3,095 results
Search Results
2. Stock Prediction using Machine Learning a Review Paper
- Author
-
Neeha Khalfay, Vidhi Soni, Nirbhey Singh Pahwa, and Deepali Vora
- Subjects
business.industry ,Computer science ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,02 engineering and technology ,Artificial intelligence ,021001 nanoscience & nanotechnology ,0210 nano-technology ,Machine learning ,computer.software_genre ,Stock prediction ,business ,computer - Published
- 2017
3. A Survey Paper on Image Classification and Methods of Image Mining
- Author
-
Sri Khetwat Saritha and Sandeep Pandey
- Subjects
Automatic image annotation ,Contextual image classification ,business.industry ,Computer science ,Pattern recognition ,Data mining ,Artificial intelligence ,computer.software_genre ,business ,computer ,Image (mathematics) - Published
- 2017
4. Survey Paper on Digital Image Sharing by Diverse Image Media
- Author
-
Ashwini Udmale and S. B. Nimbekar
- Subjects
021110 strategic, defence & security studies ,Theoretical computer science ,Multimedia ,Computer science ,business.industry ,0211 other engineering and technologies ,Cryptography ,02 engineering and technology ,computer.software_genre ,Secret sharing ,Image (mathematics) ,Digital image ,Information hiding ,Ciphertext ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,020201 artificial intelligence & image processing ,Noise (video) ,business ,computer - Abstract
Conventional cryptography is a method of transforming message into an unreadable format called as cipher text. This cipher text can easily be shared over the network without fear but anyone can get message easily by applying key on cipher text. Sharing and delivering secret images over the network is also known as a visual secret sharing (VSS) scheme. However main drawback of VSS scheme is that it is experience from high transmission risk due to the shares are like noise. As the shares are like noise which in turn lead to cause the attackers attention. To solve this problem mechanism is developed called Natural image based visual secret sharing (NVSS). This paper is motivated by need of novel mechanism to transfer the secret images over network. In proposed work for regeneration of secret image a generated noisy share, natural images and seed (needed for random functions used) are required at the receiving end. Though generated share is noisy and its contents are not recognizable, overall structure may be visible in some cases. So data hiding is should be performed on generated share to hide that structure (texture) in noisy share.
- Published
- 2016
5. Review Paper on Wormhole Attack
- Author
-
Garima Kadian and Dinesh Singh
- Subjects
Computer science ,Wireless network ,business.industry ,Data_MISCELLANEOUS ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Wormhole attack ,Cryptography ,ComputerSystemsOrganization_PROCESSORARCHITECTURES ,Computer security ,computer.software_genre ,Hardware_INTEGRATEDCIRCUITS ,Data mining ,business ,computer - Abstract
A Wireless Networks are more accessible to different types of attack than wired Network. One such attack is Wormhole Attack, in which traffic is forwarded and replayed from one location to another through the Wormhole tunnel without negotiating any cryptographic techniques over the network. Thus, it is challenging to defend against this attack. In this paper we review WSN concept and Wormhole Attack. Then we discuss classification of wormhole Attack and also mention few of the initiatives to detect the Wormhole Attack.
- Published
- 2015
6. A Survey Paper on Fraud Analysis and Report Visualization in Card System
- Author
-
Deepak Kumar Niware and Shipra Rathore
- Subjects
Artificial neural network ,business.industry ,Computer science ,computer.software_genre ,Visualization ,Product (business) ,Credit card ,ComputingMethodologies_PATTERNRECOGNITION ,The Internet ,Data mining ,Hidden Markov model ,business ,Cluster analysis ,computer - Abstract
Due to rapid growth of internet, online shopping for products is an essential part of everyone’s daily life most of the time credit card is used to pay online for products. It is an easy way to shopping, people can get your desired product on your computer screen or on smart phone. For online purchase use of credit card increases dramatically but still there is some loop holes in system of online shopping which causes online frauds or credit card frauds. There are many techniques like ANIDS Distributed Data mining WSDL, Parallel granular neural networks, Hidden Markov Model, Clustering and Bayes classification, Cost model are used. These techniques use data mining to detect frauds by the use of datasets like KDD99, KDD cup, NSL KDD. In this paper a study on different techniques and evaluate each technique on the best parameters.
- Published
- 2015
7. A Survey Paper on Voice over Internet Protocol (VOIP)
- Author
-
Urjashee Shaw and Bobby Sharma
- Subjects
Softswitch ,business.product_category ,Computer science ,computer.internet_protocol ,02 engineering and technology ,Mobile communications over IP ,law.invention ,Internet protocol suite ,law ,Internet Protocol ,Next-generation network ,0202 electrical engineering, electronic engineering, information engineering ,Internet access ,Voice over IP ,business.industry ,Wireless network ,InformationSystems_INFORMATIONSYSTEMSAPPLICATIONS ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Local area network ,020206 networking & telecommunications ,IP tunnel ,NAT traversal ,020201 artificial intelligence & image processing ,The Internet ,Communications protocol ,business ,Telecommunications ,computer ,Private network ,Computer network - Abstract
over Internet protocol (VoIP), which is a communication protocol existing over a network. The IP network can makes it possible for users to make telephone calls using the VoIP technology. Use of VoIP and Internet telephony has increased significantly in the recent years. These new phone services are based on the transmission of voice over packet switched IP networks. VoIP can be realized on any data network that uses IP, like the Internet, Intranets and Local Area Networks (LAN). VoIP customers use their Internet connection to connect to the Internet as well as to make phone calls. VoIP is the real-time transfer of voice signals using the Internet Protocol (IP) over the Internet or a private network. In simpler terms, your voice is converted to digital signal by VoIP that travels over the internet. The key factors that entice enterprises to switch to VoIP are its flexibility and cost efficiency. Some security problems may arise due to the widespread deployment of VoIP. Voice over IP (VoIP) has the potential to provide interactive communication services like video and voice conferencing. VoIP helps to transfer data which are difficult to transfer over circuit-switched wired and wireless networks.
- Published
- 2016
8. Survey Paper on Encryption, Authentication and Auditing Services for better Cloud Security
- Author
-
Aishwarya Gupta and Vishwajeet Pattanaik
- Subjects
Authentication ,Cloud computing security ,business.industry ,Computer science ,Internet privacy ,Interoperability ,Vulnerability ,Client-side encryption ,Cloud computing ,Audit ,Encryption ,Computer security ,computer.software_genre ,Information security audit ,The Internet ,business ,computer ,Cloud storage - Abstract
Data Storage Security is matter of concern especially in the field of Cloud Computing where large amount of data is being stored on daily basis over the internet. But the real world is facing some or other challenging issues regarding the same. An ubiquitous and an on-demand access with an interoperable network of your various computing resources and sharing necessary information is the need of this Internet dependent Earth, which has led the generation of Cloud and the virtual world related to it. As the number of users and data over the net are getting increased second by second there is a need of system or method which could hold this with all its privacy, integrity and confidentiality. But the vulnerabilities over Cloud data are weakening the expected progress of the field. Many complex encryption and decryption techniques are being introduced but the new risks get generated. The organisation at every level is concerned with privacy of the data and various attacks which don’t enable them to use the Cloud’s benefits and its susceptibility over the data holds the technology to grow. Some trustworthy and dependable Cloud storage will be a good option with the specific authentication as well as proper agreements and auditing protocols defines earlier itself will motivate the people to be secure and tension free while storing the data over the Cloud. General Terms Cloud Computing, Data storage security.
- Published
- 2016
9. A Research Paper on Steganography in IPV6
- Author
-
Sumit Sharma, Amit Kr. Yadav, and Lalit Mohan Joshi
- Subjects
Password ,Steganography ,Network packet ,business.industry ,Computer science ,Covert channel ,Data_CODINGANDINFORMATIONTHEORY ,Information security ,Encryption ,Computer security ,computer.software_genre ,IPv6 ,law.invention ,law ,Channel (programming) ,Internet Protocol ,business ,computer ,Computer network - Abstract
Steganography is the process to hide a secret message such that it is very difficult to detect the presence of secret message presence. On other way, the existence of secret message is hidden. A covert channel may refer to the actual medium that is used to communicate the information such as a message, image as well as file. This project uses steganography within the source address fields of Internet Protocol Version 6 (IPv6) packets to create a covert channel through which clandestine messages can be passed from one party to another. A fully functional computer program was designed and written that transparently embeds messages into the source address fields of packets and across IPv6 networks, embedded messages are by these packets. This demonstrates the covert channel possibility within a default Internet protocol. For a malicious purpose such as stealing encryption passwords as well as keys or other secrets from remote hosts in a sequence not easily detectable this channel is used, but it may be used for a noble cause such as secretly passing messages under the watchful eyes of an oppressive regime. The covert channel demonstration in itself the overall information security of society is increased by bringing awareness to the existence of such a steganographic medium.
- Published
- 2015
10. A Review Paper on Digital Watermarking and its Techniques
- Author
-
Parth Bhatt and Ruchika Patel
- Subjects
Multimedia ,Computer science ,business.industry ,Data_MISCELLANEOUS ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Subject (documents) ,Certification ,computer.software_genre ,Field (computer science) ,Image (mathematics) ,Transmission (telecommunications) ,The Internet ,business ,computer ,Digital watermarking - Abstract
In today’s Era, message transmissions over the internet have protection problems of the digital data. Hence, protection of secret messages during transmission becomes a difficult subject. Digital watermarking is provide protection of digital information or identifying information against illegitimate exploitations and allocations. watermarking is a technology to guarantee and make possible data certification, security and copyright defense of the information. The intend of watermarking is to consist of hidden data in multimedia information to ensure security examination. It would be then probable to progress the surrounded message, even if the information was distorted by one or more non-dangerous attacks. In this paper, we present the various types of watermarking techniques and application region where water making technique required. Also a survey on the some new work is done in image watermarking field.
- Published
- 2015
11. Review Paper: A Comparative Study on Partitioning Techniques of Clustering Algorithms
- Author
-
Rohit Srivastava and Gopi Gandhi
- Subjects
Fuzzy clustering ,Computer science ,business.industry ,Document classification ,Correlation clustering ,Machine learning ,computer.software_genre ,Field (computer science) ,Data set ,Set (abstract data type) ,ComputingMethodologies_PATTERNRECOGNITION ,Text mining ,Pattern recognition (psychology) ,Artificial intelligence ,Data mining ,Cluster analysis ,business ,computer - Abstract
plays a vital role in research area in the field of data mining. Clustering is a process of partitioning a set of data in a meaningful sub classes called clusters. It helps users to understand the natural grouping or cluster from the data set. It is unsupervised classification that means it has no predefined classes. This paper presents a study of various partitioning techniques of clustering algorithms and their relative study by reflecting their advantages individually. Applications of cluster analysis are Economic Science, Document classification, Pattern Recognition, Image Processing, text mining. No single algorithm is efficient enough to crack problems from different fields. Hence, in this study some algorithms are presented which can be used according to one's requirement. In this paper, various well known partitioning based methods - k-means, k-medoids and Clarans - are compared. The study given here explores the behaviour of these three methods.
- Published
- 2014
12. Survey Paper of Encrypted Data Hiding using Skin Tone Detection
- Author
-
Sachin Patel, Rekha D. Kalambe, and Rakesh Pandit
- Subjects
Biometrics ,Steganography ,business.industry ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Data security ,Cryptography ,Data_CODINGANDINFORMATIONTHEORY ,Encryption ,computer.software_genre ,Information hiding ,Key (cryptography) ,Computer vision ,Artificial intelligence ,Data mining ,business ,computer - Abstract
Steganography is the skill of hiding the existence of data in other transmission medium to attain secret communication. It does not restore cryptography but quite boost the security using its abstruse features. In this paper we have surveyed on a Steganography and cryptography techniques which provide highly secure skin tone data hiding. Biometric characteristic used to apply steganography is skin tone region of images. Here important data is implanted within skin region of image which will give an outstanding secure location for data hiding. For this skin tone detection is need to be performed. Different steps of data hiding can be applied by cropping an image interactively. Cropping of an image improved security than hiding data without cropping the whole image, so cropped region works as a key at decoding region. Cryptography algorithm is used to convert the secret messages to an unreadable form before embedding; which provides a strong backbone for data security. This survey paper focuses on illuminating the technique to secure data or message with authenticity and non repudiation. So with this object oriented steganogaphy we track skin tone objects in image with the higher security and satisfactory PSNR .Modern steganography’s goal is to keep its mere presence undetectable.
- Published
- 2013
13. A Survey Paper on E-Blood Bank and an Idea to use on Smartphone
- Author
-
Satish Niloor, A. S. Shinde, and Tushar Pandit
- Subjects
Scope (project management) ,Computer science ,business.industry ,Component (UML) ,Web application ,Computer security ,computer.software_genre ,business ,computer ,Blood bank - Abstract
is an important aspect for all living things. It proves to be a lifesaving component in case of emergency requirement. There are number of web based blood banks which are available for communication between blood bank and hospitals. None of the online blood bank offers the direct contact between donor and blood bank. This is the major drawback of the existing system. Existing systems are time consuming; require more man power and it is costly. This paper introduces comparison between existing system and improved system. The new idea will improve the existing system and it will move from conventional desktop system to mobile system. This paper introduces new features of improved system over existing system in many aspects. In this paper firstly we are going to explain merits and demerits of existing system. Also this paper will provide brief introduction about improved system and its features and Scope.
- Published
- 2015
14. Privacy Preserving Association Rule Mining using Horizontally Partition Data: Review Paper
- Author
-
Arpita B. Modh
- Subjects
Association rule learning ,business.industry ,Computer science ,Data stream mining ,Homomorphic encryption ,Cryptography ,computer.software_genre ,Partition (database) ,Paillier cryptosystem ,Information sensitivity ,Data mining ,business ,computer ,Right to privacy - Abstract
Data mining is used to extract interested pattern or knowledge from large amount of data using many data mining technique. However it may also display sensitive information about individuals compromising the individual right to privacy When a collection of data is split among various parties. Now Each and Every party would wants to keep its sensitive information private during the mining process. Privacy preserving data mining is to develop data mining method without increases the risk of misuse of data. The main aim of privacy preserving data mining is to find the global mining results by preserving the individual sites private data/information. The various methods such as randomization, perturbation, heuristic and cryptography techniques. To Find privacy pre serving association rule mining in horizontally and vertically partitioned databases. In this paper, the analysis of different methods for PPARM is performed and their results are compared. Horizontally Partitioned databases, algorithm that combines advantage of both RSA public key cryptosystem and Homomorphic encryption scheme and algorithm that uses Paillier cryptosystem to compute global supports are used. This paper reviews the wide methods used for mining association rules over horizontally distributed dataset while preserving privacy.
- Published
- 2015
15. A Survey Paper on Trajectory Pattern Mining for Pattern Matching Query
- Author
-
S. M. Shinde and S. R. Ghule
- Subjects
Transportation planning ,business.industry ,Computer science ,computer.software_genre ,Machine learning ,Graph ,Data set ,Location-based service ,Trajectory pattern ,Graph (abstract data type) ,Data mining ,Artificial intelligence ,Pattern matching ,Sequential Pattern Mining ,business ,computer - Abstract
amount information of moving objects on road network is being collected with the help of various recent technologies. The tracking of these moving objects on road networks is becoming important because of it's application in various areas. Classification has been used for classifying various kinds of data sets like graph, text documents. However, there is a lack of study on data like trajectories on road networks. Data mining techniques, especially, sequential pattern mining can be used to extract frequent spatio-temporal patterns. Again it needs to confine the length of sequential patterns to ensure high efficiency. After extracting frequent sequential patterns in trajectories, classification can be applied to classify patterns which provide useful information in applications such as city and transportation planning, road construction, design, and maintenance, marketing sector. In this paper, whole pattern matching query concept is adopted after the classification to find total traffic volume on given trajectory edge. At the same time, user can find number of vehicles moving in one as well as in both directions on that particular trajectory. Keywordssequential patterns, frequent pattern based classification, location based services, pattern matching.
- Published
- 2014
16. Recognition of Indian Paper Currency based on LBP
- Author
-
Amandeep Kaur, Vipan Vipan, and Bhawani Sharma
- Subjects
Artificial neural network ,business.industry ,Currency ,Computer science ,media_common.quotation_subject ,Quality (business) ,Artificial intelligence ,Simplicity ,Machine learning ,computer.software_genre ,business ,computer ,media_common - Abstract
The importance of automatic methods has increased greatly for paper currency recognition due to the development of modern banking services like automated teller machine (ATM) and automatic goods seller machines. For a machine, it is a challenge to recognize paper currency whether it is of 10, 20, 50, 100, 500 or 1000. Various method or algorithm has been applied to overcome this challenge and in most of systems neural network is used. For this, LBP algorithm is proposed in this paper. The proposed method has advantages of simplicity and high speed. The experimental results show that this method has a high recognition rate. The recognition ratio can achieve 100% in case of good quality images.
- Published
- 2012
17. Implementation Paper on Visual Education using Data Mining and Innovative Visualization on Cloud
- Author
-
Suraj Gaikwad, Anirban Dutta, and Kunal Pokale
- Subjects
Preference learning ,business.industry ,Computer science ,media_common.quotation_subject ,Kinesthetic learning ,computer.software_genre ,Visualization ,Information visualization ,Visual memory ,Reading comprehension ,Human–computer interaction ,Reading (process) ,Data mining ,business ,Visual learning ,computer ,media_common - Abstract
Kinesthetic, Auditory, Reading / Writing Preference Learning and Visual Learning are the 4 categories of learning types as per the widely used Fleming VAK / VARK model. Visual Learning represents concepts visually. By representing the information visually students are able to concentrate on meaning, acknowledge and group similar ideas easily making better use of visual memory. Visual learning improves student performance in the areas of Retention, Reading Comprehension, Student Achievement and Critical Learning skills. this system focuses on semi-automatically converting textual learning resources related to important world events into visual information. Few examples include Terrorist Activities in India, 26/11 Mumbai bomb blasts and Earth Quakes in India. This systems scrapes the unstructured text from textual learning resources, applies natural language processing to extract named entities in the text, uses location api's and innovative visualizations (e.g. Google Maps) to visualize the world event information in an intuitive manner. Human intervention is needed in case of incomplete information in the learning resource and verification of generated information. This system makes it easy to identify human intervention need via data health reports. General Terms Fleming VAK / VARK model, Visual Learning Data mining, NLP(Natural Language Processing), visualization, cloud.
- Published
- 2015
18. Survey Paper on Hadoop- using a Biometric Technique "Iris Recognition"
- Author
-
Yogesh Wagh, Silkesha Thigale, and Umesh S. Soni
- Subjects
Biometrics ,Multimedia ,Computer science ,business.industry ,Computer vision ,Artificial intelligence ,computer.software_genre ,business ,computer - Published
- 2015
19. Survey Paper on Clustering based Segmentation Approach to Detect Brain Tumour from MRI Scan
- Author
-
Upasana Gaikwad, Kanika Debbarma, and Silkesha Thigale
- Subjects
Computer science ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Brain tumor ,Pattern recognition ,Image processing ,Image segmentation ,medicine.disease ,computer.software_genre ,Fuzzy logic ,Component (UML) ,medicine ,Segmentation ,Data mining ,Artificial intelligence ,Focus (optics) ,Cluster analysis ,business ,Literature survey ,computer - Abstract
In the last few years, many image processing techniques have been presented in order to perform different brain tumor detection tasks. These cover Content-Based Retrieval Technique, Component Labelling Algorithm, Fuzzy C-Mean Algorithm. There is fast growth of image processing available in last few years; image segmentation have work together to get extraction of meaningful data into useful information. Image processing is used to finding applicable and efficient information from data available. With this survey paper we focus on literature survey of segmentation based image processing model as contain efficient performance.
- Published
- 2015
20. A Proposed Defect Tracking Model for Classifying the Inserted Defect Reports to Enhance Software Quality Control
- Author
-
Ayman E. Khedr, Torky Sultan, and Mostafa Sayed
- Subjects
Original Paper ,business.industry ,Computer science ,Software development ,bugs ,General Medicine ,bug tracking systems ,computer.software_genre ,Tracking (particle physics) ,Software quality ,Defect tracking ,Data mining ,business ,computer ,defects ,Software quality control ,Step method - Abstract
CONFLICT OF INTEREST: NONE DECLARED Defect tracking systems play an important role in the software development organizations as they can store historical information about defects. There are many research in defect tracking models and systems to enhance their capabilities to be more specifically tracking, and were adopted with new technology. Furthermore, there are different studies in classifying bugs in a step by step method to have clear perception and applicable method in detecting such bugs. This paper shows a new proposed defect tracking model for the purpose of classifying the inserted defects reports in a step by step method for more enhancement of the software quality.
- Published
- 2013
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.