October'2011

1) An Effective Technique using Non Local Means and Morphological Operations to Enhance Degraded Historical Document
(pp. 335-344)

Authors: B Gangamma, Srikanta Murthy K

Abstract - Ancestors used many ways to preserve their heritage by inscribing on the hard and long lasting material. Stone carvings, metal and palm leaf inscriptions are usually used for preserving the useful information related to religion, science, education, culture etc. Usually these documents are older than several centuries and over times become embarrass and the writing become indecipherable. Image processing techniques can help to enhance these documents to facilitate deciphering process. The proposed method uses a hybrid approach using combination of Morphological operations, a set theory approach and Non Local Means (NLM) filter to enhance the degraded document. Morphological operations are used for extracting image components such as, shape, edges, boundaries, skeletons, etc. NLM filter uses similarity measurement of neighborhood windows and adjusts each pixel value with a weighted average of structurally similar neighborhood. The method is compared with Average, and Gaussian filters and results are proved to be better.

FULL MANUSCRIPT


2) Effect on Magnetic Field on Ozone Layer  

(pp. 345-348)

Authors: Prof. Z. Burnet, T. B. Schol and M. S. A. Azaami

Abstract - An application of magnetic field, B to a discharge chamber under transverse electric field, E is studied, with the objective to view the effect of magnetic field to the electrons in a plasma. Theory of gas discharge stated that this configuration will create a helical motion to electrons due to gradient drift or gyration. Experimental result from previous research showed, however that this magnetic field has no effect to corona current, in contrast to the theory that the helical motion will increase the ionisation collision process and cause more electron emissions. To verify the result, application of B effect to ozone chamber is constructed under AC and pulsed power supply, and the result shows that the B does not influence gas discharge characteristic agreeing with the result from previous author. 

FULL MANUSCRIPT

 

3) An Efficient Routing Method for Ad Hoc Networks
(pp. 349-354)

Authors: Mohinder Gupta

Abstract - To secure the data in the ad hoc network the intermediate nodes with in a route are created on the basis of their currently known reputation (trust) index. However, a node which was earlier trust worthy may no longer to be so as it becomes selfish due to loss of power. This selfish behavior problem is quite common in ad hoc networks and the literature contains many strategies to deal with them. This paper presents a novel routing strategy to deal with such nodes. The strategy assumes that the selfish nodes are not malicious and obligated to speak truth about their current energy level.

FULL MANUSCRIPT


4) The Information Economy, Information and Technology
(pp. 355-358)

Authors: Tahsin Marami

Abstract - Information is a key strategic asset and Information assets are perhaps the most important type of asset in the knowledge-based economy. The Information economy mainly defined by the extension of information and communication technologies. The rapid growth of telecommunications and information technologies in the past decade is shifting the global market from a technology-based economy to an information-based economy. Countries with highly developed telecommunications infrastructure can adjust to this rapid change and take advantage of the enormous new opportunities. This paper describes some of the impacts of the information and communication technologies on the information economy.

FULL MANUSCRIPT


5) Cellular Mobile Systems Using a Multipath search
(pp. 359-363)

Authors: Tamal Chachmi and Zubayer Mehran

Abstract - This paper presents a new algorithm for solving the frequency assignment problem in cellular mobile systems. The proposed algorithm is based on a Taboo search starting with a sequential local search method. Instead of using a minimum number of frequencies and reusing them a maximum number of times, our algorithm assembles to maximum the frequencies while avoiding deadlock. This algorithm introduces a powerful sequential local search method to start with an initial solution respecting all constraints, and minimizing the costs of employment. This initial solution is used to construct a global solution by permutation of all frequencies of a constraint link in its frequency domain in order to obtain the smallest maximum frequency used and the overall cost of such a solution. The algorithm reduces both the search space, the order of variables and values and avoids cycles through by the use of a temporary Taboo list. Our approach has been tested on standard benchmark problems called Philadelphia benchmarks of frequency assignment problem. The results obtained are equivalent to those of current methods. Moreover, our approach shows more efficiency in terms of flexibility and autonomy.

FULL MANUSCRIPT


6) " Manuscript Deleted Due to Copyright Violation "
  

Authors:  N/A

Abstract - N/A