Computer Life (CPL) 

 ISSN: 1819-4818

Delivering Quality Science to the World

Archieves

Volume 1, Issue 1, 2013

 

Page No: 1-11

Research on Edge Detection of Defects in Industrial Applications Using Morphological Segmentation and Block Processing

Maryshall L Pullman, Ingemar Ramisden and Theobald Wilcox

Department of Applied Mechanics, University of Rhode Island, Kingston, USA

Abstract: Defects are occurring during the manufacturing of boilers, tiles etc., due to improper doping of the constituents added. The manufacturing industries need defect detection techniques during testing of their products. In this paper the automatic defect detection method is implemented in different applications. The object is captured and stored in database in the form of image and is monitored continuously. If any changes occur due to flaws, missing parts etc., from the ideal state it is detected using Region counting algorithm. The type of the error is identified by using Morphological (edge detection and segmentation) operation. Edge detection operator is used to find the errors such as cracks or holes. Segmentation is employed to distinguish the errors. This algorithm can be applied to few application areas and is found detecting efficiently.

Keyword: Segmentation, Edge Detection, Flaws, Morphological, Cracks

 

Page No: 12-20

Course of Software Testing Automatically Generates Test Data for the Software under Test via Path Table

Andrea Irving1, Martina Bryce1, Miyalviya Q Himani2 and Bhanowari B2

1Department of Information Engineering, Virginia Commonwealth University, Richmond, USA

2National Institute of Technology Karnataka, Surathkal, Mangalore, Karnataka, India

Abstract: Automated Test Data Generation (ATDG) is an activity that in the course of software testing automatically generates test data for the software under test (SUT). It usually makes the testing more efficient and cost effective. Test Data Generation (TDG) is crucial for software testing because test data is one of the key factors for determining the quality of any software test during its execution. The multi-phased activity of ATDG involves various techniques for each of its phases. Today testing is done manually by most of the industry due to high cost and complexity of automation. Test automation is a process of writing computer programs that can generate test cases, or else test cases need to be generated manually. In this paper, we propose a test data generation method as our aim is to improve test coverage and to avoid the unsolvable constraint problem. Our method is based on the individual constraints, and same or dependent variable to create the path table which holds the information about the path traversed by various input test data. We have implemented this method and shown along with also sample program. The result is generated in the form of table of test cases and cause –effect graph.

Keyword: Independent Feasible Path, Scalability, Equivalence Class

 

Page No: 21-28

A Survey of E-Commerce Clustering by Hidden Markov Model for Applications in Online Transaction

James Lambert1, Frederic S Raleign1, Marcus A Simollett1 and Bhanowari B2

1School of Business Management, San Diego State University, San Diego, USA

2Information Security Centre, San Diego State University, San Diego, USA

Abstract: Consumers rely on the internet to shop, bank invest online shoppers use credit card to their purchases. In electronic commerce, credit card has become the most important means of payment due to fast development in information technology around the world. Credit card will be most consentient way to do online shopping, paying bills, online movie ticket booking, fees pay etc. In case of fraud associated with it is also increasing. Many techniques use for find out the credit card fraud detection Fraud Detection; Hidden Markov Model (MHH) is the statistical tools for Engineering and scientists to solve various problems. An HMM Based system is initially studies spending profile of the cardholder and followed by checking an incoming transaction against spending behavior of the cardholder. In this paper, we can show HMM based credit card fraud detection during credit card transaction.

Keyword: Credit Card, Hidden Markov Model, Online Transaction, E-Commerce Clustering, Fraud Detecting System

 

Page No: 29-36

The Circuit Design Techniques for High Performance CMOS Layout Design of Memories

Aihua Gao and Hai Li

Department Computer Engineering, Chengdu Aeronautic Vocational and Technical College, Chengdu, China

Abstract: Memories store ones and zeros. These ones and zeros are stored and either retrieved or manipulated. Most memories store data inputs to some location. Accessing one memory location among other memory locations is as simple as selecting a set of x-y coordinates. This paper focuses on circuit design techniques for high performance CMOS layout design of memories. In order to provide a framework for understanding the techniquesthe issues behind them.

Keyword: Layout Design, CMOS, High Performance Memory

 

Page No: 37-45

A Study on Data Hiding Techniques for Data Privacy and Data Structures Based on Association Rules

Bingbing Hu1, Juan Ruan1 and Sujie Jin2

1School of Information Science, Shanghai Institute of Technology, Shanghai, China

2Education School, Jiangxi Science & Technology Normal University, Nanchang, China

Abstract: APRIORI algorithm, a popular data mining technique and compared the performances of a linked list based implementation as a basis and a tries-based implementation on it for mining frequent item sequences in a transactional database. In this paper we examine the data structure, implementation and algorithmic features mainly focusing on those that also arise in frequent item set mining. This algorithm has given us new capabilities to identify associations in large data sets. But a key problem, and still not sufficiently investigated, is the need to balance the confidentiality of the disclosed data with the legitimate needs of the data users. One rule is characterized as sensitive if its disclosure risk is above a certain privacy threshold. Sometimes, sensitive rules should not be disclosed to the public, since among other things, they may be used for inferring sensitive data, or they may provide business competitors with an advantage. So, next we worked with some association rule hiding algorithms and examined their performances in order to analyze their time complexity and the impact that they have in the original database.

Keyword: Data Privacy, Association Rules, Hiding Techniques

 

Page No: 46-52

Properties of AWNs and FEC during Voice Packet Transmission Network and the High Packet Loss Rate in Ad-hoc Wireless Networks

Jacob J Ricardo, Monroesay V Harringtonis and Leopoldis Horace

Department of Network Engineering, Illinois State University, Bloomington Normal, USA

Abstract: Ad-hoc Wireless Networks are spotted widely in the present scenarios. They play a vital role in business environments where permanent access to network resources act as key factor. They also provide a perfect solution for the creation of ad-hoc networks during natural calamity. This document is a survey of the voice communication in wireless networks. The properties of AWNs and FEC are discussed, and then the issues related to the implementation of voice communication over the network are analyzed. The main findings of this survey are the during voice packet transmission the network visage high packet loss rate. In this report, we illustrate performance results relative to marketization scheme, coding schemes are discussed. In our study we analyze the service of Layered Coding (LC) and Multiple Description Coding (MD) for supporting error resilient voice communication in ad hoc wireless networks.

Keyword: Ad-hoc Networks, Forward Error Correction, Layered Coding, Multiple Description Coding, Voice Quality, Multi Path

 

Page No: 53-61

Improve the Search Accuracy by Means of Separating the Concepts into Content Based Concepts and Location Based on OWL Search Engine

Mohamidys B Needham

College of Software Engineering, Umm Al-Qura University, Alith, Saudi Arabia

Abstract: In internet, a wide range of web information increases rapidly, user wants to retrieve the information based upon his preference of using search engines. Our paper is going to propose a new type of search engine for web personalization approach. It will capture the interests and preferences of the user in the form of concepts of mining search results and their click through. Our approach is to improve the search accuracy by means of separating the concepts into content based concepts and location based which plays an important role in global search. Moreover, recognizing the fact that different users and queries may have different emphasis on content and location information, we introduce the content and location based concepts and achieves their respective results. Additionally, search engine also provides the facility of local search by entering keywords without using internet. And feature of integrity of the search engines at one location so that user can work with different search engines in parallel.

Keyword: Web Ontology Language OWL, Personalization, Ontology based Multi-Facet OMF, WKB World Knowledge Base

 

Page No: 62-69

Novel Steganography Technique for Preventing the Detection of Hidden Messages

Jaagviris Vermari and Maimetag Gupiwota

Lecturer at Faculty of Teacher Training and Education, Sriwijaya University, Inderalaya, South Sumatera, Indonesia

Abstract: Steganography is the art of hiding information in ways that prevent the detection of hidden messages. It includes a vast array of secret communications methods that conceal the message’s very existence. These methods include invisible inks, microdots, character arrangement, digital signatures, covert channels, and spread spectrum communications. Steganography and cryptography are cousins in the spy-craft family. This paper information hiding and its applications, and image compression using proposed efficient encoding technique with the main focus being on hiding in the spatial domain are developed. Three information hiding methods are proposed, which are based on the encoding technique, are tested and the results are analyzed. Increase in tolerance level would allow using all range blocks so that more data can be stored. However low tolerance is desirable in order to give an image that is visually close to the original. Further research should go towards improving the watermarking program and adding extra functionality. One of these is looking at having multiple watermarks for a single image, so that different parts of the image have a different watermark. There is also the need to further develop the robustness of existing watermarking techniques to combat the ever-increasing attacks on watermarks.

Keyword: Steganography, LSB, Hiding Encoding Technique

Copyright©2000 Domingo Brothers, Inc. Publishers. All rights reserved, USA and worldwide.