Volume 5, Issue 6, June 2014

High Level FPGA Modeling for Image Processing Algorithms Using Xilinx System Generator
Pages: 1-8 (8) | [Full Text] PDF (814K)
Alareqi Mohammed, Elgouri Rachid and Hlou Laamari
Laboratory of Electrical Engineering and Energy System, Faculty of Sciences, Ibn Tofail University, Kenitra, Morocco
National School of Applied Sciences (ENSA), Ibn Tofail University, Kenitra, Morocco

Abstract -
This paper presents concept of hardware software co-simulation for image processing using Xilinx System Generator (XSG). This technique, provides a set of Simulink blocks (models) for several hardware operations that could be implemented on various Xilinx FPGA. This paper presents an efficient architecture for various image processing algorithms for negatives, image enhancement, contrast stretching, for grayscale and color images by using fewest possible System Generator Blocks. Performances of theses architectures implemented in FPGA card XUPV5-LX110T prototyping Virtex5 were presented.
 Index Terms - Image Processing, Xilinx System Generator and Field Programmable Gate Array (FPGA)
Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone
Pages: 9-14 (6) | [Full Text] PDF (564K)
Mushtaq Ahmed and Abdul Basit
Department of Computer Science and Engineering, University of Engineering and Technology, Lahore, Pakistan

Abstract -
With increasing popularity and ever emerging business needs there was an immense focus to improve the Internet world and to provide guarantee for service delivery. Simplest example for this case is VoIP where two subscribers make a voice call through MPLS based backbone. The end subscribers should have similar quality as that of POTS. Subscribers will expect a real time conversation with limited or no jitter. A guaranteed bandwidth must be provided to VoIP users as they don’t care about core network which logically should be transparent to end users. Another feature of MPLS called Quality of Services (QoS) addressed these issues effectively by ensuring real time conversation and guaranteed bandwidth. VPN is a tunnel through Internet to connect two different local area networks in a strict security and data encryption techniques. MPLS VPN use peer to peer VPN which merges the salient feature of Overlay VPN model and peer to peer VPN. In this paper we have enlighten MPLS introduction, MPLS VPN, Traffic Engineering and MPLS QoS in MPLS IP backbone. We have provided connectivity to different customers in MPLS backbone by implementing MPLS VPN and Provide Quality of Service to these customers locally in this backbone area. Also apply Traffic Engineering in MPLS backbone to optimize the backbone resources. On top of MPLS TE and MPLS QoS, we have also discussed MPLS QoS which guarantees less or no jitter and fixed bandwidth. Mainly we have used GNS3 for implementation and simulation.
 Index Terms - Traffic Engineering, MPLS, Implementation and Simulation
Feature Extraction from Human Facial Images
Pages: 15-19 (5) | [Full Text] PDF (498K)
Arati Jhunjhunwala and Samir Kumar Bandyopadhyay
Department of Computer Science and Engineering, University of Calcutta, India

Abstract -
Due to technological advancements there is an arousal of the world where human being and intelligent robots live together. Area of Human Computer Interaction (HCI) plays an important role in resolving the absences of neutral sympathy in interaction between human being and machine (computer). HCI will be much more effective and useful if computer can predict about emotional state of human being and hence mood of a person from supplied images on the basis of facial expressions. It is observed that 7% of human communication information is communicated by linguistic language (verbal part), 38% by paralanguage (vocal part) and 55% by facial expression. For classifying facial expressions into different categories, it is necessary to extract important facial features which contribute in identifying proper and particular expressions. Recognition and classification of human facial expression by computer is an important issue to develop automatic facial expression recognition system in vision community. This paper introduces some novel models for all steps of a face recognition system from a non-frontal RGB image. For face portion segmentation (face detection) and localization, morphological image processing operations are used. Permanent facial features like eyebrows, eyes, mouth and nose are extracted using SUSAN edge detection operator, facial geometry, edge projection analysis.
 Index Terms - HCI, Face Detection, Non-Frontal Face, RGB Image Facial Features, and Segmentation SUSAN Edge Detection Operator
The Impact of “Fuzzy” Symmetries on Artificial Intelligence
Pages: 20-25 (6) | [Full Text] PDF (437K)
Balaji R. Bombade and Balaji S. Shetty
Department of Information Technology

Abstract -
Many futurists would agree that, had it not been for RAID, the extensive unification of hash tables and write-ahead logging might never have occurred. In this position paper, we validate the study of telephony, which embodies the con- firmed principles of cyberinformatics. It at first glance seems perverse but has ample historical precedence. In order to realize this ambition, we introduce an omniscient tool for enabling RPCs (FusilTrey), verifying that the famous introspective algorithm for the construction of virtual machines by Smith and Gupta [36] is Turing complete.
 Index Terms - RAID, Cyberinformatics, Artificial Intelligence and Algorithm
Efficient Bandwidth Management in Wireless Sensor Network
Pages: 26-30 (5) | [Full Text] PDF (325K)
Yasir saleem, Yasir Salam and M. Burhan Zahoor
Department of Computer Science & Engineering, University of Engineering & Technology, Lahore, Pakistan

Abstract -
Bandwidth management is a technique to control the communication traffic or data on a network link. If the traffic increased on the link it would result in network congestion or a deadlock situation is created. Bandwidth management is measured in bits or bytes per second. Bandwidth management is useful for internet service providers (ISP), host service providers (HSP) and application service providers (ASP). In wireless sensor network sensor node can easily be attacked by the hacker so it could be handled by efficient bandwidth management scheme. Different routing algorithms have been proposed by the researchers to efficiently use the bandwidth. Our bandwidth management scheme integrates two ideas: first, we develop a method that permits the network administrator to define a rule for the sensor network how to manage the traffic produced by sensors. Second, we show that hop by hop flow control is a better way to evade unnecessary collision leads to packet losses and retransmission. Our simulation results from a 45-node wireless sensor show that these two approaches are modest to implement and permits unusual network bandwidth to be used efficiently. Network performance is increased to increase the lifetime of the sensor node. Collision leads to packet losses and retransmission.
 Index Terms - Internet Service Providers, Host Service Providers, Application Service Providers, Wireless Sensor Networks and Host by Host