Pub Date : 2015-10-01DOI: 10.7763/IJCTE.2015.V7.986
S. Adewumi
achieved by taking each of these characters that makes up the text one at a time and then search first, for the position of the last occurrence of a particular character being considered for compression together with the length of its digits, and then, starting from the beginning of the text file, note all the positions where this character has occurred. The positions of occurrence of this character while the search is on, is made equal to the length of the digit of the last occurrence of the character by padding it with zeroes to the left of the most significant bit, if need be. Concatenate the values representing the positions of the occurrence of a character and covert the concatenated string into a decimal value. Divide this value successively by 2 until the result lies between one and less than two. Store the quotient obtained from these divisions and the sum of the number of times the division was carried out as an index k. Decompression is the reverse of the steps just described, and this is achieved by taking each character; obtained their corresponding quotient (q), index k and length li. To recover the decimal positions of the concatenated values, we multiply the quotient (q) by 2 k . We then use the length of this
{"title":"Character Analysis Scheme for Compressing Text Files","authors":"S. Adewumi","doi":"10.7763/IJCTE.2015.V7.986","DOIUrl":"https://doi.org/10.7763/IJCTE.2015.V7.986","url":null,"abstract":"achieved by taking each of these characters that makes up the text one at a time and then search first, for the position of the last occurrence of a particular character being considered for compression together with the length of its digits, and then, starting from the beginning of the text file, note all the positions where this character has occurred. The positions of occurrence of this character while the search is on, is made equal to the length of the digit of the last occurrence of the character by padding it with zeroes to the left of the most significant bit, if need be. Concatenate the values representing the positions of the occurrence of a character and covert the concatenated string into a decimal value. Divide this value successively by 2 until the result lies between one and less than two. Store the quotient obtained from these divisions and the sum of the number of times the division was carried out as an index k. Decompression is the reverse of the steps just described, and this is achieved by taking each character; obtained their corresponding quotient (q), index k and length li. To recover the decimal positions of the concatenated values, we multiply the quotient (q) by 2 k . We then use the length of this","PeriodicalId":306280,"journal":{"name":"International Journal of Computer Theory and Engineering","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129850674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.7763/IJCTE.2015.V7.988
P. S. A. Devi, M. G. Mini
—A Mammogram is a competent tool in early detection of breast cancer. Image enhancement in mammographic images increases the diagnosability of abnormalities in the images. The classical image enhancement techniques are not adept to improve the diagnostic features in mammograms. The enhancement technique proposed in this paper utilizes Stationary Wavelet Transform (SWT), modulus maxima and high boost filtering. The image is decomposed using SWT and its modulus maximum is determined. A fraction of the high pass filtered image obtained as the result of SWT decomposition and modulus maxima is added to original image. The scheme is evaluated visually and objectively using measures like contrast, PSNR etc. The performance measures are evaluated for different category of images and found to be suitable to all categories of mammographic images.
{"title":"Mammographic Image Enhancement Based on SWT and High Boost Filtering","authors":"P. S. A. Devi, M. G. Mini","doi":"10.7763/IJCTE.2015.V7.988","DOIUrl":"https://doi.org/10.7763/IJCTE.2015.V7.988","url":null,"abstract":"—A Mammogram is a competent tool in early detection of breast cancer. Image enhancement in mammographic images increases the diagnosability of abnormalities in the images. The classical image enhancement techniques are not adept to improve the diagnostic features in mammograms. The enhancement technique proposed in this paper utilizes Stationary Wavelet Transform (SWT), modulus maxima and high boost filtering. The image is decomposed using SWT and its modulus maximum is determined. A fraction of the high pass filtered image obtained as the result of SWT decomposition and modulus maxima is added to original image. The scheme is evaluated visually and objectively using measures like contrast, PSNR etc. The performance measures are evaluated for different category of images and found to be suitable to all categories of mammographic images.","PeriodicalId":306280,"journal":{"name":"International Journal of Computer Theory and Engineering","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122576003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.7763/IJCTE.2015.V7.982
W. Zgallai
{"title":"The Application of Adaptive LMF Quadratic and Cubic Volterra Filters to ECG Signals","authors":"W. Zgallai","doi":"10.7763/IJCTE.2015.V7.982","DOIUrl":"https://doi.org/10.7763/IJCTE.2015.V7.982","url":null,"abstract":"","PeriodicalId":306280,"journal":{"name":"International Journal of Computer Theory and Engineering","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130527654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.7763/IJCTE.2015.V7.981
Ting Luo, G. Jiang, Mei Yu, W. Gao
—Reversible data hiding can recover the original image from the marked image without any distortion. This paper presents a novel prediction error based reversible data hiding method using histogram shifting in spatial domain. Three predictors including Mean, JPEG lossless and median edge detector (MED) are employed to compute prediction values for current pixels, respectively. Prediction errors are calculated as well to build histogram bins. Histogram shifting mechanism is designed that bins with large prediction errors are shifted based on hiding level, and thus, it will not hurt marked image if hiding level is not high. Histogram bins with small error predictions are used to hide secret data. Experimental results demonstrate that average of prediction error is less than that of interpolation error used in existing data hiding methods, and the proposed method is good at high capacity hiding. MED is the best predictor among three predictors in the proposed method, and it outperforms existing data hiding methods in terms of capacity and marked image quality.
{"title":"Novel Prediction Error Based Reversible Data Hiding Method Using Histogram Shifting","authors":"Ting Luo, G. Jiang, Mei Yu, W. Gao","doi":"10.7763/IJCTE.2015.V7.981","DOIUrl":"https://doi.org/10.7763/IJCTE.2015.V7.981","url":null,"abstract":"—Reversible data hiding can recover the original image from the marked image without any distortion. This paper presents a novel prediction error based reversible data hiding method using histogram shifting in spatial domain. Three predictors including Mean, JPEG lossless and median edge detector (MED) are employed to compute prediction values for current pixels, respectively. Prediction errors are calculated as well to build histogram bins. Histogram shifting mechanism is designed that bins with large prediction errors are shifted based on hiding level, and thus, it will not hurt marked image if hiding level is not high. Histogram bins with small error predictions are used to hide secret data. Experimental results demonstrate that average of prediction error is less than that of interpolation error used in existing data hiding methods, and the proposed method is good at high capacity hiding. MED is the best predictor among three predictors in the proposed method, and it outperforms existing data hiding methods in terms of capacity and marked image quality.","PeriodicalId":306280,"journal":{"name":"International Journal of Computer Theory and Engineering","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131752289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.7763/IJCTE.2015.V7.990
M. Otmani, Fihri Mohammed, Ezzati Abdellah
{"title":"Performance Investigations of Routing Protocols in Vanet under IPv4 and IPv6","authors":"M. Otmani, Fihri Mohammed, Ezzati Abdellah","doi":"10.7763/IJCTE.2015.V7.990","DOIUrl":"https://doi.org/10.7763/IJCTE.2015.V7.990","url":null,"abstract":"","PeriodicalId":306280,"journal":{"name":"International Journal of Computer Theory and Engineering","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134172343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.7763/IJCTE.2015.V7.993
N. M. Tuah, Dg. Senandong Ajor, N. Jamil
This study explores the tools and materials used in personal learning environment (PLE) by investigating the impact of embedding a mashup technology into learning environment. With Web 2.0 technologies, mashing up several materials into learning repository helps learners to form their own scope of learning. A PLE mashup model is suggested in determining suitable tools and materials. Based on the current trends in Web 2.0, another aspect of PLE that could be further investigated is the adoption of social media application for formal higher education level. A study on student perception shows a positive acceptance towards PLE in their learning activities. In order to serve as learning tool, how the technology could be implemented, and its limitation towards efficiency was highlighted.
{"title":"Assistive Tools towards Personal Learning Environment in Higher Education","authors":"N. M. Tuah, Dg. Senandong Ajor, N. Jamil","doi":"10.7763/IJCTE.2015.V7.993","DOIUrl":"https://doi.org/10.7763/IJCTE.2015.V7.993","url":null,"abstract":"This study explores the tools and materials used in personal learning environment (PLE) by investigating the impact of embedding a mashup technology into learning environment. With Web 2.0 technologies, mashing up several materials into learning repository helps learners to form their own scope of learning. A PLE mashup model is suggested in determining suitable tools and materials. Based on the current trends in Web 2.0, another aspect of PLE that could be further investigated is the adoption of social media application for formal higher education level. A study on student perception shows a positive acceptance towards PLE in their learning activities. In order to serve as learning tool, how the technology could be implemented, and its limitation towards efficiency was highlighted.","PeriodicalId":306280,"journal":{"name":"International Journal of Computer Theory and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134237594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.7763/IJCTE.2015.V7.995
T. Amboala, Ainnur Hafizah Anuar Mokhtar, M. Muhammad, M. Noordin, R. Othman
The article is a response to rapid uptake of online transactions that encompasses the secure transactions that comply with the Shariah principles. The algorithm in the articles proposed the inclusion of Intermediate Shariah Transaction Party (ISTP) as an intermediary for communications between merchant and customers before the transactions can be concluded. The design facilitates the efficient and effective e-commerce transaction process to alleviate three common shortcomings in e-commerce transactions namely riba’, gharar and the validity and the legality of e-commerce transactions from Shariah point of view without compromising the security aspects of the transactions. The designs were refined and presented before by the Islamic scholars before the final design was agreed on. This invention will become a major breakthrough in Shariah compliance ecommerce transactions in order to serve 2.1 billion Muslims Ummah worldwide.
{"title":"Development Method for Shariah Compliant e-Commerce Payment Processing","authors":"T. Amboala, Ainnur Hafizah Anuar Mokhtar, M. Muhammad, M. Noordin, R. Othman","doi":"10.7763/IJCTE.2015.V7.995","DOIUrl":"https://doi.org/10.7763/IJCTE.2015.V7.995","url":null,"abstract":"The article is a response to rapid uptake of online transactions that encompasses the secure transactions that comply with the Shariah principles. The algorithm in the articles proposed the inclusion of Intermediate Shariah Transaction Party (ISTP) as an intermediary for communications between merchant and customers before the transactions can be concluded. The design facilitates the efficient and effective e-commerce transaction process to alleviate three common shortcomings in e-commerce transactions namely riba’, gharar and the validity and the legality of e-commerce transactions from Shariah point of view without compromising the security aspects of the transactions. The designs were refined and presented before by the Islamic scholars before the final design was agreed on. This invention will become a major breakthrough in Shariah compliance ecommerce transactions in order to serve 2.1 billion Muslims Ummah worldwide.","PeriodicalId":306280,"journal":{"name":"International Journal of Computer Theory and Engineering","volume":"45 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114906441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.7763/IJCTE.2015.V7.985
N. Bouzera, N. Mezhoud, A. Khireddine, M. Oussalah
{"title":"Performance Comparison of the Kalman Filter Variants for Dynamic Mobile Localization in Urban Area Using Cellular Network","authors":"N. Bouzera, N. Mezhoud, A. Khireddine, M. Oussalah","doi":"10.7763/IJCTE.2015.V7.985","DOIUrl":"https://doi.org/10.7763/IJCTE.2015.V7.985","url":null,"abstract":"","PeriodicalId":306280,"journal":{"name":"International Journal of Computer Theory and Engineering","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130281394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.7763/IJCTE.2015.V7.983
D. Cymbalák, O. Kainz, F. Jakab
Paper describes the design of extended model for tracking and locating object in multi-cameras environment with controlling the streams from multiple angles in real time. Proposed and experimentally implemented solution is attempting to deliver via streaming technology of the only specific shot from scene that has the best view on tracked object in real time. Measurement of the best shot for the tracking object is based on proposed evaluation metric, consisting of dimensional, locational and reliability parameters gathered from object tracking methods. For latency optimization and accuracy of evaluation the prediction of evaluation metric was outlined. Solution is experimentally tested in standard and mobile environment as well. Approach described in this paper is innovative regarding the content related video stream delivery.
{"title":"Extended Object Tracking and Stream Control Model Based on Predictive Evaluation Metric of Multiple-Angled Streams","authors":"D. Cymbalák, O. Kainz, F. Jakab","doi":"10.7763/IJCTE.2015.V7.983","DOIUrl":"https://doi.org/10.7763/IJCTE.2015.V7.983","url":null,"abstract":"Paper describes the design of extended model for tracking and locating object in multi-cameras environment with controlling the streams from multiple angles in real time. Proposed and experimentally implemented solution is attempting to deliver via streaming technology of the only specific shot from scene that has the best view on tracked object in real time. Measurement of the best shot for the tracking object is based on proposed evaluation metric, consisting of dimensional, locational and reliability parameters gathered from object tracking methods. For latency optimization and accuracy of evaluation the prediction of evaluation metric was outlined. Solution is experimentally tested in standard and mobile environment as well. Approach described in this paper is innovative regarding the content related video stream delivery.","PeriodicalId":306280,"journal":{"name":"International Journal of Computer Theory and Engineering","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130828648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The combined use of computers and projectors in delivering multimedia presentations and in teaching is very common. However, the common operating tools used to deliver presentations such as presentation pens or mice either have limited manipulation functionality or are less convenient, and it is difficult to perform functions such as zooming, rotating images, and writing. In addition to allowing users to move freely in space to remotely perform functions, the laser pen manipulation system proposed in this paper can also perform the writing functions of a laser pen. Moreover, the system can also support the simultaneous use of two laser pens to realize a touch mode similar to that of a tablet computer, thus achieving an intuitive projection display manipulation experience.
{"title":"Intuitive Projection Display System Supporting the Manipulation of Dual Laser Pens","authors":"Ching-Sheng Wang, Ding-Jung Chiang, Chien-Liang Chen, Hsin-Chueh Chen","doi":"10.7763/IJCTE.2015.V7.979","DOIUrl":"https://doi.org/10.7763/IJCTE.2015.V7.979","url":null,"abstract":"The combined use of computers and projectors in delivering multimedia presentations and in teaching is very common. However, the common operating tools used to deliver presentations such as presentation pens or mice either have limited manipulation functionality or are less convenient, and it is difficult to perform functions such as zooming, rotating images, and writing. In addition to allowing users to move freely in space to remotely perform functions, the laser pen manipulation system proposed in this paper can also perform the writing functions of a laser pen. Moreover, the system can also support the simultaneous use of two laser pens to realize a touch mode similar to that of a tablet computer, thus achieving an intuitive projection display manipulation experience.","PeriodicalId":306280,"journal":{"name":"International Journal of Computer Theory and Engineering","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115711976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}