archive-org.com » ORG » I » IJORCS.ORG

Total: 231

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • FPGA Implementation of FIR Filter using Various Algorithms: A Retrospective
    doi 10 7815 ijorcs 42 2014 081 Close Abstract This Paper is a review study of FPGA implementation of Finite Impulse response FIR with low cost and high performance The key observation of this paper is an elaborate analysis about hardware implementations of FIR filters using different algorithm i e Distributed Arithmetic DA DA Offset Binary Coding DA OBC Common Sub expression Elimination CSE and sum of power of two SOPOT with less resources and without affecting the performance of the original FIR Filter References Cited By Steven W Smith The Scientist and Engineer s Guide to Digital Signal Processing California Technical Publishing San Diego California Second Edition 1999 Wang Wei Swamy M N S Ahmad M O Low power FIR filter FPGA implementation based on distributed arithmetic and residue number system Circuits and Systems 2001 MWSCAS 2001 Proceedings of the 44th IEEE 2001 Midwest Symposium on vol 1 no pp 102 105 vol 1 2001 doi 10 1109 MWSCAS 2001 986125 Saurabh Singh Rajput Dr S S Bhadauria Implementation of Fir Filter Using Efficient Window Function and Its Application in Filtering a Speech Signal International Journal of Electronics and Mechanical Controls Volume 1 Issue 1 November 2012 Sen M Kuo Bob H Lee and Wenshun Tian Real Time Digital Signal Processing Implementations and Applications John Wiley Sons Ltd England Second Edition 2006 Sonika Gupta Aman Panghal Performance Analysis of FIR Filter Design by Using Rectangular Hanning and Hamming Windows Method International Journal of Advanced Research in Computer Science and Software Engineering Volume 2 Issue 6 June 2012 Gao Jinding Hou Yubao Su Long Design and FPGA Implementation of Linear FIR Low pass Filter Based on Kaiser Window Function Intelligent Computation Technology and Automation ICICTA 2011 International Conference on vol 2 no pp 496 498 28 29 March 2011 doi 10 1109 ICICTA 2011 408 Croisier D J Esteban M E Levilion V Rizo Digital Filter for PCM Encoded Signals U S Patent No 3 777 130 1973 A Peled and B Liu A new hardware realization of digital filters IEEE Transactions on A S S P vol ASSP 22 pp 456 462 December 1974 Bo Hong Haibin Yin Xiumin Wang Ying Xiao Implementation of FIR filter on FPGA using DA OBC algorithm Information Science and Engineering ICISE 2010 2nd International Conference on vol no pp 3761 3764 4 6 Dec 2010 M Thenmozhi N Kirthika Analysis of Efficient Architectures for FIR filters using Common Subexpression Elimination Algorithm International Journal of Scientific Technology Research Volume 1 Issue 4 May 2012 Damian C Lunca E A low area FIR filter for FPGA implementation Telecommunications and Signal Processing TSP 2011 34th International Conference on vol no pp 521 524 18 20 Aug 2011 Heejong Yoo David V anderson Hardware efficient distributed arithmetic architecture for high order digital filters in proc IEEE International conference on Acoustics speech and signal processing ICASSP 05 Vol 5 pp 125 128 2005 Mahesh R Vinod A P A New Common Subexpression Elimination Algorithm for Realizing Low Complexity

    Original URL path: http://www.ijorcs.org/manuscript/id/81/jinalkumari-k-dhobi/fpga-implementation-of-fir-filter-using-various-algorithms-a-retrospective (2016-05-01)
    Open archived version from archive

  • Using Virtualization Technique to Increase Security and Reduce Energy Consumption in Cloud Computing
    42 2014 082 Close Abstract An approach has been presented in this paper in order to generate a secure environment on internet Based Virtual Computing platform and also to reduce energy consumption in green cloud computing The proposed approach constantly checks the accuracy of stored data by means of a central control service inside the network environment and also checks system security through isolating single virtual machines using a common virtual environment This approach has been simulated on two types of Virtual Machine Manager VMM Quick EMUlator Qemu HVM Hardware Virtual Machine Xen and outputs of the simulation in VMInsight show that when service is getting singly used the overhead of its performance will be increased As a secure system the proposed approach is able to recognize malicious behaviors and assure service security by means of operational integrity measurement Moreover the rate of system efficiency has been evaluated according to the amount of energy consumption on five applications Defragmentation Compression Linux Boot Decompression and Kernel Boot Therefore this has been resulted that to secure multi tenant environment managers and supervisors should independently install a security monitoring system for each Virtual Machines VMs which will come up to have the management heavy workload of While the proposed approach can respond to all VM s with just one virtual machine as a supervisor References Cited By Celesti Francesco A Villari M T and Puliafito A Improving Virtual Machine Migration in Federated Cloud Environments Second International Conference on Evolving Internet 20 25 September 2010 pp 61 67 doi 10 1109 INTERNET 2010 20 Chen Y Wo T and Li J An efficient resource management system for on line virtual cluster provision IEEE ICC 2009 pp 72 79 doi 10 1109 CLOUD 2009 64 Shwetha B and Balagoni Y Secure Data Storage In Cloud Computing International Journal of Research in Computer Science vol 1 2011 pp 63 73 doi 10 7815 ijorcs 11 2011 006 Mateescu G Gentzsch W and J Ribbens C Hybrid computingwhere HPC meets grid and cloud computing ELSEVIER FGCS 2011 pp 440 453 doi 10 1016 j future 2010 11 003 Zissis D and Lekkas D Addressing cloud computing security issues ELSEVIER FGCS 2011 pp 583 592 doi 10 1016 j future 2010 12 006 Li J Huai J Hu C and Zhu Y A Secure Collaboration Service for Dynamic Virtual Organizations IS Elsevier vol 180 issue 17 2010 pp 3086 3107 doi 10 1016 j ins 2010 05 014 Ray S and De Sarkar A Execution Analysis of Load Balancing Algorithms in Cloud Computing Environment IJCCSA Vol 2 No 5 2012 pp 1 13 Suakanto S H Supangkat S and Saragih R Performance Measurment of Cloud Computing Services IJCCSA Vol 2 No 2 2012 pp 9 20 M Azab A Ning P C Sezer E and Zhang X HIMA a hypervisor based integrity measurement agent IEEE Computer Society 2009 pp 461 470 doi 10 1109 ACSAC 2009 50 Zhao X Borders K and Prakash A Virtual machine security system

    Original URL path: http://www.ijorcs.org/manuscript/id/82/hamid-banirostam/using-virtualization-technique-to-increase-security-and-reduce-energy-consumption (2016-05-01)
    Open archived version from archive

  • Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale Global Optimization Problems
    10 1109 tevc 2008 2009457 E Dolan Pattern Search Behaviour in Nonlinear Optimization Thesis 1999 S Garcia M Lozano F Herrera D Molina A Snchez Global and local real coded genetic algorithms based on parentcentric crossover operators Eur J Oper Res 185 1088 1113 2008 doi 10 1016 j ejor 2006 06 043 F Glover E Taillard D Werra A user s guide to tabu search Annals of operations research 41 1 pp 1 28 1993 doi 10 1007 BF02078647 M Hadi M Orguna W Pedryczb Hybrid optimization with improved tabu search Appl Soft Comput 11 2 1993 2006 2011 doi 10 1016 j asoc 2010 06 015 P Hansen N Mladenovic M Prezreno Variable neighborhood search methods and applications Ann Oper Res 175 1 367 407 2010 doi 10 1007 s10479 009 0657 6 Hedar AF Ali Tabu search with multi level neighborhood structures for high dimensional problems Appl Intell 37 189 206 2012 doi 110 1007 s10489 011 0321 0 A Hedar A F Ali Genetic algorithm with population partitioning and space reduction for high dimensional problems in Proceeding of the 2009 International Conference on Computer Engineering and Systems ICCES09 PP 151 156 Cairo Egypt 2009 doi 10 1109 icces 2009 5383293 F Herrera M Lozano J Verdegay Tackling real coded genetic algorithms Operators and tools for behavioral analysis Artif Intell Rev 12 265 319 1998 doi 10 1023 a 1006504901164 F Herrera M Lozano D Molina Continuous scatter search An analysis of the integration of some combination methods and improvement strategies Eur J Oper Res 169 2 450 476 2006 doi 10 1016 j ejor 2004 08 009 L Hvattum F Glover Finding local optima of high dimensional functions using direct search methods European Journal of Operational Research 195 31 45 2009 doi 10 1016 j ejor 2008 01 039 D Kim K Kim F Chen Unrelated parallel machine scheduling with setup times using simulated annealing Robotics and Computer Integrated Manufacturing 18 223 231 2002 doi 10 1016 s0736 5845 02 00013 3 S Kirkpatrick C Gelatt M Vecchi Optimization by simulated annealing Science 220 4598 671 680 1983 doi 10 1016 s0736 5845 02 00013 3 T Kolda R Lewies V Torczon Optimization by direct search New perspectives on some classical and modern methods SIAM Review 45 385 482 2003 doi 10 1137 s003614450242889 M Laguna R Mart Experimental testing of advanced scatter search designs for global optimization of multimodal functions J Glob Optim 33 2 235 255 2005 doi 10 1007 s10898 004 1936 z W Lee W Ch P Chen A simulated annealing approach to make span minimization on identical parallel machines International Journal of Advanced Manufacturing Technology 31 328 334 2006 doi 10 1007 s00170 005 0188 5 J Liang P Suganthan K Deb Novel composition test functions for numerical global optimization in Proceedings of 2005 IEEE Swarm Intelligence Symposium 8 10 June pp 68 75 2005 doi 10 1109 sis 2005 1501604 J Liang A Qin P Suganthan S Baskar Comprehensive learning

    Original URL path: http://www.ijorcs.org/manuscript/id/84/ahmed-fouad-ali/hybrid-simulated-annealing-and-nelder-mead-algorithm-for-solving-large-scale-global-optimization-problems (2016-05-01)
    Open archived version from archive

  • Enhancement of DES Algorithm with Multi State Logic
    Enhanced DES algorithm works on increasing the key length or complex S BOX design or increased the number of states in which the information is to be represented or combination of above criteria By increasing the key length the number of combinations for key will increase which is hard for the intruder to do the brute force attack As the S BOX design will become the complex there will be a good avalanche effect As the number of states increases in which the information is represented it is hard for the intruder to crack the actual information Proposed algorithm replace the predefined XOR operation applied during the 16 round of the standard algorithm by a new operation called Hash function depends on using two keys One key used in F function and another key consists of a combination of 16 states 0 1 2 13 14 15 instead of the ordinary 2 state key 0 1 This replacement adds a new level of protection strength and more robustness against breaking methods References Cited By Dr Mohammed M Alani College of Computer Engineering and Sciences Gulf University Kingdom of Bahrain DES96 Improved DES Security 7th International Multi Conference on Systems Signals and Devices IEEE 2010 Akhil Kaushik Assistant Professor Computers Department Manoj Bamela Assistant Professor Electronics Department AnantKumar B Tech Pre final Computers Engineering from T I T S College Bhiwani Haryana India Block Encryption Standard for Transfer of Data International Conference on Networking and Information Technology IEEE 2010 K Anchugam and M Tamilselvi New Data Encryption Standard Algorithm IJCSNS International Journal of Computer Science and Network Security VOL 13 No 4 April 2013 Prashanti G Dipti S Sandhya Rani K A Novel Approach for Data Encryption Standard Algorithm International Journal of Engineering and Advanced Technology IJEAT ISSN 2249 8958 Volume

    Original URL path: http://www.ijorcs.org/manuscript/id/85/payal-patel/enhancement-of-des-algorithm-with-multi-state-logic (2016-05-01)
    Open archived version from archive

  • Typical Genomic Framework on Disease Analysis
    unlimited number of ways that the nucleotides can be ordered and sequenced to form distinct genes The algorithm delivers the difference between diseased and healthy status shall guide us to conclude the disease severity stage and its nature This powerful Typical Genomic Framework on Disease Analysis TGFDA algorithm is built to deliver instant result over Very Large Database using density and weight based Clustering Algorithm References Cited By R Agrawal and R Srikant Fast Algorithms for Mining Association Rules Proc 1994 Int lconf Very Large Data Bases pp 487 499 Santiago Chile Sept 2010 Haruka Fuse Haruka Fukamachi Mitsuko Inoue and Takeshi Igarshi Identification and Functional Analysis of the Gene Cluster Gene Volume 515 Issue 2 Pages 291 297 25th February 2013 Elsevier Publications D W Cheung J Han V Ng A Fu and Y Fu A Fast Distributed Algorithm for Mining Association Rules Proc 1996 Int l Conf Parallel and Distributed Information Systems PP 1996 Int l Conf Data Enf PP 106 114 New Orleans Feb 2010 doi 10 1109 PDIS 1996 568665 L Li C R Weinberg T A Darden L G Pedersen Gene selection for sample classification based on gene expression data study of sensitivity to choice of parameters of the GA KNN method Bioinformatics 17 12 2001 1131 1142 doi 10 1007 978 3 642 13089 2 49 J Khan J S Wei M Ringner L H Saal M Ladanyi F Westermann F Berthold M Schwab C R Antonescu C Peterson P S Meltzer Classification and diagnostic prediction of cancers using gene expression profiling and artificial neural networks Nat Med 7 6 2001 673 679 M B Eisen P T Spellman P O Brown D Bostein Cluster analysis and display of genome wide expression patterns Proceedings of the National Academy of Science USA 95 1998 14 863 14 868 T R Golub D K Slonim P Tamayo C Huard M GaasenBeek J P Mesirov H Coller M L Loh J R Downing M A Caligiuri C D Blomfield E S Lander Molecular classification of cancer class discovery and class prediction by gene expression monitoring Science 286 1999 531 537 doi 10 1126 science 286 5439 531 E Frank I H Witten Generating accurate rule sets without global optimization in Machine Learning Proceedings of the 15th International Conference Morgan Kaufmann Publishers Los Altos CA 1998 Y Fu and J Han V Ng A Fu and Y Fu A Fast Distributed Algorithm for Mining Association Rules Proc 1996 Int l Conf Parallel and Distributed Information Systems PP 31 44 Miami Beach Fla Dec 2001 D W Cheung J Han V Ng and C Y Wong Maintenance of Discovered Association Rules in Large Databases An Incremental Updating Technique Proc 1996 Int l Conf Data Engg PP 106 114 New Orleans Feb 2009 doi 10 1109 ICDE 1996 492094 D W Cheung J Han V Ng A Fu and Y Fu A Fast Distributed Algorithm for Mining Association Rules Proc 1996 Int l Conf Parallel and Distributed Information Systems PP

    Original URL path: http://www.ijorcs.org/manuscript/id/83/j-stanly-thomas/typical-genomic-framework-on-disease-analysis (2016-05-01)
    Open archived version from archive

  • The Effect of using Facebook Markup Language (FBML) for Designing an E-Learning Model in Higher Education
    LMS References Cited By Blattner G Fiori M 2011 Virtual social network communities An investigation of language learners development of sociopragmatic awareness and multiliteracy skills CALICO Journal 29 24 43 Cerdà F Planas N 2011 Facebook s Potential for Collaborative e Learning RUSC Revista De Universidad Y Sociedad Del Conocimiento 8 2 197 210 Dabbagh N Kitsantas A 2012 Personal learning environments social media and self regulated learning A natural formula for connecting formal and informal learning The Internet and Higher Education 15 1 3 8 doi 10 1016 j iheduc 2011 06 002 Fewkes A M McCabe M 2012 Facebook Learning tool or distraction Journal of Digital Learning in Teacher Education 28 92 98 Garrison D R 2011 E learning in the 21st century A framework for research and practice Retrieved from http www routledge com books details 9780415885836 Goldman J 2009 Facebook cookbook City CA O Reilly Media Guzin M S Kocak U Y 2010 Modeling educational usage of Facebook Computers Education v55 n2 p444 453 Sep 2010 10 pp Huwe T K 2012 Twitter and Facebook open the door to collaboration Computers in Libraries 32 8 27 29 Kayri M Cakir O 2010 An applied study on educational use of Facebook as Web 2 0 tool The sample lesson of computer networks and communication International Journal of Computer Science Education Technology 2 1 10 5121 ijcsit 2010 2405 Kennedy M 2011 Facing the future with education technology American School University 84 10 17 Lenandlar S 2013 Guided assessment or open discourse A comparative analysis of students interaction on Facebook groups Turkish Online Journal of Distance Education 14 1 35 43 Lewis L Wahesh E 2012 Facebook and the cognitive model A tool for promoting adolescent self awareness Journal of Creativity in Mental Health 7 4 365 374 Louis L 2012 An innovative research on the usage of Facebook in the higher education context of Hong Kong Electronic Journal of e Learning 10 4 p378 386 2012 9 pp EJ986646 Lovell E D Palmer B 2013 Engaging introductory writing students through Facebook About Campus 18 1 p25 28 Mar Apr 2013 4 pp EJ998123 Mahmud M M Ching W S 2012 Facebook does it really work for L2 learning SAVAP International 3 357 367 Mao E Xu L Tian W Eds 2012 Emerging computation and information technologies for education Vol 146 Berlin Germany Springer doi 10 1007 978 3 642 28466 3 Pi S M Chou C H Liao H L 2013 A study of Facebook groups members knowledge sharing Computers in Human Behavior 29 5 1971 1979 Rennie F Morrison T M 2013 E learning and social networking handbook Resources for higher education Retrieved from http books google com books hl ar lr id zV00tQB EYkC pgis 1 Shih R C 2011 Can Web 2 0 technology assist college students in learning English writing Integrating Facebook and peer assessment with blended learning Australasian Journal of Educational Technology 27 5 spec iss p829 845 2011 17 pp EJ943540

    Original URL path: http://www.ijorcs.org/manuscript/id/88/mohammed-amasha/the-effect-of-using-facebook-markup-language-fbml-for-designing-an-e-learning-model (2016-05-01)
    Open archived version from archive

  • Head and Hand Detection using Kinect Camera 360
    an advanced input device for HCI is the Kinect camera developed by Microsoft Kinect camera codenamed Project Nathal has a distinct advantage over other 3D cameras because it obtains more accurate depth information of a subject easily and very fast By using Kinect one can track up to six people concurrently and also obtain motion analysis with feature extraction Being extremely useful in indoor HCI applications it cannot be used in outdoor applications because its infrared depth sensor makes it extremely sensitive to sunlight References Cited By Lee S H and S H Oh A Kinect Sensor based Windows Control Interface International Journal of Control Automation 2014 7 3 Kean S J Hall and P Perry Meet the Kinect An Introduction to Programming Natural User Interfaces 2011 Apress Hsu H m J The potential of kinect in education International Journal of Information and Education Technology 2011 1 5 p 365 370 Wang J G and E Sung EM enhancement of 3D head pose estimated by point at infinity Image and Vision Computing 2007 25 12 p 1864 1874 Leyvand T et al Kinect identity Technology and experience Computer 2011 44 4 p 94 96 Schramm M Kinect The company behind the tech explains how it works AOL Tech http www joystiq com 2010 06 19 kinect how it works from the company behind the tech 2010 Jaemin L et al A robust gesture recognition based on depth data in Frontiers of Computer Vision FCV 2013 19th Korea Japan Joint Workshop on 2013 IEEE Supplies P 3 D Sensing Technology to Project Natal for Xbox 360 Shao L et al Computer vision for RGB D sensors Kinect and its applications IEEE transactions on cybernetics 2013 43 5 p 1314 1317 Miranda L et al Real time gesture recognition from depth data through key poses learning and decision forests in Graphics Patterns and Images SIBGRAPI 2012 25th SIBGRAPI Conference on 2012 IEEE Rimkus K et al 3D human hand motion recognition system in Human System Interaction HSI 2013 The 6th International Conference on 2013 IEEE Guo K P Ishwar and J Konrad Action recognition in video by covariance matching of silhouette tunnels in Computer Graphics and Image Processing SIBGRAPI 2009 XXII Brazilian Symposium on 2009 IEEE Tuzel O F Porikli and P Meer Region covariance A fast descriptor for detection and classification in Computer Vision ECCV 2006 2006 Springer p 589 600 Erol A et al Vision based hand pose estimation A review Computer Vision and Image Understanding 2007 108 1 p 52 73 Athitsos V and S Sclaroff Estimating 3D hand pose from a cluttered image in Computer Vision and Pattern Recognition 2003 Proceedings 2003 IEEE Computer Society Conference on 2003 IEEE Rosales R et al 3D hand pose reconstruction using specialized mappings in Computer Vision 2001 ICCV 2001 Proceedings Eighth IEEE International Conference on 2001 IEEE de La Gorce M D J Fleet and N Paragios Model based 3d hand pose estimation from monocular video Pattern Analysis and Machine Intelligence

    Original URL path: http://www.ijorcs.org/manuscript/id/89/mostafa-karbasi/head-and-hand-detection-using-kinect-camera-360 (2016-05-01)
    Open archived version from archive

  • Narrative Science Systems: A Review
    and blueprints sets U S Patent 8 630 844 issued January 14 2014 Steven Pinker Words and rules the ingredients of language New York NY Harper Perennial 2011 Lawrence A Birnbaum Kristian J Hammond Nicholas D Allen and John R Templon System and method for using data to automatically generate a narrative story U S Patent 8 688 434 issued April 1 2014 Elena Rishes Stephanie M Lukin David K Elson and Marilyn A Walker Generating different story tellings from semantic representations of narrative Interactive Storytelling pp 192 204 Springer International Publishing 2013 doi 10 1007 978 3 319 02756 2 24 Frank Schilder Systems and methods for natural language generation U S Patent 0149107 issued May 29 2014 Nathan Nichols Michael Justin Smathers Lawrence Birnbaum Kristian Hammond and Lawrence E Adams Method and apparatus for triggering the automatic generation of narratives U S Patent 8 886 520 issued November 11 2014 Lawrence A Birnbaum Kristian J Hammond Nicholas D Allen and John R Templon System and Method for Using Data and Angles to Automatically Generate a Narrative Story U S Patent 0145242 issued June 6 2013 Mark O Riedl and R Michael Young Narrative planning balancing plot and character Journal of Artificial Intelligence Research 1 39 pp 217 268 September 2010 Ramandeep Ghuman Rimpi Kumari Narrative Science International Journal of Advanced Research in Computer Science and Software Engineering 3 10 pp 510 513 October 2013 Inna Novalija Marko Grobelnik Narrator System for report generation in natural language Artificial Intelligence Laboratory Jozef Stefan Institute November 2012 Kristian Hammond Jerome Budzik and Lawrence Birnbaum Method and system for assessing relevant properties of work contexts for use by information services U S Patent 7 836 010 issued November 16 2010 James Hunter Yvonne Freer Albert Gatt Ehud Reiter Somayajulu Sripada and Cindy Sykes Automatic generation of natural language nursing shift summaries in neonatal intensive care BT Nurse Artificial intelligence in medicine 3 56 pp 157 172 November 2012 doi http dx doi org 10 1016 j artmed 2012 09 002 Joseph Reddington and Nava Tintarev Automatically generating stories from sensor data In Proceedings of the 16th international conference on Intelligent user interfaces ACM 2011 pp 407 410 doi 10 1145 1943403 1943477 Pei Yu Chi Sally Ahn Amanda Ren Mira Dontcheva Wilmot Li and Björn Hartmann MixT automatic generation of step by step mixed media tutorials In Proceedings of the 25th annual ACM symposium on User interface software and technology ACM 2012 pp 93 102 doi 10 1145 2380116 2380130 Vilmos Zsombori Michael Frantzis Rodrigo Laiola Guimaraes Marian Florin Ursu Pablo Cesar Ian Kegel Roland Craigie and Dick CA Bulterman Automatic generation of video narratives from shared UGC In Proceedings of the 22nd ACM conference on Hypertext and hypermedia ACM 2011 pp 325 334 doi 10 1145 1995966 1996009 Raymond C Kurzweil Paul Albrecht and Peter Chapman Systems and methods document narration U S Patent 8 793 133 issued July 29 2014 Kou Onodera Taisuke Akimoto and Takashi Ogata A State Event

    Original URL path: http://www.ijorcs.org/manuscript/id/92/paramjot-kaur-sarao/narrative-science-systems-a-review (2016-05-01)
    Open archived version from archive



  •