A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kaur, Ramandeep
- Comparative Analysis of Color Edge Detection Techniques Based on Fuzzy Logic
Authors
1 Electronics and Communication Engineering Department, Guru Nanak Dev. University Regional Campus, Jalandhar, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 17, No 1 (2016), Pagination: 119-126Abstract
Edge is the important feature of image. The image edges contain rich knowledge which is very important for finding characteristic of image by object recognition. It is the commonly used technique in image processing.This paper shows a fuzzy rule based algorithm that is capable of finding edges effectively from grey scale images. This paper presents that kind of operators in computer vision applications. The gradient and standard deviation is used as input for fuzzy system. The algorithm in which fusion of hue component and principal component are implemented and then the results are compared with modified fuzzy based algorithm.Keywords
Edge Detection, Image Processing, Defuzzification, Fuzzy Logic.- An Analysis of RTS/CTS Mechanism for Data Transfer In Wireless Network: A Review
Authors
1 Deptt. of Electronics and Communication Engineering, Punjabi University, Patiala, Punjab, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 17, No 1 (2016), Pagination: 569-572Abstract
In a wireless network, there is a large number of mobile nodes that share the communication medium. The wireless network employs carrier sense based MAC algorithms such as Carrier Sensing Multiple Access (CSMA) and CSMA with Collision Avoidance (CSMA/CA) for efficient sharing of communication channel. But this method does not solve the problem of hidden nodes. Hidden nodes are those nodes that are out of range of other nodes or a group of nodes. The network throughput reduces because of packet collisions caused by these hidden nodes. To solve hidden node problem, the Request-To-Send (RTS) and Clear-To-Send (CTS) mechanism is widely used in wireless networks for reserving the channel to transmit data from source to destination. This paper is aimed to provide a survey on methodology and various algorithms and methods of implementing RTS/CTS mechanism in wireless networks.Keywords
RTS/CTS, Collision, Wireless Network, Hidden Nodes, Delay.- Cutting back the Wormhole Attack in Mobile Network: A Survey
Authors
1 Department of CSE, GZS PTU Campus, Bathinda, Punjab, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 11 (2014), Pagination: 11-17Abstract
As concerned with wireless networks, the communication is done through the radio links where chances of unauthorized user are more which consequently degrades the performance of network and result is more delay. Wireless networks are broadly classified into two broad categories: infrastructure mode and infrastructure less mode. Various protocols are defined under this which uses their different mechanism for detection and isolation of the wormhole attacks. In this paper some of the studies are defined on the basis of methods used for the detection and avoidance of attacks adhere to its use in it. As the numerous attacks may arise over network on MANET, their comparison has been discussed on the basis of techniques and their effects.
This paper intends to find out all the possible ways to detect and avoid the wormhole attack in the network. It may not lead to complete isolation of the attack but plays an important role to reduce the wormhole attack.
Keywords
Wireless Network, Wormhole Attack.- A Mechanism to Enhance Lifetime of NEW LEACH Protocol in WSN
Authors
1 Department of Computer Engineering, Punjabi University, Patiala-147002, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 22 (2016), Pagination: 67-76Abstract
Due to the extensive range of applications the use of wireless sensor networks (WSNs) in past few years have increased a lot and it has become a hot research area now a days. One of the important issues in wireless sensor network is the intrinsic limited battery power in network sensor nodes. Since most of the energy is consumed by the transmission and reception, energy efficient routing protocol is required to enhance the lifetime of WSN. In this paper we presents the review of existing hierarchical routing protocol NEW LEACH and proposed a new approach that is better and more energy efficient than the existed approaches. In the proposed work, two enhancements are made. These enhancements are efficient cluster head replacement technique by using dynamic threshold value and the concept of upper threshold for sending data. Both NEW LEACH and Proposed protocol are simulated in MATLAB. The result shows that our proposed algorithm performs better than the NEW LEACH in terms of network lifetime.Keywords
WSN, Hierarchical Routing, NEW LEACH Protocol, Proposed Method, Dynamic Threshold.- Speckle Filtering of Ultrasound Images Using Improved Wavelet Shrinkage Guided Filter
Authors
1 Department of Computer Engineering, Punjabi University, Patiala, Punjab, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 22 (2016), Pagination: 258-266Abstract
Speckle noise is an intrinsic yet undesirable residual part of the medical ultrasound images, which considerably degrades the visual quality and limits the accuracy of automatic diagnostic techniques. Hence speckle suppression is an essential task before the examination and processing of the medical ultrasound images. Aiming at the problem of multiplicative speckle noise, an improved despeckled method is proposed in this paper, which is based on WaveletShrinkage_Guided filter. The proposed method used the Daubechies20 (d20) wavelet transformation to decompose the ultrasound images and an improved wavelet shrinkage algorithm to filter the high-frequency component. The wavelet coefficients of low-frequency sub-bands are filtered by an improved guided filter with varying regularization parameter and the inverse DWT is used to obtain the noise free image. Synthetic image and an ultrasound image experiments with the comparison of the Guided filter and WaveletShrinkage_Guided filter are carried out. The quantitative results of the proposed strategy show, that it outperforms the other despeckling methods in terms of favorable speckle suppression and edge preserving factors.Keywords
Speckle Suppression, Real Time Ultrasound Images, Wavelet Transform, Guided Filter, Edge Preservation Factor (EPF).- A Review on Conceptual Data Mining
Authors
1 Department of Computer Engineering, Punjabi University, Patiala, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 22 (2016), Pagination: 630-635Abstract
In the field of research area, industry and media both methodologies that are data mining from knowledge discovery from database get more attention and attracted significantly. This paper provides an overview that how these two methodologies that data mining and knowledge discovery from database related to each other in the field of machine learning, statistics and databases.Keywords
Data Mining, Applications of Data Mining, Knowledge Discovery of Data, Components of Data Mining, Tasks of Data Mining and Association Rule Mining.- Blockchain Technology : A Survey on Applications beyond Cryptocurrency
Authors
1 Student (MCA), IN
2 Student (MCA), Department of Computer Science & Application, DAV University, Jalandhar, IN
3 Associate Professor, Department of Computer Science & Application, DAV University, Jalandhar, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 35, No SP (2023), Pagination: 55-61Abstract
In the hyper-connected world, data has been playing a significant role in earthing the system of every domain that one can think of. But, it is undeniable fact that today data has prone to serious threats as it was never before, which has questioned the reliability, integrity as well as security of data. So, the technology has emerged that can mitigate all these issues, and that technology is none other than the technology residing at the heart of Bitcoin, The Blockchain.
Blockchain is one of the powerful technologies that has brought a revolution in conventional trading techniques. Conceptually, it is an open and distributed ledger that maintains an irrefutable database of records of all transactions or values that have been executed and shared peer-to-peer directly obsoleting the need for trust-worthy intermediatory in a secure, verifiable, moreover, in a permanent way alleviating the risk of fraud.
The main objective of this paper is not only to make blockchain a common business trading language but also to present its compelling applications in contrasting domains that are beyond currency rides, specifically in healthcare, politics, and its strategic implications in bridging strong economy using smart contracts that can revolutionize our digital global village.
Keywords
Bitcoin, Blockchain, Open-Ledger, Miners, Healthcare, Supply Chain, Smart Contracts.References
- S. Khezr, MD Moniruzzaman, A Yassine, R Benlamri; Blockchain technology in healthcare: A Comprehensive Review and Directions For Future Research – April-2019.
- Sarah Underwood, "Blockchain Beyond Bitcoin," Communications of the ACM, vol. 59, no. 11, pp. 15-17, November 2016.
- Sam Daley; Blockchain voting: the future of elections, Last updated September-2022.
- Ye Guo and Chen Liang. Blockchain application and outlook in the banking industry. Financial Innovation, 2(1):24, 2016.
- Ning Shi; A new proof-of-work mechanism for Bitcoin. Financial Innovation, 2(1):31, 2016.
- Dmitry Effanov, Pavel Roschin; The All-Pervasiveness of the Blockchain Technology, Published by Elsevier Ltd, 2018.
- Mahdi H. Miraz, Maaruf Ali; Applications of Blockchain technology beyond Cryptocurrency, December 2017.
- Uzma Jafar, Mohd. Juzaiddin Ab Aziz, Zarina Shukur; Blockchain for electronic voting system – review and open research challenges, published by MDPI.
- Syadav Tasmia Alvi, Mohammed Nasir Uddin, Linta Islam, Sajid Ahamed; DVTchain : A blockchain-based decentralized mechanism to ensure the security of digital voting system, October 2022.
- A. Azaria, A. Ekblaw, T. Vieira, and A. Lippman. MedRec: Using Blockchain for Medical Data Access and Permission Management. In 2016, 2nd International Conference on Open and Big Data (OBD), pages 25–30, Aug 2016.
- Benefits of Blockchain – published by IBM. Available at https://www.ibm.com/in-en/topics/benefits-of-blockchain 12. Macro Lansiti, Karim R. Lakhani; Harward Business Review: the truth about Blockchain, February-2017.
- Michael Crosby, Nachiappan, Pradan Pattanayak, Sanjeev Verma, Vignesh Kalyanaraman; Applied Innovation Review; Blockchain Technology: beyond bitcoin, published by Berkeley, 2016.
- Abid Haleem, Mohd. Javaid, Ravi Pratap Singh, Rajiv Suman; Blockchain Technology applications in healthcare: An overview,2021.
- Ghassan Karame. On the security and scalability of bitcoin’s blockchain. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS ’16, pages 1861–1862, New York, NY, USA, 2016. ACM.
- What is blockchain – published by money.com , Available at https://money.com/what-is-blockchain.