Submit Articles A Collection of Informative and Interesting Articles  
 
HOME LOGIN SUBMIT ARTICLES TOP AUTHORS WANT AN ACCOUNT?
 

Research Trends in Computer and Information Engineering

BY: NILAMADHAB MISHRA | Category: Technology | Submitted: 2012-10-02 13:04:22
       Author Photo
Article Summary: "some recent trends in computer and information engineering plays vital impact in the modern digital world . The individual trend is headed by some research discussions relating to the current scenario..."


Share with Facebook Share with Linkedin Share with Twitter Share with Pinterest Email this article




1. Application and Challenges in Internet Of Things

In this seminar discussion a beautiful combination has made by prof. Chang in between Cyber physical System (CPS), Sensor Network and Internet of things.
The Cyber Physical System is the integration of computational and physical processes, in which the sensors, actuators, and other embedded devices are networked together to sense, monitor, and control the physical world.

The Application of sensor penetrates each and every sector like consumer electronics, personal communication system, health care system and many more.

A novel integration has discussed between the RFID and IOT system.

The technological revolution of IOT represents the future of computing, communications and networking. The IoT focuses new forms of communication between people to people, people to things, things to people and finally the things to things .so it has the potentiality to gain popularity among consumers, manufacturers and industries.
IoT poses a number of challenges, not only due to the nature of the enabling technologies but also to their deployment strategy. This presentation also focused the introduction of IoT and then introduce the architecture, key technologies and applications of IoT. Furthermore, the discussions made about the open challenges and possible solutions in the area of IoT.

The seminar discussion covered a wide range of hot research issues like sensor deployment (random Vs. structured Deployment), Connectivity, barrier coverage, and node localization approaches.
The innovative Idea of Mushroom Story Public Art is practically visualized by Prof Chang , in which the innovative sensors are treated as Musical Mushrooms and play different kinds of music accordingly.

2. A novel robust loss-less Image data hiding algorithm.

In this seminar discussion , the real world images are taken , the by taking it's frequencies we can able to develop the histogram ,which further uses De Vleeschouwer et al's method to determine the possible position of the pixels with respect to the designed histogram .

Here for each non-overlapped block we have to calculate the difference of alpha.
As per the method is concerned, we can classify the blocks into following category.

- Pixels in central part of histogram.
- Pixels in left part of histogram.
- Pixels in right part of histogram.
- Pixels in both left and right parts of histogram.

3. Design and analysis of communication model for VANET.

Here the discussion was initially focused on some research issues like
- Transmission and connectivity analysis.
- Speed and traffic density.

Various models are used to solve the problem requirements, that models are routing model, forwarding model and other system models.

Here two simulated graphs are designed to prove that with the increase of number of vehicles, the traffic density also increases. A discussion has made to estimate the real distance and the safest distance between two vehicles.

To implement the connectivity analysis in VANET system, the various real time parameters are to be set; those parameters are length of vehicle, safe distance, density traffic, relative speed and the speed of the vehicle, which may enables us toward developing an safest intelligent vehicular transportation system.

4. A survey on security in medical images.

The initial discussion was focused on 3-hot security issues, those are confidentiality, integrity and authenticity .The high security mechanisms can be successfully implemented over the medical images through two security techniques.

1. Water marking
2. Encryption and decryption

A discussion has made about the process of encipher code generations ,in which the plain text are passed through hash functions to generate the hash codes ,which further passed through encipher to obtain encipher code .

The original medical images are watermarked to transform into the cover image or embedded image.
In conventional watermarking, we can get the cover image, but we cannot recover the original image from the cover image.

So Low Significant Bits based image hiding schemes was discussed to solve the partial problems.

About Author / Additional Info:

Comments on this article: (0 comments so far)

Comment Comment By Comment Date

Leave a Comment   |   Article Views: 3167


Additional Articles:
•   Do You Fear Money?

•   Boy Shot Dead After Stealing a Side Mirror

•   Unit Linked Insurance Plans (ULIPS) in India

•   Alternative Quit Smoking Help


Latest Articles in "Technology" category:
•   Security Robots on Patrol

•   Apple Pay Overview

•   Enterprise Mobility - Overview Part 1

•   M-OTA: Mobile 'Over-The- Air' (OTA) Overview

•   MDM: Mobile Device Management Overview

•   3M MAC Protocol Review

•   Build, Deploy and Test - Advanced Software Development Practice - Part 1



Important Disclaimer: All articles on this website are for general information only and is not a professional or experts advice. We do not own any responsibility for correctness or authenticity of the information presented in this article, or any loss or injury resulting from it. We do not endorse these articles, we are neither affiliated with the authors of these articles nor responsible for their content. Please see our disclaimer section for complete terms.
Page copy protected against web site content infringement by Copyscape
Copyright © 2010 saching.com - Do not copy articles from this website.
| Home | Disclaimer | Xhtml |