Notice Board :

Call for Paper
Vol. 16 Issue 4

Submission Start Date:
April 01, 2024

Acceptence Notification Start:
April 10, 2024

Submission End:
April 25, 2024

Final MenuScript Due:
April 30, 2024

Publication Date:
April 30, 2024
                         Notice Board: Call for PaperVol. 16 Issue 4      Submission Start Date: April 01, 2024      Acceptence Notification Start: April 10, 2024      Submission End: April 25, 2024      Final MenuScript Due: April 30, 2024      Publication Date: April 30, 2024




Volume II Issue I

Author Name
H Chang
Year Of Publication
2010
Volume and Issue
Volume 2 Issue 1
Abstract
Wavelet transforms enable us to represent signals with a high degree of scarcity. Wavelet thresholding is a signal estimation technique that exploits the capabilities of wavelet transform for signal denoising. The aim of this paper is to study various thresholding techniques such as Sure Shrink, VisuShrink and BayeShrink and determine the best one for image denoising. This paper presents an overview of various threshold methods for image denoising. Wavelet transform based denoising techniques are of greater interest because of their performance over Fourier and other spatial domain techniques. Selection of optimal threshold is crucial since threshold value governs the performance of denoising algorithms. Hence it is required to tune the threshold parameter for better PSNR values. In this paper, we present various wavelet based shrinkage methods for optimal threshold selection for noise removal.
PaperID
2010/eusrm/02/01/1011

Author Name
H A Saad
Year Of Publication
2010
Volume and Issue
Volume 2 Issue 1
Abstract
Millions of visitors interact daily with web sites around the world. Huge amount of data are being generated and these information could be very prized to the company in the field of understanding Customer’s behaviors. In this paper a complete preprocessing methodology having data cleaning, Enhanced preprocessing technique one of the User Identification which is key issue in preprocessing technique phase is to identify the web users. Traditional User Identification is based on the site structure by using some heuristic rules. In most cases relationship between pages are based on the site topology which reduced the efficiency of identification solve this problem we introduced proposed Technique DUI (Distinct User Identification) based on IP address ,Agent ,Referred pages on desired session time. Which can be used in counter terrorism, fraud detection and detection of unusual access of secure data, as well as through detection of frequent access behavior improve the overall designing and performance of future access. Experiments have proved that advanced data preprocessing technique can enhanced the quality of data preprocessing results.
PaperID
2010/EUSRM/02/01/1016

Author Name
C Yeh
Year Of Publication
2010
Volume and Issue
Volume 2 Issue 1
Abstract
Eencryption is widely used to ensure security in public networks like the internet. Any type of data has its own attribute; therefore, various algorithms should be used to protect confidential data from unauthorized access. Mostly the available encryption algorithms are used for text data. However, due to large data size and real time constrains, algorithms that are good for textual data. In this research, a block-based encryption model is proposed for information security using a combination of logical and mathematical operation. This model will be used as a pre-encryption technique to confuse the relationship between the original data and the generated ones. The generated data are then fed to the proposed encryption model. Efficiency, Avalanche Effect, and Execution Time have been used to measure the security level of the data. The experimental results have shown that the existing algorithms resulted in a lower efficiency, a higher execution time, and a more uniform efficiency. This implies a high similarity and a good quality of the retrieved data compared to the original one. Another feature of the proposed model is its generality; it can be applied with any other traditional algorithm to enhance its performance. Experimental results have shown that using the proposed model along with the other algorithms resulted in a better performance compared to using the other algorithms alone.
PaperID
2010/EUSRM/02/01/1023

Author Name
E I S Bernal
Year Of Publication
2010
Volume and Issue
Volume 2 Issue 1
Abstract
A novel strategy is proposed to manage the synchronization of the nodes in the network so that energy can be collectively dissipated to entire network. SSP protocol will decide that which is best path to send data from one end to other end which will keep minimum end to end delay and throughput will improve in terms number of packet delivery and received. In the proposed work, we will develop a sleep scheduler protocol and network reliability for wireless sensor networks.
PaperID
2010/EUSRM/02/01/1028