International Journal of Engineering and Techniques
IJET -Volume 3, Issue 3, May - June 2017
S.No
|
Title/Author Name
|
Serial No
|
21 |
Quality of Service in Network Administrations
- T.Sankar
Abstract
Today’s computer networks have gone from typically being a small local area network, to wide area networks, where users and servers are interconnected with each other from all over the world. This development has gradually expanded as bandwidth has become higher and cheaper.But when dealing with the network traffic, bandwidth is only one of the important properties. Delay, jitter and reliability are also important properties for the quality of network connection. This is because different applications has different needs, and therefore require different properties from the network. System administrators are in an increasing degree involved with the troubleshoot¬ing of solving network problems concerning the quality of service for the different applications.This research paper analyzed techniques for measuring, analyzing, presenting and inter¬preting the different properties for the administration of remote computer network. Keyword: Bandwidth, Delay, Jitter, Reliability.× T.Sankar , " Quality of Service in Network Administrations " Vol. 3 - Issue 3( 129-139 ) - May - June 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I3P21 |
22 |
Investigation of different Face Recognition Databases under Uncontrolled Illumination Variation Method
- S.Wilson , Dr.A.Lenin Fred
Abstract
Confront acknowledgment framework is a PC application for naturally recognizing or confirming a man from a computerized picture or a video outline from a video source. Confront acknowledgment a framework has affected on numerous useful applications in view of the conditions. In this paper, investigation of two face databases is done with the assistance of a strong Face Recognition System under uncontrolled brightening variety. In this Face acknowledgment strategy comprises of three stages, brightening heartless preprocessing technique, Feature-extraction and score combination. In the preprocessing stage enlightenment delicate picture changed into brightening obtuse picture, and after that to joins different classifiers with corresponding components as opposed to enhancing the precision of a solitary classifier. Score combination figures a weighted entirety of scores, where the weight is a measure of the separating energy of the part classifier. The above strategy is connected into two diverse face databases named Yale and YaleB and results are contrasted and precision of every databases under various light condition. Keyword: Face Recognition, Feature extraction, Preprocessing, Score fusion..× S.Wilson , Dr.A.Lenin Fred , " Investigation of different Face Recognition Databases under Uncontrolled Illumination Variation Method " Vol. 3 - Issue 3( 140-144 ) - May - June 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I3P22 |
23 |
Mechanical Engineering in Ancient Egypt, Part 50: Alabaster Products (Middle and New Kingdoms)
- Galal Ali Hassaan
Abstract
This paper is the 50th research paper in a series investigating the evolution of mechanical engineering in ancient Egypt. It tries to achieve this purpose through investigating the alabaster products during the Middle and New Kingdoms. Each alabaster product is presented chronically with present location if known and with engineering analysis showing its creativity. The innovation in the designs is outlined and the main characteristics of mechanical design methodology in ancient Egypt are outlined. Keyword: Mechanical engineering; ancient Egypt; alabaster products; Middle Kingdom; New Kingdom.× Galal Ali Hassaan , " Mechanical Engineering in Ancient Egypt, Part 50: Alabaster Products (Middle and New Kingdoms) " Vol. 3 - Issue 3( 145-160 ) - May - June 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I3P23 |
24 |
Reduction of energy consumption in wireless sensor network using data aggregation technique
- Komal Shinde,Sangita Varpe,Rohini Shinare,Vishakha Varma,Prof.M.D.Ingle
Abstract
A wireless sensor network typically includes a huge number of low-powered, less-cost sensing devices called as sensors with restricted computational, memory and communication assets. In the data aggregation technique, the information of sensor nodes is merged at cluster head nodes and then transmitted that aggregated data to the base station. The sensor nodes consume energy during sensing, processing and transmission. In wireless sensor network power and energy resources are limited. If every node sends data to the base station, energy will be wasted and thus the network energy will be consume quickly. Existing work in the literature uses PCA (Principle Component Analysis) and CS(Compressed Sensing) strategies. The proposed algorithms are Iterative Case Filtering (ICF) is used to decrease the energy consumption in an energy efficient manner and SHA (Secure Hash Algorithm) for matching sender and receivers hash key. If both the hash keys are same then data will be sent and duplicated packets will be discarded to reduce network traffic. Keyword: Data Aggregation, Energy Consumption, Iterative Case Filtering, Secure Hash Algorithm, Wireless Sensor Network.× GKomal Shinde,Sangita Varpe,Rohini Shinare,Vishakha Varma,Prof.M.D.Ingle , " Reduction of energy consumption in wireless sensor network using data aggregation technique " Vol. 3 - Issue 3( 161-164 ) - May - June 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I3P25 |
25 |
Securing WMN Using Hybrid Honeypot System
- Dr.T.Geetha, R.Karthikeyan , Kumar M , Kathiravan M
Abstract
Nowadays, we are facing with network threats that cause enormous damage to the Internet community day by day. In this situation, more and more people try to prevent their network security using some traditional mechanisms including firewall, Intrusion Detection System, etc. Among them honeypot is a versatile tool for a security practitioner, of course, they are tools that are meant to be attacked or interacted with to more information about attackers, their motives and tools. In this paper, we will describe usefulness of low-interaction honeypot and high-interaction honeypot and comparison between them. And then we propose hybrid honeypot architecture that combines low and high -interaction honeypot to mitigate the drawback. In this architecture, low-interaction honeypot is used as a traffic filter. Activities like port scanning can be effectively detected by low-interaction honeypot and stop there. Traffic that cannot be handled by low-interaction honeypot is handed over to high-interaction honeypot. In this case, low-interaction honeypot is used as proxy whereas high-interaction honeypot offers the optimal level realism. To prevent the high-interaction honeypot from infections, containment environment (VMware) is used. Keyword: Low-interaction honeypot, High-interaction honeypot, Wireless Mesh Network, Proxy .× Dr.T.Geetha, R.Karthikeyan , Kumar M , Kathiravan M , " Securing WMN Using Hybrid Honeypot System " Vol. 3 - Issue 3( 165-171 ) - May - June 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I3P25 |
26 |
A Survey of Logical Models for OLAP Databases
- Dr.T.Geetha , R.Karthikeyan , Adarsh S , Bijo BM
Abstract
Most of us understand spreadsheets and table data.Few can understand databases but only very few can really process the data into meaningful information. Most companies professionals acquaint themselves with pivot tables which summarise data and provide the performance figures at a glance. But for advanced analysis of data, professionals are hired to run the data marts and warehouses. For faster results data in warehouses is often aggregated and presummarised and so called OLAP Cubes are constructed. The start point is usually a flat database(s) or relational databases which are usually designed from the perspective of transactional data. For any OLAP based work, it is said that 90% of efforts are made in construction of the Cube. This paper is written with the perspective of easy understanding of OLAP and allied concepts. Two Sample databases have been referred; one the Food Mart sample database supplied as part of SQL Analysis Services and second is the Global Terror Data (GTD) available on University of Maryland website as a flat file MS Excel Sheet. Keyword: OLAP, Terminology, Conversion, Structures,Concepts.× Dr.T.Geetha , R.Karthikeyan , Adarsh S , Bijo BM , " A Survey of Logical Models for OLAP Databases " Vol. 3 - Issue 3( 171-181 ) - May - June 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I3P26 |
27 |
Survey on Hand Gesture Recognition Using American Sign Language
- Sneha Sharadkumar Jariwala , Prof. Neha Parmar
Abstract
This paper is the 50th research paper in a series investigating the evolution of mechanical engineering in ancient Egypt. It tries to achieve this purpose through investigating the alabaster products during the Middle and New Kingdoms. Each alabaster product is presented chronically with present location if known and with engineering analysis showing its creativity. The innovation in the designs is outlined and the main characteristics of mechanical design methodology in ancient Egypt are outlined. Keyword: Mechanical engineering; ancient Egypt; alabaster products; Middle Kingdom; New Kingdom.× Sneha Sharadkumar Jariwala , Prof. Neha Parmar , " Survey on Hand Gesture Recognition Using American Sign Language " Vol. 3 - Issue 3( 182-185 ) - May - June 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I3P27 |
28 |
Evaluation of Role Mining Results Using Data Centric Approach
- S.Anthoni Singaraj, E.Dilipkumar
Abstract
While many role mining algorithms have been proposed in recent years, there lacks a comprehensive study to compare these algorithms. These role mining algorithms have been evaluated when they were proposed, but the evaluations were using different datasets and evaluation criteria. However the two core problems in role mining such as role minimization and edge concentration are Nondeterministic polynomial. Trial and error approach is use to determine the role mining algorithm but it is time consuming due to computational overhead in mining. large data set. In this paper, we introduce a comprehensive framework for evaluating role mining algorithms by adopting a data centric approach that quickly estimates the role mining results without running any role mining algorithm. Our approach illustrated to obtain the result which is accurate effective for role based assignments. We tackle the problem from a fresh angle. Instead of developing fast role mining algorithms, we adopt a data-centric approach that quickly estimates the bounds on optimal role mining results without actually running any role mining algorithm. Keyword: - - - .× S.Anthoni Singaraj, E.Dilipkumar , " Evaluation of Role Mining Results Using Data Centric Approach " Vol. 3 - Issue 3( 186-190 ) - May - June 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I3P28 |
29 |
Segmentation and Classification of Prostate Gland Using TRUS Images
- C.Joselin Freno Crasias, Mrs. S.V.Priya
Abstract
Any detection on its early stage proves to provide a high degree of survival for a person and for this diagnosis plays a major role.The diagnosis in a nutshell should be accurate and absolute with due importance given, even to the minutest detail . From of old, the speckles have been viewed as an obstacle in the process of diagnosis. But here comes a proposal to turn them into success. Here the size and orientation of the speckles are observed to explore their intrinsic properties .The accurate segmentation is carried out by Transrectal ultrasound(TRUS) image based diagnosis for The detection of prostate cancer. The TRUS images are cut into arc like strips to obtain the different speckle sizes. Then the individual feature vector is induced to obtain the residuals.The residuals along with the inherited spatial coherence from the biological tissue forms the segment with the application of neural networks. Later the fine -tuned segments are integrated with prior shape, dark to light intensity ratio near the boundaries and the like. Keyword: Clustering method, level set segmentation , prostate segmentation , rotation- invariant Gabor features,shape prior, Sparse modeling, Artificial neural network.× C.Joselin Freno Crasias, Mrs. S.V.Priya , " Segmentation and Classification of Prostate Gland Using TRUS Images " Vol. 3 - Issue 3( 191-194 ) - May - June 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I3P29 |
30 |
Modified K-Means Clustering Algorithm for Disease Prediction
- Dr.Sandeep Kumar , Simarpreet Kaur
Abstract
This work presents the outline of K-means clustering algorithm and enhanced technique applied on K-means clustering. The K-means clustering is the basic algorithm to find the groups of data or clusters in the dataset. To find the similar groups of data the initial selection of cetroid is done and the Euclidean distance is calculated from cetroid to all other data points, and based on the smaller Euclidean distance the data points are assigned to that centroid. The initial point selection effects on the results of the algorithm, both in the number of clusters found and their centroids. Methods to enhance the k-means clustering algorithm are discussed. With the help of these methods efficiency, accuracy, performance and computational time are improved. So, to improve the performance of clusters the Normalization which is a pre-processing stage is used to enhance the Euclidean distance by calculating more nearer centers, which result in reduced number of iterations which will reduce the computational time as compared to k-means clustering. By applying this enhanced technique one can build a new proposed algorithm which will be more efficient, supports faster data retrieval from databases, makes the data suitable for analysis and prediction, accurate and less time consuming than previous work. Keyword: K-means clustering, Euclidean distance, Normalization, centroid.× Dr.Sandeep Kumar , Simarpreet Kaur , " Modified K-Means Clustering Algorithm for Disease Prediction " Vol. 3 - Issue 3( 195-201 ) - May - June 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I3P30 |