CINXE.COM
International Journal of Computer Science & Information Technology (IJCSIT)
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <style type="text/css"> ul li a{ font-weight:bold; color:#000; list-style:none; text-decoration:none; size:10px;} .imagess { height:90px; text-align:left; margin:0px 5px 2px 8px; float:right; border:none; } a:visited { color:#60F; } ul.current { margin:0;background:url(images/current.png) top left; padding:0; } ul.current li { list-style:none; font-family:'CALIBRI',Calibri; font-size:14px; color:#006;white-space:normal; font-weight:bold; margin-top:0px; padding-top:8px; padding-bottom:8px; text-align:justify; } ul.current li a { font-size:14px; padding-left:5px; } ul.current li span { font-size:14px; color:#000; font-weight:normal; text-align:justify; } .current_style { border-top:#ccc 1px solid; margin:0px 3px 0px 3px; background:#FaFaFa; border-right:#ccc 1px solid; border-left:#ccc 1px solid;border-bottom:#ccc 1px solid; } .odd { background:#eceaea; border-top:1px solid #fafafa; border-bottom:1px solid #dfdfdf; margin-left:5px; text-align:justify; } .odd p{ background:url(images/bg3.gif) repeat; height:30px; color:#ffffff; font-weight:bold; } .even { background:#fafafa; margin-left:5px; text-align:justify; } .even p{ background:url(images/bg3.gif) repeat; height:30px; color:#ffffff; } h5 {margin-top:0px; background:#449be4; height:25px; margin-bottom:0px; padding-left:2px; margin-left:3px; border-top:#ccc 1px solid; border-right:#ccc 1px solid; border-left:#ccc 1px solid; margin-right:3px; padding-top:2px; color:#FFF; } h5 a { color:#7c0b0b; text-decoration:none;font-family:calibri; font-size:15px; } #sidebar_right li{ list-style:none;} </style> <link rel="icon" type="image/ico" href="http://airccse.org/2014/adco/logo.ico"/> <title>International Journal of Computer Science & Information Technology (IJCSIT)</title> <link rel="stylesheet" type="text/css" href="current.css" /> </head> <body> <div id="wap"> <div id="page"> <div id="top"> <table width="100%" cellspacing="0" cellpadding="0" > <tr><td colspan="3" valign="top"><img src="top3.gif" /></td></tr> </table> </div> <div id="menu"> <a href="ijcsit.html">Home</a> <a href="eboard.html">Editorial</a> <a href="ijcsit2024_curr.html">Current Issue</a> <a href="papersub.html">Submission</a> <a href="jcsit_index.html">Indexing</a> <a href="specialissue.html">Special Issue</a> <a href="contacts.html">Contacts</a> <a href="http://airccse.org/" target="blank">AIRCC</a></div> <div id="content"> <div id="left"> <h2>IJCSIT - MOST CITED - Top 10 PAPERS</h2> <div class="current_style"> <ul class="current"> <li class="odd"><h2>1. <a href="http://airccse.org/journal/jcsit/0211ijcsit03.pdf" target="_blank"><font color="#FFFFFF">Diagonal Based Feature Extraction for Handwritten Alphabets Recognition System Using Neural Network</font></a></h2> <b>J.Pradeep, E.Srinivasan and S.Himavathi</b> <br/> <b><font color="#FF0000">February 2011 | Cited by 160</font></b><br /><br/> <span style="text-align:justify;">An off-line handwritten alphabetical character recognition system using multilayer feed forward neural network is described in the paper. A new method, called, diagonal based feature extraction is introduced for extracting the features of the handwritten alphabets. Fifty data sets, each containing 26 alphabets written by various people, are used for training the neural network and 570 different handwritten alphabetical characters are used for testing. The proposed recognition system performs quite well yielding higher levels of recognition accuracy compared to the systems employing the conventional horizontal and vertical methods of feature extraction. This system will be suitable for converting handwritten documents into structural text form and recognizing handwritten names.</span></li> <li class="even"><h2>2. <a href="http://airccse.org/journal/jcsit/0203csit8.pdf" target="_blank"><font color="#FFFFFF">A Novel Technique for Image Steganography Based on Block-DCT and Huffman Encoding</font></a></h2> <b>A.Nag, S.Biswas, D.Sarkar and P.P.Sarka</b><br/> <b><font color="#FF0000">June 2010 | Cited by 159</font></b><br /><br/> <span>Image steganography is the art of hiding information into a cover image. This paper presents a novel technique for Image steganography based on Block-DCT, where DCT is used to transform original image (cover image) blocks from spatial domain to frequency domain. Firstly a gray level image of size M � N is divided into no joint 8 � 8 blocks and a two dimensional Discrete Cosine Transform(2-d DCT) is performed on each of the P = MN / 64 blocks. Then Huffman encoding is also performed on the secret messages/images before embedding and each bit of Huffman code of secret message/image is embedded in the frequency domain by altering the least significant bit of each of the DCT coefficients of cover image blocks. The experimental results show that the algorithm has a high capacity and a good invisibility. Moreover PSNR of cover image with stego-image shows the better results in comparison with other existing steganography approaches. Furthermore, satisfactory security is maintained since the secret message/image cannot be extracted without knowing decoding rules and Huffman table. </span></li> <li class="odd"><h2>3. <a href="http://airccse.org/journal/jcsit/1211csit20.pdf" target="_blank"><font color="#FFFFFF">Edge Detection Techniques for Image Segmentation</font></a></h2> <b>Muthukrishnan.R and M.Radha</b><br/> <b><font color="#FF0000">June 2011 | Cited by 114</font></b><br /><br/> <span style="text-align:justify;">Interpretation of image contents is one of the objectives in computer vision specifically in image processing. In this era it has received much awareness of researchers. In image interpretation the partition of the image into object and background is a severe step. Segmentation separates an image into its component regions or objects. Image segmentation t needs to segment the object from the background to read the image properly and identify the content of the image carefully. In this context, edge detection is a fundamental tool for image segmentation. In this paper an attempt is made to study the performance of most commonly used edge detection techniques for image segmentation and also the comparison of these techniques is carried out with an experiment by using MATLAB software. </span></li> <li class="even"><h2>4. <a href="http://airccse.org/journal/jcsit/1211csit06.pdf" target="_blank"><font color="#FFFFFF">Hybrid GPS-GSM Localization of Automobile Tracking System</font></a></h2> <b>Mohammad A. Al-Khedher</b><br/> <b><font color="#FF0000">December 2011 | Cited by 110</font></b><br /><br /> <span style="text-align:justify;">An integrated GPS-GSM system is proposed to track vehicles using Google Earth application. The remote module has a GPS mounted on the moving vehicle to identify its current position, and to be transferred by GSM with other parameters acquired by the automobile�s data port as an SMS to a recipient station. The received GPS coordinates are filtered using a Kalman filter to enhance the accuracy of measured position. After data processing, Google Earth application is used to view the current location and status of each vehicle. This goal of this system is to manage fleet, police automobiles distribution and car theft cautions. </span></li> <li class="odd"><h2>5. <a href="http://airccse.org/journal/jcsit/1210ijcsit14.pdf" target="_blank"><font color="#FFFFFF">Segmentation and Object Recognition Using Edge Detection Techniques</font></a></h2> <b>Y.Ramadevi, T.Sridevi, B.Poornima and B.Kalyani</b><br/> <b><font color="#FF0000">December 2010 | Cited by 102</font></b><br /><br /> <span style="text-align:justify;">Image segmentation is to partition an image into meaningful regions with respect to a particular application. Object recognition is the task of finding a given object in an image or video sequence. In this paper, interaction between image segmentation (using different edge detection methods) and object recognition are discussed. Edge detection methods such as Sobel, Prewitt, Roberts, Canny, Laplacian of Guassian(LoG) are used for segmenting the image. Expectation-Maximization (EM) algorithm, OSTU and Genetic algorithms were used to demonstrate the synergy between the segmented images and object recognition. </span></li> <li class="even"><p>6. <a href="http://airccse.org/journal/jcsit/5313ijcsit06.pdf" target="_blank"><font color="#FFFFFF">Security Threats on Cloud Computing Vulnerabilities</font></a></p> <b>Te-Shun Chou</b><br/> <b><font color="#FF0000">June 2013 | Cited by 98</font></b><br /><br /> <span style="text-align:justify;">Clouds provide a powerful computing platform that enables individuals and organizations to perform variety levels of tasks such as: use of online storage space, adoption of business applications, development of customized computer software, and creation of a �realistic� network environment. In previous years, the number of people using cloud services has dramatically increased and lots of data has been stored in cloud computing environments. In the meantime, data breaches to cloud services are also increasing every year due to hackers who are always trying to exploit the security vulnerabilities of the architecture of cloud. In this paper, three cloud service models were compared; cloud security risks and threats were investigated based on the nature of the cloud service models. Real world cloud attacks were included to demonstrate the techniques that hackers used against cloud computing systems. In addition, countermeasures to cloud security breaches are presented.</span></li> <li class="odd"><h2>7. <a href="http://airccse.org/journal/jcsit/0611csit02.pdf" target="_blank"><font color="#FFFFFF">Common Phases of Computer Forensics Investigation Models</font></a></h2> <b>Yunus Yusoff, Roslan Ismail and Zainuddin Hassan</b><br/> <b><font color="#FF0000">June 2011 | Cited by 96</font></b><br /><br /> <span style="text-align:justify;">The increasing criminal activities using digital information as the means or targets warrant for a structured manner in dealing with them. Since 1984 when a formalized process been introduced, a great number of new and improved computer forensic investigation processes have been developed. In this paper, we reviewed a few selected investigation processes that have been produced throughout the years and then identified the commonly shared processes. Hopefully, with the identification of the commonly shard process, it would make it easier for the new users to understand the processes and also to serve as the basic underlying concept for the development of a new set of processes. Based on the commonly shared processes, we proposed a generic computer forensics investigation model, known as GCFIM. </span></li> <li class="even"><h2>8. <a href="http://airccse.org/journal/jcsit/6314ijcsit03.pdf" target="_blank"><font color="#FFFFFF">Performance Analysis of Wind Turbine as a Distributed Generation Unit in Distribution System</font></a></h2> <b>Ramadoni Syahputra, Imam Robandi and Mochamad Ashar</b><br/> <b><font color="#FF0000">June 2014 | Cited by 75</font></b><br /><br /> <span style="text-align:justify;">In this paper, the performance analysis of wind turbine as a distributed generation unit is presented. In this study a model of wind power is driven by an induction machine. Wind power that is distributed generation is capable of supplying power to ac power distribution network. Wind power generation system is modeled and simulated using Matlab Simulink software such that it can be suitable for modeling some kind of induction generator configurations. To analyze more deeply the performance of the wind turbine system, both normal and fault conditions scenarios have been applied. Simulation results prove the excellent performance of the wind power unit under normal and fault conditions in the power distribution system. </span></li> <li class="odd"><h2>9. <a href="http://airccse.org/journal/jcsit/0412csit05.pdf" target="_blank"><font color="#FFFFFF">Fuzzy Multi-Objective Approach for the Improvement of Distribution Network Efficiency by Considering DG</font></a></h2> <b>Ramadoni Syahputra</b><br/> <b><font color="#FF0000">April 2012 | Cited by 74</font></b><br /><br /> <span style="text-align:justify;">This paper presents a fuzzy multi-objective approach for achieving the minimum active power loss and the maximum voltage magnitude in order to improve the efficiency of radial distribution networks with distributed generations. Multi-objective function are considered for load balancing among the feeders, minimization of the real power loss, deviation of nodes voltage, and branch current constraint violation, while subject to a radial network structure in which all loads must be energized. Originality of the research is that the fuzzy-based multi-objective optimization in reconfiguration of distribution network including the distributed generation in order to improve the efficiency of the networks. The implementation of the fuzzy multi-objective for distribution reconfiguration on a 70 nodes distribution network with distributed generation is described. The original efficiency of the network is 95.142%. The simulation results show that efficiency of the network is increased to 96.942% by using fuzzy multiobjective method. </span></li> <li class="even"><h2>10. <a href="http://airccse.org/journal/jcsit/0211ijcsit09.pdf" target="_blank"><font color="#FFFFFF">Adaptive Fuzzy Filtering for Artifact Reduction in Compressed Images and Videos</font></a></h2> <b>P.Ramakrishna Rao, B.Addai, G.Ramakrishna and T.PanduRanga Vital</b><br/> <b><font color="#FF0000">February 2011 | Cited by 72</font></b><br /><br /> <span style="text-align:justify;">In this paper, spatial neighboring pixels are used to deal with blocking and ringing artifacts while temporal neighboring pixels are utilized to remove mosquito and flickering artifacts. To avoid the blurring effect of linear filters, a fuzzy filter is implemented. Fuzzy filter is a specific case of bilateral filters [15], [16]. Fuzzy filters help denoising the artifacts while retaining the sharpness of real edges. In image and video compression, the artifacts such as blocking or ringing artifacts are spatially directional and flickering artifacts are temporally directional. For compressed video sequences, the motion compensated spatiotemporal filter (MCSTF) is applied to intraframe and interframe pixels to deal with both spatial and temporal artifacts. In this work, a novel fuzzy filter is proposed to adapt to the pixel�s activity and directions between the pixel of interest and its surrounding pixels. </span></li> </ul></div> </div> </div> <div id="right"> <div class="menu_right"> <ul><li id="id"><a href="ijcsit.html">Scope & Topics</a></li> <li><a href="http://airccse.org/ethics.html" target="_blank">Ethics</a></li> <li><a href="ijcsit2016_curr.html">Current Issue</a></li> <li><a href="csit_archives.html">Archives</a></li> <li><a href="papersub.html">Paper Submission</a></li> <li><a href="ijcsit_cited.html">Most Cited Articles</a></li> <li><a href="specialissue.html">Special Issue</a></li> <li><a href="http://airccse.org/journal/IJCSITleaflet.pdf">Download leaflet</a></li> <li><a href="http://airccse.org/faq.html" target="_blank">FAQ</a></li> </ul> </div><br /> <p align="center"> </p> <p align="center"> </p> </div> <div class="clear"></div> <div id="footer"><table width="100%" ><tr><td height="25" colspan="2"><br /><p align="center">© 2016 AIRCC Publishing Corporation</p></td></table> </div> </div> </div> </div> </body> </html>