archive-org.com » ORG » I » IJORCS.ORG

Total: 231

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • Help the Genetic Algorithm to Minimize the Urban Traffic on Intersections
    Degraeuwe B Beusen I De Vlieger and D Botteldooren Assessment of the impact of speed limit reduction and traffic signal coordination on vehicle emissions using an integrated approach Transp Res Part D Transp Environ vol 16 no 7 pp 504 508 Oct 2011 D McKenney and T White Distributed and adaptive traffic signal control within a realistic traffic simulation Eng Appl Artif Intell vol 26 no 1 pp 574 583 Jan 2013 M Dotoli M P Fanti and C Meloni A signal timing plan formulation for urban traffic control Control Eng Pract vol 14 no 11 pp 1297 1311 Nov 2006 S Barzegar M Davoudpour M R Meybodi a Sadeghian and M Tirandazian Formalized learning automata with adaptive fuzzy coloured Petri net an application specific to managing traffic signals Sci Iran vol 18 no 3 pp 554 565 Jun 2011 F Basile P Chiacchio and D Teta A hybrid model for real time simulation of urban traffic Control Eng Pract vol 20 no 2 pp 123 137 Feb 2012 F Corman A D Ariano I a Hansen and D Pacciarelli Optimal multi class rescheduling of railway traffic J Rail Transp Plan Manag vol 1 no 1 pp 14 24 Nov 2011 H Mu J Yu and L Liu Evacuation Routes Optimization with Effects of Traffic Light at Intersections J Transp Syst Eng Inf Technol vol 11 no 3 pp 76 82 Jun 2011 H Dezani R D S Bassi N Marranghello L Gomes F Damiani and I Nunes da Silva Optimizing urban traffic flow using Genetic Algorithm with Petri net analysis as fitness function Neurocomputing vol 124 pp 162 167 Jan 2014 A Di Febbraro and N Sacco On Evaluating Traffic Lights Performance Sensitivity via Hybrid Systems Models Procedia Soc Behav Sci vol 111 pp 272 281 Feb 2014 F C Fang W L Xu K C Lin F Alam and J Potgieter Matsuoka Neuronal Oscillator for Traffic Signal Control Using Agent based Simulation Procedia Comput Sci vol 19 no Ant pp 389 395 Jan 2013 F Kaakai S Hayat and A El Moudni A hybrid Petri nets based simulation model for evaluating the design of railway transit stations Simul Model Pract Theory vol 15 no 8 pp 935 969 Sep 2007 A L C Bazzan D de Oliveira and B C da Silva Learning in groups of traffic signals Eng Appl Artif Intell vol 23 no 4 pp 560 568 Jun 2010 M P Fanti a Giua and C Seatzu Monitor design for colored Petri nets An application to deadlock prevention in railway networks Control Eng Pract vol 14 no 10 pp 1231 1247 Oct 2006 T Becher A New Procedure to Determine a User oriented Level of Service of Traffic Light Controlled Crossroads Procedia Soc Behav Sci vol 16 pp 515 525 Jan 2011 Z J Ding X Y Sun and B H Wang Violating traffic light behavior in the Biham Middleton Levine traffic flow model Procedia Eng vol 31 no 2011 pp 1072 1076 Jan 2012 K

    Original URL path: http://www.ijorcs.org/manuscript/id/87/dadmehr-rahbari/interview-panel?post_id=152 (2016-05-01)
    Open archived version from archive

  • Enhancement of DES Algorithm with Multi State Logic
    Enhanced DES algorithm works on increasing the key length or complex S BOX design or increased the number of states in which the information is to be represented or combination of above criteria By increasing the key length the number of combinations for key will increase which is hard for the intruder to do the brute force attack As the S BOX design will become the complex there will be a good avalanche effect As the number of states increases in which the information is represented it is hard for the intruder to crack the actual information Proposed algorithm replace the predefined XOR operation applied during the 16 round of the standard algorithm by a new operation called Hash function depends on using two keys One key used in F function and another key consists of a combination of 16 states 0 1 2 13 14 15 instead of the ordinary 2 state key 0 1 This replacement adds a new level of protection strength and more robustness against breaking methods References Cited By Dr Mohammed M Alani College of Computer Engineering and Sciences Gulf University Kingdom of Bahrain DES96 Improved DES Security 7th International Multi Conference on Systems Signals and Devices IEEE 2010 Akhil Kaushik Assistant Professor Computers Department Manoj Bamela Assistant Professor Electronics Department AnantKumar B Tech Pre final Computers Engineering from T I T S College Bhiwani Haryana India Block Encryption Standard for Transfer of Data International Conference on Networking and Information Technology IEEE 2010 K Anchugam and M Tamilselvi New Data Encryption Standard Algorithm IJCSNS International Journal of Computer Science and Network Security VOL 13 No 4 April 2013 Prashanti G Dipti S Sandhya Rani K A Novel Approach for Data Encryption Standard Algorithm International Journal of Engineering and Advanced Technology IJEAT ISSN 2249 8958 Volume

    Original URL path: http://www.ijorcs.org/manuscript/id/85/payal-patel-kruti-shah-khushbu-shah/interview-panel?post_id=152 (2016-05-01)
    Open archived version from archive

  • Interview Request
    Length of English Text using DES and attacks Studies on the Production of Rhamnolipids by Pseudomonas Putida Privacy Preserving MFI Based Similarity Measure for Hierarchical Document Clustering BIGP A New Single Protocol that can work as an IGP Interior Gateway Protocol as well as EGP Exterior Gateway Protocol A Novel Statistical Method for Thermostable Protein Discrimination An analysis of the methods employed for breast cancer diagnosis Max Min Fair Scheduling

    Original URL path: http://www.ijorcs.org/interview-request (2016-05-01)
    Open archived version from archive

  • Efficiently Delivering Data Packets Using Distributed Protocol for Runtime Groups Formed In Peer-to-Peer Network
    Protocol for Runtime Groups Formed In Peer to Peer Network International Journal of Research in Computer Science 1 1 2011 9 24 Web 1 May 2016 Ramya Yasa and Bhagyalaxmi Efficiently Delivering Data Packets Using Distributed Protocol for Runtime Groups Formed In Peer to Peer Network International Journal of Research in Computer Science 1 no 1 2011 9 24 doi 10 7815 ijorcs 11 2011 002 Close Abstract Peer to Peer streaming has been widely used over the internet where a streaming system usually has multiple channels and peers may form multiple groups for content distribution In this paper we propose a distributed overlay framework called SMesh subset mesh for dynamic groups where users may frequently hop from one group to another SMesh first builds a relatively stable mesh consisting of all hosts for control messaging The mesh supports dynamic host joining and leaving and construction of delivery trees Using the Delaunay Triangulation protocol as an example we show how to construct an efficient mesh with low maintenance cost We also study about various tree constructions based on the mesh including embedded bypass and intermediate trees References Cited By X Zhang J Liu B Li and T S P Yum CoolStreaming DONet A Data Driven Overlay Network for Peer to Peer Live Media Streaming Proc IEEE INFOCOM 05 pp 2102 2111 Mar 2005 X Liao H Jin Y Liu L M Ni and D Deng Anysee Peer to Peer Live Streaming Proc IEEE INFOCOM 06 Apr 2006 doi 10 1109 INFOCOM 2006 288 Y Tang J G Luo Q Zhang M Zhang and S Q Yang Deploying P2P Networks for Large Scale Live Video Streaming Service IEEE Comm Magazine vol 45 no 6 pp 100 106 June 2007 doi 10 1109 MCOM 2007 374426 PPLive http www pplive com 2009 X Hei Y Liu and K W Ross Inferring Network Wide Quality in P2P Live Streaming Systems IEEE J Selected Areas in Comm vol 25 no 9 pp 1640 1654 Dec 2007 X Hei C Liang J Liang Y Liu and K W Ross A Measurement Study of a Large Scale P2P IPTV System IEEE Trans Multimedia vol 9 no 8 pp 1672 1687 Dec 2007 M Cha P Rodriguez J Crowcroft S Moon and X Amatriain Watching Television over an IP Network Proc ACM Internet Measurement Conf IMC 08 pp 71 83 Oct 2008 Skype http www skype com 2009 D Rossi M Mellia and M Meo A Detailed Measurement of Skype Network Traffic Proc Int l Workshop Peer To Peer Systems IPTPS 08 Feb 2008 J Liebeherr M Nahas and W Si Application Layer Multicasting with Delaunay Triangulation Overlays IEEE J Selected Areas in Comm vol 20 no 8 pp 1472 1488 Oct 2002 doi 10 1109 JSAC 2002 803067 T S E Ng and H Zhang Predicting Internet Network Distance with Coordinates Based Approaches Proc IEEE INFOCOM 02 pp 170 179 June 2002 doi 10 1109 INFCOM 2002 1019258 L Tang and M Crovella Virtual Landmarks for

    Original URL path: http://www.ijorcs.org/manuscript/id/2/yasa-ramya-bhagyalaxmi/efficiently-delivering-data-packets-using-distributed-protocol-for-runtime-groups-formed-in-peer-to-peer-network (2016-05-01)
    Open archived version from archive

  • Free Space Optics: Atmospheric Effects and Back Up
    Free Space Optics Atmospheric Effects and Back Up International Journal of Research in Computer Science 1 no 1 2011 25 30 doi 10 7815 ijorcs 11 2011 003 Close Abstract The Free space optical communication technology tries to fulfill rising need for high bandwidth transmission capability link along with security and ease in installation Due to their high carrier frequency in the range of 300 THz it provides highest data rates of 2 5 Gbps which can be increased to 10 Gbps using Wavelength Division Multiplexing WDM FSO link is license free secure and easily deployable and offers low bit error rate link These features motivate to use FSO as a solution to last mile access Along with these attractive features of FSO a well known disadvantage of FSO is its sensitivity on local weather conditions which results in loss of optical signal power In this paper we will discuss performance analysis of FSO in different weather conditions References Cited By M S Awan P Brandl E Leitgeb F Nadeem L Csugai Horvath R Nebuloni Transmission of High Data Rate Optical Signals in Fog and Snow Conditions Wireless VITAE 09 M Gebhart E Leitgeb S Sheikh Muhammad B Flecker C Chlestil M Al Naboulsi H Sizuni F De Fornel Measurement of light attenuation in dense fog conditions for optical wireless links SPIE proceedings Vol 589 2005 doi 10 1117 12 614830 M Achour Simulating free space optical communication Part I Rain fall attenuation Proc SPIE Vol 3635 2002 H W O Brien Visibility and Light Attenuation in Falling Snow J Appl Meteorol vol 9 pp 671 683 1970 doi 10 1175 1520 0450 1970 009 2 0 CO 2 Millimeter Wave Division Introduction to FSO market Online available http www elva1 com products telecom FSO mm W backup html International

    Original URL path: http://www.ijorcs.org/manuscript/id/3/gurdeep-singh-tanvir-singh-vinaykant-vasishath-kaushal/free-space-optics-atmospheric-effects-back-up (2016-05-01)
    Open archived version from archive

  • Prostate Boundary Detection from Ultrasound Images using Ant Colony Optimization
    on Ant Colony Optimization is proposed which will increase efficiency minimize user involvement in prostate boundary detection from ultrasound images References Cited By Shao Fan Ling KV Prostate Boundary Detection from Ultrasonographic Images J Ultrasound Med 22 605 623 2003 Aarnink RG Beerlage HP de la et al TRUS of the prostate innovations future applications J Urol 1998 159 1568 1579 doi 10 1097 00005392 199805000 00045 Lee F Bahn DK et al The role of TRUS biopsies for determination of internal and external spread of prostate cancer Semin Urol Oncol 1998 16 129 136 Sakas G Schreyer L Grimm M Pre processing segmenting and volume rendering 3D ultrasonic data IEEE Comput Graph Appl 1995 15 47 54 doi 10 1109 38 391490 Arambula Cosio F Davies BL Automated prostate recognition a key process for clinically effective robotic prostatectomy Med Biol Eng Comput 1999 37 236 243 Von Eschenbach A Ho R Murphy GP Cunningham M Lins N American Cancer Society guideline for the early detection of prostate cancer update 1997 CA Cancer J Clin 1997 47 261 264 doi 10 3322 canjclin 47 5 261 Joseph Awad T K Abdel Galil Prostate Boundary detection in TRUS Images using Scanning Technique CCGEI 2003 Montreal May 2003 7781 7803 8 03 doi 10 1109 CCECE 2003 1226113 Pathak S D V Chalana University of Washington Seattle WA Edge Guided Delineation of the Prostate in TRUS Images o 7803 5674 8 99 1999 IEEE Richard WD Keen CG Automated texture based segmentation of ultrasound images of the prostate Computer Med Imaging Graph 1996 20 131 140 doi 10 1016 0895 6111 96 00048 1 Y Zhan et al Automated Segmentation of 3D US prostate Images using Statistical Texture Based Matching Method MICCAI 2003 LNCS 2878 688 696 2003 Y Zhan et al Prostate Boundary detection in Transrectal Ultrasound Images ICASSP 2005 0 7803 8874 7 05 2005 IEEE Dinggang Shen et al Optimized Prostate biopsy via a statistical atlas of cancer spatial distribution D Shen et al Medical Image Analysis 8 2004 139 150 doi 10 1016 j media 2003 11 002 Abolmaesumi P et al Segmentation of Prostate Contours from Ultrasound Images 0 7803 8484 9 04 2004 IEEE doi 10 1109 ICASSP 2004 1326595 Ladak HM et al Prostate Segmentation from 2D Ultrasound Images 0 7803 6455 1 00 2000 doi 10 1109 IEMBS 2000 901572 Narsis Morteza Computer Aided Detection of Prostate Detection CIMCA IAWTIC 06 0 7695 2731 0 06 2006 IEEE doi 10 1109 CIMCA 2006 75 Ruo Yun Wu et al Automatic Prostate Boundary Recognition in Sonographic Images using Feature Model Genetic Algorithm J Ultrasound Med 19 771 782 2000 0278 4297 00 Tong S Downey DB Cardinal HN Fenster A A 3D ultrasound prostate imaging system Ultrasound Med 1996 22 735 746 William D Richard et al A method for 3D Prostate Imaging using Transrectal Ultrasound Computerized Medical Imaging graphics Vol 17 No2 73 79 1993 doi 10 1016 0895 6111 93 90048 R Moskalik

    Original URL path: http://www.ijorcs.org/manuscript/id/4/vikas-wasson-baljit-singh/prostate-boundary-detection-from-ultrasound-images-using-ant-colony-optimization (2016-05-01)
    Open archived version from archive

  • Secure Data Storage In Cloud Computing
    Cloud computing is related to several technologies and the convergence of various technologies has emerged to be called cloud computing In comparison to conventional ways Cloud Computing moves application software and databases to the large data centers where the data and services will not be fully trustworthy In this article I focus on secure data storage in cloud it is an important aspect of Quality of Service To ensure the correctness of users data in the cloud I propose an effectual and adaptable scheme with salient qualities This scheme achieves the data storage correctness allow the authenticated user to access the data and data error localization i e the identification of misbehaving servers References Cited By Robert Gellman and World Privacy Forum Privacy in the Clouds Risks to Privacy and Confidentiality from Cloud Computing February 23 2009 Amazon com Amazon Web Services AWS Online at http aws amazon com Version 2010 01 Weiss Aaron Computing in the clouds netWorker 11 4 Dec 2007 Eric A Marks Bob Lozano Executive s Guide to Cloud computing John Wiley Sons Inc Theart of Service A Complete Guide to Cloud Computing http theartofservice com Tim Mather Subra Kumaraswamy and Shahed Latif Cloud Security and Privacy Published by O Reilly Media Inc 2009 Brian J S Chee and Curtis Franklin Jr Cloud Computing Technologies and Strategies of the Ubiquitous Data Center CRC Press 2010 by Taylor and Francis Group LLC N Gohring Amazon s S3 down for several hours Online at http www pcworld com businesscenter article 142549 amazons s3 down for several hours html 2008 Juels and J Burton S Kaliski PORs Proofs of Retrievability for Large Files Proc of CCS 07 2007 G Ateniese R D Pietro L V Mancini and G Tsudik Scalable and Efficient Provable Data Possession Proc of SecureComm 2008 John W Rittinghouse James F Ransome Cloud Computing Implementation Management and Security CRC Press 2010 by Taylor and Francis Group LLC Journal of Theoretical and Applied Information Technology CLOUD COMPUTING www jatit org 2005 2009 Hand Eric Head in the Clouds Nature 25 2007 Oct Privacy in the Clouds Risks to Privacy and Confidentiality from Cloud Computing Prepared by Robert Gellman for the World Privacy Forum February 23 2009 Advancing cloud computing What to do now Priorities for Industry and Governments World Economic Forum in partnership with Accenture 2011 Security of Cloud Computing Providers Study Sponsored by CA Technologies Independently conducted by Ponemon Institute LLC Publication Date April 2011 National Institute of Standards and Technology The NIST Definition of Cloud Computing document posted October 2009 http csrc nist gov groups SNS cloud computing James Walden Northern Kentucky University The OWASP Foundation http www owasp org Cloud Computing Security February 22nd 2011 Cloud Security Alliance CSA Top Threats to Cloud Computing V1 0 March 2010 http www cloudsecurityalliance org topthreats Singh Sukhpal and Inderveer Chana Cloud based development issues a methodical analysis International Journal of Cloud Computing and Services Science IJ CLOSER 2 1 2012 73 84 Kapadia Jahnvi S Survey

    Original URL path: http://www.ijorcs.org/manuscript/id/6/b-shwetha-bindu-b-yadaiah/secure-data-storage-in-cloud-computing (2016-05-01)
    Open archived version from archive

  • Fast IP Network Recovery using MRC
    from link and node failure in networks we present a new recovery scheme called Multiple Routing Configuration MRC Our anticipated scheme guarantees recovery in all single failure scenarios using a mechanism to handle both link and node failures and without knowing the root cause of the failure MRC is strictly connectionless and assumes only destination based hop by hop forwarding MRC is based on keeping additional routing information in the routers and allows packet forwarding to continue on an alternative output link immediately after the detection of a failure In this paper we present MRC and analyze its performance with respect to load distribution after a failure We also show how an estimate of the traffic demands in the network can be used to improve the distribution of the recovered traffic and thus reduce the chances of congestion when MRC is used References Cited By Basu A and J G Riecke Stability issues in OSPF routing in Proceedings of SIGCOMM San Diego California USA Aug 2001 pp 225 236 Boutremans C G Iannaccone and C Diot Impact of link failures on VoIP performance in roceedings of International Workshop on Network and perating System Support for Digital Audio and Video 2002 pp 63 71 Clark D D The design philosophy of the DARPA internet protocols SIGCOMM computer Communications Review vol 18 no 4 pp 106 114 Aug 1988 Francois P C Filsfils J Evans and O Bonaventure Achieving sub second IGPconvergence in large IP networks ACM SIGCOMM Computer Communication Review vol 35 no 2 pp 35 44 July 2005 Labovitz C A Ahuja A Bose and F Jahanian Delayed Internet Routing Convergence IEEE ACM Transactions on Networking vol 9 no 3 pp 293 306 June2001 Markopoulou A G Iannaccone Bhattacharyya C N Chuah and C Diot Characterization of failures in an

    Original URL path: http://www.ijorcs.org/manuscript/id/7/tk-rajesh-n-sreenivasulu-kvragavender/fast-ip-network-recovery-using-mrc (2016-05-01)
    Open archived version from archive



  •