Page No: 1-11
Research on Edge Detection
of Defects in Industrial Applications Using Morphological Segmentation and Block
Processing
Maryshall L Pullman,
Ingemar Ramisden and Theobald Wilcox
Department of Applied
Mechanics, University of Rhode Island, Kingston, USA
Abstract: Defects
are occurring during the manufacturing of boilers, tiles etc., due to improper
doping of the constituents added. The manufacturing industries need defect
detection techniques during testing of their products. In this paper the
automatic defect detection method is implemented in different applications. The
object is captured and stored in database in the form of image and is monitored
continuously. If any changes occur due to flaws, missing parts etc., from the
ideal state it is detected using Region counting algorithm. The type of the
error is identified by using Morphological (edge detection and segmentation)
operation. Edge detection operator is used to find the errors such as cracks or
holes. Segmentation is employed to distinguish the errors. This algorithm can
be applied to few application areas and is found detecting efficiently.
Keyword: Segmentation,
Edge Detection, Flaws, Morphological, Cracks
Page No: 12-20
Course of Software
Testing Automatically Generates Test Data for the Software under Test via Path
Table
Andrea Irving1,
Martina Bryce1, Miyalviya Q Himani2 and Bhanowari B2
1Department of Information Engineering, Virginia
Commonwealth University, Richmond, USA
2National Institute of Technology Karnataka,
Surathkal, Mangalore, Karnataka, India
Abstract: Automated
Test Data Generation (ATDG) is an activity that in the course of software
testing automatically generates test data for the software under test (SUT). It
usually makes the testing more efficient and cost effective. Test Data
Generation (TDG) is crucial for software testing because test data is one of
the key factors for determining the quality of any software test during its
execution. The multi-phased activity of ATDG involves various techniques for
each of its phases. Today testing is done manually by most of the industry due
to high cost and complexity of automation. Test automation is a process of
writing computer programs that can generate test cases, or else test cases need
to be generated manually. In this paper, we propose a test data generation
method as our aim is to improve test coverage and to avoid the unsolvable
constraint problem. Our method is based on the individual constraints, and same
or dependent variable to create the path table which holds the information
about the path traversed by various input test data. We have implemented this
method and shown along with also sample program. The result is generated in the
form of table of test cases and cause –effect graph.
Keyword: Independent
Feasible Path, Scalability, Equivalence Class
Page No: 21-28
A Survey of E-Commerce
Clustering by Hidden Markov Model for Applications in Online Transaction
James Lambert1,
Frederic S Raleign1, Marcus A Simollett1 and Bhanowari B2
1School of Business Management, San Diego
State University, San Diego, USA
2Information Security Centre, San Diego
State University, San Diego, USA
Abstract: Consumers
rely on the internet to shop, bank invest online shoppers use credit card to
their purchases. In electronic commerce, credit card has become the most
important means of payment due to fast development in information technology
around the world. Credit card will be most consentient way to do online
shopping, paying bills, online movie ticket booking, fees pay etc. In case of
fraud associated with it is also increasing. Many techniques use for find out
the credit card fraud detection Fraud Detection; Hidden Markov Model (MHH) is
the statistical tools for Engineering and scientists to solve various problems.
An HMM Based system is initially studies spending profile of the cardholder and
followed by checking an incoming transaction against spending behavior of the
cardholder. In this paper, we can show HMM based credit card fraud detection
during credit card transaction.
Keyword: Credit
Card, Hidden Markov Model, Online Transaction, E-Commerce Clustering, Fraud
Detecting System
Page No: 29-36
The Circuit Design
Techniques for High Performance CMOS Layout Design of Memories
Aihua Gao and Hai
Li
Department Computer
Engineering, Chengdu Aeronautic Vocational and Technical College, Chengdu,
China
Abstract: Memories
store ones and zeros. These ones and zeros are stored and either retrieved or
manipulated. Most memories store data inputs to some location. Accessing one
memory location among other memory locations is as simple as selecting a set of
x-y coordinates. This paper focuses on circuit design
techniques for high performance CMOS layout design of memories. In
order to provide a framework for understanding the techniques,the issues behind them.
Keyword: Layout
Design, CMOS, High Performance Memory
Page No: 37-45
A Study on Data
Hiding Techniques for Data Privacy and Data Structures Based on Association
Rules
Bingbing Hu1,
Juan Ruan1 and Sujie Jin2
1School of Information Science, Shanghai
Institute of Technology, Shanghai, China
2Education School, Jiangxi Science &
Technology Normal University, Nanchang, China
Abstract: APRIORI
algorithm, a popular data mining technique and compared the performances of a
linked list based implementation as a basis and a tries-based implementation on
it for mining frequent item sequences in a transactional database. In this
paper we examine the data structure, implementation and algorithmic features
mainly focusing on those that also arise in frequent item set mining. This
algorithm has given us new capabilities to identify associations in large data
sets. But a key problem, and still not sufficiently investigated, is the need
to balance the confidentiality of the disclosed data with the legitimate needs
of the data users. One rule is characterized as sensitive if its disclosure
risk is above a certain privacy threshold. Sometimes, sensitive rules should
not be disclosed to the public, since among other things, they may be used for
inferring sensitive data, or they may provide business competitors with an
advantage. So, next we worked with some association rule hiding algorithms and
examined their performances in order to analyze their time complexity and the
impact that they have in the original database.
Keyword: Data
Privacy, Association Rules, Hiding Techniques
Page No: 46-52
Properties of AWNs
and FEC during Voice Packet Transmission Network and the High Packet Loss Rate in
Ad-hoc Wireless Networks
Jacob J Ricardo, Monroesay
V Harringtonis and Leopoldis Horace
Department of Network
Engineering, Illinois State University, Bloomington Normal, USA
Abstract: Ad-hoc
Wireless Networks are spotted widely in the present scenarios. They play a
vital role in business environments where permanent access to network resources
act as key factor. They also provide a perfect solution for the creation of
ad-hoc networks during natural calamity. This document is a survey of the voice
communication in wireless networks. The properties of AWNs and FEC are
discussed, and then the issues related to the implementation of voice
communication over the network are analyzed. The main findings of this survey
are the during voice packet transmission the network visage high packet loss
rate. In this report, we illustrate performance results relative to marketization
scheme, coding schemes are discussed. In our study we analyze the service of
Layered Coding (LC) and Multiple Description Coding (MD) for supporting error
resilient voice communication in ad hoc wireless networks.
Keyword: Ad-hoc
Networks, Forward Error Correction, Layered Coding, Multiple Description
Coding, Voice Quality, Multi Path
Page No: 53-61
Improve the Search
Accuracy by Means of Separating the Concepts into Content Based Concepts and
Location Based on OWL Search Engine
Mohamidys B Needham
College of Software
Engineering, Umm Al-Qura University, Alith, Saudi Arabia
Abstract: In
internet, a wide range of web information increases rapidly, user wants to
retrieve the information based upon his preference of using search engines. Our
paper is going to propose a new type of search engine for web personalization
approach. It will capture the interests and preferences of the user in the form
of concepts of mining search results and their click through. Our approach is
to improve the search accuracy by means of separating the concepts into content
based concepts and location based which plays an important role in global
search. Moreover, recognizing the fact that different users and queries may
have different emphasis on content and location information, we introduce the
content and location based concepts and achieves their respective results. Additionally,
search engine also provides the facility of local search by entering keywords
without using internet. And feature of integrity of the search engines at one
location so that user can work with different search engines in parallel.
Keyword: Web
Ontology Language OWL, Personalization, Ontology based Multi-Facet OMF, WKB
World Knowledge Base
Page No: 62-69
Novel Steganography
Technique for Preventing the Detection of Hidden Messages
Jaagviris Vermari and
Maimetag Gupiwota
Lecturer at Faculty
of Teacher Training and Education, Sriwijaya University, Inderalaya, South
Sumatera, Indonesia
Abstract: Steganography
is the art of hiding information in ways that prevent the detection of hidden
messages. It includes a vast array of secret communications methods that
conceal the message’s very existence. These methods include invisible inks,
microdots, character arrangement, digital signatures, covert channels, and
spread spectrum communications. Steganography and cryptography are cousins in
the spy-craft family. This paper information hiding and its applications, and
image compression using proposed efficient encoding technique with the main
focus being on hiding in the spatial domain are developed. Three information
hiding methods are proposed, which are based on the encoding technique, are
tested and the results are analyzed. Increase in tolerance level would allow
using all range blocks so that more data can be stored. However low tolerance
is desirable in order to give an image that is visually close to the original.
Further research should go towards improving the watermarking program and
adding extra functionality. One of these is looking at having multiple
watermarks for a single image, so that different parts of the image have a
different watermark. There is also the need to further develop the robustness of
existing watermarking techniques to combat the ever-increasing attacks on
watermarks.
Keyword: Steganography,
LSB, Hiding Encoding Technique