Papers by INTERNATIONAL JOURNAL OF TECHNOLOGY AND COMPUTING IJTC
In this paper, we represent automated code smell detection and refactoring tools for calculating ... more In this paper, we represent automated code smell detection and refactoring tools for calculating code quality by detecting Code Smells and increase code quality by Refactoring Techniques. Refactoring is a process for restructuring or improving internal structure of software without changing its behavior. To achieve this aim Declarative Programming approach is followed along with object-oriented software metrics. Detection of Code Smells is based on various Facts and Rules. We used this tool to detect the bad smells in oops based case studies. Code maintainability index is represented in three categories (Hi, Low, Medium) that shows source code quality (Low, Hi, Medium).
A Vehicular Ad-Hoc Network or VANET is a form of Mobile Ad-Hoc Network or MANET which provides co... more A Vehicular Ad-Hoc Network or VANET is a form of Mobile Ad-Hoc Network or MANET which provides communication between vehicles and between vehicles and roadside base stations. A vehicle in VANET is considered to be an intelligent mobile node capable of communicating with its neighbors and other vehicles in the network. VANET is different from MANET due to high mobility of nodes and the large scale of networks. Security and privacy are the two main concerns in designing a VANET .Although there are many proposed solutions for improving securities in VANET but security still remains a delicate research subject. The main objective of the system are to propose the algorithm for detection of multiple malicious, invalid and irrelevant requests sent and received from multiple vehicles at a time and to analyze and detect the attacks in the efficient and effective manner for secure environment. In this system we are proposing the MIPDA algorithm for detecting and analyzing the denial-of-service (DOS) attack. And will also apply the proposed algorithm for detection of multiple malicious, invalid and irrelevant requests sent and received from multiple vehicles at a time. To analyze the behavior of proposed method using various performance parameters such as: Packet loss, Life time of network, Total energy consumed, Number of dead nodes and alive nodes, Frequency, Node Velocity.
The vehicular ad-hoc networks (VANET) congestion control methods are utilized to minimize the tra... more The vehicular ad-hoc networks (VANET) congestion control methods are utilized to minimize the traffic congestion across the busy squares or the roads. The vehicular clusters usually consist of the vehicular nodes and the road side units (RSU). The existing models based upon the traffic congestion control for VANETs have been critically studied for their drawbacks and shortcomings. Mainly, the existing models found working on the improvement of the shortcomings of the earlier congestion control schemes and worked towards removing them effectively. The effective queuing methods have been utilized for the traffic congestion control. The service queue (SQ) and control queue mechanisms have been utilized to curb the congestion problem in the VANETs. This has been observed primarily that the methods associated with the periodic updates (beacons) based method has been utilized to send the traffic on the expiry of time-interval to minimize the traffic congestion control. The multi-factor message similarity scanning has been utilized to avoid the flow of duplicate messages across the VANETs to minimize the traffic congestion. Also the Messages with hop-count 0 are also discarded to avoid the data loops to avoid congestion. For the improvement in the performance the dynamic priority tagging after determining the importance of the traffic inflows with message classification and path planning can be incorporated over the VANETs to decongest the networks in the proposed schemes. Also, the multilink traffic flow shaping based methods can be utilized to control the traffic congestion in the proposed solution.
In the field of artificial intelligence, Adaptive Learning Technique refers to the combination of... more In the field of artificial intelligence, Adaptive Learning Technique refers to the combination of artificial neural networks. In this research paper the Adaptive Learning Technique has been implemented to carry out the Detection and Localization of Sound (S). In this technique two methods are used to detect the pure sound, In the first method wiener filter are used to reduce the amount of noise in a signal and minimize the mean square error (M.S.E), And in the second method wiener with bacterial foraging optimization are used for effectiveness in sound. These proposed methods are compared and the results reveal its superiority.
Image segmentation is the problem of partitioning an image in a semantically meaningful way. This... more Image segmentation is the problem of partitioning an image in a semantically meaningful way. This vague definition implies the generality of the problem-segmentation can be found in any image-driven process, e.g. fingerprint/-text/face recognition, detection of anomalies in industrial pipelines, tracking of moving people/cars/airplanes, etc. For many applications, segmentation reduces to finding an object in an image. Retinal image vessel segmentation and their branching pattern can provide us with the information about abnormality or disease by examining its pathological variance. Retinal vascular pattern are used for automated screening and diagnosis of diabetic retinopathy to assist the ophthalmologists. To enhance the blood vessels and suppress the background information, in this paper, we are proposing smoothing operation on the retinal image using mathematical morphology. Then the enhanced image will be used for segmented using K-means clustering algorithm. We will use the proposed approach on the DRIVE dataset and it will be compared with alternative approaches.
In recent years, a vast research has been seen going on in the field of Mobile Ad Hoc Networks (M... more In recent years, a vast research has been seen going on in the field of Mobile Ad Hoc Networks (MANETs). In MANET each node is wirelessly interconnect with the other node through different network topologies and there are various protocols which help nodes to interconnect with the neighbors nodes and hence make wireless network. In a mobile ad hoc network, nodes move arbitrarily; therefore the network may experience rapid and unpredictable topology changes. Because nodes in a MANET normally have limited transmission ranges, some nodes cannot communicate directly with each other. Hence, routing paths in mobile ad hoc networks potentially contain multiple hops, and every node in mobile ad hoc networks has the responsibility to act as a router. In this paper we provide an overview of a wide range of the existing routing protocols with a particular focus on their characteristics and functionality. We also have discussed the literature survey of various Proactive, Reactive and Hybrid Protocols such, as AODV, DSDV, DSR, etc. in details. Furthermore, the Comparison of Proactive, Reactive and Hybrid protocols have also been discussed on the basis of some parameters, Advantages and Disadvantages.
A B S T R A C T Cloud Computing is an essential ingredient of modern computing systems. Computing... more A B S T R A C T Cloud Computing is an essential ingredient of modern computing systems. Computing concepts, technology and architectures have been developed and consolidated in the last decades; many aspects are subject to technological evolution and revolution. Cloud Computing is an computing technology that is rapidly consolidating itself as the next step in the development and deployment of increasing number of distributed application. The main objective of load balancing methods is to speed up the execution of applications on resources whose workload varies at run time in unpredictable way. Load balancing techniques are widely discussed in homogeneous as well as heterogeneous environments such as grids. There are basically two kinds of load balancing techniques. They are (i) Static and (ii) dynamic. In cloud computing environments, whenever a VM is heavily loaded with multiple tasks, these tasks have to be removed and submitted to the under loaded VMs of the same data center. In this case, when we remove more than one task from a heavy loaded VM and if there is more than one VM available to process these tasks, the tasks have to be submitted to the VM such that there will be a good mix of priorities i.e., no task should wait for a long time in order to get processed. Load balancing is done at virtual machine level i.e., at intra-data center level. We are proposing the ACCLB to balance the load on the cloud and compared it with the existing load balancing methods such as Vector Dot, Join idle queue. The main objective will be to balance the load on cloud and to reduce the energy consumption as compared to previous, on the cloud by using proposed method. Also we have to prove that our proposed technique is more efficient for load balancing and energy consumption on cloud as compared to previous.
The World Wide Web is a valuable information source which is used for information retrieval and a... more The World Wide Web is a valuable information source which is used for information retrieval and also knowledge discovery. With the enormous growth of information accessible to end users through the web, search engines perform an essential role in retrieving and organizing appropriate data for several purposes. The ranking of the web pages for the web search engine is one of the main issues currently. Page Rank is widely used for ranking web pages in order of relevance by mostly all search engines worldwide. The page ranking algorithm shows the popularity of a web page in its page rank score. The main purpose of this research is to find out an efficient approach so that users can get the relevant results from the web search engines. A quick and efficient page ranking system for web retrieval remains as a challenge.
Cloud computing, a framework for enabling convenient, and on-demand network access to a shared po... more Cloud computing, a framework for enabling convenient, and on-demand network access to a shared pool of computing resources is emerging as a new paradigm of large-scale distributed computing. It has widely been adopted by the industry, though there are many existing issues like Load Balancing, Virtual Machine Migration, Server Consolidation, Energy Management, etc. that are not fully addressed. The objective and motivation load balancing techniques in cloud computing and encourage the amateur researcher in this field, so that they can contribute in developing more efficient load balancing algorithm. This will benefit interested researchers to carry out further work in this research area. Load balancing is a methodology to distribute work load across multiple computers, or other resources over the network links to achieve the optimal resource utilization, minimum data processing, minimum average response time and avoid overhead. We are proposing the OLB + LBMM to balance the load on the cloud and compared it with the existing load balancing methods such as Honeybee Foraging Behavior, Active Clustering. The main objective of the research is balance the load on cloud and consumes less energy as compared to previous, on the cloud by using proposed method. Also we have to prove that our proposed technique is more efficient for load balancing and energy consumption on cloud as compared to previous.
Biometrics is used in the process of authentication of a person by verifying or identifying that ... more Biometrics is used in the process of authentication of a person by verifying or identifying that a user requesting a network resource is who he, she, or it claims to be, and vice versa. It uses the property that a human trait associated with a person itself like structure of finger, face details etc. By comparing the existing data with the incoming data we can verify the identity of a particular person. There are many types of biometric system like fingerprint recognition, face detection and recognition, iris recognition etc., these traits are used for human identification in surveillance system, criminal identification. Face is a complex multidimensional structure and needs good computing techniques for recognition. The face is our primary and first focus of attention in social life playing an important role in identity of individual. In this paper, we are proposing the fusion techniques for face identification system and compare it with Gaussian model and 2D Histogram. Also analyze the performance of the system using various performance parameters such as recognition rate, accuracy, true positive rate, and false negative rate.
This paper is proposed the face recognition technologies and techniques. Face recognition has bee... more This paper is proposed the face recognition technologies and techniques. Face recognition has been a fast growing, challenging and interesting area in real time applications. A large number of face recognition algorithms have been developed in last several years, the methods are PCA, LDA, ICA, SVM, ANN for recognition and various hybrid combination of this techniques. This review investigates all these methods with parameters that challenges face recognition like pose variation, facial expressions.
Segmentation of blood vessels in retinal images used for the early diagnosis of retinal diseases ... more Segmentation of blood vessels in retinal images used for the early diagnosis of retinal diseases such as hypertension, diabetes and glaucoma. The high resolution, variability in vessel width, brightness and low contrast make vessel segmentation as difficult task. There exist several methods for segmenting blood vessels from retinal images. However, most of these methods fail to segment high resolution (large in size) images, very few methods provide solution for such a high resolution images but it require lengthy elapsed time and the accuracy of these methods is not completely satisfactory. The research work presents a retinal vessel segmentation algorithm which uses a text on dictionary to classify vessel/non-vessel pixels. However, in contrast to previous work where filter parameters are learnt from manually labeled image pixels our filter parameters are derived from a smaller set of image features that we call key points. In the paper work performed to implement the image preprocessing steps such as cropping, color space transformations, channel extraction, color enhancement, gabor filter. After that, preprocessed images will be used to form feature vector and then apply k-means clustering to form segments for blood vessels segmentation. Finally, to compared the existing technique and the proposed technique using the parameters given by accuracy, sensitivity, specificity and thresholding under Receiver operating characteristic (ROC) curve for true positive rate and false positive rate.
Data communications is moving toward a single, public networking environment. The development in ... more Data communications is moving toward a single, public networking environment. The development in Switching technology for data communication has been phenomenal in the past-first using X.25 protocol where store and forward technique is employed and then the advanced frame-relay technique where variable frame structure signaling and data transfer mechanism across intelligent user-end devices is used and now advanced further to met high end-users. Having failed to get quality of service (QoS) from the other protocols like Routing Information Protocol (RIP), Open Shortest Path First (OSPF), Interior Gateway Routing Protocol (IGRP) and Exterior gateway Routing Protocol (EIGRP) from the studied literature regarding upgrade of routing policy. The packet will be admitted to some other path, if the current concerned failed to send the packet in destination location. In this paper, unequal networks (wired-wireless) include setting up modified load balancing technique in MPLS protocol to be run and acclaim to ameliorate the network performance. Keywords: quality of service (QoS), Routing Information Protocol (RIP), Open Shortest Path First (OSPF), Interior Gateway Routing Protocol (IGRP) and Exterior gateway Routing Protocol (EIGRP)
Uploads
Papers by INTERNATIONAL JOURNAL OF TECHNOLOGY AND COMPUTING IJTC