & comm. Engineering, V ol. 3, Issu e 2, PP , Fe bru a ry K.G.S. Venkatesan, B. Sundar Raj, V. Keerthiga, M. Aishwarya, Transmission of data between sensors by devolved Recognition, International Journal of Innovative Research in computer & comm. Engineering, V ol. 3, I s su e 2, P P , Fe bru a ry Anish Kumar Anbakarasan, Ilampiria Nagarajan, K.G.S. Venkatesan, Moral Hacking : A way to boost data security by using vulnerability scanning Tools,, International Journal of Innovative Research in computer & communication Engineering, V ol. 3, Issu e 3, P P , Ma rch K.G.S. Venkatesan, N.G. Vijitha, R. Karthikeyan, Secure data transaction in Multi cloud using Two-phase validation, International Journal of Innovative Research in computer & comm. Engineering, Vo l. 3, I s su e 2, P P , Feb ru a ry K. Dhanalakshmi, A. Anitha, G. Michael, K.G.S. Venkatesan, Recommendation system based on clustering & collaborative Filtering, International Journal of Innovative Research in computer & communication Engineering, Vo l. 3, Issu e 3, P P , Ma rch K.G.S. Venkatesan, Automatic Detection and control of Malware spread in decentralized peer to peer network, International Journal of Innovative Research in computer & comm. Engineering, V ol. 1, I s su e 7, PP , Se pt em b er Copyright to IJIRCCE /ijircce

8 35. Satthish Raja, S K.G.S. Venkatesan, Electronic Mail spam zombies purify in connection, International Journal of Advanced Research in Computer Science Engineering & Information Technology, Vol. 1, Issue 1, PP , June K.G.S. Venkatesan. Dr. V. Khanna, S.B. Amarnath Reddy, Providing Security for social Networks from Inference Attack, International Journal of Computer Science Engineering & Scientific Technology, March A.R. Arunachalam, K.G.S. Venkatesan, Abdul Basith.K.V., M. Sriram, Traffic Identification Method Engine : An open platform for Traffic classification,, International Journal of Innovative Research in computer & communication Engineering, V ol. 3, I s su e 3, PP , Ma rch K.G.S. Venkatesan, Dr. Kathir. Viswalingam, N.G. Vijitha, Associate Adaptable Transactions Information store in the cloud using Distributed storage and meta data manager, International Journal of Innovative Research in computer & communication Engineering, V ol. 3, I s su e 3, PP , Ma rch K.G.S. Venkatesan, Dr. V. Khanna, Jay Prakash Thakur, Banbari Kumar, Mining User profile Exploitation cluster from computer program Logs, International Journal of Innovative Research in computer & communication Engineering, V ol. 3, Issu e 3, PP , Ma rch Ms.J.Praveena, K.G.S.Venkatesan, Advanced Auto Adaptive edge-detection algorithm for flame monitoring & fire image processing, International Journal of Applied Engineering Research, Vol. 9, Issue 22, PP , K.G.S.Venkatesan, Planning in FARS by dynamic multipath reconfiguration system failure recovery in wireless mesh network, International Journal of Innovative Research in computer & comm. Engineering, V ol. 2, I s su e 8, Au gu st K.G.S. Venkatesan, Dr. V. Khanna, S.B. Amarnath Reddy, Network Monitoring using Test Packet Generation, IJSCONLINE, PP. 1-12, March K.G.S. Venkatesan, Dr. V. Khanaa, Dr. A. Chandrasekar, Reduced path, Sink failures in Autonomous Network Reconfiguration System ( ANRS ) Techniques, International Journal of Innovative Research in computer & communication Engineering, V ol. 3, Issu e 3, PP , Ma rch S. Srigowthem, K.G.S. Venkatesan, Sourav Kumar Nag, Suraj Raj, Human Effects to enhance clustering Techniques that Assists user in grouping the Friends, International Journal of Innovative Research in computer & communication Engineering, Vo l. 3, I s su e 3, PP , Ma rch K.G.S. Venkatesan, U. Muthu Selvam, J. Samualprabhu, Multi-Hop overlay Transport for high throughput transfers in the Internet, International Journal of Innovative Research in computer & communication Engineering, Vo l. 3, Issu e 3, P P , Ma rch Akyildiz, I.,Wang,X., and Wang,W.,2005, Wireless mesh networks: A survey, Computer Networks., Vol. 47, No.4, PP Kyu-Han Kim, Member, IEEE, and Kang G. Shin,Fellow, IEEE, ACM, 2011, Self-Reconfigurable Wireless Mesh Networks IEEE/ACMTRANSACTIONS ON NETWORKING, Vol. 19, No Kodialam,M., and Nandagopal,T.,2005 Characterizing the capacity region in multi-radio multi-channel wireless mesh networks, in Proc. ACM MobiCom, Cologne,Germany, PP K.G.S. Venkatesan and M. Elamurugaselvam, Design based object oriented Metrics to measure coupling & cohesion, International journal of Advanced & Innovative Research, Vol. 2, Issue 5, PP , K.G.S. Venkatesan, Dr. V. Khanaa, Dr. A. Chandrasekar, Reduced path, Sink failures in Autonomous Network Reconfiguration System ( ANRS ) Techniques, International Journal of Innovative Research in computer & communication Engineering, V ol. 3, Issu e 3, PP , Ma rch K.G.S. Venkatesan. Dr. V. Khanaa, Dr. A. Chandrasekar, Autonomous System( AS ) for mesh network by using packet transmission & failure detection, Inter. Journal of Innovative Research in computer & comm. Engineering, V ol. 2, Issu e 1 2, PP , D ec em b er Brzezinski,M., Zussman,G., and Modiano,E., 2006 Enabling distributed throughput maximization in wireless mesh networks: A partitioning approach, in Proc. ACM MobiCom, Los Angeles, CA, PP Copyright to IJIRCCE /ijircce

An Iaas Cloud System with Federation Threshold

An Iaas Cloud System with Federation Threshold An Iaas Cloud System with Federation Threshold B. Sundarraj 1, K.G.S. Venkatesan 2, M. Sriram 3, Vimal Chand 4 Assistant Professor, Dept. of C.S.E., Bharath University, Chennai, India 1 Associate Professor,

More information

SLA Based Resource Allocation as a Service Provider (SaaS) in Cloud Computing Environments

SLA Based Resource Allocation as a Service Provider (SaaS) in Cloud Computing Environments SLA Based Resource Allocation as a Service Provider (SaaS) in Cloud Computing Environments K.Adithya Narayanan, Monish Joel Singh, D.Kerana Hanirex, K.G.S. Venkatesan Dept. of C.S.E., Bharath University,

More information

Hybrid Passive and Active Surveillance Approach with Interchangeable Filters and a Time Window Mechanism for Performance Monitoring

Hybrid Passive and Active Surveillance Approach with Interchangeable Filters and a Time Window Mechanism for Performance Monitoring International Journal of Computer Sciences and Engineering Vol.-4(4), PP(25-29) April 2016, E-ISSN: 2347-2693 International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4,

More information

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management

More information

CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM

CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM Mohammad Badruzzama Khan 1, Ayesha Romana 2, Akheel Mohammed

More information

Speed Performance Improvement of Vehicle Blob Tracking System

Speed Performance Improvement of Vehicle Blob Tracking System Speed Performance Improvement of Vehicle Blob Tracking System Sung Chun Lee and Ram Nevatia University of Southern California, Los Angeles, CA 90089, USA sungchun@usc.edu, nevatia@usc.edu Abstract. A speed

More information

Performance Analysis and Comparison of JM 15.1 and Intel IPP H.264 Encoder and Decoder

Performance Analysis and Comparison of JM 15.1 and Intel IPP H.264 Encoder and Decoder Performance Analysis and Comparison of 15.1 and H.264 Encoder and Decoder K.V.Suchethan Swaroop and K.R.Rao, IEEE Fellow Department of Electrical Engineering, University of Texas at Arlington Arlington,

More information

Parametric Comparison of H.264 with Existing Video Standards

Parametric Comparison of H.264 with Existing Video Standards Parametric Comparison of H.264 with Existing Video Standards Sumit Bhardwaj Department of Electronics and Communication Engineering Amity School of Engineering, Noida, Uttar Pradesh,INDIA Jyoti Bhardwaj

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

Database Security with Access Control and Assured Deletion Using Cryptographic Key

Database Security with Access Control and Assured Deletion Using Cryptographic Key Database Security with Access Control and Assured Deletion Using Cryptographic Key S.Sumathi 1, K.G.S.Venkatesan 2, R.Karthikeyan 3 Dept. of C.S.E., Bharath University ( BIHER ), Chennai, Tamil Nadu, India

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet

Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet DICTA2002: Digital Image Computing Techniques and Applications, 21--22 January 2002, Melbourne, Australia Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet K. Ramkishor James. P. Mammen

More information

REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING

REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING Ms.PALLAVI CHOUDEKAR Ajay Kumar Garg Engineering College, Department of electrical and electronics Ms.SAYANTI BANERJEE Ajay Kumar Garg Engineering

More information

A Routing Metric for Load-Balancing in Wireless Mesh Networks

A Routing Metric for Load-Balancing in Wireless Mesh Networks A Routing Metric for Load-Balancing in Wireless Mesh Networks Liang Ma and Mieso K. Denko Department of Computing and Information Science University of Guelph, Guelph, Ontario, Canada, N1G 2W1 email: {lma02;mdenko}@uoguelph.ca

More information

The Scientific Data Mining Process

The Scientific Data Mining Process Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In

More information

Cloud Computing for Agent-based Traffic Management Systems

Cloud Computing for Agent-based Traffic Management Systems Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion

More information

Semantic Video Annotation by Mining Association Patterns from Visual and Speech Features

Semantic Video Annotation by Mining Association Patterns from Visual and Speech Features Semantic Video Annotation by Mining Association Patterns from and Speech Features Vincent. S. Tseng, Ja-Hwung Su, Jhih-Hong Huang and Chih-Jen Chen Department of Computer Science and Information Engineering

More information

Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms

Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Kirill Krinkin Open Source and Linux lab Saint Petersburg, Russia kirill.krinkin@fruct.org Eugene Kalishenko Saint Petersburg

More information

IMPROVING QUALITY OF VIDEOS IN VIDEO STREAMING USING FRAMEWORK IN THE CLOUD

IMPROVING QUALITY OF VIDEOS IN VIDEO STREAMING USING FRAMEWORK IN THE CLOUD IMPROVING QUALITY OF VIDEOS IN VIDEO STREAMING USING FRAMEWORK IN THE CLOUD R.Dhanya 1, Mr. G.R.Anantha Raman 2 1. Department of Computer Science and Engineering, Adhiyamaan college of Engineering(Hosur).

More information

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol

More information

AUTOMATIC ACCIDENT DETECTION AND AMBULANCE RESCUE WITH INTELLIGENT TRAFFIC LIGHT SYSTEM

AUTOMATIC ACCIDENT DETECTION AND AMBULANCE RESCUE WITH INTELLIGENT TRAFFIC LIGHT SYSTEM AUTOMATIC ACCIDENT DETECTION AND AMBULANCE RESCUE WITH INTELLIGENT TRAFFIC LIGHT SYSTEM Mr.S.Iyyappan 1, Mr.V.Nandagopal 2 P.G Scholar, Dept. of EEE, Ganadipathy Tulis s Jain Engineering College, Vellore,

More information

ISSN: 2348 9510. A Review: Image Retrieval Using Web Multimedia Mining

ISSN: 2348 9510. A Review: Image Retrieval Using Web Multimedia Mining A Review: Image Retrieval Using Web Multimedia Satish Bansal*, K K Yadav** *, **Assistant Professor Prestige Institute Of Management, Gwalior (MP), India Abstract Multimedia object include audio, video,

More information

Internet Video Streaming and Cloud-based Multimedia Applications. Outline

Internet Video Streaming and Cloud-based Multimedia Applications. Outline Internet Video Streaming and Cloud-based Multimedia Applications Yifeng He, yhe@ee.ryerson.ca Ling Guan, lguan@ee.ryerson.ca 1 Outline Internet video streaming Overview Video coding Approaches for video

More information

Mobile video streaming and sharing in social network using cloud by the utilization of wireless link capacity

Mobile video streaming and sharing in social network using cloud by the utilization of wireless link capacity www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 7 July, 2014 Page No. 7247-7252 Mobile video streaming and sharing in social network using cloud by

More information

Using Data Mining for Mobile Communication Clustering and Characterization

Using Data Mining for Mobile Communication Clustering and Characterization Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer

More information

JAVA IEEE 2015. 6 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites Data Mining

JAVA IEEE 2015. 6 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites Data Mining S.NO TITLES Domains 1 Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing 2 Anonymizing Collections of Tree-Structured Data 3 Making Digital Artifacts on the Web Verifiable and

More information

Synthetic Aperture Radar: Principles and Applications of AI in Automatic Target Recognition

Synthetic Aperture Radar: Principles and Applications of AI in Automatic Target Recognition Synthetic Aperture Radar: Principles and Applications of AI in Automatic Target Recognition Paulo Marques 1 Instituto Superior de Engenharia de Lisboa / Instituto de Telecomunicações R. Conselheiro Emídio

More information

Securing MANET Using Diffie Hellman Digital Signature Scheme

Securing MANET Using Diffie Hellman Digital Signature Scheme Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2

More information

Data sets preparing for Data mining analysis by SQL Horizontal Aggregation

Data sets preparing for Data mining analysis by SQL Horizontal Aggregation Data sets preparing for Data mining analysis by SQL Horizontal Aggregation V.Nikitha 1, P.Jhansi 2, K.Neelima 3, D.Anusha 4 Department Of IT, G.Pullaiah College of Engineering and Technology. Kurnool JNTU

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

Dynamic Scheduling and Pricing in Wireless Cloud Computing

Dynamic Scheduling and Pricing in Wireless Cloud Computing Dynamic Scheduling and Pricing in Wireless Cloud Computing R.Saranya 1, G.Indra 2, Kalaivani.A 3 Assistant Professor, Dept. of CSE., R.M.K.College of Engineering and Technology, Puduvoyal, Chennai, India.

More information

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks 2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh

More information

Automated Reconfiguration Enabled Mesh Network based on Fuzzy Logic for Performance Improvement

Automated Reconfiguration Enabled Mesh Network based on Fuzzy Logic for Performance Improvement Automated Reconfiguration Enabled Mesh Network based on Fuzzy Logic for Performance Improvement Vijaykumar Naik Pawar M.Tech., Dept of CSE KLS Gogte Institute of Technology Udyambag, Belagavi, Karnataka,

More information

Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems

Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Impact of Feature Selection on the Performance of ireless Intrusion Detection Systems

More information

IEEE JAVA Project 2012

IEEE JAVA Project 2012 IEEE JAVA Project 2012 Powered by Cloud Computing Cloud Computing Security from Single to Multi-Clouds. Reliable Re-encryption in Unreliable Clouds. Cloud Data Production for Masses. Costing of Cloud Computing

More information

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,

More information

Journal of Industrial Engineering Research. Adaptive sequence of Key Pose Detection for Human Action Recognition

Journal of Industrial Engineering Research. Adaptive sequence of Key Pose Detection for Human Action Recognition IWNEST PUBLISHER Journal of Industrial Engineering Research (ISSN: 2077-4559) Journal home page: http://www.iwnest.com/aace/ Adaptive sequence of Key Pose Detection for Human Action Recognition 1 T. Sindhu

More information

A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET

A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET S.Suganya Sr.Lecturer, Dept. of Computer Applications, TamilNadu College of Engineering, Coimbatore, India Dr.S.Palaniammal Prof.& Head,

More information

10CS64: COMPUTER NETWORKS - II

10CS64: COMPUTER NETWORKS - II QUESTION BANK 10CS64: COMPUTER NETWORKS - II Part A Unit 1 & 2: Packet-Switching Networks 1 and Packet-Switching Networks 2 1. Mention different types of network services? Explain the same. 2. Difference

More information

Modeling and Design of Intelligent Agent System

Modeling and Design of Intelligent Agent System International Journal of Control, Automation, and Systems Vol. 1, No. 2, June 2003 257 Modeling and Design of Intelligent Agent System Dae Su Kim, Chang Suk Kim, and Kee Wook Rim Abstract: In this study,

More information

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM Macha Arun 1, B.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Holy Mary

More information

2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment

2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment R&D supporting future cloud computing infrastructure technologies Research and Development on Autonomic Operation Control Infrastructure Technologies in the Cloud Computing Environment DEMPO Hiroshi, KAMI

More information

Architecture of distributed network processors: specifics of application in information security systems

Architecture of distributed network processors: specifics of application in information security systems Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia vlad@neva.ru 1. Introduction Modern

More information

Study and Implementation of Video Compression standards (H.264/AVC, Dirac)

Study and Implementation of Video Compression standards (H.264/AVC, Dirac) Study and Implementation of Video Compression standards (H.264/AVC, Dirac) EE 5359-Multimedia Processing- Spring 2012 Dr. K.R Rao By: Sumedha Phatak(1000731131) Objective A study, implementation and comparison

More information

SBSCET, Firozpur (Punjab), India

SBSCET, Firozpur (Punjab), India Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based

More information

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate

More information

G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418

G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418 An Analytical Model to evaluate the Approaches of Mobility Management 1 G.Vijaya Kumar, *2 A.Lakshman Rao *1 M.Tech (CSE Student), Pragati Engineering College, Kakinada, India. Vijay9908914010@gmail.com

More information

INTEROPERABLE FEATURES CLASSIFICATION TECHNIQUE FOR CLOUD BASED APPLICATION USING FUZZY SYSTEMS

INTEROPERABLE FEATURES CLASSIFICATION TECHNIQUE FOR CLOUD BASED APPLICATION USING FUZZY SYSTEMS INTEROPERABLE FEATURES CLASSIFICATION TECHNIQUE FOR CLOUD BASED APPLICATION USING FUZZY SYSTEMS * C. Saravanakumar 1 and C. Arun 2 1 Department of Computer Science and Engineering, Sathyabama University,

More information

MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL

MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL G. Maria Priscilla 1 and C. P. Sumathi 2 1 S.N.R. Sons College (Autonomous), Coimbatore, India 2 SDNB Vaishnav College

More information

Study and Implementation of Video Compression Standards (H.264/AVC and Dirac)

Study and Implementation of Video Compression Standards (H.264/AVC and Dirac) Project Proposal Study and Implementation of Video Compression Standards (H.264/AVC and Dirac) Sumedha Phatak-1000731131- sumedha.phatak@mavs.uta.edu Objective: A study, implementation and comparison of

More information

Automatic Calibration of an In-vehicle Gaze Tracking System Using Driver s Typical Gaze Behavior

Automatic Calibration of an In-vehicle Gaze Tracking System Using Driver s Typical Gaze Behavior Automatic Calibration of an In-vehicle Gaze Tracking System Using Driver s Typical Gaze Behavior Kenji Yamashiro, Daisuke Deguchi, Tomokazu Takahashi,2, Ichiro Ide, Hiroshi Murase, Kazunori Higuchi 3,

More information

Planning in FARS by dynamic multipath Reconfiguration system failure recovery in Wireless Mesh Network

Planning in FARS by dynamic multipath Reconfiguration system failure recovery in Wireless Mesh Network Planning in FARS by dynamic multipath Reconfiguration system failure recovery in Wireless Mesh Network K.G.S. VENKATESAN 1 Associate Professor, Dept. of CSE, Bharath University, Chennai 1 ABSTRACT: Mesh

More information

Mobile Multimedia Meet Cloud: Challenges and Future Directions

Mobile Multimedia Meet Cloud: Challenges and Future Directions Mobile Multimedia Meet Cloud: Challenges and Future Directions Chang Wen Chen State University of New York at Buffalo 1 Outline Mobile multimedia: Convergence and rapid growth Coming of a new era: Cloud

More information

Spam Filtering in Online Social Networks Using Machine Learning Technique

Spam Filtering in Online Social Networks Using Machine Learning Technique Spam Filtering in Online Social Networks Using Machine Learning Technique T.Suganya 1, T.Hemalatha 2 ME (final year), Department of Computer Science and Engineering, Karpagam University, Coimbatore, India

More information

ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at:

More information

DESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER

DESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE DESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER M.Vishwashanthi 1, S.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Anurag Group

More information

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram. Protection of Vulnerable Virtual machines from being compromised as zombies during DDoS attacks using a multi-phase distributed vulnerability detection & counter-attack framework Ashok Kumar Gonela MTech

More information

Distributed Framework for Data Mining As a Service on Private Cloud

Distributed Framework for Data Mining As a Service on Private Cloud RESEARCH ARTICLE OPEN ACCESS Distributed Framework for Data Mining As a Service on Private Cloud Shraddha Masih *, Sanjay Tanwani** *Research Scholar & Associate Professor, School of Computer Science &

More information

EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set

EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set Amhmed A. Bhih School of Electrical and Electronic Engineering Princy Johnson School of Electrical and Electronic Engineering Martin

More information

Comparison of K-means and Backpropagation Data Mining Algorithms

Comparison of K-means and Backpropagation Data Mining Algorithms Comparison of K-means and Backpropagation Data Mining Algorithms Nitu Mathuriya, Dr. Ashish Bansal Abstract Data mining has got more and more mature as a field of basic research in computer science and

More information

Figure 1. The cloud scales: Amazon EC2 growth [2].

Figure 1. The cloud scales: Amazon EC2 growth [2]. - Chung-Cheng Li and Kuochen Wang Department of Computer Science National Chiao Tung University Hsinchu, Taiwan 300 shinji10343@hotmail.com, kwang@cs.nctu.edu.tw Abstract One of the most important issues

More information

An Experimental Study of the Performance of Histogram Equalization for Image Enhancement

An Experimental Study of the Performance of Histogram Equalization for Image Enhancement International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Special Issue-2, April 216 E-ISSN: 2347-2693 An Experimental Study of the Performance of Histogram Equalization

More information

Mobile Tracking and Resource Reservation Scheme for Cellular Networks

Mobile Tracking and Resource Reservation Scheme for Cellular Networks Mobile Tracking and Resource Reservation Scheme for Cellular Networks Subbiah Shenbagaraman, B. Prabhakaran, S. Venkatesan Department of Computer Science, University of Texas at Dallas, Richardson, USA,

More information

PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA

PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA International Research Journal of Engineering and Technology (IRJET) e-issn: -00 Volume: 0 Issue: 0 Oct-01 www.irjet.net p-issn: -00 PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET

More information

Wireless Ultrasound Video Transmission for Stroke Risk Assessment: Quality Metrics and System Design

Wireless Ultrasound Video Transmission for Stroke Risk Assessment: Quality Metrics and System Design Wireless Ultrasound Video Transmission for Stroke Risk Assessment: Quality Metrics and System Design A. Panayides 1, M.S. Pattichis 2, C. S. Pattichis 1, C. P. Loizou 3, M. Pantziaris 4 1 A.Panayides and

More information

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. prashil.waghmare14@gmail.com

More information

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,

More information

Design of Multi-camera Based Acts Monitoring System for Effective Remote Monitoring Control

Design of Multi-camera Based Acts Monitoring System for Effective Remote Monitoring Control 보안공학연구논문지 (Journal of Security Engineering), 제 8권 제 3호 2011년 6월 Design of Multi-camera Based Acts Monitoring System for Effective Remote Monitoring Control Ji-Hoon Lim 1), Seoksoo Kim 2) Abstract With

More information

Gaming as a Service. Prof. Victor C.M. Leung. The University of British Columbia, Canada www.ece.ubc.ca/~vleung

Gaming as a Service. Prof. Victor C.M. Leung. The University of British Columbia, Canada www.ece.ubc.ca/~vleung Gaming as a Service Prof. Victor C.M. Leung The University of British Columbia, Canada www.ece.ubc.ca/~vleung International Conference on Computing, Networking and Communications 4 February, 2014 Outline

More information

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,

More information

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

A Review of Anomaly Detection Techniques in Network Intrusion Detection System A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental

More information

A Dynamic Approach to Extract Texts and Captions from Videos

A Dynamic Approach to Extract Texts and Captions from Videos Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

Image Compression through DCT and Huffman Coding Technique

Image Compression through DCT and Huffman Coding Technique International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul

More information

Continuous Fastest Path Planning in Road Networks by Mining Real-Time Traffic Event Information

Continuous Fastest Path Planning in Road Networks by Mining Real-Time Traffic Event Information Continuous Fastest Path Planning in Road Networks by Mining Real-Time Traffic Event Information Eric Hsueh-Chan Lu Chi-Wei Huang Vincent S. Tseng Institute of Computer Science and Information Engineering

More information

A Novel Pathway for Portability of Networks and Handing-on between Networks

A Novel Pathway for Portability of Networks and Handing-on between Networks A Novel Pathway for Portability of Networks and Handing-on between Networks D. S. Dayana #1, S. R. Surya #2 Department of Computer Applications, SRM University, Chennai, India 1 dayanads@rediffmail.com

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

Self-Compressive Approach for Distributed System Monitoring

Self-Compressive Approach for Distributed System Monitoring Self-Compressive Approach for Distributed System Monitoring Akshada T Bhondave Dr D.Y Patil COE Computer Department, Pune University, India Santoshkumar Biradar Assistant Prof. Dr D.Y Patil COE, Computer

More information

Performance Analysis of Mobility Pattern for Vehicular Ad-Hoc Network Using Various Routing Protocols

Performance Analysis of Mobility Pattern for Vehicular Ad-Hoc Network Using Various Routing Protocols International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-2 E-ISSN: 2347-2693 Performance Analysis of Mobility Pattern for Vehicular Ad-Hoc Network Using Various

More information

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of

More information

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network P. Shiva Kumar $, Rinki Sharma *, G.Varaprasad # $ Department of Information Technology Acharya Institute of Management and

More information

DEVELOPMENT OF SMART FIREWALL LOAD BALANCING FRAMEWORK FOR MULTIPLE FIREWALLS WITH AN EFFICIENT HEURISTIC FIREWALL RULE SET

DEVELOPMENT OF SMART FIREWALL LOAD BALANCING FRAMEWORK FOR MULTIPLE FIREWALLS WITH AN EFFICIENT HEURISTIC FIREWALL RULE SET DEVELOPMENT OF SMART FIREWALL LOAD BALANCING FRAMEWORK FOR MULTIPLE FIREWALLS WITH AN EFFICIENT HEURISTIC FIREWALL RULE SET 1 R. BALA KRISHNAN, 2 Dr. N. K. SAKTHIVEL 1 School of Computing, SASTRA University,

More information

Proof of Retrivability: A Third Party Auditor Using Cloud Computing

Proof of Retrivability: A Third Party Auditor Using Cloud Computing Proof of Retrivability: A Third Party Auditor Using Cloud Computing Vijayaraghavan U 1, Madonna Arieth R 2, Geethanjali K 3 1,2 Asst. Professor, Dept of CSE, RVS College of Engineering& Technology, Pondicherry

More information

ISSN: 2321-7782 (Online) Volume 3, Issue 7, July 2015 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 3, Issue 7, July 2015 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 3, Issue 7, July 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

Neural Network based Vehicle Classification for Intelligent Traffic Control

Neural Network based Vehicle Classification for Intelligent Traffic Control Neural Network based Vehicle Classification for Intelligent Traffic Control Saeid Fazli 1, Shahram Mohammadi 2, Morteza Rahmani 3 1,2,3 Electrical Engineering Department, Zanjan University, Zanjan, IRAN

More information

FPGA Implementation of Human Behavior Analysis Using Facial Image

FPGA Implementation of Human Behavior Analysis Using Facial Image RESEARCH ARTICLE OPEN ACCESS FPGA Implementation of Human Behavior Analysis Using Facial Image A.J Ezhil, K. Adalarasu Department of Electronics & Communication Engineering PSNA College of Engineering

More information

Wireless Sensor Network: Challenges, Issues and Research

Wireless Sensor Network: Challenges, Issues and Research ISBN 978-93-84468-20-0 Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015) Singapore, March 29-30, 2015, pp. 224-228 Wireless Sensor Network: Challenges, Issues

More information

HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER

HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER Gholamreza Anbarjafari icv Group, IMS Lab, Institute of Technology, University of Tartu, Tartu 50411, Estonia sjafari@ut.ee

More information

VEHICLE LOCALISATION AND CLASSIFICATION IN URBAN CCTV STREAMS

VEHICLE LOCALISATION AND CLASSIFICATION IN URBAN CCTV STREAMS VEHICLE LOCALISATION AND CLASSIFICATION IN URBAN CCTV STREAMS Norbert Buch 1, Mark Cracknell 2, James Orwell 1 and Sergio A. Velastin 1 1. Kingston University, Penrhyn Road, Kingston upon Thames, KT1 2EE,

More information

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc 5775 Morehouse Dr, Sam Diego, CA 92122. USA nandakishore@qualcomm.com K.

More information

TCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence Support

TCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence Support Vol. 3 Issue 1, January-2014, pp: (32-36), Impact Factor: 1.252, Available online at: www.erpublications.com TCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless

More information

Quality Optimal Policy for H.264 Scalable Video Scheduling in Broadband Multimedia Wireless Networks

Quality Optimal Policy for H.264 Scalable Video Scheduling in Broadband Multimedia Wireless Networks Quality Optimal Policy for H.264 Scalable Video Scheduling in Broadband Multimedia Wireless Networks Vamseedhar R. Reddyvari Electrical Engineering Indian Institute of Technology Kanpur Email: vamsee@iitk.ac.in

More information

Laser Gesture Recognition for Human Machine Interaction

Laser Gesture Recognition for Human Machine Interaction International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-04, Issue-04 E-ISSN: 2347-2693 Laser Gesture Recognition for Human Machine Interaction Umang Keniya 1*, Sarthak

More information

Performance Evaluation of Wired and Wireless Local Area Networks

Performance Evaluation of Wired and Wireless Local Area Networks International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof.

More information

A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA

A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA N. Zarrinpanjeh a, F. Dadrassjavan b, H. Fattahi c * a Islamic Azad University of Qazvin - nzarrin@qiau.ac.ir

More information

Low-resolution Image Processing based on FPGA

Low-resolution Image Processing based on FPGA Abstract Research Journal of Recent Sciences ISSN 2277-2502. Low-resolution Image Processing based on FPGA Mahshid Aghania Kiau, Islamic Azad university of Karaj, IRAN Available online at: www.isca.in,

More information