IJEA - Volume 3 Issue 8 (August 2014)


Sr/No/ Title Pdf
1 Comparitive Study of Sift, Surf and Hybrid Method of Image Stitching
Savita Singla, Reecha Sharma

Abstract-Nowadays, Image Stitching is used in the medical field to stitch the different X-ray images to form a single high resolution image. To Stitch these X-ray images different methods are used. This paper presents the comparison of SIFT, SURF and HYBRID method which is basically the combination of SIFT and SURF method. The comparison can be done on the basis of different quality metrics like Entropy, Standard Deviation, Quality Index, and Variance.

2 An Efficient Method for Content Based Image Retrieval Using Color, Shape and Texture Feature
Rajni Bala, Reecha Sharma

Abstract:-CBIR is the process of getting the images from the database on the basis of automatically extracted feature like color, texture, shape, spatial information or any combination of these. CBIR’s basic Technology is based on the feature extraction. The image is retrieved on the basis of difference/similarities between query image and image from the database. In this paper, CBIR system is proposed that is implemented with the help of combination of features shape, color and texture. Color moments are used for extraction of color feature. For texture and shape representation, Gabor filter and moments invariant is used. An experimental result shows that proposed method has higher retrieval efficiency than other conventional methods.

3 Quantum Query Complexity to Determine Median of a Graph
Manjula Gandhi S, Devishree J, Venkatesh J and Sathish Mohan S

Abstract— Algorithms are the key concepts of computer science. Classical computer science provides a vast body of concepts and techniques which may be reused to great effect in quantum computing. Many of the triumphs of quantum computing have come by combining existing ideas from computer science with the ideas from quantum mechanics. The problem of determining quantum query complexity for obtaining the Median of a graph is considered both in a classical system and in a quantum system.

4 A Novel Approach to Filter Unwanted Messages from Online Social Networks (OSN) User walls
Ravula Pradeepkumar, Y.Leela krishna

Abstract-The best entertainment for the younger generation now is given in the form of Social Networking sites. The Online Social Networks (OSN) mainly helps an individual to connect with their friends, family and the society online in order to gather and share new experiences with others. Nowadays, the OSNs are facing the problem of the people posting the indecent messages on any individual's wall which annoys other people on seeing them. In order to filter those unbearable messages a system called Machine Learning is introduced. Therefore one important need in today On-line Social Networks (OSNs) is to give users the ability to control the messages posted on their own private space to avoid that unwanted content is displayed. OSNs provide little support to this requirement up to now. To provide this, we propose a system allowing OSN users to have a direct control on the messages posted on their walls. This is accomplished through a flexible rule-based system, which allows users to customize the filtering criteria to be applied to their walls, and Machine Learning based soft classifier which automatically produces membership labels in support of content-based filtering.

5 Mobile Operating Systems based on kernel: A Study
Marimuthu.P, Dr.R.Manickachezian

Abstract- Mobile phones are identical essential electronic devices of our regular life, this have many feature’s, the important feature is Operating System (OS). OS is a software program that acts mediator between the user of a computer and computer hardware. This paper discus’s about the types of OS and how to use our mobiles. In this paper have five different type of mobile OS there are android, blackberry OS, iPhone, Symbian and finely windows. Now a day’s new technology are introduced very fast by many companies and also introduce an important feature. This paper where explained different types of advantages and how did use in kernel for all Operating System..

6 An Enhanced Opinionated Ranking Retrieval System Using Blogs Properties
Mangaiah Mandalapu, Y.Leela krishna

Abstract- The massive acceptance and usage of the blog communities by a significant portion of the Web users has rendered knowledge extraction from blogs a particularly important research field. One of the most interesting related problems is the issue of the opinionated retrieval, that is, the retrieval of blog entries which contain opinions about a topic. There has been a remarkable amount of work towards the improvement of the effectiveness of the opinion retrieval systems. The primary objective of these systems is to retrieve blog posts which are both relevant to a given query and contain opinions, and generate a ranked list of the retrieved documents according to the relevance and opinion scores. Although a wide variety of effective opinion retrieval methods have been proposed, to the best of our knowledge, none of them takes into consideration the issue of the importance of the retrieved opinions. In this work we introduce a ranking model which combines the existing retrieval strategies with query-independent information to enhance the ranking of the opinionated documents. This paper describes three simple heuristics which improve opinion retrieval effectiveness by using blog-specific properties. Blog timestamps are used to increase the retrieval score of blog posts published near the time of a significant even related to a query; an inexpensive approach to comment amount estimation is used to identify the level of opinion expressed in a post; and query-specific weights are used to change the importance of spam filtering for different types of queries. Overall, these methods, combined with non-blog specific retrieval approaches, result in substantial improvements over state-of-the-art.

7 A Method In Software Risk Management Modeling Using Iterative Controlled Evaluation
Sunil Kumar Reddy. K, Rama Krishna Reddy. K, Varun Kumar Reddy. G

Abstract—Every software development project has unique demands, both in terms of project specific features and mostly tacit customer/user expectations. The software developed under requirement engineering will satisfy the users mostly on their perspective. So, recent researches are concentrating on the software development and analysis based on requirement engineering. The requirement engineering processes are also challenged by the risks in developing the software. So an efficient risk analysis system and risk management system is inevitable for the software development process under requirement engineering .A project commonly contains a significant amount of uncertainties, such as continuous change of project scope to accommodate the latest market demand, requirements evolution, imprecise estimation of budget and schedule and high system complexity. Software risk management can be used as an effective tool to manage these risks and to reason under the high degree of the involved uncertainties (Stoica, 1999a; Stoica 1999b; Stoica, 2004). There is still a lack of comprehensive guidelines on how to integrate risk management activities at the early development stage. This study presents SMMICE - SOFTWARE RISK MANAGEMENT MODELING ITERATIVE CONTROLLED EVALUATION integrates from early stage of development in particular from the requirements engineering phase. The early integration supports assessment and management of risks related to the project execution, development environment, operational constraints and project stakeholders even before elicitation of the system requirements. We empirically evaluate the usefulness of SMMICE into active ongoing software development project. Our results show that GSRM is a pro-active risk management approach which effectively contributes for a successful software project completion.