Version-2 (May-June 2017)
Ver-1 Ver-2 Ver-3 Ver-4 Ver-5 Ver-6
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Strategy for Algorithm Design in Factoring RSA Numbers |
Country | : | China |
Authors | : | Xingbo WANG |
: | 10.9790/0661-1903020107 |
Abstract: The article first makes an analysis on characteristic of the RSA numbers based on the factorized RSA numbers and the Digital Signature Standard; then it investigates the affection of the divisor-ratio of a RSA number to the efficiency of searching the number's divisors in term of valuated binary tree and puts forward a framework for designing algorithms of fast factoring the RSA numbers. Thoughts of the framework are presented with detail mathematical deductions.
Keyword: RSA number, Factorization, Algorithm Design, Binary Tree
[1] Dan Boneh. Twenty Years of Attacks on the RSA Cryptosystem. Notices of the American Mathematical Society, 46(2), 1999,203-213
[2] Song Y. Yan. Cryptanalytic Attacks on RSA. Springer-Verlag New York Inc, 2008
[3] Aoki K. Advances in Integer Factoring Technique: The Way to Factor RSA-768. Ipsj Magazine, 51,2010,1030-1038
[4] Kruppa A, Leyland P. Number Field Sieve for Factoring, Encyclopedia of Cryptography and Security. 2011,862-867.
[5] Wanambisi A W, Aywa S, Maende C, et al, Advances in composite integer factorization. Materials & Structures, 48(5), 2013,1-12
- Citation
- Abstract
- Reference
- Full PDF
Abstract: heath care monnitoring is becoming essential with the increase in high risk...........
Keywords: VLC, Healthcare, OOK modulation, LED.
[1]. SMovassaghi, M Abolhasan............
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In India at every 33 seconds one person is dying because of heart attack and it has become very serious concern. One of the solutions to the problem is usage of "Data Mining". Data mining is field of 21st century, many fields where historical data plays important role data mining is employed to remove dependency on person. However, historical data varies person to person mostly in medical field, data remains with individual medical practitioner and develops his own medical expertise. To overcome this disadvantage data mining has started playing a major role in the field of medical science.............
Keywords: Data mining, Heart diseases, KNN, naïve bayes, etc
[1]. Ashish Kumar Sen, Shamsher Bahadur Patel, Dr. D. P. Shukla, "A Data Mining Technique for Prediction of Coronary Heart Disease Using Neuro-Fuzzy Integrated" Approach Two Level", International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 9 Sept., 2013 Page No. 2663-2671.
[2]. Syed Umar Amin, Kavita Agarwal, Rizwan Beg,, " Genetic neural network based data mining in prediction of heart disease using risk factors", Information and communication technologies (ICT), 2013 conference on information and communication technologies.
[3]. Jyoti Soni, Ujma Ansari, Dipesh Sharma, Sunita Soni: Predictive Data Mining for Medical Diagnosis: An Overview of Heart Disease Prediction", International Journal of Computer Applications (0975 – 8887), Volume 17– No.8, March 2011.
[4]. Divya Tomar and Sonali Agarwal, " A survey on Data Mining approaches for Healthcare", International Journal of Bio-Science and Bio-Technology, Vol.5, No.5 (2013), pp. 241-266.
[5]. Asha Rajkumar and B. Sophia Reena, "Diagnosis Of Heart Disease Using Data mining Algorithm" , Global Journal of Computer Science and Technology, Vol. 10, No. 10, pp. 38 - 43, 2010
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Human Identification via Face Recognition: Comparative Study |
Country | : | India |
Authors | : | |
: | 10.9790/0661-1903021722 |
Abstract: Biometric recognition becomes an attractive issue of processing, and have a vast amount of real applications. According to wide spread of Internet and the new aspect of Internet of things, millions of human characteristics are flying around the world. So the security and identification become a big challenge and most of the individual needs to apply secure system to save their information. Face recognition is a narrow field of biometric recognition but there are vast amount of works and projects concerned this field. These works used various technique to reach high accuracy of recognition.............
Keywords: Biometrics; Face Recognition; Human Identification; Security.
[1]. A. Wagner, J. Wright, A. Ganesh, Z. Zhou, H. Mobahi, Y. Ma, Toward a practical face recognition system: robust alignment and illumination by sparse representation, IEEE Trans. Pattern Anal. Mach. Intell. 34(2) (2012) 372–386.
[2]. L. Zhang, M. Yang, X. Feng, Sparse representation or collaborative representation: which helps face recognition?, in: ICCV, 2011.
[3]. Y. Xu, Q. Zhu, A simple and fast representation-based face recognition method, Neural Comput. Appl. 22(7–8) (2013) 1543–1549.
[4]. H. Zhang, Z. Zhang, Z. Li, Y. Chen, J. Shi, Improving representation-based classification for robust face recognition, J. Mod. Opt. 61(11) (2014) 961–968.
[5]. R. Satya Prasad, Muzhir Shaban Al-Ani and Salwa Mohammed Nejres, "An Efficient Approach for Fingerprint Recognition", International Journal of Engineering Innovation & Research, Vol. 4, Issue 2, 2015, India.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Digital image watermarking (DIW) is the way which is resilient to many attacks on digital media based on image where data authentication is full by embedding a watermark in image characteristics. This work incorporates a novel method for DIW using three level discrete wavelet transform (3DWT)-Singular value decomposition (SVD) and PNN classifier with various attacks. Extensive experiments present that proposed watermarking algorithms have high robustness and a good imperceptibility to numerous usual image processing attacks, such as Gaussian blurring, noise attack, Swirl Attack and Negative Attack.............
Keywords: DWT, SVD, SNR, Attacks, L2Norm, PNN, Accuracy, FAR, FRR
[1] Purnima K. Sharma, Paresh Chandra Sau and Dinesh Sharma," Digital Image Watermarking: An Approach by Different Transforms using Level Indicator", 2015 International Conference on Communication, Control and Intelligent Systems (CCIS) 2015 IEEE.
[2] Niteesh Shrinivas Naik, Naveena N and K. Manikantan," Robust Digital Image Watermarking using DWT+SVD approach" 2015 IEEE International Conference on Computational Intelligence and Computing Research.
[3] Reema Jain, Mahendra Kumar, Arihant Kumar Jain, and Manish Jain," Digital Image Watermarking using Hybrid DWT-FFT Technique with Different Attacks", This full-text paper was peer-reviewed and accepted to be presented at the IEEE ICCSP 2015 conference2015 IEEE.
[4] Shabir A. Parah, Shazia Ashraf and Ayash Asharf," Robustness Analysis of a Digital Image Watermarking Technique for Various Frequency Bands in DCT Domain", 2015 IEEE.
[5] Yahya AL-Nabhani, Hamid A. Jalab, Ainuddin Wahid, Rafidah Md Noor," Robust watermarking algorithm for digital images using discrete wavelet and probabilistic neural network", Journal of King Saud University – Computer and Information Sciences (2015) 27, 393–401.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Visa Processing Information System |
Country | : | India |
Authors | : | M.Kamakshi Karthiga || Mrs.S.Nithya |
: | 10.9790/0661-1903023033 |
Abstract: Visa Resource – a Very important Department in any Organization. Our Project gives the depth solution to one of its important requirements as Visa Data Processing. The client of this project is any organization who is having many abroad clients especially US clients. This type of organizations is frequently sending their employees for their overseas clients. Our project is used to process their visa and store all the details regarding the passport holder. Our project will handle all type of visas, and very much concentrate in visa processing. It will generate all possible reports, which are need by Consulate. It is a Client Server Project, Administrator can be able to create many no of users and the users are called as Customers. Administrator will describe the utilities accessed by an Customer
Keywords: Active server pages extensible file, Common language runtime, Internet information services, Just in time, Software specification
[1]. Ramandeep Kaur –Aman Arora, "Configuration Management: A Review" International Journal of Advanced Research in Computer Science and Software Engineering Volume 2013
[2]. Mark Lindeman, Philip B.Stark, "A Gentle Introduction to Risk –limiting Audits" IEEE 2012
[3]. Yongchang Ren, Tao Xing, Qiang Quan, "Software Configuration Management of Version Control Study Based on Baseline" IEEE 2010
[4]. Mark Staples,Paul L Bannerman,"Software Configuration Management in Global Software Development: A Systematic Map" IEEE 2010
[5]. Tao Xing "Software Configuration Management of Change Control Study Based on Baseline" IEEE 2010
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. The peers evaluate other peers based on their past interactions and then aggregate this information in the whole network. However it may not be the true reflection of past behavior of the peers. Moreover such type of aggregation gives only the relative ranking of peers without any absolute evaluation of their past. This is more significant when all the peers responding to a query, are malicious. In such a situation only the peer came to know that who is better among them without knowing their rank in the whole network. Hence to mitigate the attacks by malicious peers and to motivate.............
Keywords: Peers, P2P, Malicious, SORT, aggregation.
[1] Antonino Simone, Boris Skori and Nicola Zannone, "Flow based reputation: more then just ranking", International Journal of Information Technology and Decision Making, November 2011.
[2] Ruchir Gupta, Yatindra Nath Singh," A Reputation Based Framework to Avoid Free-riding in Unstructured Peer-to-Peer network",IEEE Transaction, July 2013.
[3] Ruchir Gupta and Yatindra Nath Singh," Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm",IEEE Transaction, January 2014,
[4] Kayalvizhi and Bharathi, "Efficient and distributed network model for P2P systems", International Journal of Computer Science and Mobile Computing, Vol. 3, Issue.2 , February 2014,pg.626-632.
[5] R. Gayathri and V.Vaishnavi,"Secure shell transfer through malicious nodes from peer to peer", International Journal of Advanced Information and Technology,Vol.21, No. 21, January 2014.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Review on Mining for Web EngineeringBusiness Intelligence |
Country | : | India |
Authors | : | V. Sumalatha || T.Nishitha |
: | 10.9790/0661-1903024143 |
Abstract: Over the last few years, there has been a remarkable increase in use of World Wide Web for a wide and variety of applications. The web plays a central role in e-commerce applications. As a consequence, there is a need to improve Intelligence of Web Engineering Applications in the context of Business and IT industry. To achieve this objective web engineering tasks must be able to identify some useful insights for business intelligence. The proposed research work attempts to initiate Business Intelligence from Web Based Applications. The issues of research work are uniformly accommodated in five steps. The First step identification of fundamental tasks of Web Engineering, Mining for Software Engineering and its extension to Mining for Web Engineering............
Keywords: Web mining, web engineering, agile modeling, patterns, classification, clustering.
[1]. Tao Xie, Suresh Thummalapenta, David lo, Chao Liu,"Data Mining for Software Engineering", IEEE Computer, August 2009, pp. 55-62.
[2]. Hamid Abdul A, Stan Jarzabek, " A Data Mining approach for detecting higher-level clones in Software", IEEE Transactions on Software Engineering, Vol. 35, No. 4, July/August 2009, pp. 497-514.
[3]. Ivano Malavelta, Henry Muccini, Patrizio Pellicciona, Damien Andrew Tamburri, "Providing Architectural Languages and Tools Interoperability through Model Transformation Technologies", IEEE Transactions on Software Engineering, Vol. 36, No. 4, January/February 2010, pp. 119-140.
[4]. Tao Xie, Jain Pei, Ahmed E Hassen, "Mining Software Engineering Data", IEEE 29 the International Conference on Software Engineering ICSE 07.
[5]. Francisco P.Romero, Jose A.Olivas, MArcele Genero, Mario Piattini, "Automatic Extraction of the main terminology used in Empirical Software Engineering through Text Mining Techniques" ACM ESEM 08 pp. 357 – 358.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The preprocessing step approximately consumes 85% of the time and efforts of overall time and efforts of the Knowledge Discovery in Database, (KDD). Sentiments analysis, as a new trend in KDD and data mining, requires many preprocessing steps such as tokenization, stop words removing, and stemming. These steps play, in addition to their preparation role, the data reduction role by excluding worthless data and preserving significant data. This paper presents the design and implementation of a system for English tweets segmentation, cleaning, stop words removing, and stemming...........
Keywords: Pre-processing, sentiment analysis, Stemming, Stop words, Tokenization, Twitter.
[1] Twitter (@twitter), "Twitter turns six", March 21, 2012.https://blog.twitter.com/2012/twitter-turns-six. Visited at 4/2016.
[2] Twitter usage / company facts. https://about.twitter.com/company. Visited at 7/2016
[3] G.Vinodhini, RM.Chandrasekaran, "Sentiment analysis and opinion mining: a survey", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 6, Page 282, June 2012
[4] Vikram Singh, Balwinder Saini, "An effective tokenization algorithm for information retrieval system", Department of Computer Engineering, National Institute of Technology, Kurukshetra, Haryana, India, David C. Wyld et al. (Eds), 2014.
[5] Onix Text Retrieval Toolkit API Reference.http://www.lextek.com/manuals/onix/stopwords1.html. Visited at 5/2016.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: An emerging technology is wireless mesh network that provides high quality service to end users as the "last mile" of the Internet. A Key technology in wireless mesh networks is Multicast communication. Efficient data distribution among a group of nodes is done by using Multicast. In other types of wireless networks, like sensor networks and MANETs, two multicast schemes are proposed: Level Channel Assignment (LCA) scheme and Dynamic Routing Scheme (DRA) to improve the throughput for multi-channel and multi-interface mesh networks. Multicast trees are built efficiently using thescheme by minimizing the number of relay...........
Keywords: Wireless mesh networks, multicast, multi-channel, multi-interface, channel assignment.
[1]. A. Mishra, V. Shrivastava, and S. Banerjee, "Partially Overlapped Channel Not consider Harmful,"Proc.ACM SIGMETRICS/Performance, 2006.
[2]. A.Raniwala and T. cker Chiueh, "Architecture and Schemes or an IEEE 802.11-Based Multi-Channel Wireless Mesh Network,"Proc. IEEE INFOCOM, 2005.
[3]. Chin-Fu Kuo, Member, IEEE, Ai-Chun Pang, Dynamic Routing with Security Considerations, VOL. 20, NO. 1, JANUARY 2009.
[4]. E. Royer and C. Perkins, "Multicast Operation of t he Ad-Hoc on Demand Distance Vector Routing Protocol," Proc. ACM MobiCom,1999
[5]. J. Tang, G. Xue, and W. Zhang, "Maximum Throughput and Fair Bandwidth Allocation in Multi-Channel Wireless Mesh Networks,"Proc. IEEE INFOCOM, 2006.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Human beings are living with the food. This food is the combination of elements to the body. The body contains lot of elements.The levels of these elements in human body may differ from one person to another.if there is a change in the level of these elements in the human body then disease occurs. This paper presents the theoretical aspect of a device which measures the elements in the body at regular intervals and asks the people to take the necessary food daily. This can be The hand held device like a tab and using the samples like blood, urine, saliva, hait it will list all elements in the human body and give the percentag of that.if it decreases it will alert the people to take the the food that contains...........
[1]. A review on role of essential trace elements in health and disease Lingamaneni Prashanth1, Kiran Kumar Kattapagari2, Ravi Teja Chitturi2, VenkatRamana Reddy Baddam2, Lingamaneni Krishna Prasad3.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Fingerprint recognition have gain great attentiveness in the world of biometric. The performance of this system is become worst if the image quality is not good. Pre-processing steps enhance the quality of an image and give the suitable outcome. Image binarization is one of the fundamental pre-processing steps in fingerprint recognition. The purpose of image binarization is dividing an image into foreground and background using thresholding technique. This paper describes the use of global and local thresholding techniques. As well as present the comparative analysis of global, local thresholding and proposed adaptive local thresholding algorithm. The implementation is done using java with FVC2000 and FingerDOS databases of fingerprint and evaluates the best performance of the binarization algorithm using comparing the different criteria like execution time, quality of an image, and window size of neighborhood..
[1]. D Maltoni, D Maio, A K Jain, and A Prabhakar, "Handbook of Fingerprint Recognition," Springer, New York, 2005.
[2]. Woodard, J. D., Orlans, N. M., & Higgins, P. T. (2003). Biometrics (electronic book). New York: McGraw-Hill/Osborne.
[3]. N. Otsu, "A threshold selection method from gray– level histogram," IEEE Transactions on System Man Cybernatics, Vol. SMC-9, No.1 , pp. 62-66, 1979
[4]. Devi, H.K.A., (2006). Thresholding: A Pixel-Level Image Processing Methodology Preprocessing Technique for an OCR System for the Brahmi Script. Ancient Asia. 1, pp.161–165. DOI: http://doi.org/10.5334/aa.06113
[5]. A.S. Abutaleb, "Automatic Thresholding Of Gray-Level Pictures Using Two Dimensional Entropy", Computer Vision, Graphics, And Image Processing, Vol.47, Pp.22-32, 1989..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Watermarking System Using LSB |
Country | : | Iraq |
Authors | : | Hewa Majeed Zangana |
: | 10.9790/0661-1903027579 |
Abstract: In the current paper we present a system of watermarking due to nowadays the data security is one of the major challenges and watermarking is one of the techniques where a digital pattern or signal has been inserted into a digital photo or image for security reasons. Usually, watermarking is used for protecting the copyright like owner authentication and the security of the card id. In the current system we used the technique of least significant bit (LSB) in watermarking. The results show us that the system is working well and the security of the image is really good.
Keywords: LSB, watermarking
[1] Deepshikha Chopra, Preeti Gupta, Gaur Sanjay B.C., Anil Gupta," Lsb Based Digital Image Watermarking For Gray Scale Image", IOSR Journal of Computer Engineering (IOSRJCE)ISSN: 2278-0661, ISBN: 2278-8727 Volume 6, Issue 1 (Sep-Oct. 2012), PP 36-41
[2] Dr. Ajit ,Preeti Kalra, Sonia Dhull,"Digital Watermarking" ,International Journal of Advanced Research in Computer Science and Software Engineering, ISSN:2277 128X, Volume 3, Issue 4. April 2013
[3] Preeti Gupta, "Cryptography based digital image watermarking algorithm to increase security of watermark data", International Journal of Scientific & Engineering Research, ISSN 2229-5518 Volume 3, Issue 9 (September 2012)
[4] Manpreet Kaur, Sonika Jindal, Sunny Behal, "A Study of Digital Image Watermarking", IJREAS ,Volume 2, Issue 2 (February 2012) pp-126-136
[5] B Surekha, Dr GN Swamy, "A Spatial Domain Public Image Watermarking", International Journal of Security and Its Applications Vol. 5 No. 1, January, 2011
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In this work we implemented a system to obtain human body parameter measurement without physically contacting the user. This implementation is contained the methods of obtaining 3D measurements using Kinect v2 depth sensor. The developed system at the initial stage is capable of detecting and obtaining personalized body parameters such as height, shoulder length, neck to hip length, hip to leg length and arm length by incorporating the necessary skeleton joints and front perimeter at chest, stomach and waist by incorporating the necessary 3D pixels. According to the results,...........
Keywords: Human Body Measurement, Kinect Sensor, Virtual Dressing Room (VDR), Augmented Reality.
[1] Feng Zhou, H. B. L. Duh and M. Billinghurst, "Trends in augmented reality tracking, interaction and display: A review of ten years of ISMAR," 2008 7th IEEE/ACM International Symposium on Mixed and Augmented Reality, Cambridge, 2008, pp. 193-202.
[2] S. Hauswiesner, Matthias Straka, and Gerhard Reitmayr, Virtual Try-On through Image-Based Rendering, IEEE Transactions On Visualization And Computer Graphics, Vol. 19, No. 9, September 2013
[3] Boonbrahm, Poonpong, Charlee Kaewrat, and Salin Boonbrahm. "Realistic Simulation in Virtual Fitting Room Using Physical Properties of Fabrics." Procedia Computer Science 75 (2015): pp. 12-16.
[4] M. Kasap and N. Magnenat-Thalmann, Parameterized human body model for real-time applications, CW '07. International Conference on Cyberworlds, IEEE Computer Society, 2007, pp. 160-167.
[5] Walter, Bruce, et al. "Fitting virtual lights for non-diffuse walkthroughs." Proceedings of the 24th annual conference on Computer graphics and interactive techniques. ACM Press/Addison-Wesley Publishing Co., 1997
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Smart Stick for Assisting Blind People |
Country | : | SaudiArabia |
Authors | : | Ashraf Anwar || Sultan Aljahdali |
: | 10.9790/0661-1903028690 |
Abstract: In this paper, we introduce a smart stick system for assisting blind people. The smart stick comes as a proposed solution to enable visually impaired people to find difficulties in detecting obstacles and dangers in front of them during walking and to identify the world around. The system is designed to act like an artificial vision and alarm unit The system consists of five sensors: ultrasonic sensor, IR sensor, water sensor, fire sensor, and light (LDR) sensor, microcontroller (Arduino Uno R3) to receive the sensor signals and process them to short pulses to the Arduino pins where buzzers, vibrator and voice alarms are connected...........
Keywords: SMART STICK, BLIND PEOPLE, ARDUINO UNO, ULTRA SONIC SENSORS, HEAT SENSOR, IR SENSOR, BUZZER, VIBRATOR.
[1]. Sung Jae Kang, et al." Development of an Intelligent Guide-Stick for the Blind", Proceeding of the IEEE international Conference on Robotics & Automation, 2001
[2]. Y. Kawai andF. Tomita, "A support system for visually impaired persons to understand three-dimensional visual information using acoustic interface", IEEE Conference on Pattern Recognition, Vol.3,pp.974-977,2002.
[3]. J. M. Sáez, F. Escolano, and A. Peñalver, "First steps towards stereo- based 6DOF SLAM for the visually impaired," in IEEE Conf. on Computer Vision and Pattern Recognition (CVPR), San Diego, USA,2005.
[4]. AlbertoRodriguez, et al., "Obstacle avoidance system for assisting visually impaired people", in proceeding IEEE Intelligent Vehicles Symposium Workshop, 2012.
[5]. ShrutiDambhare, et al., "Smart stick for Blind: Obstacle Detection, Artificial vision and Real-time assistance via GPS", 2nd National Conference on Information and Communication Technology (NCICT), 2011.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The framework through which PC can perceive content went into the framework either by means of an information gadget, for example, an attractive peruser or through sweep records is known as character recognition system. On the premise of this whole wide character recognition system can be part into two sections. The classification is described in the later section of this paper. This paper gives an idea as to what is a character recognition system, its application areas, the various stages explained in the process. Character Recognition is a wide thought and this paper focuses particularly...........
Keywords: character Recognition, OCR, Image Processing, Segmentation, Feature Extraction
[1]. Sukhpreet Singh, Optical Character Recognition Techniques: "A survey International Journal of Advanced Research in Computer Engineering & Technology" (IJARCET) Volume 2, Issue 6, June 2013 ISSN: 2278 – 1323.
[2]. Priya Sharma,Randhir Singh, "India Survey and Classification of Character Recognition System" International Journal of Engineering Trends and Technology- Volume4Issue3- 2013.
[3]. Line Eikvil, "Optical character recognition" Unpublished
[4]. Monica Patel1 , Shital P. Thakkar 2, " Handwritten Character Recognition in English": A Survey International Journal of Advanced Research in Computer and and Communication Engineering Vol. 4, Issue 2, February 2015.
[5]. Arya A1 , Anil Kumar A2, "A Review on Geometrical Analysis in Character Recognition" IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. V (Mar – Apr. 2015), PP 61-65.
[6]. N. VENKATA RAO, 2DR. A.S.C.S.SASTRY, 3A.S.N.CHAKRAVARTHY, 4 KALYANCHAKRAVARTHI
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Survey on Image Tempring Using Various Techniques |
Country | : | India |
Authors | : | Nisha Chauhan || Arun Agarwal |
: | 10.9790/0661-19030297101 |
Abstract: Digital images can be easily tampered with image editing tools. The detection of tampering operations is of great importance. Passive digital image tampering detection aims at verifying the authenticity of digital images without any a prior knowledge on the original images. There are various methods proposed in this filed in recent years. In this paper, we present an overview of these methods in the first part, various image forgery detection techniques are classified and then an overview of passive image authentication is presented and the existing blind forgery detection techniques are reviewed.
Keywords: Image tampering, Active approach, Passive approach, copy-move, forgery.
[1]. Surbhi gupta,"Highlighting Image Tampering by feature Extraction based on Image Quality Deterioration",2016 International Conference on Computing for Sustainable Global Development (INDIACom),978-9-3805-4421-2/16/$31.00_c 2016 IEEE
[2]. Saurabh Agarwal1 and Satish Chand2,"Image Tampering Detection using Local Phase based Operator", International Conference on Emerging Trends in Electrical, Electronics and Sustainable Energy Systems (ICETEESES–16),978-1-5090-2118-5/16/$31.00 ©2016 IEEE
[3]. Musaed Alhussein, "Image Tampering Detection Based on Local Texture Descriptor and Extreme Learning Machine", 2016 UKSim-AMSS 18th International Conference on Computer Modelling and Simulation, 978-1-5090-0888-9/16 $31.00 © 2016 IEEE DOI 10.1109/UKSim.2016.39
[4]. David Asatryan#, Naira Asatryan*, Natalya Lanina*, Alexander Petrosyan*, "Method for Detection of Image Tampering and Partial Recovery", unpublished. [5]. Wei Wang, Jing Dong, and Tieniu Tan, "A Survey of Passive Image Tampering Detection". Springer-Verlag Berlin Heidelberg 2009
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Secure Online Judge in Cloud Environment |
Country | : | India |
Authors | : | Himanshu Sharma || Rachna Jain || Siddhant Shekhar || Aabhas Sinha |
: | 10.9790/0661-190302102106 |
Abstract: Cloud Computing is a rapidly developing technology in the IT Sector. It provides an on demand service to its users using the Internet. It provides the users with the resources as per their demand and also enables the users to pay as per their usage of resources. The users can access the cloud anytime using the Internet. Such features eliminate the requirement of carrying documentation for the users as the cloud can be accessed globally and remotely by the user. But, this introduces the possibility of security breaches or intruder attacks while the user interacts with the cloud database. In this paper, some of the security concerns while using a Cloud based Online Judge will be addressed using new approaches...............
Keywords: Online Judge, Security, Cloud computing, Code checking..
[1]. Andy Kurnia, Andrew Lim, Brenda Cheang, Online Judge, Published in Journal Computers & Education, Volume 36 Issue 4, Pages 299-315, 2001 (ISSN: 0360-1315)
[2]. Akashdeep Bhardwaja, Subrahmanyam, Vinay Avasthi, Hanumat Sastry, Security Algorithms for Cloud Computing, Published in International Conference on Computational Modeling and Security Volume 85, Pages 535-542, 2016
[3]. Wayne Jansen, Timothy Grance, Guidelines on Security and Privacy in Public Cloud Computing, Published in Special Publication (NIST SP) - 800-144, 2011
[4]. Leena Khanna, Anant Jaiswal, "Cloud Computing: Security Issues and Description of Encryption Based Algorithms to Overcome Them", Published in IJARCSSE Volume 3, Issue 3, 2013 (ISSN:2277 128X)
[5]. Siwan Tang, Linfang Zou, Xuehua Liao, "A Research on Online Judge Technology Based on MOOC Platform", Published in International Conference on Information Engineering and Communications Technology (IECT 2016) ISBN: 978-1-60595-375-5
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Experimental speech recognition system based on Raspberry Pi 3 |
Country | : | Bulgaria |
Authors | : | Hasan Gyulyustan || Svetoslav Enkov |
: | 10.9790/0661-190302107112 |
Abstract: The paper represents a speech recognition system developed using Raspberry Pi microcomputer and USB webcam's microphone to detect and record speech. The software includes combination of different programming and scripting languages for Linux Debian based operating systems. Raspbian is used for the current experiment.
Keywords:pi, Raspberry, Raspbian, recognition, speech, system
[1]. Maas, Andrew L.; Le, Quoc V.; O'Neil, Tyler M.; Vinyals, Oriol; Nguyen, Patrick; Ng, Andrew Y. (2012). "Recurrent Neural Networks for Noise Reduction in Robust ASR". Proceedings of Interspeech 2012
[2]. Waibel, Alex (1989). "Modular Construction of Time-Delay Neural Networks for Speech Recognition" (PDF). Neural Computation. 1 (1): 39–46. doi:10.1162/neco.1989.1.1.39
[3]. Chan, William (2016). "Listen, Attend and Spell: A Neural Network for Large Vocabulary Conversational Speech Recognition". ICASSP.
[4]. Bahdanau, Dzmitry (2016). "End-to-End Attention-based Large Vocabulary Speech Recognition.
[5]. Yu, D.; Deng, L.; Dahl, G. (2010). "Roles of Pre-Training and Fine-Tuning in Context-Dependent DBN-HMMs for Real-World Speech Recognition". NIPS Workshop on Deep Learning and Unsupervised Feature Learning.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Forrester's Concept in Modeling Heart Dynamics |
Country | : | Russian |
Authors | : | Shmid A.V. D.SC || Novopashin M.A. || Berezin A.A. PhD |
: | 10.9790/0661-190302113121 |
Abstract: The paper deals with the Forrester's approach to analysis of heart electrical dynamics based on the hypothesis that heart belongs to the class of Complex Systems and its dynamics can be described by coupled Van der Pol differential equations with a time lag. The chain of such equations suggested by Ginzburg and Landau was used to describe such states of heart dynamics as normal beatings, fibrillation and ischemia through the kinds of the chain dynamics as regular oscillations, chaotic dynamics and intermittency dynamics of order – disorder type correspondingly. The mathematical model supporting the hypothesis demonstrated all mentioned model modes of heart functioning. During the computer...........
[1] Forrester. J. World Dynamics. Wright Allen Press. ISBN 5-17- 019253-3. 1971, p- 384
[2] Van der Pol B, Van der Mark M. Le battement du coeur considere comme oscillation de relaxation et un model elecrtrique du coeur. L'Onde electrique, 1928, N 7.
[3] Wiener N. The mathematical formulation of the problem of conduction of impulses in a network of connected excitable elements, specifically in cardiac muscle / N.
[4] Wiener, A. Rosenblueth // Arch. Del. Instit. De Cardiologia De Mexico, 1946.P. . 205 – 265.
[5] Gaponov – Grehov A.V. and Rabinowitz M.I. Autostructures, Chaotic.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The complex image matching procedure on the large image data volume require a lot of processing power and storage space, which makes the cloud platforms very much adaptable for such CBIR systems. The cloud computing enables the capability of the CBIRs to expand the computing and storage resources as the requirement rises above the registered scale. The greatest challenge rises in the CBIRs when it comes to search the large volumes of encrypted image data. The image data is stored in the encrypted to protect the privacy of the data and to protect it from various information stealing attacks on the web storage resources.............
Keywords:pi, SIFT, HOG, TAMURA, SVM, CBIR
[1]. Cao, N., Wang, C., Li, M., Ren, K., & Lou, W. (2014). Privacy-preserving multi-keyword ranked search over encrypted cloud data. Parallel and Distributed Systems, IEEE Transactions on, 25(1), 222-233.
[2]. Chang, C. Y., Wang, H. J., & Jian, R. H. (2010, July). Semantic image retrieval with Fuzzy-ART. In System Science and Engineering (ICSSE), 2010 International Conference on (pp. 69-74). IEEE.
[3]. Dillon, T., Wu, C., & Chang, E. (2010, April). Cloud computing: issues and challenges. In Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference on (pp. 27-33). Ieee.
[4]. Gudivada, V. N., & Raghavan, V. V. (1995). Design and evaluation of algorithms for image retrieval by spatial similarity. ACM Transactions on Information Systems (TOIS), 13(2), 115-144.
[5]. Krishnapuram, R., Medasani, S., Jung, S. H., Choi, Y. S., & Balasubramaniam, R. (2004). Content-based image retrieval based on a fuzzy approach. Knowledge and Data Engineering, IEEE Transactions on, 16(10), 1185-1199.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Guide for 360 ˚ VR Video Production |
Country | : | Korea |
Authors | : | Woonsub Jung || Eunju Park || Hankyu Lim |
: | 10.9790/0661-190302126132 |
Abstract: 360˚ virtual reality (VR) is a medium that can experience reality directly or indirectly in a virtual space created by a computer. A type of 360˚ VR videos is various as many as that in generally watched videos. 360˚ VR videos have various types as many as general 2D videos such as daily living, travels, sports, leports (leisure + sports), and movies but they can make realistic feeling as if watchers were present in the real place. Oculus or smart devices-mounted card boards can be used to enable realistic views............
Keywords:pi, VR, 360˚ VR, Video Shooting Method, Video Shooting Tool, Editing Method
[1] Kwangsoo Kim, "Study on filming 360° VR video using a remotely controlled mobile robot", The Graduate School of Applied Art Photography Chung-Ang University, 2017.
[2] Kwangsoo Kim, Yonghwan Lee, "Comparison and Usage Analysis of 360 Degree VR Video Rigs", The Society of Modern Photography & Video, 19(1), 2016, 87-106.
[3] Junmo Kim, "The Design and Implementation of authentication system for VR-Machine", The Graduate School of Soongsil University, 2016.
[4] Ministry of Science, ICT and Future Planning Blog "VR", http://blog.naver.com/with_msip/220833593757, (2016.10.11)
[5] Buyeon Jung, "Virtual reality (VR) market status and prospects", Korea Information Society Development Institute Trend, 28(23), 2016..