International Journal of Computational Science, Information Technology and Control Engineering (IJCSITCE)
International Journal of Computational Science, Information Technology and Control Engineering (IJCSITCE)
https://airccse.com/ijcsitce/
DESIGN AND IMPLEMENTATION OF A GSM-
BASED SCROLLING MESSAGE DISPLAY
BOARD
Adamu Murtala Zungeru , Gbenga Daniel Obikoya, Ochi Fortunatus Uche ,
Taidi Eli
Nigeria
ABSTRACT
This research work is developed with two AT89C52 microcontrollers from Atmel. The
microcontrollers provide all the functionality of the display notices and wireless control. The
Display is obtained on a 7X96 Light Emitting Diode (LED) dot matrix display, arranged on a
Vero board. A desired text message from a mobile phone is sent via a Global System for Mobile
Communication (GSM) to the GSM module located at the receiving end. The GSM modem is
connected, through MAX 232 Integrated Circuit (MAX 32 IC), to the AT89C52 microcontroller.
The message that is stored in the Electrically Erasable Programmable Read Only Memory
(EEPROM) is then displayed on the LED dot matrix display. This hardware uses regulated 5V,
500mA power supply. A three-terminal LM7805 is employed for regulation of the voltage. A
bridge type full-wave rectifier is used to rectify the AC output of the secondary of 230/12V step
down transformer. The system was tested to work according to specification.
KEYWORDS
AT89C52 Microcontroller, GSM Module, EEPROM, Display Board, LED Array
REFERENCES
[1] Bernard Sklar, (2001), “Digital Communications: Fundamentals And Applications”, Prentice
Hall.
[2] ETS 300 608, (1998) “Digital Cellular Telecommunication System (Phase 2); Specification
of the
Subscriber Identity Module- Mobile Equipment (SIM-ME) Interface”, European
Telecommunications
Standards Institute, May 1998, Available from http://electronics
madeeasy.blogspot.com/2011/04/final-year-projects-ece-4.html [Accessed 7 November 2013].
[3] Rahul Garg, (2013), “SMS based voting machine”, Available from
http://www.scribd.com/doc/136445446/SMS-BASED-VOTING-MACHINE-Project-Report
[Accessed 1 December 2013]
[4] Umesh Kubde, Wardha & India, (2013), “SMS based security system”, Available from
http://www.engineersgarage.com/contribution/sms-based-security-system?page=1 [Accessed 12
December 2013]
[5] Bharat Kulkarni, (2012), “GSM Based Automatic Meter Reading System Using ARM
Controller”,
International Journal of Emerging Technology and Advanced Engineering, Website:
www.ijetae.com
(ISSN 2250-2459), Volume 2, Issue 5, pp 446-448.
[6] Simon So, (2009) “The development of a SMS-based teaching and learning system”, Journal
of
Educational Technology Development and Exchange, 2(1), pp 113-124.
[7] Pawan Kumar, Vikas Bhrdwaj, Kiran Pal, Narayan Singh Rathor & Amit Mishra, (2012),
“GSM
based e-notice board: Wireless Communication”, International Journal of Soft Computing and
Engineering (IJSCE), ISSN: 2231-2307, Volume 2, Issue-3, pp 601-605.
[8] Smt. M. Baby, P. Harini, Y. Eleena Slesser, Y.Tejaswi, K.Ramajyothi, M.Sailaja & K.Annie
Sumantha, (2013), “SMS based wireless e-notice board”, International Journal of Emerging
Technology and Advanced Engineering, Website: www.ijetae.com (ISSN 2250-2459, ISO
9001:2008
Certified Journal), Volume 3, Issue 3, pp 181-185.
[9] Prachee U. Ketkar, Kunal P. Tayade, Akash P. Kulkarni & Rajkishor M. Tugnayat, (2013),
“GSM
mobile phone based led scrolling message display system”, International Journal of Scientific
Engineering and Technology (ISSN : 2277-1581), Volume 2 Issue 3, pp 149-155.
[10] N. S. Murthi Sarma, N. S. N. Lakshmipathi Raju, T. V. Janardhan Rao, B. Devi Vara
Prasad, B. V. V.
Satyanarayana & N. Phani Kumar, (2013), “A basic research on GSM based secured advertising
system”, Journal of Information, Knowledge and Research In Electronics And Communication
(ISSN: 0975 – 6779), Volume 02, Issue 02, pp 933-936.
[11] Himanshi Ojha, Deeksha Gupta, Abhinav Gautam & Dharmendra Kumar, (2014) “GSM
based SMS
driven automatic display toolkit”, National Student Conference on Advances in Electrical &
Information Communication Technology, AEICT-2014, pp 319-322.
[12] Anuradha Mujumdar, Vaishali Niranjane & Deepika Sagne, (2014) “Scrolling LED display
using
wireless transmission”, International Journal of Engineering Development and Research (ISSN:
2321-
9939), Volume 2, Issue 1, pp 475-478.
[13] Bhawna Saini, Rachna Devi, Shilpi Dhankhar, Mohammad-ziaul-Haque and Jagandeep
Kaur, (2014)
“Smart LED display boards”, International Journal of Electronic and Electrical Engineering
(ISSN
0974-2174), Volume 7, Number 10, pp 1057-1067, © International Research Publication House.
[14] Nivetha S. R., Puritha R., Preethi Selvaraj and Yashvanthini S. M., (2013) “SMS based
wireless
notice board with monitoring system”, International Journal of Advanced Electrical and
Electronics
Engineering, (IJAEEE), ISSN (Print) : 2278-8948, Volume 2, Issue 3, pp 58-62.
[15] Rahul Kamboj and Preeti Abrol, (2013) “Design and Development of GSM based Multiple
LED
Display Boards”, International Journal of Computer Applications (0975 – 8887), Volume 71,
No.18,
pp 40-46.
[16] Gowrishankar Kasilingam, Mritha Ramalingam and Chandra Sekar (2014), “A survey of
light
emitting diode (LED) display board” Indian Journal of Science and Technology, (ISSN (Print):
0974-
6846, ISSN (Online) : 0974-5645), Vol 7(2), pp 185–188.
International Journal of Computational Science, Information Technology and Control
Engineering (IJCSITCE) Vol.1, No.3, October 2014
31
[17] Raj Hakani, “GSM based alphanumeric scrolling display system, (2014)” International
Journal of
Advanced Research in Computer Engineering & Technology (IJARCET), Volume 3, Issue 2, pp
419-
422.
[18] Mayur R. Bhoyar, Suraj Chavhan and Vaidehi Jaiswal, (2014) “Secure method of updating
digital
notice board through SMS with PC monitoring system”, IOSR Journal of Computer Science
(IOSRJCE), e-ISSN: 2278-0661, p-ISSN: 2278-872, pg. 24-29..
A Hybrid DPCM-DCT and RLE Coding for
Satellite Image Compression
KEYWORDS
Compression, satellite images, DCT, DPCM
VOLUME LINK:https://airccse.com/ijcsitce/vol1.html
REFERENCES
[1] G. P. Abousleman, M. W. Marcellin, and B. R. Hunt, "Compression of hyperspectral imagery
using the 3-D DCT and hybrid DPCM/DCT," IEEE Transactions on Geoscience and Remote
Sensing, vol. 33, no. 1, pp. 26-34, January 1995.
[3] W. B. Pennebaker and J. L. Mitchell, “JPEG: Still Image Data Compression Standard”, Van
Nostrand Reinhold, New York, 1993.
[4] A. Skodras, C. Christopoulos, and T. Ebrahimi, "The JPEG 2000 still image compression
standard," IEEE Signal Processing Magazine, vol. 18, no. 5, pp. 36-58, September 2001.
[5] S. Bhattacharjee, S. Das, D. Roy Choudhury and P. Pal Chouduri, “ A Pipelined Architecture
Algorithm for Image Compression”, Proc. Data Compression Conference, Saltlake City, USA,
March 1997.
[6] Sami Khuri and Hsiu-Chin Hsu “Interactive Packages for Learning Image Compression
Algorithms” lists, requires prior specific permission and/or a fee. ITiCSE 2000, Helsinki,
Finland.
Validation of the Development Methodologies
Ammar LAHLOUHI
ABSTRACT
This paper argues that modelling the development methodologies can improve the multi-agents
systems software engineering. Such modelling allows applying methods, techniques and
practices used in the software development to the methodologies themselves. The paper
discusses then the advantages of the modelling of development methodologies. It describes a
model of development methodologies, uses such a model to develop a system of their partial
validation, and applies such a system to multi-agent methodologies. Several benefits can be
gained from such modelling, such as the improvement of the works on the development,
evaluation and comparison of multi-agent development methodologies.
KEYWORDS
Development methodologies, Modelling, Multi-agent systems.
VOLUME LINK:https://www.airccse.org/journal/ijwest/vol1.html
REFERENCES
[1]Bernon, C., Gleizes, M. P., Picard, G., &Glize, P. (2002). The Adelfe Methodology For an
Intranet System Design. In proceedings of the fourth international bi-conference workshop on
agent-oriented information systems (AOIS 2002 at CaiSE’02) Toronto (Ontario, Canada), May
27-28, 2002.
[2] Bresciani, P., Perini, A., Giorgini, P., Giunchiglia, F., & Mylopoulos, J. (2004). Tropos: An
agentoriented software development methodology. Autonomous Agents and Multi-Agent
Systems, 8(3), 203-236.
[3] Bush, G., Cranefield, S., & Purvis, M. (2001). The Styx agent methodology. The Information
Science Discussion Paper Series 2001/02, Department of Infor- mation Science, University of
Otago, New Zealand., Jan. 2001.
[4] Caire, G., Coulier, W., Garijo, F., at al.. (2002). Agent oriented analysis using
MESSAGE/UML. In Agent-oriented software engineering II (pp. 119-135). Springer Berlin
Heidelberg.
[5] Calisti M., M. Cossentino, Methodology Work Plan, Document number f- wp-00023,
Approved at 2003/02/10, http://www.fipa.org/docs/wps/f-wp-00023/f-wp-00023.html (accessed
27/04/2014)
[6] Cernuzzi, L., & González, M. (2002). A Framework for Evaluating WIS Design
Methodologies. Enterprise Information Systems III. Kluwer Academic Publishers, Dordrecht,
The Netherlands, 198207.
[7] Cernuzzi, L., & Rossi, G. (2002). On the evaluation of agent oriented modeling methods. In
Proceedings of Agent Oriented Methodology Workshop, Seattle (Vol. 29).
[8] Collinot, A., Drogoul, A., & Benhamou, P. (1996, December). Agent oriented design of a
soccer robot team. In Proceedings of the Second International Conference on Multi-Agent
Systems (ICMAS96) (pp. 41-47).
[9] Cuesta, P., Gómez, A., González, J. C., & Rodríguez, F. J. (2003). A framework for
evaluation of agent oriented methodologies. In Proceedings of the Conference of the Spanish
Association for Artificial Intelligence (Vol. 147, pp. 151-152).
[10] Dam, K. H., & Winikoff, M. (2004). Comparing agent-oriented methodologies. In Proc. of
the Fifth Int. Bi-Conference Workshop on Agent-Oriented Information Systems (at AAMAS03),
pp. 78-93. Springer Berlin Heidelberg.
[11] DeLoach, S. A., Wood, M. F., & Sparkman, C. H. (2001). Multiagent systems engineering.
International Journal of Software Engineering and Knowledge Engineering, 11(03), 231-258.
[12] Elammari, M., & Lalonde, W. (1999). An agent-oriented methodology: High-level and
intermediate models. In Proc. of the 1st Int. Workshop. on Agent-Oriented Information Systems
(pp. 1-16).
[13] Ferber, J., & Gutknecht, O. (1998). A meta-model for the analysis and design of
organizations in multi-agent systems. In Proceeding of the 3rd International Conference on
Multi-Agent Systems (ICMAS 98). IEEE CS Press.
[14] Ferber, J., Treur, J., Müller, J. P., Gutknecht, O., & Jonker, C. M. (2000). Organization
models and behavioral requirements specification for multi-agent systems. In Multi-Agent
Systems, International Conference on (pp. 0387-0387). IEEE Computer Society.
[15] Giunchiglia, F., Mylopoulos, J., & Perini, A. (2003). The tropos software development
methodology: processes, models and diagrams. In Agent-Oriented Software Engineering III (pp.
162-173). Springer Berlin Heidelberg.
[16] Gómez-Sanz, J. J., &Pavón, J. (2002). Agent Oriented Software Engineering with
MESSAGE. Proceedings of the fourth international bi-conference workshop on agent-oriented
information systems (AOIS 2002 at CaiSE’02) Toronto (Ontario, Canada), May 27-28.
[17] Iglesias, C. A., Garijo, M., González, J. C., & Velasco, J. R. (1996). A methodological
proposal for multiagent systems development extending CommonKADS. In Proceedings of the
10th Banff knowledge acquisition for knowledge-based systems workshop (Vol. 1, pp. 25-1).
[18] Iglesias, C. A., Garijo, M., & González, J. C. (1999). A survey of agent-oriented
methodologies. In Intelligent Agents V: Agents Theories, Architectures, and Languages: 5th
International Workshop, ATAL’98 Paris, France, July 4–7, 1998 Proceedings (pp. 317-330).
Springer Berlin Heidelberg.
[19] Jennings, N. R. (2001). An agent-based approach for building complex software systems.
Communications of the ACM, 44(4), 35-41.
[20] Kellner, M. I., Madachy, R. J., & Raffo, D. M. (1999). Software process simulation
modeling: why? what? how?. Journal of Systems and Software, 46(2), 91-105.
[22] Lind, J. (1999). A process model for the design of multi-agent systems. Research report of
German Research Center for AI (DFKI), number TM-99-03.
[23] Nwana, H. S., Ndumu, D. T., Lee, L. C., & Collis, J. C. (1999). ZEUS: a toolkit for building
distributed multiagent systems. Applied Artificial Intelligence, 13(1), 129-185.
[24] Odell, J., Parunak, H. V. D., & Bauer, B. (2000). Extending UML for agents. Proc. of the
AgentOriented Information Systems Workshop at the 17th National conference on Artificial
Intelligence (AAAI), 2000.
[25] O’malley, S. A., & DeLoach, S. A. (2002). Determining when to use an agent-oriented
software engineering In Proceedings of the Second International Workshop On Agent-Oriented
Software Engineering (AOSE-2001), pages 188-205, Montreal, May 2001.
[26] Omicini, A. (2001). SODA: Societies and infrastructures in the analysis and design of
agent-based systems. In Proceedings of the First International Workshop of Agent-Oriented
Software Engineering, AOSE. Springer-Verlag, Berlin (pp. 185-193).
[27] Osterweil, L. (1987). Software processes are software too. In Proceedings of the 9th
international conference on Software Engineering (pp. 2-13). IEEE Computer Society Press.
[28] Osterweil, L. J. (1997). Software Processes Are Software Too, Revisited: An Invited Talk
on the Most Influential Paper of ICSE 9. In Proc. 19th Int’l Conf. Software Engineering (ICSE).
(pp 540-548)
[29] Padgham, L., & Winikoff, M. (2003). Prometheus: A methodology for developing
intelligent agents. In Agent-oriented software engineering III (pp. 174-185). Springer Berlin
Heidelberg.
[30] Paulk, M. C., Weber, C., Curtis, B., &Chrisses, M. B. The Capability Maturity Model:
Guidelines for Improving the Software Process. 1995. Addison Wesley.
[31] Perry D.E. and G.E. Kaiser. Models of software development environments. IEEE
Transactions on Software Engineering, 17, March 1991.
[32] Sabas, A., Delisle, S., & Badri, M. (2002). A comparative analysis of multiagent system
development methodologies: Towards a unified approach. In Third International Symposium
From Agent Theory to Agent Implementation (AT2AI-3), Volume 2, pages 599–604.
[33] Shehory, O., & Sturm, A. (2001). Evaluation of modeling techniques for agent-based
systems. In Proceedings of the Fifth International Conference on Au- tonomous Agents, pages
624-631. ACM Press.
[34] Sturm, A., &Shehory, O. (2004). A framework for evaluating agent-oriented methodologies.
In Agent-Oriented Information Systems (pp. 94-109). Springer Berlin Heidelberg.
[36] Wood, M. F., & DeLoach, S. A. (2001). An overview of the multiagent systems engineering
methodology. In Agent-Oriented Software Engineering (pp. 207-221). Springer Berlin
Heidelberg.
[37] Wooldridge, M., Jennings, N. R., & Kinny, D. (2000). The Gaia methodology for agent-
oriented analysis and design. Autonomous Agents and Multi-Agent Systems, 3(3), 285-312.
[38] Wooldridgey, M., &Ciancarini, P. (2001). Agent-oriented software engineering: The state of
the art. In Agent-Oriented Software Engineering. Lecture Notes in AI Volume 1957. (pp. 1-28).
[39] Xu H. and S. M. Shatz, A Framework for Modeling Agent-Oriented Soft- ware, Proceedings
of the 21st International Conference on Distributed Com- puting Systems (ICDCS 2001), April
16-19, 2001, Phoenix, Arizona, USA. IEEE Computer Society, pages 57-64, 2001.
[40] Xu, H. (2003). A Model-based approach for development of multi-agent software systems
(Doctoral dissertation, University of Illinois).
[41] Zambonelli, F., Jennings, N. R., & Wooldridge, M. (2003). Developing multiagent systems:
The Gaia methodology. ACM Transactions on Software Engineering and Methodology
(TOSEM), 12(3), 317370.
Search for Optimized Cost matrix for Performance Enhancement
of Anomaly Based Intrusion Detection System using
Cost Sensitive Classifier
ABSTRACT
Intrusion Detection Systems (IDSs) should maximize security while minimize cost. Classic
evaluation measures have been extensively studied in the past. Recently, cost-sensitive
classification has received much attention. A cost-sensitive classifier uses cost values to evaluate
the performance of the classifier. However, these cost values must be given in advance and are
generally unknown for a given dataset. It is very time consuming to find these cost values. Again
if it is possible to find out such cost values same cannot be used for other datasets. In a typical
classification task, all types of misclassifications are treated equally. However, in many practical
cases, not all misclassifications are equal. Therefore, it is critical to use a cost-sensitive classifier
to minimize cost of misclassifications. This work uses MetaCost, a costsensitive meta-classifier
that takes in a classification algorithm, training data, and a cost matrix. In order for MetaCost to
be effective, we need to find an optimal cost matrix. In this paper we have proposed a new
optimization technique for choosing the cost matrix: cost matrix optimization technique for
Anomaly Based Intrusion Detection System (ABIDS). This approach can be applied for finding
out optimized cost matrix for any datasets.
KEYWORDS
Intrusion Detection System, Anomaly based Intrusion Detection System, classification
algorithm, accuracy, confusion matrix, cost matrix.
VOLUME LINK:https://airccse.com/ijcsitce/vol1.html
REFERENCES
[1] Pang-Ning Tan, Michael Steinbach, and Vipin Kumar, “Introduction to Data Mining”,
AddisonWesley, 2006.
[2] Ian H. Witten and Eibe Frank, “Data Mining: Practical Machine Learning Tools and
Techniques”, Elsevier, second edition, 2005.
[3] Mark J. Lawson, “The Search for a Cost Matrix to Solve Rare-Class Biological Problems”,
PhD Thesis, Department of Computer Science, VirginiaTech, Virginia, 2009.
[5] D. D. Margineantu, “Methods for Cost-Sensitive Learning”, PhD Thesis, Oregon State
University, 2001.
[7] Pedro Domingos, “MetaCost: A general method for making classifiers cost-sensitive”, Fifth
International Conference on Knowledge Discovery and Data Mining, pp. 155-164, 1999.
[8] Mahesh V. Joshi, Vipin Kumar, and Ramesh C. Agarwal, “Evaluating boosting algorithms to
classify rare classes: Comparison and improvements”, Proceedings of the First IEEE
International Conference on Data Mining (ICDM'01), 2001.
[9] Yamnin Sun, Mohamed S. Kamel, Andrew K. C. Wong, and Yang Wang, “Cost-sensitive
boosting for classification of imbalanced data”, Pattern Recognition, Vol. 40, pp. 3358-3378,
2007.
Authors
Dr. Manasi Gyanchandani PhD from MANIT, Bhopal. M.E & B.E. in
Computer Science & Engineering. She has around 19 years teaching experience.
Guided 20 Mtech theses. Area of interest includes Artificial Intelligence, Neural
Networks and Intrusion Detection Systems. Currently completed her Ph.D in the
area of Anomaly Based Intrusion Detection systems. Working as an Assistant
Professor at Maulana Azad National Institute of Technology, Bhopal since 2005.
Dr. J. L.Rana Professor and Ex-Head of Dept of MANIT Bhopal. PhD
from IIT Mumbai MS from USA (Hawaii) Guided 20 Ph.Ds
Dr. R.N.Yadav B.E. and Mtech from Motilal Nehru Regional Engineering
College Allahabad, and Maulana Azad National Institute of Technology,
Bhopal. Ph.D from IIT Kanpur. Working as an Professor in the Department
of Electronics at Maulana Azad National Institute of Technology, Bhopal.
Contrast of Resnet and Densenet Based on the
Recognition of Simple Fruit Data Set
Ding Tianye
Hangzhou Foreign Language School, Hangzhou, Zhejiang, China
ABSTRACT
In this paper, a fruit image data set is used to compare the efficiency and accuracy of two widely
used Convolutional Neural Network, namely the ResNet and the DenseNet, for the recognition
of 50 different kinds of fruits. In the experiment, the structure of ResNet-34 and DenseNet_BC-
121 (with bottleneck layer) are used. The mathematic principle, experiment detail and the
experiment result will be explained through comparison.
KEYWORDS
Deep learning, Object recognition, Computer vision, Image processing, Convolutional Neural
Networks.
VOLUME LINK:https://airccse.com/ijcsitce/current2019.html
REFERENCES
[1] Fruits-360, Version: 2018.07.01.0. https://www.kaggle.com/moltean/fruits. last visited on
12.07.2018.
[3] M. Liang, X. Hu, Recurrent Convolutional Neural Network for Object Recognition, IEEE
Conference on Computer Vision and Pattern Recognition (CVPR) Boston, pp. 3367-3375, 2015.
[5] keitakurita, Learning Rate Tuning in Deep Learning: A Practical Guide, 2018.
http://mlexplained.com/2018/01/29/learning-rate-tuning-in-deep-learning-a-practical-guide/. last
visited on 15.01.2019.
[6] Z. Liu, answering why DenseNet requires more memory in training, 2017.
https://www.reddit.com/r/MachineLearning/comments/67fds7/d_how_does_densenet_compare_t
o_re snet_and/. last visited on 12.01.2019
AUTHORS
ABSTRACT
Modern IP networks are complex entities that require constant maintenance and care. Similarly,
constructing a new network comes with a high amount of upfront cost, planning, and risk. Unlike
the disciplines of software and hardware engineering, networking and IT professionals lack an
expressive and useful certification language that they can use to verify that their work is correct.
When installing and maintaining networks without a standard for describing their behavior,
teams find themselves prone to making configuration mistakes. These mistakes can have real
monetary and operational efficiency costs for organizations that maintain large networks. In this
research, the Network Certification Description Language (NETCDL) is proposed as an easily
human readable and writeable language that is used to describe network components and their
desired behavior. The complexity of the grammar is shown to rank in the top 5 out of 31
traditional computer language grammars, as measured by metrics suite. The language is also
shown to be able to express the majority of common use cases in network troubleshooting. A
workflow involving a certifier tool is proposed that uses NETCDL to verify network correctness,
and a reference certifier design is presented to guide and standardize future implementations.
KEYWORDS
Physical Network Testing, Automated Testing, Integration Testing.
VOLUME LINK:https://airccse.com/ijcsitce/current2018.html
REFERENCES
[1] Ieee standard for verilog hardware description language. IEEE Std 1364-2005 (Revision of
IEEE Std 1364-2001), pages 1{560, 2006.
[2] N. Allen. Network Maintenance and Troubleshooting Guide: Field-tested Solutions for
Everyday Problems, 2nd Edition. Addison Wesley, Upper Saddle River, NJ, USA, 2010.
[3] T. L. Alves and J. Visser. Sdfmetz: Extraction of metrics and graphs from syntax definitions.
on Language Descriptions, Tools, and Applications, page 101, 2007.
[4] T. L. Alves and J. Visser. A case study in grammar engineering. In Software Language
Engineering, pages 285{304. Springer, 2008.
[6] I. Chef Software. Chef - automation for web-scale it. http://www.getchef.com/chef, October
2014.
[13] J. Heering, P. R. H. Hendriks, P. Klint, and J. Rekers. The syntax definition formalism
sdfreference manual. ACM Sigplan Notices, 24(11):43{75, 1989.
[14] A. Hellesy. Cucumber: behaviour driven development with elegance and joy.
http://cukes.info/, October 2014.
[21] D. Libes. expect: Curing those uncontrollable fits of interaction. In USENIX Summer, pages
183{192, 1990.
[22] S. McQuerry. Interconnecting Cisco Network Devices, Part 1 (ICND1). Cisco Press,
Indianapolis IN, USA, 2008.
[23] S. McQuerry. Interconnecting Cisco Network Devices, Part 2 (ICND2). Cisco Press,
Indianapolis IN, USA, 2008.
[24] Saltstack. Saltstack - fast, scalable and exible systems management software for data center
automation, cloud orchestration, server provisioning, configuration management and more.
http://www.saltstack.com, October 2014.
[25] I. Shrubbery Networks. Rancid - really awesome new cisco config differ.
http://www.shrubbery.net/rancid/, January 2014.
[26] J. J. Van der Ham, F. Dijkstra, F. Travostino, H. Andree, and C. T. de Laat. Using rdf to
describe networks. Future Generation Computer Systems, 22(8):862{867, 2006.
Energy Efficient Linear Cluster Handling Protocol
for WSN
Jaspinder Kaur1 and Varsha Sahni2
ABSTRACT
Wireless sensor networks (WSNs) have attained expanding awareness from both the research
association and authentic users. The efficient usage of energy source in a sensor node is very
major criteria to sustain the life time of wireless sensor network. For obtaining durability of
network lifetime, and reducing energy consumption, energy efficiency routing protocol play an
important role. We are exhibit an innovative and energy efficient routing protocol in our
research. Towards Energy Efficiency in Linear WSNs a linear cluster handling (LCH) technique
is used with multiple static sinks in a linearly enhanced field of 1500m*350m2. We are divided
the whole into four equal sub-regions. We set multiple static sinks i.e. one at the centre and two
at the both corners of the field for efficient data gathering. A reactive and Distance plus energy
dependent clustering protocol Threshold Sensitive Energy efficient with Linear Cluster Handling
[4] DE (TEEN-LCH) is implemented in the network field. Simulation shows improved results
for our proposed protocol in term of throughput, packet delivery ratio and energy consumption.
KEYWORDS
WSN, Routing Protocols, nodes, energy.
VOLUME LINK:https://airccse.com/ijcsitce/papers/3216ijcsitce01.pdf
REFERENCES
[1] Geetha. V., Pranesh.V. Kallapur, Sushma Tellajeera,” Clustering in Wireless Sensor
Networks: Performance Comparison of LEACH & LEACH-C Protocols Using NS2”
ELSEVIER Procedia Technology 4 ( 2012 ) 163 – 170
[2] Zhao Han, Jie Wu, Member, IEEE, Jie Zhang, Liefeng Liu, and Kaiyun Tian, “A General
Self-Organized TreeBasedEnergy-Balance Routing Protocol” IEEE TRANSACTIONS ON
NUCLEAR SCIENCE, VOL. 61, NO. 2, APRIL 2014
[3] Shanthi Dr. E.RamaDevi “A Cluster Based Routing Protocol in Wireless Sensor Network for
Energy Consumption” Int. J. Advanced Networking and Applications Volume: 05, Issue: 04,
Pages:2015-2020 (2014) ISSN : 0975-0290 International Journal of Computational Science,
Information Technology and Control Engineering (IJCSITCE) Vol.3, No.1/2, April 2016 10
[5] DaWei Xu, Jing Gao,a “Comparison Study to Hierarchical Routing Protocols in Wireless
Sensor Networks” ELSEVIER Procedia Environmental Sciences 10 ( 2011 ) 595 – 600 [6] B.
Manzoor, N. Javaid, O. Rehman, M. Akbar, Q. Nadeem, A. Iqbal, M. Ishfaq” Q-LEACH: A
New Routing Protocol for WSNs ” Procedia Computer Science 19 ( 2013 ) 926 – 931
[7] M. Sajid, K. Khan, U. Qasim, Z.A. Khaan,S. Tariq, N. Javaid,”A New Linear Cluster
Hnadling(LCH)Technique Toward’s Energy efficiency in Linear WSNs” 2015 IEEE 29
International Conference on Advanced Information Networking and Applications.
[8] Jaspinder Kaur, Varsha Sahni “Survey on Hierarchical Cluster Routing Protocols of WSN”
International Journal of Computer Applications (0975 – 8887) Volume 130 – No.17,
November2015
[10] Kemal Akkaya , Mohamed Younis “A survey on routing protocols for wireless sensor
networks” ELSEVIER,
[11] Jaspinder Kaur, Taranvir Kaur, Kanchan Kaushal “Survey on WSN Routing Protocols”
International Journal of Computer Applications (0975 – 8887) Volume 109 – No. 10, January
2015
[12] Varsha Sahni ,Jaspreet Kaur, Sonia Sharma “Security Issues and Solutions in Wireless
Sensor Networks” International Journal of Computer Science and Information Technologies,
Vol. 3 (2) , 2012,
[13] Nikolaos A. Pantazis, Stefanos A. Nikolidakis and Dimitrios D.Vergados, Senior Member,
IEEE” EnergyEfficient Routing Protocols in Wireless Sensor Networks: A Survey” IEEE
communications survey & tutorials, vol. 15, no. 2, second quarter 2013
[14] Harjeet Kaur 1, Manju Bala 2 ,Varsha Sahni 3 “Study of Black hole Attack Using Different
Routing Protocols in MANET” International Journal of Advanced Research in Electrical,
Electronics and Instrumentation Engineering, Vol. 2, Issue 7, July 2013
[15] Sanjeev Kumar Gupta, Neeraj Jain, Poonam Sinha “ Clustering Protocols in Wireless
Sensor Networks: A Survey” International Journal of Applied Information Systems (IJAIS) –
ISSN : 2249-0868 Foundation of Computer Science FCS, New York, USA Volume 5– No.2,
January 2013
[16] S. Misra et al. (eds.), Guide to Wireless Sensor Networks, Computer Communications and
Networks, DOI: 10.1007/978-1-84882-218-4 4, Springer-Verlag cAst2weszvxvx London
Limited 2009.
[17] Manju Bala , Lalit Awasthi “On Proficiency of HEED Protocol with Heterogeneity for
Wireless Sensor Networks with BS and Nodes Mobility” International Journal of Applied
Information Systems (IJAIS) – ISSN : 2249-0868 Foundation of Computer Science FCS, New
York, USA Volume 2– No.7, May 2012
[18] Ming Zhang, Yanhong Lu, Chenglong Gong, “ Energy-Efficient Routing Protocol based on
Clustering and Least Spanning Tree in Wireless Sensor Networks”, International Conference on
Computer Science and Software Engineering,IEEE, 2008.
[19] Jennifer Yick , Biswanath Mukherjee, Dipak Ghosal“ On the Wireless sensor network
survey” ELSEVIER, Computer Networks 52 (2008) 2292–2330
Pandemic Information Dissemination Web
Application: A Manual Design for Everyone
O. Nolasco-Jáuregui1and L.A. Quezada-Téllez2
ABSTRACT
The aim of this research is to generate a web application from an inedited methodology with a series of
instructions indicating the coding in a flow diagram. The primary purpose of this methodology is to aid
non-profits in disseminating information regarding the COVID-19 pandemic, so that users can share vital
and up-to-date information. This is a functional design, and a series of screenshots demonstrating its
behaviour is presented below. This unique design arose from the necessity to create a web application for
an information dissemination platform; it also addresses an audience that does not have programming
knowledge. This document uses the scientific method in its writing. The authors understand that there is a
similar design in the bibliography; therefore, the differences between the designs are described herein; it
is very important to point out that this proposal can be taken as an alternative to the design of any web
application.
KEYWORDS
Infodemic, web application, Python, Flask, Social Media, COVID-19 & Analysis.
VOLUME LINK:https://airccse.com/ijcsitce/current2022.html
REFERENCES
[1] Eysenbach, G. ―How to fight an infodemic: the four pillars of infodemic management‖,
Journal of medical Internet research, 22(6), e21820, 2020.
[2] World Health Organization. ―Director-General‘s remarks at the media briefing on 2019
novel coronavirus on 8 February 2020‖, 2020.
[3] Mendoza, M., Poblete, B., & Castillo, C. ―Twitter under crisis: Can we trust what we RT?‖.
In Proceedings of the first workshop on social media analytics (pp. 71-79, 2010.
[4] Starbird, K., Maddock, J., Orand, M., Achterman, P., & Mason, R. M. ―Rumors, false flags,
and digital vigilantes: Misinformation on twitter after the 2013 boston marathon bombing‖.
IConference Proceedings, 2014.
[5] Kim, L., Fast, S. M., &Markuzon, N. ―Incorporating media data into a model of infectious
disease transmission‖. PloS one, 14(2), e0197646, 2019.
[6] Shaman, J., Karspeck, A., Yang, W., Tamerius, J., &Lipsitch, M. ―Real-time influenza
forecasts during the 2012–2013 season‖, Nature communications, 4(1), 1-10, 2013.
[7] Viboud, C., &Vespignani, A. ―The future of influenza forecasts‖, Proceedings of the
National Academy of Sciences, 116(8), 2802-2804, 2019.
[8] Buchanan, M. ―Managing the infodemic‖, Doctoral dissertation, Nature Publishing Group.,
2020)
[9] Cinelli, M., Quattrociocchi, W., Galeazzi, A., Valensise, C. M., Brugnoli, E., Schmidt, A. L.,
... & Scala, A. ―The COVID-19 social media infodemic‖, Scientific Reports, 10(1), 1-10, 2020.
[10] Cuello-Garcia, C., Pérez-Gaxiola, G., & van Amelsvoort, L. ―Social media can have an
impact on how we manage and investigate the COVID-19 pandemic‖, Journal of clinical
epidemiology, 127, 198, 2020.
[11] Jurkowitz, M., & Mitchell, A. ―Americans who primarily get news through social media
are least likely to follow COVID-19 coverage, most likely to report seeing made-up news‖, Pew
Research Center, 2020.
[12] Hitlin, P., & Olmstead, K. ―The science people see on social media‖, Pew Research Center,
2019.
[13] Smailhodzic, E., Hooijsma, W., Boonstra, A., & Langley, D. J. ―Social media use in
healthcare: A systematic review of effects on patients and on their relationship with healthcare
professionals‖, BMC health services research, 16(1), 1-14, 2016.
[14] Zarocostas, J. (2020). How to fight an infodemic. The lancet, 395 (10225), 676.
[15] Chou, W. Y. S., Oh, A., & Klein, W. M. ―Addressing health-related misinformation on
social media‖, Jama, 320(23), 2417-2418, 2018.
[16] Wang, Y., McKee, M., Torbica, A., & Stuckler, D. ―Systematic literature review on the
spread of health-related misinformation on social media‖, Social science & medicine, 240,
112552, 2019.
[17] Neumann, G., & Kawaoka, Y. ―Predicting the next influenza pandemics‖, The Journal of
infectious diseases, 219, S14-S20, 2019.
[18] Chitra, U., & Musco, C. ―Analyzing the impact of filter bubbles on social network
polarization‖., In Proceedings of the 13th International Conference on Web Search and Data
Mining, pp. 115-123, 2020.
[19] Holone, H. ―The filter bubble and its effect on online personal health information‖,
Croatian medical journal, 57(3), 298, 2016.
[20] Lau, A. Y., &Staccini, P. ―Artificial intelligence in health: new opportunities, challenges,
and practical implications2, Yearbook of medical informatics, 28(01), 174178, 2019.
[21] Yang, K. C., Pierri, F., Hui, P. M., Axelrod, D., Torres-Lugo, C., Bryden, J., & Menczer, F.
(2021). ―The COVID-19 Infodemic: Twitter versus Facebook‖. Big Data & Society, 8(1),
20539517211013861.
[22] Islam, M. S., Sarkar, T., Khan, S. H., Kamal, A. H. M., Hasan, S. M., Kabir, A., ... & Seale,
H. ―COVID-19–related infodemic and its impact on public health: A global social media
analysis‖, The American journal of tropical medicine and hygiene, 103(4), 1621, 2020.
[25] GoodFirms (2020). What is a Web Framework?. Retrieved January 7th 2021 from
GoodFirms: https://www.goodfirms.co/glossary/web-framework/
[26] JetBrains (2021).The Python IDE for Professional Developers. Retrieved January 8th 2021
from JetBrains S.R.O.: https://www.jetbrains.com/pycharm/
[27] JetBrains (2021).Download PyCharm for Windows. Retrieved January 8th 2021 from
JetBrains S.R.O.: https://www.jetbrains.com/pycharm/download/#section=windows
[28] Armin Ronacher and Contributors (2015). The Pallets Projects (Flask). Retrieved January
9th 2021 from WSGI.org: https://palletsprojects.com/p/flask/
[29] Python Software Foundation (2021) Python Web Server Gateway Interface v1.01. Retrieved
January 11th 2021 from python.org: https://www.python.org/dev/peps/pep3333 [30] Corey
Schafer (2021). Development, Design, DIY and more [Blog]. Retrieved January 10th 2021 from
CoreyMS: https://coreyms.com/
[31] Bradley Mitchel (2020, October 23). 127.0.0.1 IP Address Explained. Retrieved January
11th 2021 from LifeWire: https://www.lifewire.com/network-computer-special-ipaddress-
818385
[32] Getbootstrap (2020). Introduction. Retrieved January 12th 2021 from The Bootstrap
Authors and MIT license: https://getbootstrap.com/docs/4.3/gettingstarted/introduction/
[33] PythonBasic.org (2020). Flask HTTP methods, handle GET & POST. Retrieved January
13th 2021 from Python Basic.org:
https://pythonbasics.org/flaskhttpmethods/#:~:text=A%20GET%20message%20is%20send,not%
20cached%20by%20the %20server
[34] PythonBasic.org (2020). Send an E-mail with Python Flask. Retrieved January 14th 2021
from PythonBasic.org: https://pythonbasics.org/flask-mail/
[35] Python Software Foundation (2021). email: Examples. Retrieved January 16th 2021 from
python.org: https://docs.python.org/3/library/email.examples.html
[36] Andromeda (2020, November 28th). Flask-Bcrypt. Retrieved January 17th 2021 from
Andromeda.local Debian Linux Version 10.7: http://lira.no-ip.org:8080/doc/pythonflask-
bcryptdoc/html/
[37] Simon Tatham (2020, November 22). Download PuTTy. Retrieved January 18th 2021 from
putty.org: https://www.putty.org/
[38] Linode (2020, October 7th). Use Public Key Ahuthetication with SSH. Retrieved January
18th 2021 from Linode: https://www.linode.com/docs/guides/use-public-keyauthentication-
withssh/#windows
[39] Linode (2020, November 24). DNS Manger. Retrieved January 18th 2021 from Linode:
https://www.linode.com/docs/guides/dns-manager/
[40] Hanson, C., & Walcott, K. R. (2018). ―NETCDL: The Network Certification Description
Language‖. International Journal of Computational Science, Information Technology and Control
Engineering, 5(3).
[41] Kaur, J., & Sahni, V. (2016). ―Energy Efficient Linear Cluster Handling Protocol For
WSN‖. International Journal of Computational Science, Information Technology and Control
Engineering, 3(3).
[42] Kularia, Y., Kohli, S., & Bhattacharya, P. P. (2016). ―Analysis Of Acoustic Channel
Characteristics For Underwater Wireless Sensor Networks‖. International Journal of
Computational Science, Information Technology and Control Engineering, 3(1/2).
Adaptive Type-2 Fuzzy Second Order Sliding
Mode Control for Nonlinear Uncertain Chaotic
System
Rim Hendel1, Farid Khaber1 and Najib Essounbouli2
ABSTRACT
In this paper, a robust adaptive type-2 fuzzy nonsingular sliding mode controller is designed to stabilize
the unstable periodic orbits of uncertain perturbed chaotic system with internal parameter uncertainties
and external disturbances. In Higher Order Sliding Mode Control (HOSMC),the chattering phenomena of
the control effort is reduced, by using Super Twisting algorithm. Adaptive interval type-2 fuzzy systems
are proposed to approximate the unknown part of uncertain chaotic system and to generate the Super
Twisting signals. Based on Lyapunov criterion, adaptation laws are derived and the closed loop system
stability is guaranteed. An illustrative example is given to demonstrate the effectiveness of the proposed
controller.
KEYWORDS
Chaotic System, Type-2 Fuzzy Logic System, second order Sliding Mode Control, Lyapunov
Stability.
VOLUME LINK:https://airccse.com/ijcsitce/vol2.html
REFERENCES
[1] E. Tlelo-Cuautle,(2011) “Chaotic Systems”, JanezaTrdine 9, 51000 Rijeka, Croatia.
[2] I. Zelinka, S. Celikovsky, H. Richter & G. Chen, (2010) “Evolutionary Algorithms and
Chaotic Systems”, Studies in Computational Intelligence, vol. 267, Springer-Verlag Berlin
Heidelberg.
[5] L-X. Yang, Y-D. Chu, J.G. Zhang, X-F. Li & Y-X. Chang,(2009) “Chaos synchronization in
autonomous chaotic system via hybrid feedback control”, Chaos, Solitons and Fractals, vol. 41,
pp. 214–223.
[7] Q. Zhang & J-a. Lu,(2008) “Chaos synchronization of a new chaotic system via nonlinear
control”, Chaos, Solitons and Fractals, vol. 37, pp. 175– 179.
[8] Y. Jian, S. Bao, (2014) “Control and Synchronization of Fractional Unified Chaotic Systems
via Active Control Technique”, Proceedings of the 33rd Chinese Control Conference, pp.1977-
1982.
[9] U. E. Vincent, (2008) “Chaos synchronization using active control and backstepping control:
a comparative analysis”, Nonlinear Analysis, Modelling and Control, Vol. 13, No. 2, pp. 253–
261.
[10] B. A. Idowu, U. E. Vincent & A. N. Njah, (2008) “Control and synchronization of chaos in
nonlinear gyros via backstepping design”, International Journal of Nonlinear Science, Vol. 5,
No.1 , pp. 11-19.
[11] F. Farivar, M.A. Shoorehdeli, (2012) “Fault tolerant synchronization of chaotic heavy
symmetric gyroscope systems versus external disturbances via Lyapunov rule-based fuzzy
control”, ISA Transactions, vol. 51, pp. 50-64.
[12] L-D. Zhao, J-B. Hu, J-A. Fang, W-X. Cui, Y-L. Xu, X. Wang, (2013) “Adaptive
synchronization and parameter identification of chaotic system with unknown parameters and
mixed delays based on a special matrix structure”, ISA Transactions, vol. 52, pp. 738-743.
[13] T-C Lin, C-H Kuo, (2011) “H-infinity synchronization of uncertain fractional order chaotic
systems:Adaptive fuzzy approach”, ISA Transactions, vol. 50, pp. 548-556.
[14] R. Hendel, F.Khaber, N. Essounbouli, (2015) “Chaos Control via Adaptive Interval Type-2
Fuzzy Nonsingular Terminal Sliding Mode Control”, International Journal of Computational
Science, Information Technology and Control Engineering (IJCSITCE), Vol.2, pp. 19-31.
[15] N. Vasegh& A. K. Sedigh, (2009) “Chaos control in delayed chaotic systems via sliding
mode based delayed feedback”, Chaos, Solitons and Fractals, vol. 40, pp. 159–165.
[17] C. Yin, S. Dadras, S-m. Zhong& Y. Q. Chen, (2013) “Control of a novel class of fractional-
order chaotic systems via adaptive sliding mode control approach”, Applied Mathematical
Modelling, vol. 37, pp. 2469–2483.
[18] X. Zhang, X. Liu & Q. Zhu, (2014) “Adaptive chatter free sliding mode control for a class
of uncertain chaotic systems”, Applied Mathematics and Computation, vol. 232, pp. 431 –435.
[19] M. Fazlyab, M.Z. Pedram, H. Salarieh, A. Alastyn, (2013) “Parameter estimation and
interval type-2 fuzzy sliding mode control of a z-axis MEMS gyroscope”, ISA Transactions,
vol.52, pp. 900-911.
[20] R. Hendel, F. Khaber, (2013) “Stabilizing Periodic Orbits of Chaotic System Using
Adaptive Type-2 Fuzzy Sliding Mode Control”, Proceedings of The first International
Conference on Nanoelectronics, Communications and Renewable Energy ICNCRE’13 ,Jijel,
Algeria, p. 488-493.
[21] W. Perruquetti, J.P. Barbot, (2002) “Sliding mode control in engineering”, Marcel Dekker.
[22] X. Liu, Y. Han, (2014) “Finite time control for MIMO nonlinear system based on higher-
order sliding mode”, ISA Transactions, vol. 53, pp. 1838-1846.
[23] J. Wang, Q.Zong, R. Su, B.Tian, (2014) “Continuous high order sliding mode controller
design for a flexible air-breathing hypersonic vehicle”, ISA Transactions, vol. 53, pp. 690-698.
[24] A. Levant, (2007) “Principles of 2-sliding mode design”, Automatica, vol. 43, pp. 1247-
1263.
[26] A. Levant, (2001) “Universal SISO sliding mode controllers with finite-time convergence”,
IEEE Transactionson Automatic Control, vol. 46, pp. 1447– 1451.
[27] N.N. Karnik, J.M. Mendel, Q. Liang, (1999) “Type-2 fuzzy logic systems”, IEEE Trans.
Fuzzy Syst, vol. 7, pp. 643-658.
[28] J.E. Slotine, W.P. Li, (1991) “Applied Nonlinear Control”, Prentice-Hall, Englewood Cliffs,
NJ.
Authors
ABSTRACT
Optical Character Recognition (OCR) is the process which enables a system to without human
intervention identifies the scripts or alphabets written into the users’ verbal communication. Optical
Character identification has grown to be individual of the mainly flourishing applications of knowledge in
the field of pattern detection and artificial intelligence. In our survey we study on the various OCR
techniques. In this paper we resolve and examine the hypothetical and numerical models of Optical
Character Identification. The Optical character identification or classification (OCR) and Magnetic
Character Recognition (MCR) techniques are generally utilized for the recognition of patterns or
alphabets. In general the alphabets are in the variety of pixel pictures and it could be either handwritten or
stamped, of any series, shape or direction etc. Alternatively in MCR the alphabets are stamped with
magnetic ink and the studying machine categorize the alphabet on the basis of the exclusive magnetic
field that is shaped by every alphabet. Both MCR and OCR discover utilization in banking and different
trade appliances. Earlier exploration going on Optical Character detection or recognition has shown that
the In Handwritten text there is no limitation lying on the script technique. Hand written correspondence
is complicated to be familiar through due to diverse human handwriting style, disparity in angle, size and
shape of calligraphy. An assortment of approaches of Optical Character Identification is discussed here all
along through their achievement.
KEYWORDS
Optical Character Identification, offline Hand written Character Recognition, Pre-processing,
characteristic Extraction, categorization, Post Processing.
VOLUME LINK:https://airccse.com/ijcsitce/current2017.html
REFERENCES
[1] Sushruth Shastry, Gunasheela G, Thejus Dutt, Vinay D S and Sudhir Rao Rupanagudi, “i” -
A novel algorithm for Optical Alphabet Recognition (OCR). 978-1-4673-5090-7/13/$31.00
©2013 IEEE.
[2] Lulu Zhang, Xingmin Shi, Yingjie Xia, Kuang Mao, “A Multi-filter Based License Plate
Localization and Recognition Framework”. 978-1-4673-4714-3/13/$31.00 ©2013 IEEE. [3]
Ibrahim El Khatib, Yousef Samir-Mohamad Omar, and Ali Al Ghouwayel, “AN EFFICIENT
ALGORITHM FOR AUTOMATIC RECOGNITION OF THE LEBANESE CAR LICENSE
PLATE. ISBN: 978-1-4799-5680-7/15/$31.00 ©2015 IEEE.
[4] Jieun Kim, and Ho-sub Yoon “Graph Matching Method for Alphabet Recognition in Natural
Scene Images. 978-1-4244-8956-5/11/$26.00 ©2011 IEEE
[5] Feng Yanga,and Fan Yangb, “Alphabet Recognition Using Parallel BP Neural Network”.
978-14244-1724-7/08/$25.00©2008IEEE.
[6] Rókus Arnold, and Póth Miklós “Alphabet Recognition Using Neural Networks. 11th IEEE
International Symposium on Computational Intelligence and Informatics • 18–20 November,
2010 • Budapest, Hungary.
[7] Amarjot Singh , Ketan Bacchuwar , Akash Choubey, and Devinder Kumar , “An OMR
Based Automatic Music Player”. 978-1-61284-840-2/11/$26.00 ©2011 IEEE.
[8] Shan Du, Member, IEEE, Mahmoud Ibrahim, Mohamed Shehata, Senior Member, IEEE, and
Wael Badawy, Senior Member, IEEE “Automatic License Plate Recognition (ALPR):A State-
ofthe-Art Review, IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO
TECHNOLOGY, VOL. 23, NO. 2, FEBRUARY 2013.
[9] Imran Shafiq Ahmad, BoubakeurBoufama, Pejman Habashi, William Anderson and Tarik
Elamsy, “Automatic License Plate Recognition:
[10] A Comparative Study”. 2015 IEEE International Symposium on Signal Processing and
Information Technology (ISSPIT).
[11] Rejean Plamondon, Fellow, IEEE, and Sargur N. Srihari, Fellow, IEEE, “On-Line and Off-
Line Handwriting Recognition:A Comprehensive Survey 1EEE TRANSACTIONS ON
PATTERN ANALYSIS AND MACHINE INTELLIGENCE. VOL. 22, NO. 1. JANUARY
2000.
[12] Hadar I. Avi-Itzhak, Thanh A. Diep, and Harry Garland, “High Accuracy Optical Alphabet
Recognition Using Neural Networks with Centroid Dithering IEEE TRANSACTIONS ON
PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 17, NO. 2, FEBRUARY
1995.
[13] Shalin A. Chopra, Amit A. Ghadge, Onkar A. Padwa, Karan S. Punjabi, Prof. Gandhali S.
Gurjar, “Optical Alphabet Recognition”, International Journal of Advanced Research in
Computer and Communication Engineering Vol. 3, Issue 1, January 2014.
[14] C. Nelson Kennedy Babu, Member IEEE and Krishnan Nallaperumal, Senior Member
IEEE, “A License Plate Localization using Morphology and Recognition”, 978-1-4244-2746-
8/08/$25.00 ©2008 IEEE.
[16] Aparna.A, and Prof. I.Muthumani, “Optical Alphabet Recognition for Handwritten Cursive
English alphabets”, International Journal of Computer Science and Information Technologies,
Vol. 5 (1) , 2014, 847-848.
[17] Jacob George, Varghese George, A. Deepan, Joshua Ninan Valson, “Optical Alphabet
Recognition Based Hand-Held Device for Printed Text to Braille Conversion 978-1-4244-925 3-
4 /11/$26.00 ©2011 IEEE.
[18] Miguel A. Ferrer, Moises Diaz, Cristina Carmona-Duarte and Aythami Morales, “A
Behavioral Handwriting Model for Static and Dynamic Signature Synthesis: IEEE
TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE 2016.