New user registration
Event organizer registration
Login via your institution account
Login via your organization account
Login via your publisher account
Login using your new user credentials
Forgot username or password?
Subscribe to SciArchives
Computer Science >
Computer Science (General)
Journal of Computer Engineering and Technology (JCET)
Editor in chief:Dr. A.Udayakumar
Your selection(s) could not be saved due to an internal error. Please try again.
Browse by Volumes
Frequent Periodic Cryptic Sequence Mining In Biological Data
Volume: 1 | Issue no: 1-2013 | Pagination: 46-61
Amino acid sequences are known to constantly mutate and diverge unless there is a limiting condition that makes such a change deleterious. The few existing algorithms that can be applied to find such contiguous approximate pattern mining have drawbacks like poor scalability, lack of guarantees in finding the pattern, and difficulty in adapting to other applications. In this paper, we present a new algorithm called Constraint Based Frequent Motif Mining (CBFMM). CBFMM is a flexible Frequent Pattern-tree-based algorithm that can be used to find frequent patterns with a variety of definitions of motif (pattern) models. They can play an active role in protein and nucleotide pattern mining, which ensure in identification of potentiating malfunction and disease. Therefore, insights into any aspect of the repeats ? be it structure, function or evolution - would prove to be of some importance. This study aims to address the relationship between protein sequence and its threedimensional structure, by examining if large cryptic sequence repeats have the same structure. We have tested the proposed algorithm on biological domains. The conducted comparative study demonstrates the applicability and effectiveness of the proposed algorithm.
Olcmcr: Ordered Load-Balancing Cooperative Multi Channel Routing Topology For Voice Transmission Over Ip Based 802.11 Wlan
Author:Mohammed Sirajuddin, Dr D. Rajya Lakshmi And Dr Syed Abdul Sattar.
Volume: 1 | Issue no: 1-2013 | Pagination: 36-45
In this paper, we propose a cooperative multi channel VoIP routing protocol for 802.11 WLAN networks that handles the congestion to improve the Quality of routing service. Part of the proposed protocol introduced a MAC layer level solution called Cooperative Multi Channel Routing (CMCR) that effectively handles the multi channel transmission at one hop relay node level cooperative multi channel group. The proposed model controls the congestion in hierarchical order to minimize the resource utilization. Limited bandwidth and a high degree of mobility require that routing protocols for ad hoc networks be adaptive, trouble-free, and energy saving. Here we proposed a new Ordered Load-balancing Cooperative Multi Channel Routing Topology (OLCMCR) for 802.11 WLANs, which handles congestion state. OLCMCR capable to adopt a any WLAN structure with enhanced similar resilience against mobility. And OLCMCR utilizes CMCR to reduce the overhead of route failure recovery, improve route efficiency and reduce data transmissions. Our simulation results show that OLCMCR handles congestion with reduced control overhead in various environments. Also can observe improved packet delivery ratio.
Assure Secure Depot Assistance In Cloud
Volume: 1 | Issue no: 1-2013 | Pagination: 26-35
Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users' Physical possession of their outsourced data, which inevitably poses new security risks towards the correctness of the data in cloud. In order to address this new problem and further achieve a secure and dependable cloud storage service, we propose a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data. The proposed design allows users to audit the cloud storage with very lightweight communication and computation cost. The auditing result not only ensures strong cloud storage correctness guarantee, but also simultaneously achieves fast data error localization, i.e., the identification of misbehaving server. Considering the cloud data are dynamic in nature, the proposed design further supports secure and efficient dynamic operations on outsourced data, including block modification, deletion, and append. Analysis shows the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks.
Classification And Compression Of Cardiac Vascular Disease To Enhance Rural Health Care System Using Softcomputing Techniques
Author:C.Anushya Devi,K.Vimala,N.Sathiya Rani.
Volume: 1 | Issue no: 1-2013 | Pagination: 18-25
The detection of Cardiac Vascular Disease (CVD) is to save a life of a heart patients, with the help of Public Health Care Centers by transmitting ECG signals to nearby hospital server. In this paper we analyze the abnormalities found in the ECG signals by identifying the Normal, Bradycardia Arrhythmia, Tachycardia Arrhythmia and Ischemia signal using the method of Neuro Fuzzy Classifier. DWT coefficients are used toextract the relevant information from the ECG input data. The extracted features are analyzed and classified using Adaptive Neuro Fuzzy Inference System (ANFIS) as a Neuro Fuzzy classifier. The compression algorithm is performed by using Huffman coding. Unit blocks size optimization, adaptive threshold adjustment, and 4-bit-wise Huffman coding methods are applied to reduce the processing cost while maintaining the signal quality.
A Survey Of Elliptic Curve Cryptography Using Character Conversion Method
Author:Arun Kumar Gandhi, Dr. S.S.Tyagi.
Volume: 1 | Issue no: 1-2013 | Pagination: 10-17
In the recent years, elliptic curve cryptography (ECC) has gained widespread exposure and acceptance and has already been include in many security standards. It is widely recognized that data security will play a central role in the design of future IT system. Elliptic key cryptography recently gained lot of attention in industries when we talk about security. This paper discusses the basic operation how ECC is more secure than other public key cryptosystems and also how security can be enhanced in ECC by using CharacterConversion-Method.
Non-Intrusive Drowsiness Detection Using Artificial Techniques
Author:Trupti Dange,Tarun Yengatiwar
Volume: 1 | Issue no: 1-2013 | Pagination: 1-9
Driver fatigue is one of the major causes of accidents in the world. Detecting the drowsiness of the driver is one of the surest ways of measuring driver fatigue In this project we aim to develop drowsiness detection system using Fuzzy Logic and Genetic Algorithm, both in Isolation to detect drowsiness .It uses an nonintrusive technique for judging driver alertness. Alertness is detected on the basis of the degree to which the driver's eyes are open or closed. Viola-Jones algorithm has been developed for face detection which then further used by the fuzzy logic and Genetic Algorithm. Fuzzy logic used to determine level of fatigueness and determine output state. Genetic algorithm has been used to make a good performing combination of good indicators. It calculates the degree (%) of eyes and mouth to detect the state of drowsiness. During the analytical study Genetic Algorithms [22, 23] results were found more accurate as compared to Fuzzy This paper describes how to find the eyes, and determine the status of the eyes are open or closed. An application of Viola Jones algorithm is used for Face detection and tracking. The Haar like feature is developed, which was a primary objective of the project. Haar like feature is a classifier which is trained with a few hundreds of positive and negative examples that are scaled to the same size. The system deals with using information obtained for the binary version of the image to find the edges of the face, which narrows the area of where the eyes may exist...Taking into account the knowledge that eye regions in the face present in uppermost quadrants, we consider extraction of eyes for calculations. Once the eyes are located, we can use various mat lab image processing tool to determine whether the eyes are open or closed.
Contact and support
Terms and conditions
Frequently asked questions
Copyright © 2015
All rights reserved. SciArchives.