Applied Mechanics and Materials Vol. 573

Paper Title Page

Abstract: This paper deals with quantification of the noise located in the digital signal by an innovative process. This process is associated with the filter that represents the novel information conveyed by the desired signal, residual interference and residual noise which are used to reduce the noise. A typical uniform quantization operation of a sampled signal is identified and interpreted with the framework of stochastic difference equation. A new theorem is proposed with all possible assumptions to support our result to signal noise ratio. AMS [200] Subject Classification: 39A10, 39A30, 39A60, 39B82, 39B99.
489
Abstract: A biometric identification system may be a pc application for mechanically distinctive or confirmative of an individual from a digital image or a video frame from a video supply. One in all the ways that to try and do this can be by examination designated face expression from the image and a facial information. This paper planned dynamic face recognition from near-infrared images by exploitation sparse representation classifier. Most of the prevailing datasets for facial expressions are captured in a very visible light spectrum. However, the visible light (VIS) will modify with time and placement, causing important variations in look and texture. This new framework was designed to attain strength to pose variation and occlusion and to resolve uncontrolled environmental illumination for reliable biometric identification. This paper gift a unique analysis on a dynamic facial features recognition, exploitation near-infrared (NIR) datasets and LBP(Local binary patterns) feature descriptors. It shows sensible and strong results against illumination variations by exploitation infrared imaging system.
495
Abstract: The support vector machine (SVM), an assuring new method for the classification, has been widely used in many areas efficiently. However, the online learning issue of SVM is still not addressed satisfactorily since when a new sample arrives to retrain the SVM to adjust the classifier. This may not be feasible for real-time applications due to the expensive computation cost for re-training the SVM. This paper propose an Online SVM classifier algorithm known as OSVM-CH, which is based on the convex hull vertices selection depends on geometrical features of SVM. From the theoretical point of view, the first d+1(d is the dimension of the input samples) selected samples are proved to be vertices of the convex hull. This guarantees that the selected samples in our method keep the greatest amount of information of the convex hull. From the pedestrian detection application point of view, the new algorithm can update the classifier without reducing its classification performance.
501
Abstract: The Outlier detection is one of the major issues that has been worked out deeply within the Data Mining domain. It has been used to detect dissimilar observations within the data taken into the account. Detection of outliers helps to recognize the system faults and thereby helping the administrators to take preventive measures before it rises. In this paper, we recommends a comprehensive survey of an outlier detection. We anticipate this survey will support a better understanding of various directions in which experimental approach can be done on this topic.
511
Abstract: . Phishing has become most notorious security issues in online real time web pages. Many studies and ideas have been proposed related to phishing attack in order to overcome the security issues. Phishing attack can be easily done by Uniform resource locator (URL) obfuscation. It is the trick where the user will be forwarded to fake web page which has look and feel effect as the original web page when they click through the fake link. Organizations which use online business and transaction like ebay, paypal use many preventive approaches like blacklist, whitelist of URL in order to prevent any online theft using phishing attack. This paper propose a novel idea for detecting Phishing attack by checking the URL patterns of the suspected page with generated legitimate common URL pattern by inspecting different international URL patterns of that particular banking site.
519
Abstract: Cloud Computing is the important aspect in Information Technology, which is believed to be suitable for Small business purposes for accessing the resources .Cloud Community portals are used for storing, accessing, synchronizing and for backup the files .The main concern in cloud portal is the security issues in public cloud like Drop box. Drop box are used to access the data whenever needed. In this paper, the attack of Drop box by means of Spam mails is taken into consideration and encryption techniques such as Honey Encryption is used for avoidance of attacks caused by Spam mails such as data stealing, guessing of passwords etc.
523
Abstract: Image retrieval system becoming a more popular in all the disciplines of image search. In real-time, interactive image retrieval system has become more accurate, fast and scalable to large collection of image databases. This paper presents a unique method for an image retrieval system based on firefly algorithm, which improve the accuracy and computation time of the image retrieval system. The firefly algorithm is utilized to optimize the image retrieval process via search for nearly optimal combinations between the corresponding features as well as finding out approximate optimized weights for similarities with respect to the features. The proposed method is able to dynamically reflect the user’s intention in the retrieval process by optimizing the objective function. The Efficiency of the proposed method is compared with other existing image retrieval methods through precision and recall. The performance of the method is experimented on the Corel and Caltech database images.
529
Abstract: Cloud computing is a platform that provides different services for the Internet users and companies on a pay-as-you-use basis. Services are provided through the datacenters which are available all over the world. One of the major problems faced by the service providers is the huge amount of energy consumed at the Datacenter. In todays world, where the environmental factors are the most talked about, energy efficient management of Datacenters has to be given due importance. In this paper a migration model is proposed for migration of job between virtual machines by considering the energy consumed and deadline as crucial factors.
537
Abstract: Large number of application areas, like location-based services, transaction logs, sensor networks are qualified by uninterrupted data stream from many. Sensor data handling of continuous data needs to cover various issues, admitting the storage efficiency, processing throughput, bandwidth conception and secure transmission. This paper addresses the challenges by providing secure and efficient transmission of sensor data by embedding it over the inter-packet delays (IPDs). The embedding of sensor data within a host medium makes this technique reminiscent of watermarking. Interpolation technique is used to hide the sensor data into an image which is send to another node. By enforcing linear enlargement to interpolation-errors, a extremely effective reversible watermarking scheme is achieved, which can ensure high image quality without sacrificing embedding capacity. Time-Based flow watermarking technique is proposed, that avoids data degradation due to traditional watermarking. Sensor data is extracted effectively based on the inter-packet delays that minimizes the probability of decoding error. The outcome of the observation depicts that this system is scalable and highly resilient in sensor data.
543
Abstract: Mobile cloud computing will wear down gaining quality among users, the researchers predicts these troubles by execution of mobile applications on application suppliers external to the mobile device. During this paper, we have a tendency to gift a wide survey of mobile cloud computing, whereas prominence the particular considerations in mobile cloud computing square measure as follows. (a) Highlights the present state in Application of cloud computing usage in real time world. (b) Identifies the problems in testing bandwidth and (c) provides a optimizing of the offloading that saves energy
549

Showing 81 to 90 of 139 Paper Titles