4,394 results
Search Results
2. Wireless Security in Libya: A Survey Paper
- Author
-
Abdelfattah Mahmoud and Salima Benqdara
- Subjects
Computer science ,Computer security ,computer.software_genre ,computer ,Wireless security - Published
- 2019
- Full Text
- View/download PDF
3. Survey Paper on IoT based Smart Intelligent Toilet using SVM and Regression Algorithms
- Author
-
S Yashaswini, Ashwini K, and K Vasudha
- Subjects
Support vector machine ,Toilet ,Computer science ,business.industry ,Artificial intelligence ,Regression algorithm ,business ,Machine learning ,computer.software_genre ,Internet of Things ,computer - Published
- 2019
- Full Text
- View/download PDF
4. Stock Prediction using Machine Learning a Review Paper
- Author
-
Neeha Khalfay, Vidhi Soni, Nirbhey Singh Pahwa, and Deepali Vora
- Subjects
business.industry ,Computer science ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,02 engineering and technology ,Artificial intelligence ,021001 nanoscience & nanotechnology ,0210 nano-technology ,Machine learning ,computer.software_genre ,Stock prediction ,business ,computer - Published
- 2017
- Full Text
- View/download PDF
5. Review paper on Blue Brain Technology
- Author
-
Mannu Kumari and Rizwan Khan
- Subjects
Multimedia ,Computer science ,computer.software_genre ,computer - Published
- 2018
- Full Text
- View/download PDF
6. Review Paper on Discrete Cosine Transform using Different Types of Adder
- Author
-
Paresh Rawat, Aarti Ranji, and Nashrah Fatima
- Subjects
Adder ,Theoretical computer science ,Computer science ,Hardware description language ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,02 engineering and technology ,Integrated circuit ,Inverse discrete cosine transform ,020202 computer hardware & architecture ,law.invention ,Computer Science::Hardware Architecture ,law ,Computer Science::Multimedia ,VHDL ,0202 electrical engineering, electronic engineering, information engineering ,Discrete cosine transform ,Lapped transform ,Hardware_ARITHMETICANDLOGICSTRUCTURES ,Arithmetic ,computer ,Transform coding ,computer.programming_language ,Data compression - Abstract
power design is one of the most significant challenges to maximize battery life time in portable devices and to save the energy during system process. Discrete Cosine Transform (DCT) is widely used in image and video compression process. Here in this paper, we review on low power Discrete Cosine Transform architecture by using varies methods. Discrete Cosine Transform (DCT) is most popular method used today in video compression systems. A number of algorithms have been proposed for implementation of the DCT. Loeffler (1989) has specified a new class of 1D-DCT using only 29 additions and 11 multiplications. To implement such an algorithm, one or more than one multipliers have to be integrated. This process requires a high occupation of silicon area. Arithmetic distribution is generally used for such algorithms. The coding for reconfigurable 8-point Discrete Cosine Transform (DCT) has been done using VHDL, under Xilinx platform. KeywordsCosine Transform (DCT), Inverse Discrete Cosine Transform (IDCT), Very High Speed Integrated Circuit Hardware Description Language (VHDL)
- Published
- 2016
- Full Text
- View/download PDF
7. Survey Paper on Digital Image Sharing by Diverse Image Media
- Author
-
Ashwini Udmale and S. B. Nimbekar
- Subjects
021110 strategic, defence & security studies ,Theoretical computer science ,Multimedia ,Computer science ,business.industry ,0211 other engineering and technologies ,Cryptography ,02 engineering and technology ,computer.software_genre ,Secret sharing ,Image (mathematics) ,Digital image ,Information hiding ,Ciphertext ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,020201 artificial intelligence & image processing ,Noise (video) ,business ,computer - Abstract
Conventional cryptography is a method of transforming message into an unreadable format called as cipher text. This cipher text can easily be shared over the network without fear but anyone can get message easily by applying key on cipher text. Sharing and delivering secret images over the network is also known as a visual secret sharing (VSS) scheme. However main drawback of VSS scheme is that it is experience from high transmission risk due to the shares are like noise. As the shares are like noise which in turn lead to cause the attackers attention. To solve this problem mechanism is developed called Natural image based visual secret sharing (NVSS). This paper is motivated by need of novel mechanism to transfer the secret images over network. In proposed work for regeneration of secret image a generated noisy share, natural images and seed (needed for random functions used) are required at the receiving end. Though generated share is noisy and its contents are not recognizable, overall structure may be visible in some cases. So data hiding is should be performed on generated share to hide that structure (texture) in noisy share.
- Published
- 2016
- Full Text
- View/download PDF
8. A Survey Paper on Voice over Internet Protocol (VOIP)
- Author
-
Urjashee Shaw and Bobby Sharma
- Subjects
Softswitch ,business.product_category ,Computer science ,computer.internet_protocol ,02 engineering and technology ,Mobile communications over IP ,law.invention ,Internet protocol suite ,law ,Internet Protocol ,Next-generation network ,0202 electrical engineering, electronic engineering, information engineering ,Internet access ,Voice over IP ,business.industry ,Wireless network ,InformationSystems_INFORMATIONSYSTEMSAPPLICATIONS ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Local area network ,020206 networking & telecommunications ,IP tunnel ,NAT traversal ,020201 artificial intelligence & image processing ,The Internet ,Communications protocol ,business ,Telecommunications ,computer ,Private network ,Computer network - Abstract
over Internet protocol (VoIP), which is a communication protocol existing over a network. The IP network can makes it possible for users to make telephone calls using the VoIP technology. Use of VoIP and Internet telephony has increased significantly in the recent years. These new phone services are based on the transmission of voice over packet switched IP networks. VoIP can be realized on any data network that uses IP, like the Internet, Intranets and Local Area Networks (LAN). VoIP customers use their Internet connection to connect to the Internet as well as to make phone calls. VoIP is the real-time transfer of voice signals using the Internet Protocol (IP) over the Internet or a private network. In simpler terms, your voice is converted to digital signal by VoIP that travels over the internet. The key factors that entice enterprises to switch to VoIP are its flexibility and cost efficiency. Some security problems may arise due to the widespread deployment of VoIP. Voice over IP (VoIP) has the potential to provide interactive communication services like video and voice conferencing. VoIP helps to transfer data which are difficult to transfer over circuit-switched wired and wireless networks.
- Published
- 2016
- Full Text
- View/download PDF
9. Survey Paper on Encryption, Authentication and Auditing Services for better Cloud Security
- Author
-
Aishwarya Gupta and Vishwajeet Pattanaik
- Subjects
Authentication ,Cloud computing security ,business.industry ,Computer science ,Internet privacy ,Interoperability ,Vulnerability ,Client-side encryption ,Cloud computing ,Audit ,Encryption ,Computer security ,computer.software_genre ,Information security audit ,The Internet ,business ,computer ,Cloud storage - Abstract
Data Storage Security is matter of concern especially in the field of Cloud Computing where large amount of data is being stored on daily basis over the internet. But the real world is facing some or other challenging issues regarding the same. An ubiquitous and an on-demand access with an interoperable network of your various computing resources and sharing necessary information is the need of this Internet dependent Earth, which has led the generation of Cloud and the virtual world related to it. As the number of users and data over the net are getting increased second by second there is a need of system or method which could hold this with all its privacy, integrity and confidentiality. But the vulnerabilities over Cloud data are weakening the expected progress of the field. Many complex encryption and decryption techniques are being introduced but the new risks get generated. The organisation at every level is concerned with privacy of the data and various attacks which don’t enable them to use the Cloud’s benefits and its susceptibility over the data holds the technology to grow. Some trustworthy and dependable Cloud storage will be a good option with the specific authentication as well as proper agreements and auditing protocols defines earlier itself will motivate the people to be secure and tension free while storing the data over the Cloud. General Terms Cloud Computing, Data storage security.
- Published
- 2016
- Full Text
- View/download PDF
10. A Survey Paper on Image Classification and Methods of Image Mining
- Author
-
Sri Khetwat Saritha and Sandeep Pandey
- Subjects
Automatic image annotation ,Contextual image classification ,business.industry ,Computer science ,Pattern recognition ,Data mining ,Artificial intelligence ,computer.software_genre ,business ,computer ,Image (mathematics) - Published
- 2017
- Full Text
- View/download PDF
11. Review Paper on Wormhole Attack
- Author
-
Garima Kadian and Dinesh Singh
- Subjects
Computer science ,Wireless network ,business.industry ,Data_MISCELLANEOUS ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Wormhole attack ,Cryptography ,ComputerSystemsOrganization_PROCESSORARCHITECTURES ,Computer security ,computer.software_genre ,Hardware_INTEGRATEDCIRCUITS ,Data mining ,business ,computer - Abstract
A Wireless Networks are more accessible to different types of attack than wired Network. One such attack is Wormhole Attack, in which traffic is forwarded and replayed from one location to another through the Wormhole tunnel without negotiating any cryptographic techniques over the network. Thus, it is challenging to defend against this attack. In this paper we review WSN concept and Wormhole Attack. Then we discuss classification of wormhole Attack and also mention few of the initiatives to detect the Wormhole Attack.
- Published
- 2015
- Full Text
- View/download PDF
12. A Survey Paper on Fraud Analysis and Report Visualization in Card System
- Author
-
Deepak Kumar Niware and Shipra Rathore
- Subjects
Artificial neural network ,business.industry ,Computer science ,computer.software_genre ,Visualization ,Product (business) ,Credit card ,ComputingMethodologies_PATTERNRECOGNITION ,The Internet ,Data mining ,Hidden Markov model ,business ,Cluster analysis ,computer - Abstract
Due to rapid growth of internet, online shopping for products is an essential part of everyone’s daily life most of the time credit card is used to pay online for products. It is an easy way to shopping, people can get your desired product on your computer screen or on smart phone. For online purchase use of credit card increases dramatically but still there is some loop holes in system of online shopping which causes online frauds or credit card frauds. There are many techniques like ANIDS Distributed Data mining WSDL, Parallel granular neural networks, Hidden Markov Model, Clustering and Bayes classification, Cost model are used. These techniques use data mining to detect frauds by the use of datasets like KDD99, KDD cup, NSL KDD. In this paper a study on different techniques and evaluate each technique on the best parameters.
- Published
- 2015
- Full Text
- View/download PDF
13. A Review Paper on Currency Recognition System
- Author
-
Jay G. Mehta, Komal Vora, and Ami Shah
- Subjects
Discrete wavelet transform ,Currency ,Computer science ,Frequency domain ,Feature extraction ,Recognition system ,ComputingMilieux_COMPUTERSANDSOCIETY ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Data mining ,computer.software_genre ,computer - Abstract
In this paper, an algorithm based on the frequency domain feature extraction method is discussed for the detection of currency. This method efficiently utilizes the local spatial features in a currency image to recognize it. The entire system is pre-processed for the optimal and efficient implementation of two dimensional discrete wavelet transform (2D DWT) which is used to develop a currency recognition system. A set of coefficient statistical moments are then extracted from the approximate efficient matrix. The extracted features can be used for recognition, classification and retrieval of currency notes. The classification result will facilitate the recognition of fake currency mainly using serial number extraction by implementing OCR. It is found that the proposed method gives superior results. Keywordsextraction, classification, discrete wavelet transform, textural feature, currency recognition, OCR, fake currency, security thread, serial number, RBI marks.
- Published
- 2015
- Full Text
- View/download PDF
14. A Research Paper on Steganography in IPV6
- Author
-
Sumit Sharma, Amit Kr. Yadav, and Lalit Mohan Joshi
- Subjects
Password ,Steganography ,Network packet ,business.industry ,Computer science ,Covert channel ,Data_CODINGANDINFORMATIONTHEORY ,Information security ,Encryption ,Computer security ,computer.software_genre ,IPv6 ,law.invention ,law ,Channel (programming) ,Internet Protocol ,business ,computer ,Computer network - Abstract
Steganography is the process to hide a secret message such that it is very difficult to detect the presence of secret message presence. On other way, the existence of secret message is hidden. A covert channel may refer to the actual medium that is used to communicate the information such as a message, image as well as file. This project uses steganography within the source address fields of Internet Protocol Version 6 (IPv6) packets to create a covert channel through which clandestine messages can be passed from one party to another. A fully functional computer program was designed and written that transparently embeds messages into the source address fields of packets and across IPv6 networks, embedded messages are by these packets. This demonstrates the covert channel possibility within a default Internet protocol. For a malicious purpose such as stealing encryption passwords as well as keys or other secrets from remote hosts in a sequence not easily detectable this channel is used, but it may be used for a noble cause such as secretly passing messages under the watchful eyes of an oppressive regime. The covert channel demonstration in itself the overall information security of society is increased by bringing awareness to the existence of such a steganographic medium.
- Published
- 2015
- Full Text
- View/download PDF
15. A Survey Paper of Structure Mining Technique using Clustering and Ranking Algorithm
- Author
-
Preetibala Deshmukh and Vikram Garg
- Subjects
Information retrieval ,Computer science ,Rank (computer programming) ,Structure mining ,computer.software_genre ,Fuzzy logic ,Ranking (information retrieval) ,Ranking ,Web mining ,Web page ,Data mining ,Cluster analysis ,Literature survey ,computer ,Algorithm - Abstract
A survey of various link analysis and clustering algorithms such as Page Rank, Hyperlink-Induced Topic Search, Weighted Page Rank based on Visit of Links K-Means, Fuzzy K-Means.Ranking algorithms illustrated, Weighted Page Rank is more efficient than Hyperlink-induced Topic Search Whereas clustering algorithms has described Fuzzy Soft, Rough K-Means is a mixture of Rough K-Means and fuzzy softest and provide efficient results than Rough K-Means approach and K-means. The literature survey shows how these algorithms are used for link-analysis and extracts the information, including contents and images from web pages efficiently.In new algorithm Weighted Page Content Rank user can get relevant and important pages easily as it employs web structure mining and web content mining. A webpage ranking analysis can be apply on the scenario where the searching and interaction with the numerous web data is required, so in order to provide effective result the technique can be used.
- Published
- 2015
- Full Text
- View/download PDF
16. Survey Paper on User Defined Spam Boxes using Email Filtering
- Author
-
Sudhakar Chavan, Rupali S. Vairagade, Advait Patil, Varun Joshi, and Nikhil Jaunjal
- Subjects
World Wide Web ,Multimedia ,Computer science ,Email address harvesting ,HTML email ,User defined ,computer.software_genre ,computer ,Spamming ,Email filtering - Published
- 2017
- Full Text
- View/download PDF
17. A Review Paper on Digital Watermarking and its Techniques
- Author
-
Parth Bhatt and Ruchika Patel
- Subjects
Multimedia ,Computer science ,business.industry ,Data_MISCELLANEOUS ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Subject (documents) ,Certification ,computer.software_genre ,Field (computer science) ,Image (mathematics) ,Transmission (telecommunications) ,The Internet ,business ,computer ,Digital watermarking - Abstract
In today’s Era, message transmissions over the internet have protection problems of the digital data. Hence, protection of secret messages during transmission becomes a difficult subject. Digital watermarking is provide protection of digital information or identifying information against illegitimate exploitations and allocations. watermarking is a technology to guarantee and make possible data certification, security and copyright defense of the information. The intend of watermarking is to consist of hidden data in multimedia information to ensure security examination. It would be then probable to progress the surrounded message, even if the information was distorted by one or more non-dangerous attacks. In this paper, we present the various types of watermarking techniques and application region where water making technique required. Also a survey on the some new work is done in image watermarking field.
- Published
- 2015
- Full Text
- View/download PDF
18. Assessing h- and g-Indices of Scientific Papers using k-Means Clustering
- Author
-
A. Govardhan and S. GovindaRao
- Subjects
Set (abstract data type) ,Computer science ,Group (mathematics) ,k-means clustering ,Data mining ,Cluster analysis ,computer.software_genre ,Greedy algorithm ,Partition (database) ,computer ,Task (project management) - Abstract
K-means clustering technique works as a greedy algorithm for partition the n-samples into k-clusters so as to reduce the sum of the squared distances to the centroids. A very familiar task in data analysis is that of grouping a set of objects into subsets such that all elements within a group are more related among them than they are to the others. Kmeans clustering is a method of grouping items into k groups. In this work, an attempt has been made to study the importance of clustering techniques on hand g-indices, which are prominent markers of scientific excellence in the fields of publishing papers in various national and international journals. From the analysis, it is evidenced that k-means clustering algorithm has successfully partitioned the set of 18 observations into 3 clusters.
- Published
- 2014
- Full Text
- View/download PDF
19. A Survey Paper on: Frequent Pattern Analysis Algorithm from the Web Log Data
- Author
-
Samiksha Kankane and Vikram Garg
- Subjects
World Wide Web ,Task (computing) ,Web mining ,Computer science ,Process (engineering) ,Social media ,Data mining ,Line (text file) ,Server log ,Data structure ,computer.software_genre ,Algorithm ,computer - Abstract
Web data mining is an emerging research area where mining data is an important task and various algorithms has been proposed in order to solve the various issues related to the web mining in existing dataset. This paper focuses the concept of data mining and FP-Growth algorithm. As for FPGrowth algorithm, the effectiveness is limited by internal memory size because mining process is on the base of large tree-form data structure. This Research work concentrates on web usage mining and in particular focuses on discovering the web usage patterns of web sites from the server log files. This paper finds the procedure to work with the proposed technique which can be possible to remove the drawback of limitation of the existed technique in the web mining area. The various web usages mining technique can further work on various scientific area, medical area and social media application to approach for the research and security related area. A detail and pattern growth technique can help in getting more data and further on using line up algorithm we can illustrate the data states presentation effectively.
- Published
- 2015
- Full Text
- View/download PDF
20. A Survey Paper on E-Blood Bank and an Idea to use on Smartphone
- Author
-
Satish Niloor, A. S. Shinde, and Tushar Pandit
- Subjects
Scope (project management) ,Computer science ,business.industry ,Component (UML) ,Web application ,Computer security ,computer.software_genre ,business ,computer ,Blood bank - Abstract
is an important aspect for all living things. It proves to be a lifesaving component in case of emergency requirement. There are number of web based blood banks which are available for communication between blood bank and hospitals. None of the online blood bank offers the direct contact between donor and blood bank. This is the major drawback of the existing system. Existing systems are time consuming; require more man power and it is costly. This paper introduces comparison between existing system and improved system. The new idea will improve the existing system and it will move from conventional desktop system to mobile system. This paper introduces new features of improved system over existing system in many aspects. In this paper firstly we are going to explain merits and demerits of existing system. Also this paper will provide brief introduction about improved system and its features and Scope.
- Published
- 2015
- Full Text
- View/download PDF
21. Survey Paper on Variant of New JCJ Protocol
- Author
-
Prachi Kataria, Amol Jadhav, and Bhagyashri Lokhande
- Subjects
Computational complexity theory ,Operations research ,Computer science ,media_common.quotation_subject ,Coercion ,Computer security ,computer.software_genre ,Transparency (behavior) ,Voting ,Key (cryptography) ,ComputingMilieux_COMPUTERSANDSOCIETY ,Protocol (object-oriented programming) ,computer ,Anonymity ,media_common - Abstract
Paper, pens, and ballot-boxes, appropriate procedures were used in traditional voting schemes to reassure voters that the result of the tally is correct [1]. Most viable approach to address voter coercion and vote selling in Internet voting is still the basic concept [4]. Its unrealistic computational requirements of the quadratic-time tallying procedure.is one of the main open issues [4]. In this paper, they examine authorization of votes which is the main cause of the issue and the most recent proposals to perform this step in linear time will be summarized. Based on anonymity sets we explain the key underlying concepts of these proposals and introduce a new protocol. However at the negative side, high transparency will generally make it easier for voters to reveal how they voted [1]. Relevant information is published so that the voter may verify that her vote is included in the final tally and that accepted votes have been cast using proper voting material. With the purpose of internet voting protocol it is practically impossible for vote buyers or coercers to elicit the voters' behavior. The efficiency is compared efficiency with existing work under equal degrees of coercion-resistance using an appropriate measure. Internet voting enjoys wide interest from both researches as well as practices [2]. The main purpose of the new protocol is to move computational complexity introduced in recent works from the voter side to the tallying authority side.
- Published
- 2015
- Full Text
- View/download PDF
22. Review Paper: A Comparative Study on Partitioning Techniques of Clustering Algorithms
- Author
-
Rohit Srivastava and Gopi Gandhi
- Subjects
Fuzzy clustering ,Computer science ,business.industry ,Document classification ,Correlation clustering ,Machine learning ,computer.software_genre ,Field (computer science) ,Data set ,Set (abstract data type) ,ComputingMethodologies_PATTERNRECOGNITION ,Text mining ,Pattern recognition (psychology) ,Artificial intelligence ,Data mining ,Cluster analysis ,business ,computer - Abstract
plays a vital role in research area in the field of data mining. Clustering is a process of partitioning a set of data in a meaningful sub classes called clusters. It helps users to understand the natural grouping or cluster from the data set. It is unsupervised classification that means it has no predefined classes. This paper presents a study of various partitioning techniques of clustering algorithms and their relative study by reflecting their advantages individually. Applications of cluster analysis are Economic Science, Document classification, Pattern Recognition, Image Processing, text mining. No single algorithm is efficient enough to crack problems from different fields. Hence, in this study some algorithms are presented which can be used according to one's requirement. In this paper, various well known partitioning based methods - k-means, k-medoids and Clarans - are compared. The study given here explores the behaviour of these three methods.
- Published
- 2014
- Full Text
- View/download PDF
23. A Review Paper on Different Approaches for Query Optimization using Schema Object base View
- Author
-
Dhaval Patel and Pratik R. Patel
- Subjects
Web search query ,Information retrieval ,Database ,Computer science ,View ,Materialized view ,InformationSystems_DATABASEMANAGEMENT ,computer.software_genre ,Query language ,Query optimization ,Data warehouse ,Query expansion ,Relational database management system ,Web query classification ,Schema (psychology) ,Query by Example ,Sargable ,computer ,computer.programming_language ,RDF query language - Abstract
of Data is the extraction of hidden prognosticative information from large databases or set of data, is a strong new technology with great prospective to help companies focus on the most important information in their data warehouses. Query optimization is a purpose of many relational database management systems. The query optimizer experiments to dictate the most efficient way to implement a given query by examining the possible query plans. In this paper, the different techniques is given for optimizing query using schema based and materialized views in data warehouse namely- view adaptation & synchronization, view selection and view maintenance. Keywordsoptimization, materialized view
- Published
- 2015
- Full Text
- View/download PDF
24. A Trustable Software Agent Framework for the Examination Paper Preparation and Moderation Process (EPMP)
- Author
-
Mohd Zaliman Mohd Yusoff, Moamin A. Mahmoud, Abdulrazaq NathimAbdulrazaq, and Mohd Sharifuddin Ahmad
- Subjects
Process management ,Software agent ,Order (exchange) ,Computer science ,Process (engineering) ,Moderation ,Computer security ,computer.software_genre ,computer ,Domain (software engineering) - Abstract
his paper develops a trustable software agent framework to simulate the possible situations of trust between agents and propose novel solutions that could be provided by software agent technology. The technology is applied to the security and trust process to overcome the serious issues that could be faced by using software agent technology. This study demonstrates the use of autonomous software agents to secure the Examination Paper Preparation and Moderation Process (EPMP) domain and apply security and trust mechanisms on the agents that access and perform various domain tasks. Three levels of trust are designed, which correspond to the EPMP domain's groups of people who are the Examination Committee, Moderator, and Lecturer. Each level has its own trust requirements that should be fulfilled by the agent in order to access the level, otherwise the agent is blocked and access to the level is denied. This work implements the proposed framework for the domain and observes the results of the security and trust mechanisms. It then compares the performance before and after the implementation to see the effectiveness of the framework.
- Published
- 2013
- Full Text
- View/download PDF
25. Survey Paper of Encrypted Data Hiding using Skin Tone Detection
- Author
-
Sachin Patel, Rekha D. Kalambe, and Rakesh Pandit
- Subjects
Biometrics ,Steganography ,business.industry ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Data security ,Cryptography ,Data_CODINGANDINFORMATIONTHEORY ,Encryption ,computer.software_genre ,Information hiding ,Key (cryptography) ,Computer vision ,Artificial intelligence ,Data mining ,business ,computer - Abstract
Steganography is the skill of hiding the existence of data in other transmission medium to attain secret communication. It does not restore cryptography but quite boost the security using its abstruse features. In this paper we have surveyed on a Steganography and cryptography techniques which provide highly secure skin tone data hiding. Biometric characteristic used to apply steganography is skin tone region of images. Here important data is implanted within skin region of image which will give an outstanding secure location for data hiding. For this skin tone detection is need to be performed. Different steps of data hiding can be applied by cropping an image interactively. Cropping of an image improved security than hiding data without cropping the whole image, so cropped region works as a key at decoding region. Cryptography algorithm is used to convert the secret messages to an unreadable form before embedding; which provides a strong backbone for data security. This survey paper focuses on illuminating the technique to secure data or message with authenticity and non repudiation. So with this object oriented steganogaphy we track skin tone objects in image with the higher security and satisfactory PSNR .Modern steganography’s goal is to keep its mere presence undetectable.
- Published
- 2013
- Full Text
- View/download PDF
26. A Survey Paper on Trajectory Pattern Mining for Pattern Matching Query
- Author
-
S. M. Shinde and S. R. Ghule
- Subjects
Transportation planning ,business.industry ,Computer science ,computer.software_genre ,Machine learning ,Graph ,Data set ,Location-based service ,Trajectory pattern ,Graph (abstract data type) ,Data mining ,Artificial intelligence ,Pattern matching ,Sequential Pattern Mining ,business ,computer - Abstract
amount information of moving objects on road network is being collected with the help of various recent technologies. The tracking of these moving objects on road networks is becoming important because of it's application in various areas. Classification has been used for classifying various kinds of data sets like graph, text documents. However, there is a lack of study on data like trajectories on road networks. Data mining techniques, especially, sequential pattern mining can be used to extract frequent spatio-temporal patterns. Again it needs to confine the length of sequential patterns to ensure high efficiency. After extracting frequent sequential patterns in trajectories, classification can be applied to classify patterns which provide useful information in applications such as city and transportation planning, road construction, design, and maintenance, marketing sector. In this paper, whole pattern matching query concept is adopted after the classification to find total traffic volume on given trajectory edge. At the same time, user can find number of vehicles moving in one as well as in both directions on that particular trajectory. Keywordssequential patterns, frequent pattern based classification, location based services, pattern matching.
- Published
- 2014
- Full Text
- View/download PDF
27. Implementation Paper on Visual Education using Data Mining and Innovative Visualization on Cloud
- Author
-
Suraj Gaikwad, Anirban Dutta, and Kunal Pokale
- Subjects
Preference learning ,business.industry ,Computer science ,media_common.quotation_subject ,Kinesthetic learning ,computer.software_genre ,Visualization ,Information visualization ,Visual memory ,Reading comprehension ,Human–computer interaction ,Reading (process) ,Data mining ,business ,Visual learning ,computer ,media_common - Abstract
Kinesthetic, Auditory, Reading / Writing Preference Learning and Visual Learning are the 4 categories of learning types as per the widely used Fleming VAK / VARK model. Visual Learning represents concepts visually. By representing the information visually students are able to concentrate on meaning, acknowledge and group similar ideas easily making better use of visual memory. Visual learning improves student performance in the areas of Retention, Reading Comprehension, Student Achievement and Critical Learning skills. this system focuses on semi-automatically converting textual learning resources related to important world events into visual information. Few examples include Terrorist Activities in India, 26/11 Mumbai bomb blasts and Earth Quakes in India. This systems scrapes the unstructured text from textual learning resources, applies natural language processing to extract named entities in the text, uses location api's and innovative visualizations (e.g. Google Maps) to visualize the world event information in an intuitive manner. Human intervention is needed in case of incomplete information in the learning resource and verification of generated information. This system makes it easy to identify human intervention need via data health reports. General Terms Fleming VAK / VARK model, Visual Learning Data mining, NLP(Natural Language Processing), visualization, cloud.
- Published
- 2015
- Full Text
- View/download PDF
28. Survey Paper on Hadoop- using a Biometric Technique "Iris Recognition"
- Author
-
Yogesh Wagh, Silkesha Thigale, and Umesh S. Soni
- Subjects
Biometrics ,Multimedia ,Computer science ,business.industry ,Computer vision ,Artificial intelligence ,computer.software_genre ,business ,computer - Published
- 2015
- Full Text
- View/download PDF
29. Recognition of Indian Paper Currency based on LBP
- Author
-
Amandeep Kaur, Vipan Vipan, and Bhawani Sharma
- Subjects
Artificial neural network ,business.industry ,Currency ,Computer science ,media_common.quotation_subject ,Quality (business) ,Artificial intelligence ,Simplicity ,Machine learning ,computer.software_genre ,business ,computer ,media_common - Abstract
The importance of automatic methods has increased greatly for paper currency recognition due to the development of modern banking services like automated teller machine (ATM) and automatic goods seller machines. For a machine, it is a challenge to recognize paper currency whether it is of 10, 20, 50, 100, 500 or 1000. Various method or algorithm has been applied to overcome this challenge and in most of systems neural network is used. For this, LBP algorithm is proposed in this paper. The proposed method has advantages of simplicity and high speed. The experimental results show that this method has a high recognition rate. The recognition ratio can achieve 100% in case of good quality images.
- Published
- 2012
- Full Text
- View/download PDF
30. Query Recommendation for Long Tail Queries-A Review Paper
- Author
-
Sunita Yadav and Anand Prasad Gupta
- Subjects
Hierarchy ,Information retrieval ,Web search query ,Computer science ,View ,InformationSystems_INFORMATIONSTORAGEANDRETRIEVAL ,InformationSystems_DATABASEMANAGEMENT ,Online aggregation ,Query optimization ,Query language ,computer.software_genre ,Ranking (information retrieval) ,Spatial query ,Search-oriented architecture ,Search engine ,Query expansion ,Object Query Language ,Web query classification ,Query by Example ,Sargable ,Data mining ,computer ,Boolean conjunctive query ,computer.programming_language ,RDF query language - Abstract
Large volume of queries over large volume of users allows search engine to build methods for generating query suggestion for input query. Query recommendation methods are powerful technique to generate related queries or alternate queries as a query suggestion for original query which is given by user in the search engine first time. In this review paper we discussed about query recommendation methods and comparison between different methods how the query suggestion is given by these methods for the input query by user in search engine. Some query recommendation method do not covers the unseen and rare queries but some of them covers these queries by some additional feature added such as generalize the query token of input query by a suitable place holder from hierarchy tool wordnet3.0 or wekepedia by yago mapping. These generalization techniques are also discussed in this paper.
- Published
- 2012
- Full Text
- View/download PDF
31. Privacy Preserving Association Rule Mining using Horizontally Partition Data: Review Paper
- Author
-
Arpita B. Modh
- Subjects
Association rule learning ,business.industry ,Computer science ,Data stream mining ,Homomorphic encryption ,Cryptography ,computer.software_genre ,Partition (database) ,Paillier cryptosystem ,Information sensitivity ,Data mining ,business ,computer ,Right to privacy - Abstract
Data mining is used to extract interested pattern or knowledge from large amount of data using many data mining technique. However it may also display sensitive information about individuals compromising the individual right to privacy When a collection of data is split among various parties. Now Each and Every party would wants to keep its sensitive information private during the mining process. Privacy preserving data mining is to develop data mining method without increases the risk of misuse of data. The main aim of privacy preserving data mining is to find the global mining results by preserving the individual sites private data/information. The various methods such as randomization, perturbation, heuristic and cryptography techniques. To Find privacy pre serving association rule mining in horizontally and vertically partitioned databases. In this paper, the analysis of different methods for PPARM is performed and their results are compared. Horizontally Partitioned databases, algorithm that combines advantage of both RSA public key cryptosystem and Homomorphic encryption scheme and algorithm that uses Paillier cryptosystem to compute global supports are used. This paper reviews the wide methods used for mining association rules over horizontally distributed dataset while preserving privacy.
- Published
- 2015
- Full Text
- View/download PDF
32. Content Based Image Retrieval for Medical Images Techniques and Storage Methods-Review Paper
- Author
-
Shashideep Chaudhari, K. Wanjale, and Tejas Borawake
- Subjects
Upload ,Digital image ,Information retrieval ,Automatic image annotation ,Multimedia ,Feature (computer vision) ,Computer science ,Digital library ,Content-based image retrieval ,computer.software_genre ,Image retrieval ,computer ,Field (computer science) - Abstract
In the medical field, images, and especially digital images, are produced in ever increasing quantities and used for diagnostics and therapy. Content based access to medical images for supporting clinical decision making has been proposed that would ease the management of clinical data and scenarios for the integration of content-based access methods into Picture Archiving and Communication Systems (PACS) have been created. This article gives an overview of available literature in the field of content based access to medical image data and on the technologies used in the field. Section 1 gives an introduction into generic content based image retrieval and the technologies used. Section 2 describes the basic algorithm used in the implemented systems. Section 3 describes various methods of implementing CBIR. New research directions are being defied that can prove to be useful. This article also identifies explanations to some of the outlined problems in the field as it looks like many propositions for systems are made from the medical domain and research prototypes are developed in computer science departments using medical datasets. Still, there are very few systems that seem to be used in clinical practice. Content-Based Image Retrieval (CBIR) has been a topic of research interest for nearly a decade. Approaches to date use image features for describing content. A survey of the literature shows that progress has been limited to prototype systems that make gross assumptions and approximations. The full text of the article is not available in the cache. Kindly refer the IJCA digital library at www.ijcaonline.org for the complete article. In case, you face problems while downloading the full-text, please send a mail to editor at editor@ijcaonline.org
- Published
- 2010
- Full Text
- View/download PDF
33. Survey Paper on Clustering based Segmentation Approach to Detect Brain Tumour from MRI Scan
- Author
-
Upasana Gaikwad, Kanika Debbarma, and Silkesha Thigale
- Subjects
Computer science ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Brain tumor ,Pattern recognition ,Image processing ,Image segmentation ,medicine.disease ,computer.software_genre ,Fuzzy logic ,Component (UML) ,medicine ,Segmentation ,Data mining ,Artificial intelligence ,Focus (optics) ,Cluster analysis ,business ,Literature survey ,computer - Abstract
In the last few years, many image processing techniques have been presented in order to perform different brain tumor detection tasks. These cover Content-Based Retrieval Technique, Component Labelling Algorithm, Fuzzy C-Mean Algorithm. There is fast growth of image processing available in last few years; image segmentation have work together to get extraction of meaningful data into useful information. Image processing is used to finding applicable and efficient information from data available. With this survey paper we focus on literature survey of segmentation based image processing model as contain efficient performance.
- Published
- 2015
- Full Text
- View/download PDF
34. A Proposed Defect Tracking Model for Classifying the Inserted Defect Reports to Enhance Software Quality Control
- Author
-
Ayman E. Khedr, Torky Sultan, and Mostafa Sayed
- Subjects
Original Paper ,business.industry ,Computer science ,Software development ,bugs ,General Medicine ,bug tracking systems ,computer.software_genre ,Tracking (particle physics) ,Software quality ,Defect tracking ,Data mining ,business ,computer ,defects ,Software quality control ,Step method - Abstract
CONFLICT OF INTEREST: NONE DECLARED Defect tracking systems play an important role in the software development organizations as they can store historical information about defects. There are many research in defect tracking models and systems to enhance their capabilities to be more specifically tracking, and were adopted with new technology. Furthermore, there are different studies in classifying bugs in a step by step method to have clear perception and applicable method in detecting such bugs. This paper shows a new proposed defect tracking model for the purpose of classifying the inserted defects reports in a step by step method for more enhancement of the software quality.
- Published
- 2013
- Full Text
- View/download PDF
35. Python in Computational Science: Applications and Possibilities
- Author
-
Md. Golam Rashed and Raquib Ahsan
- Subjects
Computer science ,Programming language ,010102 general mathematics ,05 social sciences ,Code reuse ,050301 education ,Multiprocessing ,General-purpose language ,Python (programming language) ,computer.software_genre ,01 natural sciences ,Data type ,Computational science ,Scripting language ,0101 mathematics ,0503 education ,Compiled language ,computer ,computer.programming_language - Abstract
This paper focuses on the role of python in dramatic increase in productivity and high-level of code reuse in computational science. The salient features of python make it an ideal language for scientific computing exposing the shortcomings of legacy languages and prototyping platforms. Python provides a rich collection of built-in data types such as strings, lists, dictionaries; dynamic typing and dynamic binding, modules, classes, exceptions handling, automatic memory management, multiprocessing, parallel computing capabilities. Python can also be used as a glue language to wrap around existing static compiled code to obtain optimum performance. The uptrend of adopting python as a general purpose language along with its vast collection of scientific libraries are also reviewed in this paper, which ensures the long term presence of python and its growing user base in the foreseeable future. General Terms Computational Science. Keywords
- Published
- 2018
- Full Text
- View/download PDF
36. Barrier Free Internet Access: Evaluating the Cyber Security Risk Posed by the Adoption of Bring Your Own Devices to e-Learning Network Infrastructure
- Author
-
Eric Tutu Tchao, Seth D. Djane, and Richard Y. Ansah
- Subjects
FOS: Computer and information sciences ,business.product_category ,Courtesy ,Process (engineering) ,Computer science ,E-learning (theory) ,Bring your own device ,Computer security ,computer.software_genre ,Database-centric architecture ,Computer Science - Computers and Society ,Phone ,Computers and Society (cs.CY) ,Personal computer ,Internet access ,business ,computer - Abstract
The adoption of Bring Your Own Device (BYOD), also known as Bring Your Own Technology (BYOT), Bring Your Own Phone (BYOP), or Bring Your Own Personal Computer (BYOPC), is a policy which allows people access to privileged resources, information and services available on the private computer network of an organization using their own personal computer devices. BYOD, since its emergence in 2009, courtesy of Intel, is now a common practice in many organizations. Academic institutions that attempt to implement BYOD, can derive many benefits as well as many risks to its network infrastructure, largely security-based. This paper presents an assessment of a WLAN network which has been deployed for a campus-wide data centric e-learning platform at Kwame Nkrumah University of Science and Technology (KNUST) towards the overall objective of achieving a barrier free internet access to enhance the teaching and learning process at the university. The paper subsequently evaluates the WLAN infrastructure, its accompanying BYOD set-up, and associated likely security risks and threats, and recommends appropriate solutions.
- Published
- 2017
- Full Text
- View/download PDF
37. Virtualization Environment for Computer Labs to Maintain Security, Stability and Availability
- Author
-
Abdalla Alameen
- Subjects
Workstation ,Desktop virtualization ,Computer science ,Operational availability ,Control (management) ,Stability (learning theory) ,Virtualization ,computer.software_genre ,law.invention ,Engineering management ,law ,Human–computer interaction ,Sandbox (computer security) ,ComputingMilieux_COMPUTERSANDEDUCATION ,computer - Abstract
Academic organizations are supposed to seek certain balance between the concerns of security, stability and availability of shared computer labs to achieve the course learning objectives. Some academic activities in computer science courses require students to control and configure some laboratory devices. Students in advanced courses may use some risky applications for some learning activities. It may affect the stability, availability and security of the working nature in the shared lab and networks. Virtualization Platform has the ability to overcome these concerns to achieve learning objectives. Virtualization technologies allow students to access and control the computer settings as well as the working environment in advanced applications without affecting the operational availability of computer labs throughout the college day. Virtualization enables computer security teachers to train their students on many hands-on activities without exposing or causing damages to computer labs. This paper presents the usage of virtualization technology in such environment, the opportunities and benefits of using this technology in computer security oriented courses. The paper also discusses the use of the VMware workstation pro as a sandbox for risky lab activities in computer security courses. Here the Desktop Virtualization offers great opportunities to teach advanced skills in computer security courses. Also, this paper outlines the challenges and limitations of virtualization along with some recommendations to address these limitations.
- Published
- 2017
- Full Text
- View/download PDF
38. Amharic Text Chunker using Conditional Random Fields
- Author
-
Birchiko Achamyeleh, Gebeyehu Belay, and Birhan Hailu
- Subjects
Conditional random field ,Amharic ,business.industry ,Computer science ,language ,General Medicine ,Artificial intelligence ,business ,computer.software_genre ,Amharic text chunker, base phrase chunker, conditional random fields, clause boundary identification ,computer ,language.human_language ,Natural language processing - Abstract
This paper introduces Amharic text chunker using conditional random fields. To get the optimal feature set of the chunker; the researchers’ conduct different experiments using different scenarios until a promising result obtained. In this study different sentences are collected from Amharic grammar books, new articles, magazines and news of Walta Information Center (WIC) for the training and testing datasets. Thus, these datasets were analyzed and tagged manually and used as a corpus for our model training and testing. The entire datasets were chunk tagged manually for the training dataset and approved by linguistic professionals. For the identification of the boundary of the phrases IOB2 chunk specification is selected and used in this study. The result of all experiments is reported with the maximum overall accuracy off 97.26%, with a window size of two on both sides, with their corresponding POS tag of each token and the worst performance achieved is 84.57%, with only the window size of one word on both the left and right sides.
- Published
- 2021
- Full Text
- View/download PDF
39. Challenges and Risk to Implement IOT in Smart Homes: An Indian Perspective
- Author
-
Abhay Kr. Ray and Rakesh Roshan
- Subjects
050210 logistics & transportation ,business.industry ,Computer science ,05 social sciences ,Perspective (graphical) ,Computer security ,computer.software_genre ,03 medical and health sciences ,0302 clinical medicine ,0502 economics and business ,The Internet ,030223 otorhinolaryngology ,business ,Internet of Things ,computer - Abstract
The concept of Internet of Things requires the seamlessly connectivity of millions of heterogeneous devices. In today’s world, Implementation of IoT in Smart Homes is one of the major applications of Internet of Things. In this paper, we will discuss the different challenges and risk to implement IoT in Smart Homes of India. An Indian perspective is taken, because India is in very first stage for implementing the Smart Homes. This paper explains many challenges in Indian scenario like availability of Internet, Cost of devices, device maintenance issue etc. and proposes a framework of smart homes is also discussed here.
- Published
- 2016
- Full Text
- View/download PDF
40. Automatic Speech Recognition System: A Review
- Author
-
Neerja Arora
- Subjects
business.industry ,Computer science ,Speech recognition ,020208 electrical & electronic engineering ,Feature extraction ,020206 networking & telecommunications ,02 engineering and technology ,computer.software_genre ,System a ,Mode (computer interface) ,0202 electrical engineering, electronic engineering, information engineering ,Speech analytics ,Artificial intelligence ,business ,computer ,Natural language processing - Abstract
is the most prominent & primary mode of Communication among human beings. Now-a-days Speech also has potential of being important mode of interaction with computers. This paper gives an overview of Automatic Speech Recognition System, Classification of Speech Recognition System and also includes overview of the steps followed for developing the Speech Recognition System in stages. This paper also helps in choosing the tool and technique along with their relative merits & demerits. A comparative study of different techniques is also included in this paper. KeywordsSpeech Recognition (ASR), ASR classification, Speech Analysis, Feature Extraction, Modelling Techniques, Language Modelling, Testing, ASR Tools.
- Published
- 2016
- Full Text
- View/download PDF
41. Privacy Preserved Data Publishing Techniques for Tabular Data
- Author
-
C Keerthy and S Sabitha
- Subjects
Information retrieval ,Data anonymization ,Computer science ,business.industry ,Data_MISCELLANEOUS ,02 engineering and technology ,Data publishing ,Computer security ,computer.software_genre ,Encryption ,020204 information systems ,Microdata (HTML) ,0202 electrical engineering, electronic engineering, information engineering ,ComputingMilieux_COMPUTERSANDSOCIETY ,business ,computer ,Personally identifiable information - Abstract
Almost all countries have imposed strict laws on the disclosure of Personally Identifiable Information(PII). However PII need to be published for many purposes like research. In such cases, we apply different types of methods like anonymization, encryption etc. This paper discuss about the different methods of anonymization of tabular microdata. The most popular method of data anonymization of tabular data is k-anonymity. However, it suffers from many attacks and hence l-diversity was proposed. The l-diversity anonymization also possessed various limitations and hence t-closeness was proposed. This paper summarize these anonymization techniques and their limitations.
- Published
- 2016
- Full Text
- View/download PDF
42. Swarm Intelligence Approach for Breast Cancer Diagnosis
- Author
-
Mohammad-Hossein Nadimi-Shahraki and Hoda Zamani
- Subjects
business.industry ,Computer science ,food and beverages ,02 engineering and technology ,medicine.disease ,Machine learning ,computer.software_genre ,01 natural sciences ,Swarm intelligence ,010406 physical chemistry ,0104 chemical sciences ,Breast cancer ,0202 electrical engineering, electronic engineering, information engineering ,medicine ,020201 artificial intelligence & image processing ,Artificial intelligence ,skin and connective tissue diseases ,business ,computer - Abstract
the breast cancer has been become one of the main reasons of death in women especially in the developed countries, there have been done many research for breast cancer diagnosis. Although researchers have recently proposed many methods by using intelligent approaches for diseases diagnosis, a few of them fulfill the need of high accuracy. In this paper, the most popular swarm intelligence algorithms PSO, ICA, FA and IWO are applied to diagnosis the breast cancer. The experimental results show that swarm intelligence approach can be applied for breast cancer diagnosis with high accuracy. Moreover, FA can diagnose the breast cancer more accurate than other swarm intelligence methods compared in this paper. KeywordsIntelligence, Diseases diagnosis, Breast cancer
- Published
- 2016
- Full Text
- View/download PDF
43. House Price Forecasting using Data Mining
- Author
-
Ankit Mohokar, Nihar Bhagat, and Shreyash Mane
- Subjects
Operations research ,Computer science ,05 social sciences ,050301 education ,computer.software_genre ,01 natural sciences ,010104 statistics & probability ,House price ,Linear regression ,Estate ,Data mining ,0101 mathematics ,0503 education ,computer - Abstract
People looking to buy a new home tend to be more conservative with their budgets and market strategies. The existing system involves calculation of house prices without the necessary prediction about future market trends and price increase. The goal of the paper is to predict the efficient house pricing for real estate customers with respect to their budgets and priorities. By analyzing previous market trends and price ranges, and also upcoming developments future prices will be predicted. The functioning of this paper involves a website which accepts customer’s specifications and then combines the application of multiple linear regression algorithm of data mining. This application will help customers to invest in an estate without approaching an agent. It also decreases the risk involved in the transaction.
- Published
- 2016
- Full Text
- View/download PDF
44. WACO for Mammogram Classification
- Author
-
S. Vani Kumari and R Sowrya
- Subjects
Weaver ant ,Computer science ,Local binary patterns ,02 engineering and technology ,computer.software_genre ,030218 nuclear medicine & medical imaging ,03 medical and health sciences ,0302 clinical medicine ,Nest ,0202 electrical engineering, electronic engineering, information engineering ,skin and connective tissue diseases ,biology ,Artificial neural network ,Multimedia ,business.industry ,fungi ,food and beverages ,Pattern recognition ,biology.organism_classification ,Backpropagation ,Support vector machine ,Multilayer perceptron ,Shortest path problem ,Path (graph theory) ,020201 artificial intelligence & image processing ,Artificial intelligence ,Pathfinding ,business ,computer - Abstract
Breast cancer is one of the ruinous diseases causing more number of deaths in women. Many efforts are being made to develop efficient techniques to identify the breast cancer at early stage. This paper implements weaver ant colony optimization (WACO) for classifying mammograms. The behavior of weaver ants' to bind the neurons between the layer to make the path to find the output of Neural Network(NN). The unique nest building behavior of Weaver ants' made a considerable remark, NN have proved to be one of the best methods for classification & WACO is used for optimized pathfinding. Each layer of NN is considered as one leaf and the leaves are divided into as many portions equal to the number of neurons,& let ants connect portion of leaf from one layer to another, makes the weight connection in the NN. The task is accomplished by using a NN with a back propagation technique (BPT). To determine the usefulness of WACO based Neural Network (NN)closed nests building behavior made us change the architecture of BPN. Weaver ants show indirect message between ants to find the shortest path between their nest and food sources. These ants ability is to construct nests by weaving together leaves using larval silk .Local Binary Pattern is a method which can be used extract the features for identifying the breast cancer abnormality by mammogram. Multilayer perceptron (MLP) and support vector machine for mammogram classification and mammogram images are preprocessed to reduce noise and detect the background of the mammogram to extract the required features. This paper implements WACO for classifying mammograms. Here we used MIAS database which describes the mammogram is in which stage benign or normal stage
- Published
- 2016
- Full Text
- View/download PDF
45. Classifying Bacterial Species using Computer Vision and Machine Learning
- Author
-
Venkatesh Vijaykumar
- Subjects
business.industry ,Computer science ,Computation ,020207 software engineering ,02 engineering and technology ,Machine learning ,computer.software_genre ,01 natural sciences ,010104 statistics & probability ,0202 electrical engineering, electronic engineering, information engineering ,Computer vision ,Artificial intelligence ,0101 mathematics ,business ,Classifier (UML) ,computer - Abstract
study embodied in this paper, aims at making use of machine learning and computer vision algorithms in order to reliably identify the species of bacteria, from their microscopic images. The study has taken into consideration three of the most commonly occurring species of bacteria that are clinically important. The work shown further in this study can be extended to a larger number of bacteria species. The study makes use of the Speeded Up Robust Features or SURF algorithm for detecting image keypoints. The artificial intelligence classifier makes use of these keypoint vectors as its input variable. It is noteworthy that the images used are taken at the gram staining stage of bacterial identification, in order to minimize any biases in the dataset owing to a variance in staining technique, although the feature detector invariably grayscales the image prior to keypoint computation. The paper follows the study from the conception of the idea, to the formulating of the algorithm, the training and testing of the same.
- Published
- 2016
- Full Text
- View/download PDF
46. OATS: An Architectural Design and Implementation for Telepresence Robots
- Author
-
Swapnil Kalhapure
- Subjects
0209 industrial biotechnology ,Telerobotics ,Multimedia ,business.industry ,Computer science ,020206 networking & telecommunications ,02 engineering and technology ,computer.software_genre ,020901 industrial engineering & automation ,User experience design ,Human–computer interaction ,0202 electrical engineering, electronic engineering, information engineering ,Robot ,business ,computer - Abstract
Robotic Telepresence systems focus majorly on the concept of telecommunication and remote presence with independent mobility. Recently a number of Telepresence robots have been introduced in the market, each with some unique feature and show-off factor. While these systems promise good user experience, they are too expensive for the general public to use them. This paper proposes an innovative approach to build a commercial robotic Telepresence system called OATS. OATS stands for “Open Access Telepresence Systems”, which is an architecture primarily based on open source platforms like, WebRTC and MQTT. The uniqueness of the architecture is that, the Telepresence robot can use any mobile smartphone running an OATS client application, as the brain of the robot, reducing the need of expensive, onboard electronics and processing power. The smartphone connects to a robotic platform that enables the robot to move. Using this robot, a person can remotely interact using any smartphone or laptop. This OATS client connects to a server which provides services required for peer to peer videoconferencing and machine communication between the clients. A user can login to one of this Telepresence robot and pilot it in a remote area, from any part of the world. This architecture not only reduces the cost of the Telepresence robot, but the use of smartphone platform also opens up whole new possibilities for development of next generation of telepresence robots. In this paper, we briefly discuss the OATS architecture, its deployment strategies and its advantages over existing
- Published
- 2016
- Full Text
- View/download PDF
47. A Survey over the Security Issues of Bluetooth using Elliptic Curve Cryptography
- Author
-
Ahmed Hweishel A. Alfarjat and J Hanumanthappa
- Subjects
business.industry ,Computer science ,Cryptographic protocol ,Computer security ,computer.software_genre ,Encryption ,law.invention ,Bluetooth ,Symmetric-key algorithm ,law ,Key (cryptography) ,Elliptic curve cryptography ,business ,computer ,Personally identifiable information ,Hacker - Abstract
In this research paper,the authors are addressing the problem of algorithms for Wireless LAN for Secured Transmission. This research work also proposes an overview of some of the major attacks that Blue tooth has faced over the years along with some possible solutions. The main aim of this research work is to investigate security features of Bluetooth using Elliptic Curve Cryptography(ECC). The ECC is the latest and fastest encryption method which offers stronger security. As it is known that although a vast majority of devices currently now communicates using Bluetooth methodology, the blue tooth security expert provides automatic updates to its security protocol and user privacy protection techniques. Further protection of the device user’s personal information becomes the primary aim. The research work also explores the Bucket Brigade Attack on Bluetooth security using Elliptic Curve Cryptography (ECC). Also it is implied that Bucket Brigade Attack(BBA) is one of the amazing solution to the problem of key agreement or key swapping. Further the beauty of this scheme is when two parties who likes to communicate using symmetric key and an Elliptic Curve Cryptography(ECC) an Intruder(Hacker) enters in between a sender and a receiver. This paper is an attempt to implement the ECC after a survey over the current issues on security.
- Published
- 2016
- Full Text
- View/download PDF
48. Parallel Computing to Predict Breast Cancer Recurrence on SEER Dataset using Map-Reduce Approach
- Author
-
D R Umesh and B. Ramachandra
- Subjects
Speedup ,business.industry ,Computer science ,Breast cancer recurrence ,Computation ,02 engineering and technology ,Parallel computing ,010501 environmental sciences ,computer.software_genre ,Machine learning ,01 natural sciences ,Data set ,ComputingMethodologies_PATTERNRECOGNITION ,020204 information systems ,Map reduce ,0202 electrical engineering, electronic engineering, information engineering ,Artificial intelligence ,Data mining ,business ,Classifier (UML) ,computer ,0105 earth and related environmental sciences - Abstract
to the late overpowering development rate of large scale data, the advancement of handling faster processing algorithms with optimal execution has turned into a critical need of the time. In this paper, parallel Map-Reduce algorithm is proposed, that encourages concurrent participation of various computing hubs to develop a classifier on SEER breast cancer data set. Our algorithm can prompt supported models whose speculation execution is near the respective baseline classifier. By exploiting their own parallel architecture the algorithm increases noteworthy speedup. In addition, the algorithm don't require singular processing hubs to communicate with each other, to share their data or to share the knowledge got from their data and consequently, they are powerful in safeguarding privacy of computation also. This paper utilized the Map-Reduce framework to implement the algorithms and experimented onSEER breast cancer data sets to exhibit the execution as far as classification accuracy and speedup. Keywordscancer; Big dataanalytics, Classification; Parallel Computing; MapReduce, SEER.
- Published
- 2016
- Full Text
- View/download PDF
49. Improving Accuracy using different Data Mining Algorithms
- Author
-
Pooja Pandey and Ishpreet Singh
- Subjects
Computer science ,Process (computing) ,k-means clustering ,Decision tree ,02 engineering and technology ,computer.software_genre ,Field (computer science) ,Term (time) ,Data set ,ComputingMethodologies_PATTERNRECOGNITION ,Pattern recognition (psychology) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Data mining ,Cluster analysis ,computer - Abstract
Mining large data set is an important issue to deal with as data is growing as the field grows. Today, crime rate is a menace that each country faces. With the increase in crime rate the data is increasing and it is such a critical field that accuracy is important at the same time. This paper shows the comparison in the results between clustering and the classification. K means is used in clustering and in classification decision tree is used. The process of applying decision tree and clustering one after the other is used CDDT(clustered data of decision tree) in this paper. General Terms Your general terms must be any term which can be used for general classification of the submitted material such as Pattern Recognition, Security, Algorithms et. al.
- Published
- 2016
- Full Text
- View/download PDF
50. Responsive Web Design Techniques
- Author
-
Waseem I. Bader and Abdelaziz I. Hammouri
- Subjects
Multimedia ,business.industry ,Computer science ,0211 other engineering and technologies ,021107 urban & regional planning ,02 engineering and technology ,computer.software_genre ,Field (computer science) ,World Wide Web ,Responsive web design ,021105 building & construction ,Web design ,Code (cryptography) ,The Internet ,business ,Programmer ,computer - Abstract
As new devices and technologies are invented to access the internet, from computer desktops, laptops, mobile phones to smart TVs, there has been a great need to upgrade the techniques used in the field of website design, because these new devices come along with their own specific sizes and views. Although most devices & technologies try to be as compatible as possible with the common web design features, but there has been an absolute need for website designers to do a lit bit more to adapt to the fast growing race in internet devices and provide all their viewers with the best possible experience while accessing their websites. In this paper, different responsive website design techniques are presented that could adapt to different technologies and devices while at the same time focusing on cutting down the time and effort needed for a website designer or programmer to maintain and edit it. The code samples in this paper were implemented using the ASP.net programming language, but it can be implemented in other development languages and environments using the same concepts.
- Published
- 2016
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.