Enhanced Representation Of Data Flow Anomaly Detection For Teaching Evaluation

Size: px
Start display at page:

Download "Enhanced Representation Of Data Flow Anomaly Detection For Teaching Evaluation"

Transcription

1 Enhanced Representation Of Data Flow Anomaly Detection For Teaching Evaluation T.Mamatha A.BalaRam Asst.Prof. in Dept. of CSE Assoc.Prof. in Dept of CSE SreeNidhi Institute of Science & Technology CMR Institute of Technology Yamnampet, Ghatkesar,Hyderabad, TS,INDIA-5030 Medchal, Hyderabad,TS,India Dr. D.S.R. Murthy Prof. & Head of CSE Geethanjali College of Engg & Tech Hyderabad-5030-TS-INDIA ABSTRACT In this paper we propose three letter sequence of action for dataflow anomaly detection and representing data flow model for each data object. When we represent the CFG for data object, it is not giving the information that the object is used for which purpose(whether for calculation, predicate or redefined) so we extend the representation for more understanding and also given the DFD for all possible situation for normal flow and anomaly flow. KEYWORDS:. Data Flow Testing, Data flow Anomaly Detection, Data flow model, control flow graph. INTRODUCTION Data-flow testing is the name given to a family of test strategies based on selecting paths through the program s control flow in order to explore sequences of events related to the status of data objects. For example, pick enough paths to assure that every data item has been initialized prior to its use, or that all objects have been used for something, if not then it is anomalous. Anomaly, it is an abnormal way of doing something. Example: x = f(y); x = f2(z); The second definition of x overrides the first Three types of abnormal situations with using variable. Type : Defined and then defined again N.Archana Asst.Prof. in Dept of CSE Sreenidhi Institute of Science & Technology Yamnampe, Ghatkesar, Hyderabad,TS,INDIA-30 archana.nagelli@gmail.com Type 2: Undefined but referenced Type 3: Defined but not referenced In such situations. When your representing Data Flow Anomalies for two letter sequence of actions. as below. We face some difficulties in understand the concept. dd : harmless, suspicious dk : probably a bug. du : normal kd : normal kk : harmless, but probably a bug ku : a bug ud : normal. Redefinition. uk : normal uu : normal When you consider the situation ud, here it indicates that the object is used and redefined. but we have to assume that the object is defined already. For dk, here the data object is defined and killed without using. ud, here object is used and refined but it is not showing whether object is defined or not. so assumption is eliminated in our paper. We elaborated the representation so that it is Page 292

2 very easy to understand and with a little practice, reasonably quick and straightforward to develop. Program actions are represented by d,k and u as below: Program Actions (d, k, u): Defined (created) - explicitly or implicitly(d) Killed (released ) - directly or indirectly (k) Used In a calculation - (c) In a predicate - (p) - directly(or)indirectly (u) 2. THREE LETTER SEQUENCE OF ACTIONS When your using data object for some purpose and representing using control flow graph or Data flow graph, It is not showing that whether the data object is used for calculation purpose, predicate purpose or for redefining. Here we extend the representation by using the notation as follows. D is for Defined, initialized or created (explicitlyor implicitly) o Redefined - Dr K is for killed or released (directly or indirectly) U for Usage o In calculation - Uc o In Predicate - Up Uc : Represents that object or variable is used for calculation purpose Up :Represents that object or variable is used for Predicate purpose. Dr : Represents that the object or variable is redefined The task or action to be performed on the object or variable is denoted by d,k and u( d for define, u for usage and k for killing). It follow sequence of task like first it should be defined then used for some purpose, lastly it can kill. indicates the nothing is happened on the current time Example: d-k indicates that object is defined and killed without using the object for any purpose. It giving more understanding of what happened to data object or variable. 2. Proposed Three letter sequence of Actions(d,u,k) : duk - normal duu - normal dku - Anomaly dkd - Probably a bug ddu - normal dud - normal udk - Anomaly ukd - Anomaly udd - Anomaly ukk - Anomaly uuk - Anomaly kdu - harmless, but suspicious kkk - Harmless kud - Anomaly kuu - Anomaly kdu - probably a Anomaly ddd - harmless but suspicious Leading dash and Trailing dash means, nothing happened form entry to current and trailing dash to mean nothing happened after that point. d- - - Harmless, Suspicious, defined but not used for any purpose after that point du- - Normal, Defined and used for some Purpose. d-k - Probably a Bug, Defined but Without using killed the object. -uk - Bug, Without Defining object is Used for calculation/predicate and killed 3. REPRESENTATION OF DATA OBJECT USING CONTROL FLOW GRAPH Constructing a simplified control flow graph from the given structured code is: Create a simplified flow graph for code given. For More understanding, Constructed flow graph for each data object and mentioned whether object is used for predicate purpose or Calculation Purpose. Example: an Z = b a - Page 293

3 START INPUT a, b, n Z := 0 IF a = THEN Z := GOTO DONE r := c := POWER: c := c * a r := r + IF r <= n THEN Z := (c ) / (a ) DONE: Z := b + Z GO TO POWER END Fig : simplified flow graph for above program Fig 3: Control flow graph for the object c: c:= z:=(c-)/(a-), u c c:=c*a, u c Fig 4: Control flow graph for the object r: Read a,b,n Z=0 Z:= Z:=b+z 2 a:=? 5 6 P Y c:= r:= Z:=(c-)/ (a-) P2 Y r:=r+, c:=c*a r<n? r:= r:=r+ r<n, u p Fig 5: control flow graph for the object b: 3. Control Flow Graph for Each Data Object: Read b z:=b+z Fig 2: control flow graph for the object Z: u c hgfhf z=0 z:= z :=b+z Z:= (c -)/(a-), u c 3 4 Fig 6: control flow graph for the object n: Page 294

4 Read n Fig 7:control flow graph for the object a: r<n, u p 5. CONCLUSION The main objective of this enhancement is for better understanding of the data object usage. When the object is defined(d), but not yet used(u) or killed(k) It becomes anomalous, this kind of representation with two letter sequence have not proper understanding. So we extend the representation for more understanding. We propose flow graph for each data object to show how the object is used after it is defined. And finally we depict State graph, shows the anomalous states and some Normal states. Read a a:= 6. REFERENCES c:=c*a, u c z:=(c-)/(a-), u c 4. DATA FLOW ANOMALY STATE GRAPH u u u ukk udd udk uuk ukd duu duk dkd kdu ddu dud udk dku []. Software Testing Techniques, Boris Beizer, 2 nd Edition,Dream Tech Press. [2]LEE J. WHITE, BOGDAN WISZNIEWSKI Path Testing of Computer Programs withloops using a Tool for Simple Loop Patterns - SOFTWARE PRACTICE AND EXPERIENCE, VOL. 2(0) (OCTOBER 99) [3] Philipp Hoschka, Christian Huitema Control flow graph analysis for automatic fast path implementation Published in: Proceedings «Second IEEE Workshop on the Architecture and Implementation of High Performance Communication Subsystems», Williamsburg, Virginia Sep [3] Bender, R.A., and Potorff, E.L. Basic testing: a dataflow analysis techniques. IBM System Development Division, Poughkeepsie Laboratory. [4] Clarke, L.A., Podgurski, A.,Richardson, D.J., and Zeil, S.J.A Comparison of data flow path selection criteria. IEEE Transactions on Software Engineering(985) [5]. Clarke, L.A., Podgurski, A.,Richardson, D.J., and Zeil, S.J.An Investigation of data flow path selection criteria. Workshop on Software Testing, Banff, Canada,986 [6] Fran Berman, Andrew Chien, Keith Cooper, Jack Dongarra, Ian Foster, Dennis Gannon, Lennart Johnsson, Ken Kennedy, Carl Kesselman, John Mellor-Crummey, Dan Reed, Linda Torczon, and Rich Wolski. The grads project: Software support for high-level grid application Development. Inernational Journal of High Performance Computing Applications, 5(4), Winter Page 295

5 [7]. Preston Briggs. Drawing control-flow graphs with style. July 994. Authors Mrs. N.Archana, Working as an Assistant Professor in Dept of C.S.E of sreenidhi Institute of Science & Technology. M.Tech in Software Engineering from JNTU, Hyderabad. B.Tech in C.S.E from JNTUH. She has more than 8 yrs of experience. Her Area of Interest is Wireless Sensor Network & Information Security Mrs. T.Mamatha, Working as an Assistant Professor in Dept of C.S.E of sreenidhi Institute of Science & Technology. M.Tech in Software Engineering from JNTU, Anantapur. B.Tech in C.S.E from JNTUH. Her Area of Interest is Software Engineering & Software Testing. Mr. A. Balaram working as Associate Professor in the Dept. Of Computer Science and Engineering, CMR Institute of Technology, Hyderabad, India. He has more than 0 years of teaching experience.. His research interests are Software Engineering, Image Processing, Net work Security and Cryptography. Dr. D. S. R. Murthy is currently working as a Professor & Head of the Dept of CSE in Geethanjali college of Engineering and Technology since June 204. Earlier he worked as a professor of Information Technology in Sreenidhi Institute of science and Technology from OCT 2004 to JUNE 20. Prior to that he was in NIT Warangal JNTUCE, Anantapur and ICFAI in different faculty positions of Computer Science. He is a Fellow of IETE, Senior Life Engineer (EI(I) & IETE). He published a text book on C Programming & Data Structures. His research interests are Image Processing, Image Cryptography and Data Mining. Page 296

Topics in Data-Flow Testing

Topics in Data-Flow Testing Dependable Software Systems Topics in Data-Flow Testing Material drawn from [Beizer] Courtesy Spiros Mancoridis Data-Flow Testing Data-flow testing uses the control flowgraph to explore the unreasonable

More information

High Performance Computing. Without a Degree in Computer Science

High Performance Computing. Without a Degree in Computer Science High Performance Computing Without a Degree in Computer Science Smalley s Top Ten 1. energy 2. water 3. food 4. environment 5. poverty 6. terrorism and war 7. disease 8. education 9. democracy 10. population

More information

Component Architectures

Component Architectures Component Architectures Rapid Prototyping in a Networked Environment Ken Kennedy Rice University http://www.cs.rice.edu/~ken/presentations/lacsicomponentssv01.pdf Participants Ruth Aydt Bradley Broom Zoran

More information

Grid Application Development Software

Grid Application Development Software Grid Application Development Software Department of Computer Science University of Houston, Houston, Texas GrADS Vision Goals Approach Status http://www.hipersoft.cs.rice.edu/grads GrADS Team (PIs) Ken

More information

K Anup Kumar et al,int.j.comp.tech.appl,vol 3 (1), 32-39

K Anup Kumar et al,int.j.comp.tech.appl,vol 3 (1), 32-39 A Modified Feistel Cipher Involving a Key as a Multiplicant on Both the Sides of the Plaintext Matrix and Supplemented with Mixing, Permutation, and Modular Arithmetic Addition 1 V.U.K. Sastry, 2 K. Anup

More information

EFFECTIVE EFFICIENT BOOLEAN RETRIEVAL

EFFECTIVE EFFICIENT BOOLEAN RETRIEVAL EFFECTIVE EFFICIENT BOOLEAN RETRIEVAL J Naveen Kumar 1, Dr. M. Janga Reddy 2 1 jnaveenkumar6@gmail.com, 2 pricipalcmrit@gmail.com 1 M.Tech Student, Department of Computer Science, CMR Institute of Technology,

More information

Biological Sequence Alignment On The Computational Grid Using The Grads Framework

Biological Sequence Alignment On The Computational Grid Using The Grads Framework Biological Sequence Alignment On The Computational Grid Using The Grads Framework Asim YarKhan (yarkhan@cs.utk.edu) Computer Science Department, University of Tennessee Jack J. Dongarra (dongarra@cs.utk.edu)

More information

Toward a Framework for Preparing and Executing Adaptive Grid Programs

Toward a Framework for Preparing and Executing Adaptive Grid Programs Toward a Framework for Preparing and Executing Adaptive Grid Programs Ken Kennedy α, Mark Mazina, John Mellor-Crummey, Keith Cooper, Linda Torczon Rice University Fran Berman, Andrew Chien, Holly Dail,

More information

Dataflow Testing. Definitions 2

Dataflow Testing. Definitions 2 Dataflow Testing Dataflow Analysis Can reveal interesting bugs Dataflow Testing Chapter 9 Testing All-Nodes and All-Edges in a control flow graph may miss significant test cases Testing All-Paths in a

More information

Dataflow Testing. Dataflow Testing. Dataflow Analysis. Definitions. Definitions 2. Definitions 3

Dataflow Testing. Dataflow Testing. Dataflow Analysis. Definitions. Definitions 2. Definitions 3 Dataflow Testing Dataflow Testing Testing All-Nodes and All-Edges in a control flow graph may miss significant test cases Testing All-Paths in a control flow graph is often too timeconsuming Chapter 9

More information

Why Performance Models Matter for Grid Computing

Why Performance Models Matter for Grid Computing Why Performance Models Matter for Grid Computing Ken Kennedy 1 Rice University ken@rice.edu 1 Introduction Global heterogeneous computing, often referred to as the Grid [5, 6], is a popular emerging computing

More information

Dataflow Testing. Chapter 9!

Dataflow Testing. Chapter 9! Dataflow Testing Chapter 9! Dataflow Testing Testing All-Nodes and All-Edges in a control flow graph may miss significant test cases! Testing All-Paths in a control flow graph is often too timeconsuming!

More information

Experiments with Scheduling Using Simulated Annealing in a Grid Environment

Experiments with Scheduling Using Simulated Annealing in a Grid Environment Experiments with Scheduling Using Simulated Annealing in a Grid Environment Asim YarKhan Computer Science Department University of Tennessee yarkhan@cs.utk.edu Jack J. Dongarra Computer Science Department

More information

Secure data accumulation by ant agents in wireless sensor network using randomized dispersive routing Mechanism U.Moulali 1 2 N.

Secure data accumulation by ant agents in wireless sensor network using randomized dispersive routing Mechanism U.Moulali 1 2 N. Secure data accumulation by ant agents in wireless sensor network using randomized dispersive routing Mechanism U.Moulali 1 2 N.Sainath 1 Sr.Asst Prof, Dept. of CSE, QISCET, Ongole, India moulali.u@gmail.com

More information

A Novel Architecture of Parallel Multiplier Using Modified Booth s Recoding Unit and Adder for Signed and Unsigned Numbers

A Novel Architecture of Parallel Multiplier Using Modified Booth s Recoding Unit and Adder for Signed and Unsigned Numbers International Journal of Research Studies in Science, Engineering and Technology Volume 2, Issue 8, August 2015, PP 55-61 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Architecture of Parallel

More information

A Distributed k-secure Sum Protocol for Secure Multi-Party Computations

A Distributed k-secure Sum Protocol for Secure Multi-Party Computations HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/ A Distributed k-secure Sum Protocol for Secure Multi-Party Computations Rashid Sheikh, Beerendra Kumar, Durgesh Kumar Mishra 68 Abstract Secure sum computation

More information

Design of Dual Port SDRAM Controller with Time Slot Register

Design of Dual Port SDRAM Controller with Time Slot Register International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 8, Issue 2 (August 2013), PP.76-81 Design of Dual Port SDRAM Controller with Time

More information

Dataflow Testing. Chapter 10!

Dataflow Testing. Chapter 10! Dataflow Testing Chapter 10! Dataflow Testing Testing All-Nodes and All-Edges in a control flow graph may miss significant test cases! Testing All-Paths in a control flow graph is often too timeconsuming!

More information

ISSN: (Online) Volume 2, Issue 3, March 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: (Online) Volume 2, Issue 3, March 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 2, Issue 3, March 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com

More information

Dr. V.U.K.Sastry Professor (CSE Dept), Dean (R&D) SreeNidhi Institute of Science & Technology, SNIST Hyderabad, India

Dr. V.U.K.Sastry Professor (CSE Dept), Dean (R&D) SreeNidhi Institute of Science & Technology, SNIST Hyderabad, India Vol., No., A Block Cipher Involving a Key Bunch Matrix an Additional Key Matrix, Supplemented with Modular Arithmetic Addition supported by Key-based Substitution Dr. V.U.K.Sastry Professor (CSE Dept),

More information

Grid Computing: Application Development

Grid Computing: Application Development Grid Computing: Application Development Lennart Johnsson Department of Computer Science and the Texas Learning and Computation Center University of Houston Houston, TX Department of Numerical Analysis

More information

Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks

Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks 1 Chiranjeevi Rampilla, 2 Pallikonda Anil Kumar, 1 Student, DEPT.OF CSE, PVPSIT, KANURU, VIJAYAWADA. 2 Asst.Professor, DEPT.OF

More information

Recoverable Timestamping Approach For Concurrency Control In Distributed Database

Recoverable Timestamping Approach For Concurrency Control In Distributed Database Recoverable Timestamping Approach For Concurrency Control In Distributed base Rinki chauhan iknirs@gmail.com Suman Malik suman.sheoran14@gmail.com R K Rathy rathy.citm@yahoo.co.in Preeti Bhati versatilepreeti@yahoo.com

More information

Dynamic Load Sharing Policy in Distributed VoD using agents

Dynamic Load Sharing Policy in Distributed VoD using agents 270 IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.10, October 2008 Dynamic Load Sharing Policy in Distributed VoD using agents H S Guruprasad Asst Prof & HOD Dept of ISE,

More information

Faculty Profile. Educational Qualification

Faculty Profile. Educational Qualification Mr. Mr. Subhrajit Nag HOD subhrajit.nag@gnindia.dronacharya.info Faculty Profile M.Tech in Computer Science & Engg from Indian School of Mines, Dhanbad, in 2014 B.Tech in Computer Science & Engg from Abcus

More information

COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK

COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK Nalin Gahlaut 1, Jaya sharma 2, Pankaj Kumar 3, Kaushal Kumar 4 1 Doctoral Candidate, Uttarakhand Technical University,

More information

INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGIES, VOL. 02, ISSUE 01, JAN 2014 ISSN

INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGIES, VOL. 02, ISSUE 01, JAN 2014 ISSN CONSTANT INCREASE RATE DDOS ATTACKS DETECTION USING IP TRACE BACK AND INFORMATION DISTANCE METRICS 1 VEMULA GANESH, 2 B. VAMSI KRISHNA 1 M.Tech CSE Dept, MRCET, Hyderabad, Email: vmlganesh@gmail.com. 2

More information

Latency Hiding by Redundant Processing: A Technique for Grid enabled, Iterative, Synchronous Parallel Programs

Latency Hiding by Redundant Processing: A Technique for Grid enabled, Iterative, Synchronous Parallel Programs Latency Hiding by Redundant Processing: A Technique for Grid enabled, Iterative, Synchronous Parallel Programs Jeremy F. Villalobos University of North Carolina at Charlote 921 University City Blvd Charlotte,

More information

International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July ISSN

International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July ISSN International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 445 Clusters using High Dimensional Data for Feature Subset Algorithm V. Abhilash M. Tech Student Department of

More information

Bio-Data. : Lavanya Kampa. Narayana Engineering College, Nellore JNTU College of Engineering, JNTUA, Anantapur

Bio-Data. : Lavanya Kampa. Narayana Engineering College, Nellore JNTU College of Engineering, JNTUA, Anantapur Bio-Data NAME : Lavanya Kampa DESIGNATION : Sr.Assit. Professor AREAS OF RESEARCH : Data Mining & Cloud EMAIL : lavanya.kk2005@gmail.com PHONE : 8499097990 DATE OF JOINING : 14/12/2008 DATE OF BIRTH :

More information

STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK

STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK 1 Arpita Singh, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 PG student, SHIATS-DU,

More information

EFFECTIVE SYSTEM ARCHITECTURE BASED RISC STRATEGY

EFFECTIVE SYSTEM ARCHITECTURE BASED RISC STRATEGY INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFECTIVE SYSTEM ARCHITECTURE BASED RISC STRATEGY Charitha Devi Arika 1, V. Koteswara Rao 2 1 M.Tech Student, Dept of ECE, QIS

More information

Compiler Technology for Problem Solving on Computational Grids

Compiler Technology for Problem Solving on Computational Grids Compiler Technology for Problem Solving on Computational Grids An Overview of Programming Support Research in the GrADS Project Ken Kennedy Rice University http://www.cs.rice.edu/~ken/presentations/gridcompilers.pdf

More information

APPLICATION OF GRAPH THEORY IN COMMUNICATION NETWORKS

APPLICATION OF GRAPH THEORY IN COMMUNICATION NETWORKS APPLICATION OF GRAPH THEORY IN COMMUNICATION NETWORKS Suman Deswal 1 and Anita Singhrova 2 1,2 Deenbandhu Chottu Ram University of Sc. & Tech., Murthal, Sonipat. Haryana, India. ABSTRACT The use of mathematics

More information

CURRICULUM VITAE. Discipline University /Board Year % Secured. Indian Institute of Technology (IIT), Kharagpur. (NIT), Rourkela

CURRICULUM VITAE. Discipline University /Board Year % Secured. Indian Institute of Technology (IIT), Kharagpur. (NIT), Rourkela CURRICULUM VITAE Name: Dr. ASHOK KUMAR TURUK Personal Data : Position Held: Assistant Professor Department : Computer Science & Engineering Office Address : Dept. of Computer Science & Engineering. (NIT)

More information

A New Encryption and Decryption Algorithm for Block Cipher Using Cellular Automata Rules

A New Encryption and Decryption Algorithm for Block Cipher Using Cellular Automata Rules International Journal of Emerging Engineering Research and Technology Volume 3, Issue 8, August 2015, PP 130-136 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A New Encryption and Decryption Algorithm

More information

Compilers and Run-Time Systems for High-Performance Computing

Compilers and Run-Time Systems for High-Performance Computing Compilers and Run-Time Systems for High-Performance Computing Blurring the Distinction between Compile-Time and Run-Time Ken Kennedy Rice University http://www.cs.rice.edu/~ken/presentations/compilerruntime.pdf

More information

Improved Remote User Authentication Scheme Preserving User Anonymity

Improved Remote User Authentication Scheme Preserving User Anonymity 62 IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.3, March 28 Improved Remote User Authentication Scheme Preserving User Anonymity Mrs. C. Shoba Bindu, Dr P. Chandra Sekhar

More information

Measuring Height of an Object using Accelerometer and Camera in ios and Android Devices

Measuring Height of an Object using Accelerometer and Camera in ios and Android Devices Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.380

More information

Generation of High Performance Domain- Specific Languages from Component Libraries. Ken Kennedy Rice University

Generation of High Performance Domain- Specific Languages from Component Libraries. Ken Kennedy Rice University Generation of High Performance Domain- Specific Languages from Component Libraries Ken Kennedy Rice University Collaborators Raj Bandypadhyay Zoran Budimlic Arun Chauhan Daniel Chavarria-Miranda Keith

More information

SHORTEST PATH ALGORITHM FOR QUERY PROCESSING IN PEER TO PEER NETWORKS

SHORTEST PATH ALGORITHM FOR QUERY PROCESSING IN PEER TO PEER NETWORKS SHORTEST PATH ALGORITHM FOR QUERY PROCESSING IN PEER TO PEER NETWORKS Abstract U.V.ARIVAZHAGU * Research Scholar, Sathyabama University, Chennai, Tamilnadu, India arivu12680@gmail.com Dr.S.SRINIVASAN Director

More information

ANALYZING THE EFFICIENCY OF PROGRAM THROUGH VARIOUS OOAD METRICS

ANALYZING THE EFFICIENCY OF PROGRAM THROUGH VARIOUS OOAD METRICS ANALYZING THE EFFICIENCY OF PROGRAM THROUGH VARIOUS OOAD METRICS MR. S. PASUPATHY 1 AND DR. R. BHAVANI 2 1 Associate Professor, Dept. of CSE, FEAT, Annamalai University, Tamil Nadu, India. 2 Professor,

More information

Testing Theory. Agenda - What will you learn today? A Software Life-cycle Model Which part will we talk about today? Theory Lecture Plan

Testing Theory. Agenda - What will you learn today? A Software Life-cycle Model Which part will we talk about today? Theory Lecture Plan heory Lecture Plan 2 esting heory Lecture 8 Software Engineering DDC88/DDC93 autumn 28 Department of Computer and Information Science Linköping University, Sweden L - Course Introduction and Overview L2

More information

PNC BASED DISTRIBUTED MAC PROTOCOL IN WIRELESS NETWORKS

PNC BASED DISTRIBUTED MAC PROTOCOL IN WIRELESS NETWORKS PNC BASED DISTRIBUTED MAC PROTOCOL IN WIRELESS NETWORKS Gowdara Rajasekhar Gowda 1, Dr. B R Sujatha 2 1MTech (DECS) student, E&C Dept, Malnad College of Engineering, Karnataka, India. 2Associate professor,

More information

REDUCTION IN RUN TIME USING TRAP ANALYSIS

REDUCTION IN RUN TIME USING TRAP ANALYSIS REDUCTION IN RUN TIME USING TRAP ANALYSIS 1 Prof. K.V.N.Sunitha 2 Dr V. Vijay Kumar 1 Professor & Head, CSE Dept, G.Narayanamma Inst.of Tech. & Science, Shaikpet, Hyderabad, India. 2 Dr V. Vijay Kumar

More information

Why Performance Models Matter for Grid Computing

Why Performance Models Matter for Grid Computing Why Performance Models Matter for Grid Computing Ken Kennedy 1 Rice University ken@rice.edu 1 Introduction Global heterogeneous computing, often referred to as the Grid [5, 6], is a popular emerging computing

More information

Degree Branch / Specialization College University CSE SONA COLLEGE OF TECHNOLOGY : ASSISTANT PROFESSOR (SENIOR GRADE) ASSISTANT PROFESSOR

Degree Branch / Specialization College University CSE SONA COLLEGE OF TECHNOLOGY : ASSISTANT PROFESSOR (SENIOR GRADE) ASSISTANT PROFESSOR FACULTY PROFILE Name Designation Email ID : NISHA SOMS : ASSISTANT PROFESSOR (SENIOR GRADE) : nishasoms.cse@srit.org Area of Specialization : Wireless Ad Hoc Networks, Mobile Computing Cryptography and

More information

Design Implementation of Composite Field S-Box using AES 256 Algorithm

Design Implementation of Composite Field S-Box using AES 256 Algorithm International Journal of Emerging Engineering Research and Technology Volume 3, Issue 12, December 2016, PP 43-51 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Design Implementation of Composite Field

More information

COCHIN UNIVERSITY OF SCIENCE AND TECHNOLOGY

COCHIN UNIVERSITY OF SCIENCE AND TECHNOLOGY COCHIN UNIVERSITY OF SCIENCE AND TECHNOLOGY Name: Department: Contact Details: Address for communication Email Phone Intercom Academic Background Qualifications: Qualifying Post Graduate Degree: Ph. D

More information

TEST CASE EFFECTIVENESS OF HIGHER ORDER MUTATION TESTING

TEST CASE EFFECTIVENESS OF HIGHER ORDER MUTATION TESTING TEST CASE EFFECTIVENESS OF HIGHER ORDER MUTATION TESTING Shalini Kapoor CSE Deptt, GNI, Mullana get_shalini@rediffmail.com Abstract--- Effectiveness means how good a test case is in finding faults. Traditional

More information

Directory Compaction Techniques for Space Optimizations in ExFAT and FAT File Systems for Embedded Storage Devices

Directory Compaction Techniques for Space Optimizations in ExFAT and FAT File Systems for Embedded Storage Devices IJCSI International Journal of Computer Science Issues, Vol. 11, Issue 1, o, January 1 ISS (Print): 19-81 ISS (Online): 19-78 www.ijcsi.org 1 Compaction Techniques for Space Optimizations in EFAT and FAT

More information

Biodata. Name: Ms. Jyoti M. Hurakadli. Designation: Associate Professor. Qualification: M.Tech (Computer Network Engineering),

Biodata. Name: Ms. Jyoti M. Hurakadli. Designation: Associate Professor. Qualification: M.Tech (Computer Network Engineering), Biodata Name: Ms. Jyoti M. Hurakadli Designation: Associate Professor Qualification: M.Tech (Computer Network Engineering), B.E. (Computer Science and Engineering) Specialization: Computer Networking Date

More information

ISSN: (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com

More information

FAME: A NOVEL FRAMEWORK FOR POLICY MANAGEMENT IN FIREWALL

FAME: A NOVEL FRAMEWORK FOR POLICY MANAGEMENT IN FIREWALL FAME: A NOVEL FRAMEWORK FOR POLICY MANAGEMENT IN FIREWALL A.Krishna Mohan Associate professor Dept. CSE (IT) UCEK JNTU Kakinada Abstract: In this paper investigate the problem of discovering the set of

More information

V e l a m m a l E n g i n e e r i n g C o l l e g e Department of Information Technology

V e l a m m a l E n g i n e e r i n g C o l l e g e Department of Information Technology V e l a m m a l E n g i n e e r i n g C o l l e g e Department of Information Technology Name & Photo : MRs.C.M.NALAYINI Designation: Assistant Professor II Qualification : M.Tech,(Ph.D) Area of Specialization

More information

Load balancing with Modify Approach Ranjan Kumar Mondal 1, Enakshmi Nandi 2, Payel Ray 3, Debabrata Sarddar 4

Load balancing with Modify Approach Ranjan Kumar Mondal 1, Enakshmi Nandi 2, Payel Ray 3, Debabrata Sarddar 4 RESEARCH ARTICLE International Journal of Computer Techniques - Volume 3 Issue 1, Jan- Feb 2015 Load balancing with Modify Approach Ranjan Kumar Mondal 1, Enakshmi Nandi 2, Payel Ray 3, Debabrata Sarddar

More information

ADAPTIVE SLOT ALLOCATION AND BANDWIDTH SHARING FOR PRIORITIZED HANDOFF CALLS IN MOBILE NETWOKS

ADAPTIVE SLOT ALLOCATION AND BANDWIDTH SHARING FOR PRIORITIZED HANDOFF CALLS IN MOBILE NETWOKS ADAPTIVE SLOT ALLOCATION AND BANDWIDTH SHARING FOR PRIORITIZED HANDOFF CALLS IN MOBILE NETWOKS S.Malathy G.Sudhasadasivam K.Murugan S.Lokesh Research Scholar Professor, CSE Department Lecturer, IT Dept

More information

UNCOVERING OF ANONYMOUS ATTACKS BY DISCOVERING VALID PATTERNS OF NETWORK

UNCOVERING OF ANONYMOUS ATTACKS BY DISCOVERING VALID PATTERNS OF NETWORK UNCOVERING OF ANONYMOUS ATTACKS BY DISCOVERING VALID PATTERNS OF NETWORK Dr G.Charles Babu Professor MRE College Secunderabad, India. charlesbabu26@gmail.com N.Chennakesavulu Assoc.Professor Wesley PG

More information

Performance of Static Networks for Power Saving Mode

Performance of Static Networks for Power Saving Mode Performance of Static Networks for Power Saving Mode B. Rama Devi Department of E.C.E., Kakatiya Institute of Technology and Science, Warangal, Telangana, INDIA Prof. M. Asha Rani Department of E.C.E.,

More information

CURRICULUM VITAE. June, 2013

CURRICULUM VITAE. June, 2013 CURRICULUM VITAE ד"ר אבי סופר Dr. Avi Soffer June, 2013 ORT Braude College, Department of Software Engineering, P.O. Box 78, Karmiel 2161002, Israel Telephone: +972-4-990-1720 Email: asoffer@braude.ac.il

More information

Ravindranagar Colony, Habsiguda, : Department of Computer Science & Engineering, University College of Engineering(A),

Ravindranagar Colony, Habsiguda, : Department of Computer Science & Engineering, University College of Engineering(A), Name Designation Father Name : Dr.V.B.Narsimha : Assistant Professor : V.Raghavulu Date of Birth : 20-06-1969 Residence Address : Flat No.101, SR Apartment, Ravindranagar Colony, Habsiguda, Hyderabad,

More information

MULTI-NODE DATABASE APPLICATION DEPLOYMENT ON LAMP ARCHITECTURE

MULTI-NODE DATABASE APPLICATION DEPLOYMENT ON LAMP ARCHITECTURE MULTI-NODE DATABASE APPLICATION DEPLOYMENT ON LAMP ARCHITECTURE M. M. Chavan and Y. V. Dongre Department of Computer Engineering, Vishwakarma Institute of Information Technology, Pune ABSTRACT Recent trends

More information

Implementation of ON/OFF and PID controller using TCP Protocol Based on Virtual Instrumentation

Implementation of ON/OFF and PID controller using TCP Protocol Based on Virtual Instrumentation Implementation of ON/OFF and PID controller using TCP Protocol Based on Virtual Instrumentation Abhyarthana Bisoyi 1, Umesh Chandra Pati 2 Postgraduate Scholar, NIT Rourkela, India 1 Associate Professor,

More information

Locking and Tracking of Stolen Vehicles

Locking and Tracking of Stolen Vehicles Locking and Tracking of Stolen Vehicles S.Pradeep PG Scholar, Dept of ECE (ES), CMRCET, JNTUH, Medchal, Hyderabad, TS, India. Mrs.K.Jyothi Assistant Professor, Dept of ECE, CMRCET, JNTUH, Medchal, Hyderabad,

More information

A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography

A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography V. Lokeswara Reddy Associate Professor, Department of CSE, K.S.R.M. College of Engg., Kadapa, Y.S.R. Dist., A.P.(INDIA)

More information

Support and Confidence Based Algorithms for Hiding Sensitive Association Rules

Support and Confidence Based Algorithms for Hiding Sensitive Association Rules Support and Confidence Based Algorithms for Hiding Sensitive Association Rules K.Srinivasa Rao Associate Professor, Department Of Computer Science and Engineering, Swarna Bharathi College of Engineering,

More information

An Improved Run Length Encoding Scheme for Image Compression Ch.Samson 1, VUK Sastry 2

An Improved Run Length Encoding Scheme for Image Compression Ch.Samson 1, VUK Sastry 2 www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 6 Issue 3 March 2017, Page No. 20716-20720 Index Copernicus value (2015): 58.10 DOI: 10.18535/ijecs/v6i3.57

More information

Privacy-Preserving k-secure Sum Protocol Rashid Sheikh, Beerendra Kumar SSSIST, Sehore, INDIA

Privacy-Preserving k-secure Sum Protocol Rashid Sheikh, Beerendra Kumar SSSIST, Sehore, INDIA Privacy-Preserving k-secure Rashid Sheikh, Beerra Kumar SSSIST, Sehore, INDIA rashidsheikhmrsc@yahoo.com, beerucsit@gmail.com (IJCSIS) International Journal of Computer Science and Information Security,

More information

C.P.Ronald Reagan, S.Selvi, Dr.S.Prasanna Devi, Dr.V.Natarajan

C.P.Ronald Reagan, S.Selvi, Dr.S.Prasanna Devi, Dr.V.Natarajan Enhancing DES Using Local Languages C.P.Ronald Reagan, S.Selvi, Dr.S.Prasanna Devi, Dr.V.Natarajan Abstract: Network services and internet plays vital role in transmitting information from source to destination.

More information

Software design simulation for quick and qualitative application development

Software design simulation for quick and qualitative application development IJCSNS International Journal of Computer Science and Network Security, Vol.9, No.8, August 2009 89 Software design simulation for quick and qualitative application development P.K. Suri 1 Gurdev Singh

More information

Comparing Tesseract results with and without Character localization for Smartphone application

Comparing Tesseract results with and without Character localization for Smartphone application Comparing Tesseract results with and without Character localization for Smartphone application Snehal Charjan 1, Prof. R. V. Mante 2, Dr. P. N. Chatur 3 M.Tech 2 nd year 1, Asst. Professor 2, Head of Department

More information

IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY

IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY Shreelekshmi R, Wilscy M 2 and C E Veni Madhavan 3 Department of Computer Science & Engineering, College of Engineering, Trivandrum,

More information

A Image Steganography based on Non-uniform Rectangular Partition

A Image Steganography based on Non-uniform Rectangular Partition A Image Steganography based on Non-uniform Rectangular Partition Venkata Ramesh Pokala 1, Y. Dasradh Ram Reddy 2, G. Srinivasa Reddy 3 Asst.Prof of CSE department BVSR, Chimakurthy, A.P, India Abstract:

More information

GUI Controlled Robot with MATLAB

GUI Controlled Robot with MATLAB Rajender M.Tech (Digital Electronics and Communication Systems), Siddhartha Institute of Engineering and Technology. GUI Controlled Robot with MATLAB Pushpalatha, M.Tech Associate Professor, Siddhartha

More information

Systematic Detection And Resolution Of Firewall Policy Anomalies

Systematic Detection And Resolution Of Firewall Policy Anomalies Systematic Detection And Resolution Of Firewall Policy Anomalies 1.M.Madhuri 2.Knvssk Rajesh Dept.of CSE, Kakinada institute of Engineering & Tech., Korangi, kakinada, E.g.dt, AP, India. Abstract: In this

More information

Smart Test Case Quantifier Using MC/DC Coverage Criterion

Smart Test Case Quantifier Using MC/DC Coverage Criterion Smart Test Case Quantifier Using MC/DC Coverage Criterion S. Shanmuga Priya 1, Sheba Kezia Malarchelvi 2 Abstract Software testing, an important phase in Software Development Life Cycle (SDLC) is a time

More information

Arm Microcontroller Implementation of Des Using Concept with Time-Variable Key

Arm Microcontroller Implementation of Des Using Concept with Time-Variable Key Arm Microcontroller Implementation of Des Using Concept with Time-Variable Key Amol D. Tupkar 1, Prof. U.A. Rane 2 1 P.G. student (M.E. Digital Electronics), SSGMCE. Shegaon, SGB Amravati University, Maharashtra,

More information

NTS A NAVIGATION TRACKER SYSTEM

NTS A NAVIGATION TRACKER SYSTEM NTS A NAVIGATION TRACKER SYSTEM Nitin Tooteja 1, Prerna Ahuja 2, Shanu Sharma 3 1 Student, Computer Science & Engineering, Amity University, Uttar Pradesh, India, ntooteja_30@yahoo.co.in 2 Student, Computer

More information

Security Technologies for Dynamic Collaboration

Security Technologies for Dynamic Collaboration Special Issue Advanced Technologies Driving Dynamic Collaboration Featuring System Technologies Security Technologies for Dynamic Collaboration By Hiroshi MIYAUCHI,* Ayako KOMATSU, Masato KAWATSU and Masashi

More information

ISSN (Online) ISSN (Print)

ISSN (Online) ISSN (Print) Accurate Alignment of Search Result Records from Web Data Base 1Soumya Snigdha Mohapatra, 2 M.Kalyan Ram 1,2 Dept. of CSE, Aditya Engineering College, Surampalem, East Godavari, AP, India Abstract: Most

More information

Adaptive Power Control for Quality of Service Improvement in WCDMA Wireless Networks

Adaptive Power Control for Quality of Service Improvement in WCDMA Wireless Networks Adaptive Power Control for Quality of Service Improvement in WCDMA Wireless Networks Vandana Khare Associate Prof. ECE department, CMR College of Engineering & Technology, Hyderabad, India. & Research

More information

Keyless Car Entry Authentication System Based on A Novel Face-Recognition Structure

Keyless Car Entry Authentication System Based on A Novel Face-Recognition Structure Keyless Car Entry Authentication System Based on A Novel Face-Recognition Structure I.Amulya M.Tech VLSI System Design, AITS, Rajampet, Kadapa (DT) Mr. K. Sreenivasa Rao, Associate Professor, Dept: ECE,

More information

Adaptive Buffer size routing for Wireless Sensor Networks

Adaptive Buffer size routing for Wireless Sensor Networks Adaptive Buffer size routing for Wireless Sensor Networks Kalyani Upputhoola 1, Narasimha Rao Sirivella 2 Student, M.Tech (CSE), QIS College of Engineering and Technology, Hyderabad, AP, India 1 Assistant

More information

Cryptanalysis of Blind Signature Schemes

Cryptanalysis of Blind Signature Schemes IJCSNS International Journal of Computer Science and Network Security, VOL.14 No.5, May 2014 73 Cryptanalysis of Blind Signature Schemes Nitu Singh M.Tech Scholar Dept. of Cmputer Science & Engineering

More information

Compiler Architecture for High-Performance Problem Solving

Compiler Architecture for High-Performance Problem Solving Compiler Architecture for High-Performance Problem Solving A Quest for High-Level Programming Systems Ken Kennedy Rice University http://www.cs.rice.edu/~ken/presentations/compilerarchitecture.pdf Context

More information

Decreasing End-to Job Execution Times by Increasing Resource Utilization using Predictive Scheduling in the Grid

Decreasing End-to Job Execution Times by Increasing Resource Utilization using Predictive Scheduling in the Grid Decreasing End-to to-end Job Execution Times by Increasing Resource Utilization using Predictive Scheduling in the Grid Ioan Raicu Computer Science Department University of Chicago Grid Computing Seminar

More information

Delegating Auditing Task to TPA for Security in Cloud Computing

Delegating Auditing Task to TPA for Security in Cloud Computing Delegating Auditing Task to TPA for Security in Cloud Computing 1 Nallam Gowri, 2 D.Srinivas 1,2Dept. of CSE,Kakinada Institute of Engineering & Technology, Korangi, e.g.dt,ap, India Abstract: This paper

More information

A New Approach of Forward Error Correction For Packet Loss Recovery

A New Approach of Forward Error Correction For Packet Loss Recovery Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

Compilers for High Performance Computer Systems: Do They Have a Future? Ken Kennedy Rice University

Compilers for High Performance Computer Systems: Do They Have a Future? Ken Kennedy Rice University Compilers for High Performance Computer Systems: Do They Have a Future? Ken Kennedy Rice University Collaborators Raj Bandypadhyay Zoran Budimlic Arun Chauhan Daniel Chavarria-Miranda Keith Cooper Jack

More information

A study on Congestion Control of Wireless Communication Network applying ML and FL Techniques

A study on Congestion Control of Wireless Communication Network applying ML and FL Techniques IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 12, Issue 3, Ver. III (May - June 2017), PP 10-16 www.iosrjournals.org A study on Congestion

More information

2015, IJARCSSE All Rights Reserved Page 133

2015, IJARCSSE All Rights Reserved Page 133 Volume 5, Issue 11, November 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Efficient

More information

Identifying Misuse of Data In Cloud

Identifying Misuse of Data In Cloud Identifying Misuse of Data In Cloud K.S.R. Chaitanya #1, T.Rajendra Prasad *2, # Department of IT, Kakinada Institute of Engineering and Technology korangi,ap,india 1 ksaichaitanya007@gmail.com 2 rajendraprasad.tanukula@gmail.com

More information

Faculty Profile. Educational Qualifications. Work Experience. : Dr. K.V.S.S.S.S.Sairam. : Contact No.

Faculty Profile. Educational Qualifications. Work Experience. : Dr. K.V.S.S.S.S.Sairam. : Contact No. Faculty Profile Name Designation Email : Dr. K.V.S.S.S.S.Sairam : Professor : drsairam@nitte.edu.in Contact No. : +91-9731809851 Joining Date : 05-01-2015 Educational Qualifications Ph.D. on Optical Communication

More information

I. INTRODUCTION II. RELATED WORK.

I. INTRODUCTION II. RELATED WORK. ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: A New Hybridized K-Means Clustering Based Outlier Detection Technique

More information

KCG College of Technology, Chennai

KCG College of Technology, Chennai , Chennai-600 097 faculty member : S SANKAR Department : COMPUTER SCIENCE AND ENGINEERING Present Designation : ASSOCIATE PROFESSOR Residential Address : B22, SHANTINIKETAN ALTAIR APARTMENT KELAMBAKKAM,

More information

OPTIMAL ALLOCATION FOR RELIABILITY ANALYSIS OF SERIES PARALLEL SYSTEM USING DYNAMIC PROGRAMMING

OPTIMAL ALLOCATION FOR RELIABILITY ANALYSIS OF SERIES PARALLEL SYSTEM USING DYNAMIC PROGRAMMING OPTIMAL ALLOCATION FOR RELIABILITY ANALYSIS OF SERIES PARALLEL SYSTEM USING DYNAMIC PROGRAMMING D. RAVI KUMAR 1, V. SANKAR 2 LMISTE, Asst. Professor, EEE Dept., VNR Vignana Jyothi Institute of Engg. &

More information

DISCLOSURE PROTECTION OF SENSITIVE ATTRIBUTES IN COLLABORATIVE DATA MINING V. Uma Rani *1, Dr. M. Sreenivasa Rao *2, V. Theresa Vinayasheela *3

DISCLOSURE PROTECTION OF SENSITIVE ATTRIBUTES IN COLLABORATIVE DATA MINING V. Uma Rani *1, Dr. M. Sreenivasa Rao *2, V. Theresa Vinayasheela *3 www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 5 May, 2014 Page No. 5594-5599 DISCLOSURE PROTECTION OF SENSITIVE ATTRIBUTES IN COLLABORATIVE DATA MINING

More information

FACULTY PROFILE INTRODUCTION PERSONAL PROFILE. Amanpreet Kaur. Designation:- Lecturer. Specialization:- Wireless Communication Engineering

FACULTY PROFILE INTRODUCTION PERSONAL PROFILE. Amanpreet Kaur. Designation:- Lecturer. Specialization:- Wireless Communication Engineering FACULTY PROFILE INTRODUCTION Amanpreet Kaur B.Tech. (Honors), M.Tech Designation:- Lecturer Specialization:- Wireless Communication Engineering Contact Information:- Department of Electronics and Communication

More information

Histogram Difference Methods Using Colour Models

Histogram Difference Methods Using Colour Models Histogram Difference Methods Using Colour Models Priyanks S 1, Dr. Jharna Majumdar 2, Santhosh Kumar K L 3 Post Graduate Student, Dept. of CSE, NMIT, Bangalore, Karnataka, India 1 Dean R&D, HOD CSE (PG),

More information

Navigation Cost Modeling Based On Ontology

Navigation Cost Modeling Based On Ontology IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 4, Issue 3 (Sep.-Oct. 2012), PP 34-39 Navigation Cost Modeling Based On Ontology 1 Madala Venkatesh, 2 Dr.R.V.Krishnaiah 1 Department

More information