博電競菠菜平臺 www.rrkuhedt.buzz Mohammad Mojtaba Keikhayfarzaneh1,2*,Javad Khalatbari1, B.Somayeh Mousavi3 and Saeedeh Motamed1,4

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Human face detection is one of the vital techniques in computer vision. It plays so important role in a wide variety of applications such as surveillance systems, video tracking applications and image database management. In this paper a new method to detect faces with different pose in colour images, is proposed. Skin colour, lip position, face shape information and statistical texture properties are the key parameters for developing fussy rule based classifiers to extract face candidate from an image. The algorithm consist of two main parts: detecting frontal face system and detecting profile face system. In first step, skin regions are identified in HSI colour space, using fuzzy system, applying distance of each pixel colour to skin colour cluster as input and producing a skin-likelihood image in output. The regions owning the most likelihood of belonging to skin are labelled and enter the frontal face detecting part . To extract frontal face regions ,fuzzy rule based system is used, applying face and lip position, lip area data and face shape. The detected faces are removed and remain areas are tested by the profile face finding algorithm. This algorithm utilizes statistical texture properties of ear to verify profile face detection. By this system, 98%, 90% and 83.33% detection rates are achieved, respectively for frontal, near frontal and profile faces.

Hide Abstract

Views 
   PDF Download PDF Downloads: 317



T. Syed Akheel1, S.A.K. Jilani2 and K. Kanthamma2

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Face is an important biometric feature for personal identification. Human beings easily detect and identify faces in a scene but it is very challenging for an automated system to achieve such objectives. Hence there is need to have reliable identification method for interacting users .In this paper we discuss past research on biometric face feature extraction and recognition of static images. We will present implementation outline of these methods along with their comparative measures and result analysis.

Hide Abstract

Views 
   PDF Download PDF Downloads: 318



Eena Gilhotra1 and Saroj Hiranwal2

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Clustering has become an increasingly important task in modern application domains such as marketing and purchasing assistance, multimedia, molecular biology etc. The goal of clustering is to decompose or partition a data set into groups such that both the intra-group similarity and the intergroup dissimilarity are maximized. In many applications, the size of the data that needs to be clustered is much more than what can be processed at a single site. Further, the data to be clustered could be inherently distributed. The increasing demand to scale up to these massive data sets which are inherently distributed over networks with limited bandwidth and computational resources has led to methods for parallel and distributed data clustering. In this thesis, we present CIODD, a cohesive framework for cluster identification and outlier detection for distributed data. The core idea is to generate independent local models and combine the local models at a central server to obtain global clusters. A feedback loop is then provided from the central site to the local sites to complete and refine the global clusters obtained. Our experimental results show the efficiency and accuracy of the CIODD approach.?

Hide Abstract

Views 
   PDF Download PDF Downloads: 281



Vaibhav Shukla and Somnath Ghosh

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

In the present study, general graph terminologies are explained with their representation and application in wide fields like operational research, genetics, physics and chemistry. Basically in the study of graph theory we can represent the relationship between various objects in very simple and convenient way in the form of picture.

Hide Abstract

Views 
   PDF Download PDF Downloads: 285



Pankaj Gupta, Deepak Jain, Nikhil Anthony, Pranav Gupta, Harsh Bhojwani and Uma Nagaraj

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Internet address lookup is a challenging problem because of increasing routing table sizes, increased traffic, higher speed links, and the migration to 128 bit IPv6 addresses. IP routing lookup requires computing the best matching prefix, for which standard solutions like hashing were believed to be inapplicable. The best existing solution we know of, BSD radix tries, scales badly as IP moves to 128 bit addresses. This paper presents a novel algorithm “Distributed memory organization” for lookup of 128 bit IPv6 addresses and “Asymmetric Linear search” on hash tables organized by prefix lengths. Our scheme scales very well when traffic on routers is unevenly distributed and in genera it requires only 3-4 lookups, independent of the address bits and table size. Thus it scales very well for IPv4 and IPv6 under such network conditions. Using the proposed techniques a router can achieve a much higher packet forwarding rate and throughput.

Hide Abstract

Views 
   PDF Download PDF Downloads: 291



Pranali D. Tembhurne1, R.K. Krishna2 and Ashish Jaiswal3

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

IEEE 802.16e is the latest broadband wireless access standard designed to support mobility. IEEE 802.16e (MAC + PHY) is an emerging standard for mobile wireless broadband access systems. In any mobile networks, power saving is one of the most important features for the extension of devices’ lifetime. To enhance the power efficiency of broadband wireless sensor networks based on battery power, power saving strategies based on cross-layer design is proposed for IEEE 802.16e sleepmode operation. In this paper first we implement the MAC layer & PHY layer. MAC layer with its features are implemented. Second we use the modulation techniques (BPSK, QPSK & 16QAM) with OFDM physical layer to reduce the packet loss. Also analyzing the throughput & delay with time.

Hide Abstract

Views 
   PDF Download PDF Downloads: 296



Raj Kumar and V.K. Saraswat

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

There are several security measures to protect the sensitive, confidential and secretive data over the internet. One of the basic mechanism is to apply a secret code of encryption. The basic problem with encryption has been speed, the reliability of mechanism and the compatibility with different web browsers. We have several encryption algorithms like RSA, IDEA, TEA and DES. These algorithms are developed by different people and written in many forms i.e. in different programming languages. Here we are proposing a model of stream cipher based on encryption techniques with digital adder’s operation. The text is translated into hex code using some secret key (say password). The secret key is only shared by sender and receivers. So only authorized personnel can access the data sent. Our model proposes to use n-bit serial adder to encrypt data with fast speed and high reliability. The encrypted data are converted into hexadecimal to enhance the compatibility of the proposed mechanism with different machines and platforms. We have performed an analytical analysis to determine the best working algorithms for text web browser.

Hide Abstract

Views 
   PDF Download PDF Downloads: 279



Rashmi Agrawal

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

In this paper, actually we will present a technique of secure data transmission through hiding of data in image file by replacing it’s one of the LSB bit. The watermarked bit embedded into image sample to increases the robustness against noise hence by combining cryptography and steganography we will increases the security of data.

Hide Abstract

Views 
  



M. Vasim Babu

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

A Wireless Sensor Network (WSN) consists of spatially distributed autonomous sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants. In recent years, there has been a growing interest in wireless sensor networks. One of the major issues in wireless sensor network is developing an energy-efficient routing protocol. The challenge lies in efficiently providing acceptable accuracy while conforming to the many constraints of WSNs. Energy limited is one main bottle-neck for wireless sensor networks. Due to unreasonable cluster head electing and intensive energy consumption of cluster head in clustering algorithm, I propose cluster based partial multihop algorithm for heterogeneous WSN, Which aimed to optimize cluster head voting and balance energy consumption of cluster head. I also propose a hierarchical tree routing method that reduces the distance of cluster-head to the base station.

Hide Abstract

Views 
   PDF Download PDF Downloads: 312



Akhil Khare, Shashank Sharma and Sonali Goyal

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Augmented reality is a powerful user interface technology that augments the user’s environment with computer generated entities In this venture we investigate building indoor location based applications for a mobile augmented reality system. Augmented reality is a natural interface to visualize special information such as position or direction of locations and objects for location based applications that process and present information based on the user’s position in the real world. To enable such applications we construct an indoor tracking system that covers a substantial part of a building. It is based on visual tracking of fiducial markers enhanced with an inertial sensor for fast rotational updates This is especially problematic for mobile augmented reality systems, which ideally require extremely precise position tracking for the user’s head, but which may not always be able to achieve the necessary level of accuracy. While it is possible to ignore variable positional accuracy in an augmented reality user interface, this can make for a confusing system; for example, when accuracy is low, virtual objects that are nominally registered with real ones may be too far off to be of use. Our system uses inferencing and path planning to guide users toward targets that they choose.

Hide Abstract

Views 
   PDF Download PDF Downloads: 260



Archana B. Saxena and Deepti Sharma

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

We propose threshold based centralized load balancing policy for heterogeneous systems, where all incoming jobs are acknowledged by central server and completed with the help of workstations. All the activities (Load distribution & Load sharing) within system are regulated with the help of a central server by maintaining Capability matrix and Load matrix. We present details how threshold based Load balancing is implemented in anticipated system. A node is assigned a relative load threshold on the basis of their operational capability. Overloaded (Load > Threshold) and under loaded (Load < threshold) nodes can route load balancing through central server. We intend to do a simulation study to compare the propose scheme with conventional Load balancing scheme to show that projected scheme will increase system throughput and condense execution time. The computer simulation is based on time, sender and receiver initiative load balancing scheme, and is tested for a number of decision thresholds. We hope our result will match our expectation.

Hide Abstract

Views 
   PDF Download PDF Downloads: [Download not found]



V. K. Saraswat and Amit Singhal

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

There are many routing algorithms are presented for Mobile Ad hoc Network such as Destination sequenced Distance Vector (DSDV) which is known as proactive routing algorithm based on routing table, due to continuously updating routing tables, it consumes large portion of network capacity. Another is Ad hoc on Demand Distance Vector (AODV) is known as reactive algorithm. In this algorithm, when path breaks, it needs a new route discovery, this cause a route discovery latency, therefore these are not suitable for real time communication. With the inspiration by Swarm Intelligence (SI), we borrowed idea from ant colony and Ant Colony Optimization framework and proposed an Enhanced hybrid routing algorithm which can improve the performance in MANET. The hybrid quality of the algorithm makes it suitable for the entire environment in comparison with reactive and proactive protocols. The introduced routing algorithm is highly adaptive, efficient and scalable. The main aim of this algorithm to reduce the end-to-end delay in the context of pause time and mobility on packet received. We refer to this algorithm as the “Ant Colony based Multi Agent Routing Algorithm (ACMRA).

Hide Abstract

Views 
   PDF Download PDF Downloads: 290



Vaibhav Shukla and Som Nath Ghosh

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

The present study discussed about all the basic components of mobile devices which are being used in the development of mobile phones. The author focused on client server architecture and mobile computing. Various types of operating systems which are used very frequently in the mobile devices are Window CE and Symbian OS, these are the two very frequently used operating systems which we used in the mobile devices.

Hide Abstract

Views 
   PDF Download PDF Downloads: 271



P. Ramanathan1 and Pradip Manjrekar2

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

In this research paper, we presented the wireless Sensor network (WSN)for monitoring a patient having hole in the heart continuously using ZIGBEE The output of biosensor has to be transmitted via Zigbee and the same has to be sent to the remote wireless monitor for observing the condition of the patient having hole in the heart and for the same proper medical treatment should be given to him/ her without surgery using alternative medicine to cure hole in the heart. The remote wireless monitor is constructed of Zigbee and personal computer (PC). The measured signal has to be sent to the PC, which can be data collection. When the measured signals over the standard value, the personal computer sends Global system for Mobile communication (GSM) short message to the care taker. Although Bluetooth is better than Zigbee for transmission rate, but Zigbee has lower power consumption. Hence, Zigbee is generally used for 24 hours monitor of communication transmission system. The first procedure of the system that we use the biosensor to measure Heart rate and blood pressure from human body using Zigbee the measured signal sends to the PC via the RS-232 serial port communication interface. We can send the signal to remote PC or PDA from the internet. In particular, when measured signals over the standard value, the personal computer will send GSM short message to absent care taker’s mobile phone.?

Hide Abstract

Views 
   PDF Download PDF Downloads: 282



Anisha Kumar

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Information Technology solutions have paved a way to a new world of internet, business networking and e-banking, budding as a solution to reduce costs, change the sophisticated economic affairs to more easier, speedy, efficient, and time saving method of transactions. Internet has emerged as a blessing for the present pace of life but at the same time also resulted in various threats to the consumers and other institutions which results in committing cyber crime. Despite the increase in government compliance requirements and the proliferation of security tools, companies continue to underestimate the threat from phishing, data loss, and other cyber vulnerabilities. This paper contributes an understanding of the effects of negative use of Information technology, as how a simple technological aspect of file deletion can result in cyber crime. A few aspects to trace the deleted information with restoring software is also mentioned in this paper.

Hide Abstract

Views 
   PDF Download PDF Downloads: 285



R. Vinoth and S. Sivasankar

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Trust and security have prevented businesses from fully accepting cloud platforms. To protect clouds, providers must first secure virtualized datacenter resources, uphold user privacy, and preserve data integrity. It is suggested using a trust-overlay network over multiple data centers to implement a reputation system for establishing trust between service providers and data owners. Data coloring and software watermarking techniques protect shared data objects and massively distributed software modules. These techniques Safeguard multi-way authentications, enable single sign-on in the cloud, and tighten access control for sensitive data in both public and private clouds.

Hide Abstract

Views 
   PDF Download PDF Downloads: 291



Suneet Kaur1, V.S. Ubboveja2 and Alka Agarwal3

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Pavement surface deflection of a highway is a primary factor for evaluating the pavement strength of a flexible pavement. Benkelman Beam Deflection (BBD) technique is widely used in the country for evaluating the structural capacity of an existing flexible pavement as also for estimation and design of overlays for strengthening of a weak pavement. The field test for measuring the surface deflection is expensive and time consuming, and alternate modeling methods to estimate surface deflection of a pavement, therefore, would result in substantial savings in time and money in the preparation of detailed project reports for the large highway rehabilitation and strengthening projects being undertaken in the country. An attempt has been made in this paper to compare the results obtained from the models based on Multivariate Regression analysis and Artificial Neural Network to predict reasonably accurate characteristic deflection of flexible pavements. Data used for building the model was collected from field tests conducted by various entities in the state of Madhya Pradesh engaged in the rehabilitation and strengthening of highways in the State passing through extensive black cotton soil areas.?

Hide Abstract

Views 
   PDF Download PDF Downloads: 283



Sagar Shankarrao Shillewar

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

This application note shows how to use Point-to-Point Protocol (PPP) networking with the Tiny Inter Net Interfaces (TINI) runtime environment for dial-up networking. Includes detailed configuration of Windows? 2000 dial-up client software.

Hide Abstract

Views 
   PDF Download PDF Downloads: 307



Jamal Mohammad Aqib

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

In this paper we present a compression method for PML (Physical Markup Language) document based on Huffman Algorithm. The algorithm and Java code pieces are presented. And the test result shows the compression method has good compression ratio for the PML document. The Physical Markup Language (PML) is designed to be a general, standard means for describing the physical world including human and machines. How to save the PML document in internet server efficiently will become more and more important.

Hide Abstract

Views 
   PDF Download PDF Downloads: 277



Syed Minhaj Ali1 and Bhavna Gupta2

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

This paper describes a neural network speech enhancement system using Multilayer Perceptron (MLP) network and trained using the back propagation algorithm (BPA). Speech enhancement is generally refers to map noisy speech into cleaner speech. Noisy speech signals are obtained by adding random noise to the clean signals .Speech enhancement is then performed on the noisy signals by using the ADALINE. Here we show that neural nets can be used to significantly boost recognition accuracy, without retraining the speech recognizer.

Hide Abstract

Views 
   PDF Download PDF Downloads: 257



P. Srinivas

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

This Paper focuses on the “encouragement” approach which communication has taken. This is because in order for QoS initiatives to be meaningful to consumers the information must keep pace with changing technological and market developments. The communication providers are best placed to provide the relevant QoS indicators in a timely fashion. However, the ability to provide meaningful data does not necessarily mean that communication providers will be willing to provide it without regulatory intervention. As competition increases, there are clear incentives for providers with a high quality of service to produce and promote timely and accessible QoS information for consumers. Conversely there is no economic incentive for those providers offering a low quality of service to do the same. The trends are likely to affect both the type and quality of the services offered in the market. For example, with some routine Internet activities such as web browsing and email all that is normally required is sufficient bandwidth. The IP-protocol should not as rule experience any difficulty with delay, jitter etc. However as consumers demand more interactive functions such as conversations and video-conferencing, a low level of end-to-end delay and jitter, low packet loss, and a guaranteed bandwidth are all needed to ensure standards are maintained.

Hide Abstract

Views 
   PDF Download PDF Downloads: 283



Somnath Ghosh

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

In recent years, many people died or injured because of traffic accidents all over the world. When statistics are investigated India is the most dangerous country in terms of number of traffic accidents among Asian countries. However, we agree that this rate is higher in India since many traffic accidents are not recorded, for example single vehicle accidents or some accidents without injury or fatality. In this study, using fuzzy logic method; which has increasing usage area in Intelligent Transportation Systems, a model is developed which would obtain to prevent the vehicle pursuit distance automatically. Using velocity of vehicle and pursuit distance that can be measured with a sensor on vehicle a model has been established to brake.

Hide Abstract

Views 
   PDF Download PDF Downloads: 272



Sri Pammi Srinivas

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

The Dissertation presents a study and Implementation of different software metrics. We find that there are specific metrics for different stages of the software development cycle. The Metrics in this dissertation as a literature study is Metrics for Software Requirements, Metrics for Design Level. The Software Metrics covered in this Dissertation are Object-Oriented Design Metrics, Metrics for Coding Level, Metrics for Testing Level, Building cost estimation model and Software Reliability Models. Reliability metric was one of the first early prediction models to be used. The late prediction models mostly consist of the Software Reliability growth models. Jelinski and Moranda’s model developed one of the earliest reliability models. Musa Basic Execution Time Model postulated that software reliability theory should be based on execution time, which is the actual processor time utilized in executing the program, rather than on calendar time.

Hide Abstract

Views 
   PDF Download PDF Downloads: 256



Ajay Gadicha1, V.T. Ingole2 and Amit Manikrao3

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

In this paper, actually we will present a technique of secure data transmission through hiding of data in image file by replacing it’s one of the LSB bit. The watermarked bit embedded into image sample to increases the robustness against noise hence by combining cryptography and steganography we will increases the security of data.

Hide Abstract

Views 
   PDF Download PDF Downloads: 236



P. Selvaperumal

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Image fusion is a process of combining multiple input images of the same scene into a single fused image, which preserves relevant information and also retains the important features from each of the original images and makes it more suitable for human and machine perception. The reason for going onto image fusion is that, in the medical image processing, different sources of images produce complementary information and so one has to fuse all the sources of images to get more details required for the diagnosis of the patients. In this method the raw data is the MR scan image of a patient’s brain which is observed at different angles or resolutions. The images possess both different as well as common information with respect to each other. Thus when these images are fused together the redundant images are neglected and the complementary images are added thereby producing an accurate diagnosis with a single image.

Hide Abstract

Views 
   PDF Download PDF Downloads: 267



Naveen Tyagi1 and Ashish Chaturvedi2

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Software conformance testing is the process of evaluating the accuracy of an implementation built to the requirements of a functional specification. Tedious conformance testing of software is not practical because variable input values and variable sequencing of inputs results in so many possible combinations of tests. Mutation testing is a technique for unit testing software that, although powerful, but computationally expensive. Recent engineering advances have given us techniques and algorithms for significantly reducing the cost of mutation testing. This paper demonstrates NA (Naveen-Ashish) Mutation to design a system that will approximate mutation.

Hide Abstract

Views 
   PDF Download PDF Downloads: 270



Tariq Ahamad

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

In modern world of technology wireless users are much more sophisticated telecommunications users than they were few years ago. They are longer satisfied with just completing a clear call, today’s subscribers demand innovative ways to use the wireless phone. They want multiple services that allow them to handle or select incoming calls in a variety of ways. Wireless intelligent network is developed to drive intelligent network capabilities such as service independence, separation of basic switching functions from service and Application functions and independence of applications from lower-level communication details into wireless networks. The primary weapon for empowering providers to deliver distinctive services with enhanced flexibility is wireless intelligent networks (wins).

Hide Abstract

Views 
   PDF Download PDF Downloads: 279



N. Leena

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

The early struggles with the internet was finding a way to safely buy and sell goods or transfer funds using computer and telecommunication networks. The goal was to enable e-commerce by providing a safe, convenient and immediate payment system on the internet. But internet is notorious for giving its users a feeling of anonymity. The inadequate security results in major damage. Now a days a number of critical transactions are carried out by computer systems over networks. There is an internet security threat - cyber crime which enables ecommerce transaction face significant financial and information losses.?

Hide Abstract

Views 
   PDF Download PDF Downloads: 473



Roohi Ali1 and Sana Iqbal2

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

This paper is concerned with The visualization of 802.11 mesh networks is a technical grand challenge. Given the current status of introspective communication, security experts famously desire the simulation of linked lists. In our research, we use stochastic archetypes to confirm that Internet QoS and 802.11 mesh networks are mostly incompatible.

Hide Abstract

Views 
   PDF Download PDF Downloads: 238



Hema Yadav1, Shoyeb Ali Sayyed2 and V.H. Badshah

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

In this paper we have established a fixed point theorem for multivalued mappings and generalized the result of Sayyed, Sayyed and Badshah6 . AMS 2000 Subject Classifications : Primary 54H25, Secondary 47H10.

Hide Abstract

Views 
   PDF Download PDF Downloads: 269



Manish Jain, Adarsh Srivastava, Anand Kumar Dixit and Somnath Ghosh

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Dynamic programming is a useful technique for making a sequence of interrelated decisions. It provides a step wise procedure for finding the optimal combination of decisions. Dynamic programming provides a useful way to find out the minimum distance between the two nodes within the network.The multistage decision policy with recursive approach will provides an efficient way while using Dynamic programming. In multistage decision process the problem is divided into several parts called as sub problems and then each sub problem will be solved individually and the final result will be obtained by combining the results of all the sub problems.

Hide Abstract

Views 
   PDF Download PDF Downloads: 256



Ashish Rastogi

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

As we know that the Software market is growing very fast. The main purpose of the most software producers is produce the software of very high Quality. Software quality is a multi-dimensional content which is easily distinguishable and measurable. Although the Quality of the software is dependent on Functional and Non Functional Requirement of the user. To determine this content more exact, the qualitative models have been presented in which different aspects of this matter are investigated. But the existences of different models and using different expressions have made the comprehension of this content a little hard. In this research paper we try to introduce models and their analytical comparison, determine software qualification and its qualitative characteristics more clearly.

Hide Abstract

Views 
   PDF Download PDF Downloads: 254



Kanusu Srinivas Rao1 and Ratnakumari Challa2

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Intelligent e-voting data has been shown to pose a lot of benefit to e-voting especially in the area of security and recounting. After the election and balloting processes, valuable knowledge can still be extracted from this data. This work provides a framework model as roadmap for developers to follow in future development of such a system. The Perl based sample tested showed optimum performance and hence proves the viability of the methodology.

Hide Abstract

Views 
  



S.M.K. Quadri and Aasia Quyoum

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

Software Reliability is an important component of software quality. A number of software reliability models have been proposed since 1970s, but there is no single model that can be used in all the situations. To reduce the risk, it is better to experiment with the model of the system rather than with the system itself. Simulation, offers an attractive alternative to analytical models as it describes a system being characterized in terms of its artifacts, events, interrelationships and interactions in such a way that one may perform experiments on the model, rather than on the system itself. Simulation strives for achieving its goals but it does have certain limitations. This research paper focuses on the goals and limitations of using simulation in software reliability.

Hide Abstract

Views 
   PDF Download PDF Downloads: 262



Manoj C. Lohani, Upendra S. Aswal and Ramesh S. Rawat

[ View:    Abstract ] [ HTML Full Text] [ PDF ] [ XML ]

This paper presents a new approach of reconstruction of Binary search tree using its Pre order tree-traversal only. There are many approaches given with the help of combination of two- tree traversals. But, in this paper we have not used any other combination of tree traversals to reconstruct the Binary search tree. Our work shows the implementation of this algorithm in C language. Our algorithm is found to be very simple and faster than other non recursive algorithms due to its unique implementation. Due to this reason the time and space complexities are significantly reduced.

Hide Abstract

Views 
   PDF Download PDF Downloads: 256