Accepted Papers

  • Articles Separation From Old Tamil Newspapers Using Histogram Analysis
    Kasthuri Shanmugalingam1 and Darsha Mahendrarajah2, University of Moratuwa, Sri Lanka
    ABSTRACT
    Archaeological records are one of the main resources of human requirements for getting information about various topics. Most archaeological records were found on newspapers. An automated image processing system may be a suitable solution in the way to efficient and flexible searching approach. For this application, image analysis and article separation is needed before feature extraction and OCR operation. Article separation is essential otherwise feature extraction process will be more complex. In this paper an article separation technique is presented to segment article from old Tamil newspaper scanned image. In this technique implemented by horizontal and vertical histogram and whitespace analysis. Automate calculate threshold values are used to identify whitespaces. Binarization and noise removal done as part of pre-processing.
  • The Impact of Scalable Communication on Cryptography
    Joshua McCarthy, MIT, USA
    ABSTRACT
    Embedded modalities and virtual machines have garnered improbable interest from both mathematicians and physicists in the last several years. After years of unproven research into erasure coding, we disconfirm the evaluation of write-ahead logging. We construct an analysis of B-trees, which we call Hull.
  • An Effective Algorithm For Solving the the OVRP
    Majid Yousefikhoshbakht, Bu-Ali Sina University, Iran
    ABSTRACT
    The open vehicle routing problem (OVRP) is one of the most important versions of vehicle routing problem (VRP) in which the vehicles are not required to return to the depot after completing service. Because this problem belongs to NP-hard Problems, an efficient hybrid elite ant system called EHEAS is proposed in this paper in which a new state transition rule, tabu search as an effective local search algorithm and a new pheromone updating rule are used for more improving solutions. These modifications avoid the premature convergence and makes better solutions. Computational results on several instances show that the proposed algorithm finds closely the best known solutions for most of the instances in which ten best known solutions are also found. In addition, the EHEAS is comparable in terms of solution quality to the best performing published metaheuristics.
  • Security and privacy of an IoT Smart Environment System
    Pedro Oliveira,Paulo Novais1and Tiago Pedrosa and Paulo Matos2, 1Algoritmi Centre/University of Minho, Portugal, 2 Institute Polytechnic of Braganca, Braganca
    ABSTRACT
    The IoT, increases the existing concerns at the level of safety and introduces new risks. Because multiplies the already normal risks that exist in any data communication, as each device increases the possible area of attack, and interoperability expands the potential attack scope. This paper, deals with the actual problem of secure an IoT system, namely using secure techniques to secure a Smart Environment System, and the privacy of their users. On a new era of interaction between per- sons and physical spaces, users want that those spaces smartly adapt to their preferences in a transparent way. This work wants to promote a balanced solution between the need of personal information and the user's privacy expectations. We propose a solution based on requiring the minimal information possible, together with techniques to anonymize and disassociate the preferences from the users.
  • Implementation and Performances Study of An IEEE 802.11AD MODEL UNDER NS-3
    Nouri OMHENI and Faouzi ZARAI, National School of Electronics and Telecommunications of Sfax, Tunisia
    ABSTRACT
    IEEE 802.11ad is an amendment to the existing WLAN 802.11 standard. The aim of this amendment 802.11ad is to provide lower latency and higher data throughput solutions away from more crowded spectrum bands by operating in the 60 GHz millimeter wave band. But to date, a few simulation models for this new amendment are available. In this paper, we conduct a detailed study of the implementation of this standard under NS-3 Network Simulator. In addition, a series of simulations have been made to study the performance of this new technology in terms of throughput, jitter and latency.