ANN Based Fault Classifier and Fault Locator for Double Circuit Transmission Line
Research Paper | Conference Paper
Vol.04 , Issue.02 , pp.1-6, Apr-2016
Abstract
Accurate and fast fault detection, classification and location is very important from the service restoration and reliability point of view. However in case of double circuit transmission line due to mutual coupling effect this may result in poor discrimination between faulty and healthy line. This paper presents an artificial neural network based fault classifier and locator for double circuit transmission line. The neural network was trained by various sets of data available from simulation of model for different faults conditions. The obtained simulation result shows the proposed system works satisfactorily.
Key-Words / Index Term
Double Circuit Transmission Line, Artificial Neural Network, Fault Detection, Fault Classification, Fault Location.
References
[1] Tahar Bouthiba, “Fault Location In EHV Transmission Lines Using Artificial Neural Networks”, Int. J. Appl. Math. Computer. Sci., 2004, Vol. 14, No. 1, 69–78.
[2] Anamika Jain, A. S. Thoke, and R. N. Patel, “Fault Classification of Double Circuit Transmission Line Using Artificial Neural Network”, International Journal of Electrical Systems Science and Engineering 1;4 © www.waset.org Fall 2008.
[3] H. Zheng you, C. Xiaoqing and L. Guoming, “Wavelet entropy definition and its application for transmission line fault detection and identification.” Conference on power system technology, 2006.
[4] R.P.Hasbe, A.P.Vaidya, Detection and classification of faults on 220 KV transmission line using wavelet transform and neural network, International Journal of Smart Grid and Clean Energy, August 2013.
[5] Mayuresh Rao, R.P.Hasbe, Detection and classification of faults transmission line using wavelet transform and neural network, ISSN 2278-8948, Volume -2, 2005 ISSN 1307-6884, May 2013.
[6] Atul A. Kale, Navita G. Pandey, Fault Detection and Fault Classification of Double Circuit Transmission Line Using Artificial Neural Network, International Research Journal of Engineering and Technology, Volume 2, Issue8, Page 1226- 1229, November 2015.
Citation
Atul A. Kale, Navita G. Pandey, "ANN Based Fault Classifier and Fault Locator for Double Circuit Transmission Line", International Journal of Computer Sciences and Engineering, Vol.04, Issue.02, pp.1-6, 2016.
Review Of Secure And Privacy Preserving DRM Scheme
Review Paper | Conference Paper
Vol.04 , Issue.02 , pp.7-10, Apr-2016
Abstract
Digital rights management (DRM) is becoming a key enabling technology to protect intellectual property of digital contents and it controls dissemination and usage of digital content. Numerous researches have been conducted for DRM since the past decade. This paper summarizes the basic concepts in DRM and present the typical DRM reference architecture. Secondly, requirements in this domain are studied. Furthermore, the some existing techniques are presented with detail analysis to point out the advantages and disadvantages respectively.
Key-Words / Index Term
Digital Rights Management (DRM), Interoperability, Proxy Re-encryption, Homomorphic encryption
References
[1] Durand, M. Eluard, S. Lelievre, and C. Vincent. “Smartpro : A smart card based digital content protection for professional workflow.”In Smart Card Research and Advanced Applications,8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings, Lecture Notes in Computer Science, pages 255– 266. Springer, 2008.
[2] D. W. Kravitz and T. S. Messerges. “Achieving media Portability through local content translation and end-to-end right management.”In Proceedings of the Fifth ACM Workshop on Digital Rights Management, Alexandria, VA, USA, November 7, 2005, pages 27– 36. ACM, 2005.
[3] S. Lee, H. Park, and J. Kim. “A secure and mutual-profitable drm interoperability scheme”. In Proceedings of the The IEEE symposium on Computers and Communications, ISCC ’10,pages 75–80,Washington, DC, USA, 2010. IEEE Computer Society.
[4] Aafa J S and Soja Salim, "Fingerprint Privacy Protection Techniques: A Comparative Study", International Journal of Computer Sciences and Engineering, Volume-02, Issue-07, Page No (86-89), Jul -2014, E-ISSN: 2347-2693
[5] G. Taban, A. A. C´ardenas, and V. D. Gligor. “Towards a secure and interoperable drm architecture”. In Proceedings
of the Sixth ACM Workshop on Digital Rights Management, Alexandria, VA, USA,October 30, 2006, pages 69–78. ACM, 2006.
[6] He Y J, Hui L C K, Yiu S M. “Avoid illegal encrypted DRM content sharing with non-transferable re-encryption”. Proceedings of the IEEE 13th International Conference on Communication Technology (ICCT’11), Sep 25−28, 2011, Jinan, China. Piscataway, NJ, USA: IEEE, 2011: 703−708.
[7] Y.-J. He, T. W. Chim, L. C. K. Hui, and S. M. Yiu. “Non- Transferable proxy re-encryption scheme for data dissemination Control”. http://eprint. iacr.org/2010/192.pdf.
[8] Petrlic R. “Proxy re-encryption in a privacy-preserving cloud Computing DRM scheme”. Proceedings of the 4th International Symposium on Cyberspace Safety and Security (CSS’12), Dec 12−13, 2012, Melbourne, Australia. LNCS 7672. Berlin, Germany:Springer-Verlag, 2012: 194−211
[9] G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved proxy re-encryption schemes with applications to secure distributed storage,” ACM Transactions on Information and System Security (TISSEC), vol. 9, no. 1, pp. 1–30, 2006.
[10] HUANG Qin-long, MA Zhao-feng, YANG Yi-xian, FU Jing-yi, NIU Xin-xin. “Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing” The Journal of China Universities of Posts and Telecommunications, pages 88–95, December 2013.
[11] Rivest R L, Adleman L, Dertouzos M L. “On data banks and privacy homomorphisms. In: Foundations of Secure Computation”. New York, NY, USA: Academic Press, 1978: 169−177
Citation
Bhavana S. Rote, M. M. Deshpande, "Review Of Secure And Privacy Preserving DRM Scheme", International Journal of Computer Sciences and Engineering, Vol.04, Issue.02, pp.7-10, 2016.
Module Voltage Balancing Algorithm for Phase Shifted SPWM Controlled Cascaded Multilevel Inverter
Research Paper | Conference Paper
Vol.04 , Issue.02 , pp.11-17, Apr-2016
Abstract
Multilevel inverters are considered to be an effective and practical solution for increasing power demands and harmonic reduction. They have been attracting attention because of increased power ratings, better harmonic performance and optimized electromagnetic interferences. Among several topologies proposed in literature, Cascaded H-bridge Multilevel Inverter (CMI) stands out due to its advantage in modularization, extendibility and minimization in number of power semiconductors. But one of the major limitations in case of Cascaded Multilevel Inverter is voltage unbalance across dc capacitors with increase in output voltage levels. The module voltage balancing algorithm such as sorting strategy has been proposed for modular multilevel inverter as well as Level Shifted controlled Cascaded Multilevel Inverter in literature. This paper explores basic operating principle of a seven level Cascaded Multilevel Inverter. Carrier based modulation techniques have been summarized. Also, in this paper the sorting strategy for module voltage balance has been proposed for Phase Shifted (PS) SPWM controlled seven level Cascaded Multilevel Inverter. Total Harmonic Distortion (THD) along with module voltage balancing band has also been analyzed.
Key-Words / Index Term
Multilevel inverters, SPWM, sorting strategy, voltage balance control
References
[1] Lin Xu, “Dynamic Modelling, Controls and Electromagnetic Switching of the Modular Cascaded converter (MCC’s)”, ELEKTRONISKI VESTNIK 80(3): 79-83, 2013.
[2] X. Zhang, B.Zhang, P. Tang, X. Peng, Y.Luo, ECE Capstone Design Project, Rutgers School of Engineering, Spring2014.
[3] S. K. Salankayana, N. Chellammal, R. Gurram, “Diagnosis of Faults due to Misfiring of Switches of a Cascaded Multilevel Inverter using artificial Neural Networks”, International Journal of Computer Applications (0975-8887), vol. 41, no.17, March 2012.
[4] J.Rodriguez, L.G. Franquelo, S Kouro, J.I. Leon, R.Portillo, M. Prats, M. Perz, “Multilevel converters: An enabling t echnology for high power applications” in Proc. of the IEEE, vol. 97, pp. 1786-1817, Nov. 2009,
[5] A. Nabae, I. Takahashi, and H. Agaki, “A New Neutral Point Clamped PWM Inverter”, IEEE Trans. Ind. Applicat, vol. IA-17, pp. 518-523, Sept./Oct. 1981.
[6] J.S. Lai and F.Z. Peng, “Multilevel Converters- A New Breed of Power Converters”, IEEE, Trans. Ind. Applicat., vol 32, pp. 509-517, May/ June 1996.”
[7] T. A. Meynard and H. Fosch, “Multilevel Choppers for High Voltage Applications”, Eur. Power Electron. Drives J., vol.2, no.1, pp. 41, Mar. 1992.
[8] R. H.B aker and L. H. Bannister, “Electric Power Converter”, U.S patent 3867643, Feb. 1975.
[9] Bin Wu, “High Power Converters and AC Drives”, IEEE Press, 2006.
[10] B. P. McGrath and D .G. Holmes, “Multicarrier PWM Strategies for Multilevel Inverters”, IEEE Trans. Ind. Electron., vol. 49, no. 4, pp. 858-867, 2002.
[11] L.Tolbert and T.G. Habetler, “Novel Multilevel Inverter carrier based SPWM method”, IEEE Trans.Ind. Applicat., vol. 35, pp. 1098-1107, Sept./Oct.. 1999.
[12] S. R. Deore, P. B. Darji and A. M. Kulkarni, “Switching Function Analysis of Half and Full bridge Modular Multilevel Converter for HVDC Applications”, IET Journal on Gen. Trans. and Dist., vol. 7, no.11, pp.1344-1356, Nov. 2013.
[13] L. Tolbert, F.Z. Peng and T. Habelter, “Multilevel Converters for Large Electric Drives”, IEEE Trans. Ind. Applicat, vol. 35, pp. 36-44, Jan./Feb. 1999.
[14] SuruchiAgarwal and S. R. Deore, “Level shifted SPWM of a seven level cascaded multilevel inverter for STATCOM applications”, in IEEE, Int. Conf. on Nascent Tech. in Engg. Field(ICNTE), Navi Mumbai, Jan. 2015.
Citation
Suruchi Gupta and S. R. Deore, "Module Voltage Balancing Algorithm for Phase Shifted SPWM Controlled Cascaded Multilevel Inverter", International Journal of Computer Sciences and Engineering, Vol.04, Issue.02, pp.11-17, 2016.
A New Security Protocol Using Hybrid Cryptography Algorithms
Review Paper | Conference Paper
Vol.04 , Issue.02 , pp.18-22, Apr-2016
Abstract
A Computer Network is an interconnected group of autonomous computing nodes, which use a well-defined, mutually agreed set of rules and conventions known as protocols, interact with one-another meaningfully and allow resource sharing preferably in a predictable and controllable manner. Communication has a major impact on today’s business. It is desired to communicate data with high security. Security Attacks compromises the security and hence various Symmetric and Asymmetric cryptographic algorithms have been proposed to achieve the security services such as Authentication, Confidentiality, Integrity, Non-Repudiation and Availability.At present, various types of cryptographic algorithms provide high security to information on controlled networks. These algorithms are required to provide data security and users authenticity.To improve the strength of these security algorithms, a new security protocol for online transaction can be designed using combination of both symmetric and asymmetric cryptographic techniques. This protocol provides three cryptographic primitives such as integrity, confidentiality and authentication. These three primitives can be achieved with the help of Advance Encryption Standard,Elliptic Curve Cryptography,XOR-Dual RSA algorithm and Message Digest MD5. It uses Elliptic Curve Cryptography and Advance Encryption both for encryption,XOR-Dual RSA algorithm for authentication and MD-5 for integrity. This new security protocol has been designed for better security with integrity using a combination of both symmetric and asymmetric cryptographic techniques.
Key-Words / Index Term
Advanced Encryption Standard;Cryptography;Message Digest-5;WSN,XOR-Dual RSA
References
[1] Dan Boneh and Glenn Durfee. Cryptanalysis of rsa with private key d less than n 0.292. Information Theory, IEEE Transactions on, 46(4):1339–1349, 2000.
[2] Ravi Kishore Kodali and NVS Narasimha Sarma. Energy efficient ecc encryption using ecdh. In Emerging Research in Electronics, Computer Science and Technology, volume248, pages 471–478. Springer, 2014.
[3] N. Kumar. A secure communication wireless sensor networks through hybrid (aes+ecc) algorithm. von LAP LAMBERT Academic Publishing, 386, 2012.
[4] Mewada, Shivlal, Pradeep Sharma, and S. S. Gautam. "Classification of Efficient Symmetric Key Cryptography Algorithms" International Journal of Computer Science and Information Security, Vol-14, No-2 (2016): 105-110.
[5] T. R. Mahesh M. J. Dubal and P. A. Ghosh. Design of a new security protocol using hybrid cryptography algorithms. In Proceedings of 3rd International Conference on Electronics Computer Technology (ICECT), 5), year=2010.
[6] Wuling Ren and Zhiqian Miao. A hybrid encryption algorithm based on des and rsa in Bluetooth communication. In Modeling, Simulation and Visualization Methods (WMSVM), 2010 Second International Conference on, pages 221–225. IEEE, 2010.
[7] S Subasree and NK Sakthivel. Design of a new security protocol using hybrid cryptography.
[8] Hung-Min Sun, Mu-En Wu, Wei-Chi Ting, and M Jason Hinek. Dual rsa and its security analysis. Information Theory, IEEE Transactions on, 53(8):2922–2933, 2007.
[9] Stefan Tillich and Johann Großsch¨adl. Accelerating aes using instruction set extensions for elliptic curve cryptography. In Computational Science and Its Applications–ICCSA 2005, pages 665–675. Springer, 2005.
[10] Shi-hai Zhu. Research of hybrid cipher algorithm application to hydraulic information transmission. In Electronics, Communications and Control (ICECC), 2011 International Conference on, pages 3873–3876. IEEE, 2011.
Citation
Darshan Bhole, Aditi Mote, Rachana Patil , "A New Security Protocol Using Hybrid Cryptography Algorithms", International Journal of Computer Sciences and Engineering, Vol.04, Issue.02, pp.18-22, 2016.
Terrace Car Parking System using PLC
Review Paper | Conference Paper
Vol.04 , Issue.02 , pp.23-26, Apr-2016
Abstract
Now a days car parking is a big problem, most of we see there is no space or less space for parking the car. Most of the times car is parked on the road and because of this traffic problem occurs. On this problem we have a solution; the solution is “Terrace Car Parking System”. Most of times we see that roof or terrace space of our building is not in use so we can use it for car parking. For this we require building structure and car parking system which is suitable for parking the car. In this paper we discuss on car parking system.
Key-Words / Index Term
Automatic car parking system, car position sensing, turntable control, lift door control, lift movement control, programming flow chart
References
[1] Khaled Kamel, Eman Kamel, “Programmable Logic Controllers: Industrial Control”, McGraw Hill Professional, 2013
[2] Digital Electronics – prepared by Prof. Rafael Arce, UPR-Humacao
[3] Nise, N.S. Control Systems And Engineering. Addison Wesley. 2nd edition, 1995
[4] John Webb and Ronald R. '' Modern Control Technology'', 2nd Edition. Kalian.
[5] Vaze, Swanand S. "PLC Based Automatic Multistoried Car Parking System." International Journal of engineering Research and Applications 1.4: 67-71.
[6] Article on Rack and Pinion at Wikipedia [Online].
[7] https://en.wikipedia.org/wiki/Rack_and_pinion
[8] M. G., I. M. Vishnevetskii, and Iu. V. Greiman. Remont, modernizatsiia i ekspluatatsiia liftov, 2nd ed. Moscow,1968.[Online]. http://encyclopedia2.thefreedictionary.com/Lift+(elevator)
[9] Article on Turntable history [Online].
http://www.djsociety.org/Turn%20History.htm
Citation
Sangeeta Pattankar, Nikhil Mohan , Neeraj Nimbalkar, Vivek Shinde and Yogesh Karande, "Terrace Car Parking System using PLC", International Journal of Computer Sciences and Engineering, Vol.04, Issue.02, pp.23-26, 2016.
Protecting Websites from Dissociative Identity SQL Injection Attack- a Patch for Human Folly
Review Paper | Conference Paper
Vol.04 , Issue.02 , pp.27-30, Apr-2016
Abstract
Injection attack is a method that can inject any kind of malicious string or anomaly string on the original string. Most of the pattern based techniques are used static analysis and patterns are generated from the attacked statements. In this project, we proposed a detection and prevention technique for preventing SQL Injection Attack (SQLIA) using Aho-Corasick pattern matching algorithm. The basic goal of our project is to minimize the web-based attacks like SQL Injection Attack (SQLIA) and reduce the load of server.
Key-Words / Index Term
SQL Injection; SQL Injection Attack; Aho-Corasick Algorithm; Anomaly Scoring
References
[1] Aho, Alfred V.; Margaret J. Corasick (June 1975). "Efficient string matching: An aid to bibliographic search". Communications of the ACM 18 (6): 333–340
[2] Commentz-Walter B. A string matching algorithm fast on the average, Proc. 6th International Colloquium on Automata, Languages, and Programming (1979), pp. 118-132.
[3] Alsmadi I., Nuser M., String Matching Evaluation Methods for DNA Comparisons, International Journal of Advanced Science and Technology, Vol.47, 2012.
[4] Amir A., Lewenstein M., and Porat E., Faster Algorithms for String Matching with K-Mismatches, Journal of Algorithms 50(2004) 257-275.
[5] Gomaa N.H., Fahmy A.A., Short Answer Grading using String Similarity and Corpus-Based Similarity, International Journal of Advanced Computer Science and Applications, Vol 3,No.11, 2012.
[6] https://www.blogs.akamai.com/
[7] C.J. Ezeife, J. Dong, A.K. Aggarwal, “Sensor Web-IDS: A Web Mining Intrusion Detection System”, International Journal of Web Information Systems, volume 4, pp. 97-120, 2007
Citation
Aman Prasad, Gangasagar Pitla, Satish Patil,. Rachana Patil, "Protecting Websites from Dissociative Identity SQL Injection Attack- a Patch for Human Folly", International Journal of Computer Sciences and Engineering, Vol.04, Issue.02, pp.27-30, 2016.
Modified Cascaded Five Level Multilevel Inverter Using Hybrid Pulse Width Modulation
Research Paper | Conference Paper
Vol.04 , Issue.02 , pp.31-34, Apr-2016
Abstract
Multilevel inverter is an effective and practical solution for increasing power demand and reducing harmonics of AC waveforms. Such inverters synthesize a desired output voltage from several levels of dc voltages as inputs. Our aim in this project is to analyze the performance of cascaded five level inverter using hybrid pulse width modulation technique. It has been found that this technique reduces the switching losses and total harmonic distortion. In the conventional cascaded H-bridge multilevel inverter eight power switches have been used is reduced to six power switches by employing this topology and it can be employed for high voltage and high power applications. Due to these advantages, cascaded H-bridge inverter has been widely applied to such applications as HVDC, SVC, stabilizers, and high power motor drives. The performance can be analyzed by the MATLAB/Simulink.
Key-Words / Index Term
Multilevel inverter, Cascaded H-Bridge multilevel inverter, Hybrid pulse width modulation, Total harmonic distortion.
References
[1] “POWER ELECTRONICS HANDBOOK”, Third Edition by Muhammed H. Rashid
[2] S. Sivagamasundari, Dr. P. Melba Mary (IJETAE), “Analysis of cascaded 5 level multilevel inverter using hybrid PWM” Volume 3, Issue 4, April 2013
[3] John N. Chiasson, Leon M. Tolbert, Keith J. McKenzie, Zhong Du, “ A Complete solution to the harmonic elimination problem”, IEEE transactions on power electronics, Vol. 19, No.2, pp. 491-498, March 2004.
[4] C. Kiruthika, T. Ambika, Dr. R. Seyezhai, ”Simulation of cascaded multilevel inverter using Hybrid PWM technique”, International Journal of Systems, Algorithms & Applications, Volume 1, Issue 1, December 2011
[5] Indrajit Sarkar and B. G. Fernandes, “Modified Hybrid Multi-Carrier PWM Technique for Cascaded H-Bridge Multilevel Inverter”Department of Electrical Engineering, IIT Bombay, Volume 1, Issue 1, December 2011.
[6] Zhou Jinghua, Li Zhengxi,” Research on Hybrid Modulation Strategies Based on General Hybrid Topology of Multilevel Inverter” International Symposium on Power Electronics, Electrical Drives, Automation and Motion, North China University of Technology, Beijing, (China),2008.
Citation
Saket Bakshi, Nishita Katkar, Malini Hadkar, Sanyogita Suryavanshi and J. Swapna, "Modified Cascaded Five Level Multilevel Inverter Using Hybrid Pulse Width Modulation", International Journal of Computer Sciences and Engineering, Vol.04, Issue.02, pp.31-34, 2016.
Analysis of Spread Spectrum Time Domain Reflectometry for Cable Fault Detection
Research Paper | Conference Paper
Vol.04 , Issue.02 , pp.35-38, Apr-2016
Abstract
Cable fault detection is crucial and helps to avoid severe damage and maintain continuous functioning of an electrical system. Spread Spectrum Time Domain Reflectometry is considered to be an effective method to detect intermittent faults such as open circuits and short circuits. This paper shows the working and advantages of Spread Spectrum Time Domain Reflectometry (SSTDR). It also includes experimental data analysis performed on low voltage cable using ARC CHASER SSTDR kit manufactured by LIVE WIRE INNOVATIONS.
Key-Words / Index Term
Spread spectrum time domain reflectometry (SSTDR), pseudo noise (PN), time domain reflectometry (TDR), cable fault detection, correlation.
References
[1] “Analysis of Spread Spectrum Time Domain Reflectometry for Wire Fault Location”, Paul Smith, Member, IEEE, Cynthia Furse, Senior Member, IEEE, and Jacob Gunther, Member, IEEE, December 2005.
[2] “Tutorial on Spread Spectrum Technology”, Prabakar Prabakaran, N.L. Poly Technic College, June 2003.
[3] “Sequence and Spread Spectrum Time Domain Reflectometry for Transmission Line Analysis”, Jacklyn Reis, Agostinho L.S. Castrob, Jo˜ao C.W.A Costa, Jaume R.I. Riuc, and Klas Ericson.
[4] “A critical comparison of reflectometry methods for location of wiring faults”, Cynthia Furse, Senior Member, IEEE, You Chung Chung, Member, IEEE, Chet Lol' and Praveen Pendayala, December 15, 2005.
[5] “Frequency-Domain Reflectometery for on-Board Testing of Aging Aircraft Wiring”, Cynthia Furse, Senior Member, IEEE, You Chung Chung, Member, IEEE, Rakesh Dangol, Marc Nielsen, Member, IEEE, Glen Mabey, and Raymond Woodwar.
[6] “Couplers for on-line Time Domain Reflectometry diagnostics of power cables”, V. Dubickas and H. Edin, 2004 Annual Report Conference on Electrical Insulation and Dielectric Phenomena.
[7] “Essential Elements of an Electric Cable Condition Monitoring Program”, M. Villaran and R. Lofaro, NRC Project Managers, January 2010.
[8] “Condition Monitoring Techniques for Electric Cables”, Michael Villaran and Robert Lofaro, November 2009.
[9] “Cable Fault Profiles and Troubleshooting Guide”, Thorne and Derrick, UK.
[10] “Identification of Fault Locations in Underground Distribution System using Discrete Wavelet Transform”, A. Ngaopitakkul, C. Apisit, C. Pothisarn, C. Jettanasen and S. Jaikhan, March 2010.
[11] “Spread Spectrum Time Domain Reflectometry”. PhD thesis, P. Smith, Utah State University, 2003.
[12] “Communication System Engineering”, 2nd ed., J.G. Proakis and M. Salehi, Prentice-Hall, 2002.
[13] “Crosscorrelation Properties of Pseudorandom and Related Sequences”, D.V. Sawarte and M.B. Pursley, Proceedings of The IEEE 68, pp. 593–619, May 1980.
[14] “Feasibility of Spread Spectrum Sensors for Location of Arcs on Live Wires”, C. Furse, P. Smith, M. Safavi, and C. Lo, IEEE Sensors Journal 5, pp. 1445–1450, December 2005.
[15] “Communication Systems”, Wiley, 4th ed., S. Haykin, 1999.
Citation
Reema Sharma, Piyush Barge and Hemant Prasad, "Analysis of Spread Spectrum Time Domain Reflectometry for Cable Fault Detection", International Journal of Computer Sciences and Engineering, Vol.04, Issue.02, pp.35-38, 2016.
An Experimental Study of the Performance of Histogram Equalization for Image Enhancement
Research Paper | Conference Paper
Vol.04 , Issue.02 , pp.39-42, Apr-2016
Abstract
Histogram equalization is one of the image enhancement techniques which has gained widespread popularity nowadays. It is a spatial domain histogram manipulation technique which mainly deals with brightness value remapping for recovering the lost contrast. In this paper an experimental study of the performance of histogram equalization technique on images has been done using matlab. Image multiplication and image division techniques are done on images in such a way that by adjusting the respective constant values, the contrast of the image is been made poor. To recover the lost contrast and the image back, the technique of histogram equalization is used and a comparison of the resultant image with original image and an analysis of the performance of this technique is done. The appearance of the images get enhanced by histogram equalization. The method uses the principle of stretching out the grey levels of the less contrast, darker image thereby producing a uniformly distributed flat histogram and a more contrast clear image.
Key-Words / Index Term
Histogram manipulation; Pixel; Remapping; Histogram equalization; Image enhancement; Contrast; Brightness
References
[1] S. Lau, “Global image enhancement using local information,” Electronics Letters, vol. 30, pp. 122–123, Jan. 1994.
[2] Rafael C. Gonzalez, Richard E. Woods, “Digital Image Processing”, 2nd edition, Prentice Hall, 2002.
[3] A. K. Jain, “Fundamentals of Digital Image Processing”. Englewood Cliffs, NJ: Prentice-Hall, 1991.
[4] Yeong-Taeg Kim, “Contrast enhancement using brightness preserving bi-histogram equalization,” IEEE Trans. Consumer Electronics, vol. 43, no. 1, pp. 1-8, 1997.
[5]] M. Abdullah-Al-Wadud, Md. Hasanul Kabir, M. Ali Akber Dewan, Oksam Chae, “A dynamic histogram equalization for image contrast enhancement”, IEEE Transactions. Consumer Electron., vol. 53, no. 2, pp. 593- 600, May 2007.
[6] Chen SD and Ramli A, “Contrast Enhancement Using Recursive Mean-Separate Histogram Equalization For Scalable Brightness Preservation”, Consumer Electronics, IEEE Transactions on, (2003), vol. 49, no. 4. pp. 1301-1309.
[7] Kim YT, “Contrast Enhancement Using Brightness Preserving Bi-Histogram Equalization”, Consumer Electronics, IEEE Transactions on, (1997), vol. 43, no.1, pp.1-8.
[8] Wang C and Zhongfu Ye, “Brightness Preserving Histogram Equalization With Maximum Entropy: A Variational Perspective”, IEEE Trans. Consumer Electronics, Nov (2005) vol. 51, no. 4, pp. 1326- 1334.
Citation
Sukanya P, Veena Reddy Shelke, "An Experimental Study of the Performance of Histogram Equalization for Image Enhancement", International Journal of Computer Sciences and Engineering, Vol.04, Issue.02, pp.39-42, 2016.
A Supervised Forum Crawler
Research Paper | Conference Paper
Vol.04 , Issue.02 , pp.43-47, Apr-2016
Abstract
Web Forums or Internet Forums provide a space for users to share, discuss and request information. Web Forums are sources of huge amount of structured information that is rapidly changing. So crawling Web Forums requires special softwares. A Generic Deep Web Crawler or a Focused Crawler cannot be used for this purpose. In this paper, we propose an effective Web Crawler especially for Internet Forums. This Forum Crawler overcomes the drawbacks of many of the existing Forum Crawlers. It has the ability to detect the Entry URL (Uniform Resource Locator) of a Forum site, given any page of it. Crawling process starting from Entry URL increases the coverage. Different URLs in the Web Forums are classified into four categories. The entire crawling process is divided into a learning part and an online crawling part. Learning part will create regular expressions based on URLs and crawling part actually crawls the Web pages.
Key-Words / Index Term
Forum Crawling; URL Type; Page Classification; Crawling Strategy; Javascript-based URLs
References
[1] Internet forum. http://en.wikipedia.org/wiki/Internet forums.
[2] Web Crawler. http://en.wikipedia.org/wiki/Webcrawler.
[3] Asa Ben-Hur and JasonWeston. A user’s guide to support vector machines. In Data mining techniques for the life sciences, pages 223–239. Springer, 2010N.B. Salem, and J-P Hubaux, “Securing Wireless Mesh Networks”, IEEE Wireless Communications, Vol.13, Issue-2, 2006, pp.50-55.
[4] Rui Cai, Jiang-Ming Yang, Wei Lai, Yida Wang, and Lei Zhang. irobot: An intelligent crawler for web forums. In Proceedings of the 17th international conference on World Wide Web, pages 447–456. ACM, 2008.
[5] Li Ding, Tim Finin, Anupam Joshi, Rong Pan, R Scott Cost, Yun Peng, Pavan Reddivari, VC Doshi, and Joel Sachs. Swoogle: A semantic web search and metadata engine. In Proc. 13th ACM Conf. on Information and Knowledge Management, pages 65–69, 2004.
[6] Hai Dong and Farookh Khadeer Hussain. Focused crawling for automatic service discovery, annotation, and classification in industrial digital ecosystems. Industrial Electronics,IEEE Transactions on, 58(6):2106–2116, 2011.
[7] Yan Guo, Kui Li, Kai Zhang, and Gang Zhang. Board forum crawling: a web crawling method for web forum. In Proceedings of the 2006 IEEE/WIC/ACM International Conference on Web Intelligence, pages 745–748. IEEE Computer Society, 2006.
[8] Amit Sachan, Wee-Yong Lim, and Vrizlynn LL Thing. A generalized links and text properties based forum crawler. In Proceedings of the The 2012 IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technology-Volume 01, pages 113–120. IEEE Computer Society, 2012.
[9] ] Jingtian Jiang, Nenghai Yu, and Chin-Yew Lin. Focus: learning to crawl web forums. In Proceedings of the 21st international conference companion on World Wide Web, pages 33–42. ACM, 2012.
[10] Alex Goh Kwang Leng, KP Ravi, Ashutosh Kumar Singh, and Rajendra Kumar Dash.Pybot: An algorithm for web crawling. In Nanoscience, Technology and Societal Implications (NSTSI), 2011 International Conference on, pages 1–6. IEEE, 2011.
[11] Ian H Witten, Eibe Frank, Leonard E Trigg, Mark A Hall, Geoffrey Holmes, and Sally Jo Cunningham. Weka: Practical machine learning tools and techniques with java implementations. 1999.
[12] Jamali, Mohsen, et al. "A method for focused crawling using combination of link structure and content similarity." Proceedings of the 2006 IEEE/WIC/ACM International Conference on Web Intelligence. IEEE Computer Society, 2006.
Citation
Sreeja S R, Sangita Chaudhari, "A Supervised Forum Crawler", International Journal of Computer Sciences and Engineering, Vol.04, Issue.02, pp.43-47, 2016.