Advanced Materials Research Vols. 403-408

Paper Title Page

Abstract: Due to a rapid advancement in the electronic commerce technology, the use of ATM cards has dramatically increased. As ATM card becomes the most popular mode of payment for both online as well as regular purchase, cases of fraud associated with it are also rising. In this paper, we model the sequence of operations in ATM card transaction processing using a Hidden Markov Model as well as Bluetooth based mobile security model (HMM) and show how it can be used for the detection of frauds. To determine the parameters of a HMM it is first necessary to make a rough guess at what they might be. Once this is done, more accurate (in the maximum likelihood sense) parameters can be found by applying the so-called Baum-Welch re-estimation formulae..
1014
Abstract: Frequent pattern mining has been a focused theme in data mining research. Lots of techniques have been proposed to improve the performance of frequent pattern mining algorithms. This paper presents review of different frequent mining techniques. With each technique, we have provided brief description of the technique. At the end, we compared different frequent pattern mining techniques.
1022
Abstract: Intersymbol interference is a major cause to limit high data rate transmission in wireless communication. To avoid ISI OFDM is the preferred modulation technique. For frequency selective channels pure OFDM may not be sufficient to eliminate ISI. The use of time coding (interleaver and convolution coder) improves the ISI affected reception but do not eliminate ISI completely. The paper investigates the presence of equalizers to improve BER performance in ISI affected reception. The performance improvement is observed for two novel equalizers namely zero forcing equalizers and MMSE equalizers. Simulation results are presented to demonstrate the superiority of the CODED OFDM method with equalizers
1028
Abstract: The “unprecedented growth” in the field of technology has gone past leaps and bounds to such an extent that it has given birth to a “life saving technique” to reveal the images of hidden objects that might prove to be an ecstatic news for the pilots to prevent flight crashes due to blurred weather and enabling the surgeons to perform a bloodless surgery. An effective way to accomplish this is to recover the image behind the obstacle by varying the electrical voltage across a crystal of Non-Linear material such as BBO, LBO. The image absorbs the energy from noise and showcases its structure to the observers as voltage is optimally varied. For weak signals, such as distant or dark images, incorporating noise into them can enhance their quality. It’s high time that we look into this technique in a futuristic perspective and implement it in a rampant manner to “prevent the exorbitant death toll and thereby save the invaluable lives of human beings existing in the universe.”
1035
Abstract: Handwriting recognition is a special category of pattern recognition which is matured enough for English language, but for Hindi it is in development state. Among various features directional features found to outperform than the others. So in this paper, we have evaluated the performance of various direction features and various classifiers for the handwritten Devnagri numeral recognition. The character image is preprocessed and portioned into sub-images. The standard zoning is compared against flexible zoning. An experimental comparison of gradient features and chain code histogram feature is evaluated with Bays classifier, K-nn, fuzzy k-nn. For comparison of the performance, the error rate and complexity of computation and time is used as the measure. Gradient features are found to outperform among various directional features.
1042
Abstract: This paper aims to implement multiple sharing of data as well as broadcasting message by providing full duplex connectivity via Bluetooth using the Juggler concept of multi-hop conventions already being implemented in wired connectivity. At present, it is impossible to provide a full duplex connection in Bluetooth based devices. To overcome this problem, we have come up with a concept that efficiently utilizes the Juggler. Furthermore, it also aims to improve the security factors for the network by implementing RC4 and MDS cryptography techniques. The MDS (Maximum Distance Separable) is used for increasing the diffusion property. Conjurer is similar to a juggler who juggles objects while performing magic. Likewise, Juggler provides nearly instantaneous handoff between base stations or supports a modest sideband channel with peer nodes, without adversely affecting foreground throughput. The Juggler switches frequency between different base stations using the frequency transition table for optimizing the overall usage of the bandwidth between these stations, thereby preventing any form of wastage of data and bandwidth. Furthermore, we ensure that both the sender and the clients issue concurrent network flows so that Juggler is able to assign these flows across more than one access point, providing significant speedup when wired-side bandwidth from the access point constrains end-to-end performance. Moreover, the concurrent connectivity prevents any bluetooth attack between the clients as the sender keeps track of the activities of each of his/her client.
1049
Abstract: Multipath routing plays an important role in communication networks. It can increase the effective bandwidth between pairs of vertices, avoid congestion in a network and reduce the probability of dropped packets. In this paper, we built model for vertex-disjoint paths problem and then proposed algorithm for finding the shortest pair of vertex-disjoint paths. We consider in this paper the shortest-path problem in networks in which the length (or weight) of the edges are considered. We present algorithms for finding the shortest-path. In more restricted transit. Furthermore, we can extend this algorithm to find any k disjoint paths whose sum-weight is minimized.
1057
Abstract: Web data mining is a field that has gained popularity in the recent time with the advancement in web mining technologies. Web data mining is the extraction of data on web. The term Web Data Mining is a technique used to crawl through various web resources to collect required information, which enables an individual or a company to promote business, understanding marketing dynamics, new promotions floating on the Internet, etc. The data on web is unstructured, irregular and lacks a fixed unified pattern as it is presented in HTML format that represents data in the presentation format and is unable to handle semi-structured or unstructured data . These difficulties lead to the emergence of XML based web data mining. XML was created so that richly structured documents could be used over the web.XML provides a standard for the data exchange and data storage .This paper presents a web data mining model based on XML. In this model first of all unstructured data is transformed to XML and then XML document is stored in database in the form of the string tree, then specific records are searched using a LINQ query. If record does not exist in the database then check the updates of specific website and repeat the same steps. At last data selected by LINQ Query is displayed on web browser. The feature that helped to increase the speed of data extraction and that also reduces the time of extraction is the presence of database that stores the data that have been extracted earlier by a user and can be used by other users by passing a LINQ query .In this model there is no need to create an extra separate XSL file because this model stores xml document in the database in the form of the string tree. This model is implemented using C# with XML.
1062
Abstract: A novel method by combining the edge-based and stroke filter based text extraction in the videos is presented. Several researchers have used edge-based and filter based text extraction in the video frames. However, these individual techniques are having their own advantages and disadvantages to extract text in the video frames. Combination of these two techniques fetches good result as compared to individual techniques. In this paper, the canny edge-based and stroke filter for text extraction in the video frames are amalgamated. The effectiveness of the proposed method is evaluated over the individual edge-based and stroke filter based techniques and found that the proposed method significantly improves the text extraction rate in the videos in terms of precision (91.99%) and recall (87.18%) respectively
1068
Abstract: In order to improve the properties of nano graded ferroelectric films (NGFF), the generalized Ginzburg-Landau-Denvonshire (GLD) theory is used to investigate the ferroelectric and pyroelectric properties of NGFF. A function is introduced to describe the local structure of this graded film. The numerical results show that parameter and film thickness are two very important factors that influence the ferroelectric and pyroelectric properties of films, larger values lead to smaller spontaneous polarization and lower pyroelectric peak Local structure in NGFF leads to flatten the polarization distribution, which raises the spontaneous polarization of components with lower transition temperature, but reduces spontaneous polarization of components with higher transition temperature.
1077

Showing 171 to 180 of 984 Paper Titles