Pub Date : 2016-06-30DOI: 10.5121/IJCSES.2016.7301
Walid K. A. Hasan
The internet has been playing an increasingly important role in our daily life, with the availability of many web services such as email and search engines. However, these are often threatened by attacks from computer programs such as bots. To address this problem, CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) was developed to distinguish between computer programs and human users. Although this mechanism offers good security and limits automatic registration to web services, some CAPTCHAs have several weaknesses which allow hackers to infiltrate the mechanism of the CAPTCHA. This paper examines recent research on various CAPTCHA methods and their categories. Moreover it discusses the weakness and strength of these types.
{"title":"A Survey of Current Research on CAPTCHA","authors":"Walid K. A. Hasan","doi":"10.5121/IJCSES.2016.7301","DOIUrl":"https://doi.org/10.5121/IJCSES.2016.7301","url":null,"abstract":"The internet has been playing an increasingly important role in our daily life, with the availability of many web services such as email and search engines. However, these are often threatened by attacks from computer programs such as bots. To address this problem, CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) was developed to distinguish between computer programs and human users. Although this mechanism offers good security and limits automatic registration to web services, some CAPTCHAs have several weaknesses which allow hackers to infiltrate the mechanism of the CAPTCHA. This paper examines recent research on various CAPTCHA methods and their categories. Moreover it discusses the weakness and strength of these types.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"74 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133135068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-30DOI: 10.5121/IJCSES.2016.7202
Wang Shujie, Cheng Wushan
This paper introduces a kind of ARM embedded system as the control systemof the nursing bed.The embedded control system takes the ARM9 S3C2440 chip as the core of data processing. The design ofthe control system includes hardware design, software design and PC monitoring system design.
{"title":"DESIGN AND DEVELOPMENT OF ARM -BASED CONTROL SYSTEM FOR NURSING BED","authors":"Wang Shujie, Cheng Wushan","doi":"10.5121/IJCSES.2016.7202","DOIUrl":"https://doi.org/10.5121/IJCSES.2016.7202","url":null,"abstract":"This paper introduces a kind of ARM embedded system as the control systemof the nursing bed.The embedded control system takes the ARM9 S3C2440 chip as the core of data processing. The design ofthe control system includes hardware design, software design and PC monitoring system design.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126539527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-30DOI: 10.5121/IJCSES.2016.7203
Akshat Sharma, Rishon Patani, A. Aggarwal
This paper presents a set of methods that uses a genetic algorithm for automatic test-data generation in software testing. For several years researchers have proposed several methods for generating test data which had different drawbacks. In this paper, we have presented various Genetic Algorithm (GA) based test methods which will be having different parameters to automate the structural-oriented test data generation on the basis of internal program structure. The factors discovered are used in evaluating the fitness function of Genetic algorithm for selecting the best possible Test method. These methods take the test populations as an input and then evaluate the test cases for that program. This integration will help in improving the overall performance of genetic algorithm in search space exploration and exploitation fields with better convergence rate.
{"title":"SOFTWARE TESTING USING GENETIC ALGORITHMS","authors":"Akshat Sharma, Rishon Patani, A. Aggarwal","doi":"10.5121/IJCSES.2016.7203","DOIUrl":"https://doi.org/10.5121/IJCSES.2016.7203","url":null,"abstract":"This paper presents a set of methods that uses a genetic algorithm for automatic test-data generation in software testing. For several years researchers have proposed several methods for generating test data which had different drawbacks. In this paper, we have presented various Genetic Algorithm (GA) based test methods which will be having different parameters to automate the structural-oriented test data generation on the basis of internal program structure. The factors discovered are used in evaluating the fitness function of Genetic algorithm for selecting the best possible Test method. These methods take the test populations as an input and then evaluate the test cases for that program. This integration will help in improving the overall performance of genetic algorithm in search space exploration and exploitation fields with better convergence rate.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128128431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-30DOI: 10.5121/IJCSES.2016.7204
Ming Xing, Wushan Cheng
This article describes the development of DSP as the core of the face recognition system, on the basis of understanding the background, significance and current research situation at home and abroad of face recognition issue, having a in-depth study to face detection, Image preprocessing, feature extraction face facial structure, facial expression feature extraction, classification and other issues during face recognition and have achieved research and development of DSP-based face recognition system for robotic rehabilitation nursing beds. The system uses a fixed-point DSP TMS320DM642 as a central processing unit, with a strong processing performance, high flexibility and programmability.
{"title":"RESEARCH AND DEVELOPMENT OF DSP-BASED FACE RECOGNITION SYSTEM FOR ROBOTIC REHABILITATION NURSING BEDS","authors":"Ming Xing, Wushan Cheng","doi":"10.5121/IJCSES.2016.7204","DOIUrl":"https://doi.org/10.5121/IJCSES.2016.7204","url":null,"abstract":"This article describes the development of DSP as the core of the face recognition system, on the basis of understanding the background, significance and current research situation at home and abroad of face recognition issue, having a in-depth study to face detection, Image preprocessing, feature extraction face facial structure, facial expression feature extraction, classification and other issues during face recognition and have achieved research and development of DSP-based face recognition system for robotic rehabilitation nursing beds. The system uses a fixed-point DSP TMS320DM642 as a central processing unit, with a strong processing performance, high flexibility and programmability.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124234270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-30DOI: 10.5121/IJCSES.2016.7201
Zahra Shirazi, Seid Javad Mirabedini
In this paper, a dynamic K-means algorithm to improve the routing process in Mobile Ad-Hoc networks (MANETs) is presented. Mobile ad-hoc networks are a collocation of mobile wireless nodes that can operate without using focal access points, pre-existing infrastructures, or a centralized management point. In MANETs, the quick motion of nodes modifies the topology of network. This feature of MANETS is lead to various problems in the routing process such as increase of the overhead massages and inefficient routing between nodes of network. A large variety of clustering methods have been developed for establishing an efficient routing process in MANETs. Routing is one of the crucial topics which are having significant impact on MANETs performance. The K-means algorithm is one of the effective clustering methods aimed to reduce routing difficulties related to bandwidth, throughput and power consumption. This paper proposed a new K-means clustering algorithm to find out optimal path from source node to destinations node in MANETs. The main goal of proposed approach which is called the dynamic K-means clustering methods is to solve the limitation of basic K-means method like permanent cluster head and fixed cluster members. The experimental results demonstrate that using dynamic K-means scheme enhance the performance of routing process in Mobile ad-hoc networks.
{"title":"Dynamic K-Means Algorithm for Optimized Routing in Mobile Ad Hoc Networks","authors":"Zahra Shirazi, Seid Javad Mirabedini","doi":"10.5121/IJCSES.2016.7201","DOIUrl":"https://doi.org/10.5121/IJCSES.2016.7201","url":null,"abstract":"In this paper, a dynamic K-means algorithm to improve the routing process in Mobile Ad-Hoc networks (MANETs) is presented. Mobile ad-hoc networks are a collocation of mobile wireless nodes that can operate without using focal access points, pre-existing infrastructures, or a centralized management point. In MANETs, the quick motion of nodes modifies the topology of network. This feature of MANETS is lead to various problems in the routing process such as increase of the overhead massages and inefficient routing between nodes of network. A large variety of clustering methods have been developed for establishing an efficient routing process in MANETs. Routing is one of the crucial topics which are having significant impact on MANETs performance. The K-means algorithm is one of the effective clustering methods aimed to reduce routing difficulties related to bandwidth, throughput and power consumption. This paper proposed a new K-means clustering algorithm to find out optimal path from source node to destinations node in MANETs. The main goal of proposed approach which is called the dynamic K-means clustering methods is to solve the limitation of basic K-means method like permanent cluster head and fixed cluster members. The experimental results demonstrate that using dynamic K-means scheme enhance the performance of routing process in Mobile ad-hoc networks.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122230268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-02-28DOI: 10.5121/IJCSES.2015.6101
Haifa Ben Saber, M. Elloumi
There are subsets of genes that have similar behavior under subsets of conditions, so we say that they coexpress, but behaveindependently under other subsets of conditions. Discovering such coexpressions can be helpful to uncover genomic knowledge such as gene networks or gene interactions. That is why, it is of utmost importance to make a simultaneous clustering of genes and conditions to identify clusters of genes that are coexpressed under clusters of conditions. This type of clustering is called biclustering. Biclustering is an NP-hard problem. Consequently, heuristic algorithms are typically used to approximate this problem by finding suboptimal solutions. In this paper, we make a new survey on tools , biclusters validation and evaluation functions.
{"title":"A NEW STUDY ON BICLUSTERING TOOLS, BICLUSTERS VALIDATION AND EVALUATION FUNCTIONS","authors":"Haifa Ben Saber, M. Elloumi","doi":"10.5121/IJCSES.2015.6101","DOIUrl":"https://doi.org/10.5121/IJCSES.2015.6101","url":null,"abstract":"There are subsets of genes that have similar behavior under subsets of conditions, so we say that they coexpress, but behaveindependently under other subsets of conditions. Discovering such coexpressions can be helpful to uncover genomic knowledge such as gene networks or gene interactions. That is why, it is of utmost importance to make a simultaneous clustering of genes and conditions to identify clusters of genes that are coexpressed under clusters of conditions. This type of clustering is called biclustering. Biclustering is an NP-hard problem. Consequently, heuristic algorithms are typically used to approximate this problem by finding suboptimal solutions. In this paper, we make a new survey on tools , biclusters validation and evaluation functions.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132521452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-31DOI: 10.5121/IJCSES.2014.5601
X. Yang, Cheng Wushan
To meet the requirements of the detection system of underwater controller of subsea tree, this paper adopts the data acquisition and control mode of “HMI+ SIEMENS PLC+SQL ".Using the configuration software, completed the development and design of production tree detection system to monitor, control and data communication. The monitoring function has realized the process simulation of oil tree, the control function has realized the remote control of oil tree, and database SQL has realized the management and analysis of data in oil well, achieving real-time tracking, rapid response, improve speed , quality and reporting level of oil production engineering design .At the same time the design center can make full use of the database to complete the design of required query, statistical analysis and the output function of related form .
{"title":"DETECTION SYSTEM DESIGN OF SUBSEA TREE CONTROLLER","authors":"X. Yang, Cheng Wushan","doi":"10.5121/IJCSES.2014.5601","DOIUrl":"https://doi.org/10.5121/IJCSES.2014.5601","url":null,"abstract":"To meet the requirements of the detection system of underwater controller of subsea tree, this paper adopts the data acquisition and control mode of “HMI+ SIEMENS PLC+SQL \".Using the configuration software, completed the development and design of production tree detection system to monitor, control and data communication. The monitoring function has realized the process simulation of oil tree, the control function has realized the remote control of oil tree, and database SQL has realized the management and analysis of data in oil well, achieving real-time tracking, rapid response, improve speed , quality and reporting level of oil production engineering design .At the same time the design center can make full use of the database to complete the design of required query, statistical analysis and the output function of related form .","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"17 2-3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126251048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-08-31DOI: 10.5121/IJCSES.2014.5401
Ahlem Drif, Abdallah Boukerram
The community detection in complex networks has attracted a growing interest and is the subject of several researches that have been proposed to understand the network structure and analyze the network properties. In this paper, we give a thorough overview of different community discovery strategies, we propose taxonomy of these methods, and we specify the differences between the suggested classes which helping designers to compare and choose the most suitable strategy for the various types of network encountered in the real world.
{"title":"TAXONOMY AND SURVEY OF COMMUNITY DISCOVERY METHODS IN COMPLEX NETWORKS","authors":"Ahlem Drif, Abdallah Boukerram","doi":"10.5121/IJCSES.2014.5401","DOIUrl":"https://doi.org/10.5121/IJCSES.2014.5401","url":null,"abstract":"The community detection in complex networks has attracted a growing interest and is the subject of several researches that have been proposed to understand the network structure and analyze the network properties. In this paper, we give a thorough overview of different community discovery strategies, we propose taxonomy of these methods, and we specify the differences between the suggested classes which helping designers to compare and choose the most suitable strategy for the various types of network encountered in the real world.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114920310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-08-31DOI: 10.5121/IJCSES.2014.5403
Maram Mohammed Falatah, O. Batarfi
Cloud computing is a technique that has a great capabilities and benefits for users. Cloud characteristics encourage many organizations to move to this technology. But many consideration faces transmission process. This paper outline some of these considerations and considerable efforts solved cloud scalability issues.
{"title":"CLOUD SCALABILITY CONSIDERATIONS","authors":"Maram Mohammed Falatah, O. Batarfi","doi":"10.5121/IJCSES.2014.5403","DOIUrl":"https://doi.org/10.5121/IJCSES.2014.5403","url":null,"abstract":"Cloud computing is a technique that has a great capabilities and benefits for users. Cloud characteristics encourage many organizations to move to this technology. But many consideration faces transmission process. This paper outline some of these considerations and considerable efforts solved cloud scalability issues.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114139328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-30DOI: 10.5121/IJCSES.2014.5203
G. Hemalatha, C. Sumathi, Manonmaniam Sundaranar
Automatic recognition of facial expressions is an important component for human-machine interfaces. It has lot of attraction in research area since 1990's.Although humans recognize face without effort or delay, recognition by a machine is still a challenge. Some of its challenges are highly dynamic in their orientation, lightening, scale, facial expression and occlusion. Applications are in the fields like user authentication, person identification, video surveillance, information security, data privacy etc. The various approaches for facial recognition are categorized into two namely holistic based facial recognition and feature based facial recognition. Holistic based treat the image data as one entity without isolating different region in the face where as feature based methods identify certain points on the face such as eyes, nose and mouth etc. In this paper, facial expression recognition is analyzed with various methods of facial detection,facial feature extraction and classification.
{"title":"A Study of Techniques for Facial Detection and Expression Classification","authors":"G. Hemalatha, C. Sumathi, Manonmaniam Sundaranar","doi":"10.5121/IJCSES.2014.5203","DOIUrl":"https://doi.org/10.5121/IJCSES.2014.5203","url":null,"abstract":"Automatic recognition of facial expressions is an important component for human-machine interfaces. It has lot of attraction in research area since 1990's.Although humans recognize face without effort or delay, recognition by a machine is still a challenge. Some of its challenges are highly dynamic in their orientation, lightening, scale, facial expression and occlusion. Applications are in the fields like user authentication, person identification, video surveillance, information security, data privacy etc. The various approaches for facial recognition are categorized into two namely holistic based facial recognition and feature based facial recognition. Holistic based treat the image data as one entity without isolating different region in the face where as feature based methods identify certain points on the face such as eyes, nose and mouth etc. In this paper, facial expression recognition is analyzed with various methods of facial detection,facial feature extraction and classification.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128186358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}