Tag Archives: computer science

www.ijorcs.org – White Globe Publications is BLACKLISTED BY MOST Universities WORLDWIDE

Avoid damaging your academic career. Do not associate in any way your name with: http://www.ijorcs.org

International Journal of Research in Computer Scienc – http://www.ijorcs.org

IJORCS.org is a low-quality journal with NO REVIEW at all.

OWNER is Mr Gursharan Singh, #1675, St.12, Dashmesh Nagar, Gill Road, Ludhiana – 141003, Punjab, India

Not sure? Simply send them him (that is, Mr Gursharan Singh) multiple “Scigen papers” (for those who don’t know what Scigen papers are just google it) and in a week or two, you will receive an acceptance email asking you to pay and publish.

We send them 1 Scigen paper (“The Effect of Modular Methodologies on Networking“) and 1 absolutely stupid paper (“Bridging the Gap between Network Protocol and Protocol Network in ASCII Mode“) and both were accepted for publications!!!

Paying for Open-Access publications is not wrong, since the journal needs to be profitable to be able to survive and continue to serve the scientific community, BUT where to pay is important.

Please STOP these people who just set up websites in minutes by copy and paste other websites and starts making money for non-reviewed research articles.

White Globe Publications is from Ludhiana, Punjab, India, telephone numbers of the owner of the website, reviewer and editor is +91-8054039690, +91-9780335152.

Email address: editor@ijorcs.org, queries@ijorcs.org

The website domain was registered on 16th September 2011, that is, is some 3 months old.

It is SAD that the following list of publications have no value and this will impact negatively the authors:

IEEE-754 compliant Algorithms for Fast Multiplication of Double Precision Floating Point Numbers

Author: Geetanjali Wasson                  Published Date: 2011-09-29

In image and signal processing applications floating-point multiplication is major concern in calculations. Performing multiplication on floating point data is a long course of action and requires huge quantity of processing time. By improving the speed of multiplication task overall speed of the system can be enhanced. The Bottleneck in the floating point multiplication process is the multiplication of mantissas which needs 53*53 bit integer multiplier for double precision floating point numbers. By improving the speed of multiplication task the overall speed of the system can be improved. In this paper a comparison on the existing trends in mantissa multiplication is made. Vedic and Canonic Signed digit algorithms were compared on parameters like speed, complexity of routing, pipelining, resource required on FPGA. The comparison showed that Canonic Signed Digit Algorithm is better than Vedic algorithm in terms of speed and resources required on spartan3 FPGA.

Efficiently Delivering Data Packets Using Distributed Protocol for Runtime Groups Formed In Peer-to-Peer Network

Author: Yasa Ramya, Bhagyalaxmi                  Published Date: 2011-09-29

Peer-to-Peer streaming has been widely used over the internet, where a streaming system usually has multiple channels and peers may form multiple groups for content distribution. In this paper, we propose a distributed overlay framework called SMesh (subset-mesh) for dynamic groups where users may frequently hop from one group to another. SMesh first builds a relatively stable mesh consisting of all hosts for control messaging. The mesh supports dynamic host joining and leaving, and construction of delivery trees. Using the Delaunay Triangulation protocol as an example, we show how to construct an efficient mesh with low maintenance cost. We also study about various tree constructions based on the mesh, including embedded, bypass, and intermediate trees.

Free Space Optics: Atmospheric Effects and Back Up

Author: Gurdeep Singh, Tanvir Singh                  Published Date: 2011-09-29

The Free space optical communication technology tries to fulfill rising need for high bandwidth transmission capability link along with security and ease in installation. Due to their high carrier frequency in the range of 300 THz, it provides highest data rates of 2.5 Gbps which can be increased to 10 Gbps using Wavelength Division Multiplexing (WDM). FSO link is license free, secure, and easily deployable and offers low bit error rate link. These features motivate to use FSO as a solution to last mile access. Along with these attractive features of FSO, a well-known disadvantage of (FSO) is its sensitivity on local weather conditions which results in loss of optical signal power. In this paper we will discuss performance analysis of FSO in different weather conditions.

Feature Based Method for Human Facial Emotion Detection using Optical Flow Based Analysis

Author: Pooja Sharma                  Published Date: 2011-09-29

Computer has been widely deployed to our daily lives, but human computer interaction still lacks intuition. Researchers intend to resolve these shortcomings by augmenting traditional systems with human like interaction mechanism. Today, dedicated hardware often infers the emotional state from human body measures. These have been a considerable amount of research done into the detection and implicit communication channels, including facial expressions. Most studies have extracted facial features for some specific emotions in specific situations. In this paper we uses a feature point tracking technique applied to five facial image regions to capture basic emotions. The used database contains 219 images, 10 Japanese female, six expressions and one neutral. We use grayscale images which are ethically not diverse. We use optical flow based analysis to detect emotions from human facial image data. Our proof of data demonstrates the feasibility of our approach and shows promising for integration into various applications.

Prostate Boundary Detection from Ultrasound Images using Ant Colony Optimization

Author: Vikas Wasson                  Published Date: 2011-09-29

Prostate Cancer & diseases is quite common in elderly men. Early detection of prostate cancer is very essential for the success of treatment. In the diagnosis & treatment of prostate diseases, prostate boundary detection from sonography images plays a key role. However, because of the poor image quality of ultra sonograms, prostate boundary detection is still difficult & challenging task & no efficient & consistent solution has yet been found. For improving the efficiency, they need is to automate the boundary detection process for which number of methods has been proposed. In this paper, a new method based on Ant Colony Optimization is proposed, which will increase efficiency & minimize user involvement in prostate boundary detection from ultrasound images.

Digital Watermarking Trends

Author: Sarabjeet Singh                  Published Date: 2011-09-29

Digital Watermarking is the technique used by researchers to hide user defined information along with important information that may be visible or invisible depending upon the requirements of the user. Now Digital Watermarking is concerned with the ownership of the information. Absence of Digital Watermark in the information results in loss of revenue. The Digital Watermark packed with the information should be inseparable. This paper will present here the different tr ends that are followed in the digital watermarking.

Secure Data Storage In Cloud Computing

Author: B. Shwetha Bindu                  Published Date: 2011-09-29

Cloud computing has gained a lot of hype in the current world of I.T. Cloud computing is said to be the next big thing in the computer world after the internet. Cloud computing is the use of the Internet for the tasks performed on the computer and it is visualized as the next- generation architecture of IT Enterprise. The ‘Cloud’ represents the internet. Cloud computing is related to several technologies and the convergence of various technologies has emerged to be called cloud computing. In comparison to conventional ways Cloud Computing moves application software and databases to the large data centers, where the data and services will not be fully trustworthy. In this article, I focus on secure data storage in cloud; it is an important aspect of Quality of Service. To ensure the correctness of users’ data in the cloud, I propose an effectual and adaptable scheme with salient qualities. This scheme achieves the data storage correctness, allow the authenticated user to access the data and data error localization, i.e., the identification of misbehaving servers.

Fast IP Network Recovery using MRC

Author: T.K Rajesh                  Published Date: 2011-09-29

Internet takes vital role in our communications infrastructure, due to slow convergence of routing protocols after network failure become a budding problem. To assure fast recovery scheme from link and node failure in networks, we present a new recovery scheme called Multiple Routing Configuration (MRC). Our anticipated scheme guarantees recovery in all single failure scenarios, using a mechanism to handle both link and node failures, and without knowing the root cause of the failure. MRC is strictly connectionless, and assumes only destination based hop-by-hop forwarding. MRC is based on keeping additional routing information in the routers, and allows packet forwarding to continue on an alternative output link immediately after the detection of a failure. In this paper we present MRC, and analyze its performance with respect to load distribution after a failure. We also show how an estimate of the traffic demands in the network can be used to improve the distribution of the recovered traffic, and thus reduce the chances of congestion when MRC is used.