Version-3 (Sep-Oct 2017)
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In this paper study of the biometrics. The recognition of face and fingerprint. The authentication of face and fingerprint are using various fusion levels. In this technology are useful for various applications. The biometrics is unimodal and multimodal system. Unimodal suffers from inter class, noisy data etc. the drawbacks can remove by using multimodal biometrics. The development of feature, sensor, match, rank, decision and other approach of fusion.
Keywords: [Multimode, Sensor, Feature level, Fingerprint, Face.]
[1] Handbook of Multibiometrics by Arun A, Ross and Karthik Nandakumar and Anil K.Jain Springer-Verlag New York Inc, Oct 19, 2007, (ISBN: 97803877104 02) (Only Chapter 1)
[2] "Fingerprint Compression Technique using Sparse R-epresentation" ,( Swanil Raut, Nisha Wankhade, ) International Journal of Science and Research (IJSR), Vol. 4, Issue 4, April 2015.
[3] Biometric Systems: Technology, Design and Perfo-rmance Evaluation, (Hardc over) James Wayman, (An-il Jain, Davide Maltoni, Dario Maio)
[4] Handbook of Multibiometrics, Ross, Arun A., Nanda kumar, Karthik, Jain, Anil K, 2006, Springer, ISBN 978-0-387-22296-7
[5] "A comparative analysis of Unimodal and multimodal Biometric System" (Manisha Sharma, Raju Baraskar, shikha Agrawal) IJARC May-jun 2017 ISSN NO =. 0976-5697
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Tracing down Black hole attack in MANETS |
Country | : | India |
Authors | : | Dr. G. Krishna Kishore || K. Jahnavi || D. Suresh Babu |
: | 10.9790/0661-1905030610 |
Abstract: A mobile ad-hoc network (MANET) is a union of numerous connectionless mobile nodes which transmit data through wireless channels, in the absence of any stable infrastructure. Both genuine and malevolent nodes can ingress the network. So MANETS are predominantly liable to many assaults or attacks. The dropping of data packet while transmitting from source to goal is one of the critical problems in MANETS. There are many factors by which this data packet droppings is caused. One foremost cause for this packet loss is black hole attack. In black hole assault a malevolent node publicize itself as it is having briefest way from source to the goal nodes during routing location process and switch the data towards it and then drops that data instead of reaching actual destination. Here we concentrate on tracing of Black hole assault in Ad Hoc On-Demand Distance Vector (AODV) protocol. The work is carried on NS-3 (Network Simulator).
Keywords: AODV, Black hole attack, MANET, NS3
[1]. Irshad ullah, Shoaib ur rehman, Analysis of Black hole attack on MANETs Using distinctive MANET routing protocols – 2010
[2]. Sonika Malik, Indu Kashyap, Identif'ying, Avoidance and Performance Assessment of Black Hole Attack on AODV Protocol in MANET - International Journal of Computer Applications IJCA – 2014
[3]. T.Manikandan, S.Shitharth, C.Senthilkumar, C.Sebastinalbina, N.Kamaraj, Removal of Selective Black Hole Attack in MANET by AODV Protocol - International Journal of Innovative Research in Science, Engineering and Technology - 2014
[4]. Dr.S.Tamilarasan, Securing AODV Routing Protocol from Black Hole Attack - International Journal of Computer Science and Telecommunications - 2012
[5]. Nidhi Tiwari, - Detection of Black Hole Attack using Control Packets in AODV Protocol for MANET - International Journal of Computer Applications -2015
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Acoustic Event Detection Using T-DSN With Reverse Automatic Differentiation |
Country | : | India |
Authors | : | Rahna K.M || Baby C.J |
: | 10.9790/0661-1905031115 |
Abstract:The Tensor Deep Stacking Neural Network (T-DSN) enhance the conventional Deep Stacking Network by replacing one or more of its layers with a tensor layer, in which each input vector is projected into two nonlinear subspaces, and a tensor layer, in which two subspace projections interact with each other and jointly predict the next layer in the deep architecture. In addition, we implement a approach to find Derivatives, mostly in the form of gradients and Hessians. Automatic differentiation (AD) is a technique for calculating
derivatives of numeric functions expressed as computer programs efficiently and accurately. Integrating AD with Deep Stacking Neural Network enables dynamic computational graph which increases the computational speed dramatically.
Keywords: Automatic Event Detection;Tensor Deep Stacking Network; Tensor;Gradient Methods
[1] Pierre L., David S., Charles T., Laurent G.,"Deep Neural Networks for Automatic detection of scream and shouted speech in
subway trains",IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP),Shanghai,pp. 6460-6464,
2016 .
[2] G. Rahna K M and Baby C J,"A Survey on Scream Detection Methods",International Conference on Advanced Computing and
Communication Systems (ICACCS ), pp.1948-1952, 2017.
[3] D. Yu ; L. Deng : Deep learning and its applications to signal and information processing. IEEE Signal Process.
Mag., 28 (2011), 145–154.
[4] L. Deng,"Three Classes of Deep Learning Architectures and their Applications." APSIPATrans. Signal Inf. Process. 2014
- Citation
- Abstract
- Reference
- Full PDF
Abstract:To strengthen the dominant's dominance or to weaken that dominance, the conflict's agents seek to create alliances. The conflict is a life phenomenon; individuals, companies, states, organizations, governments, etc., are in conflict. Due to the importance of the conflict and its great impact on human interests and relations, many methods have been suggested to study and analyze it. The rough set theory is one of the important tools to deal with inconsistency, which characterizes conflict. Inconsistency in conflict represents uncertainty about alliance, neutrality and struggle among agents in a conflict situation. This paper presents the design and implementation of a proposed general system for conflict analysis that depends on rough set theory and conflict theory. It discusses the overall process of this system.......
Keywords: Rough set, conflict system, conflict analysis
[1] B. Sun, W. Ma, and H. Zhao, "Rough set-based conflict analysis model and method over two universes," Information Sciences, vol.
372. pp. 111–125, 2016.
[2] Z. Pawlak, "Rough sets," Int. J. Comput. Inf. Sci., vol. 11, no. 5, pp. 341–356, 1982.
[3] L. a. Zadeh, "Fuzzy sets," Inf. Control, vol. 8, no. 3, pp. 338–353, 1965.
[4] B. D. Gau W-L, "Vague sets," IEEE Trans. Syst. Man. Cybern., vol. 23, 1993.
[5] D. MOLODTSOV, "Soft Set Theory First Results." An international Journal Computers and Mathematics with Applications -
Elsevier, pp. 19–31, 1999.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | An Enhanced Video Stabilization Based On Emd Filtering And Spectral Analysis |
Country | : | India |
Authors | : | B. Sowbhagya |
: | 10.9790/0661-1905032330 |
Abstract:In this paper a new video stabilization technique is proposed based on the Hilbert Huang Transform (HHT). HHT is a Decomposes the video into Intrinsic Mode Functions (IMFs). The proposed video stabilizer deals with vertical or horizontal displacements meaning that translational motions are corrected. First, LMVs from a certain image region of the sequence are defined by applying a motion estimation algorithm. Second, the resulting signal is separated into a finite number of IMFs through the process of EMD. The proposed HHTbased DIS method can be beneficial in a variety of applications including handheld cameras and mobile phones as a post-processing method, as well as for stabilizing image sequences acquired from cameras mounted on vehicles.
Keywords: Video Stabilization, Motion Estimation, HHT, IMFS, SSIM
[1]. C. Caraffi, S. Cattani, and P. Grisleri, "Off-road path and obstacle detection using decision networks and stereo vision," IEEE
Trans. Intell. Transp. Syst., vol. 8, no. 4, pp. 607–618, Dec. 2007.
[2]. A. A. Amanatiadis and I. Andreadis, "Digital image stabilization by independent component analysis," IEEE Trans. Instrum. Meas.,
vol. 59, no. 7,pp. 1755–1763, Jul. 2010.
[3]. A. Bosco, A. Bruna, S. Battiato, G. Bella, and G. Puglisi, "Digital video stabilization through curve warping techniques," IEEE
Trans. Consum. Electron., vol. 54, no. 2, pp. 220–224, May 2008.
[4]. A.-O. Boudraa and J.C. Cexus, "EMD-based signal filtering," IEEE Trans. Instrum. Meas., vol. 56, no. 6, pp. 2196–2202, Dec.
2007.
[5]. S. Battiato, A. R. Bruna, and G. Puglisi, "A robust block based image/video registration approach for mobile imaging d evices,"
IEEE Trans. Multimedia, vol. 12, no. 7, pp. 622–635, Nov. 2010.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Nowadays Bioinformatics is a good and an upcoming technology for the recent researchers.Alignment and comparison of DNA and RNA, Genemapping on chromosomes, Protein structureprediction, gene finding from DNA sequences arevarious useful tasks of bioinformatics. In recent years,many techniques used for the DNAAlignment and Comparison. In the field of biologyDNA Alignment and Comparison plays a vital rolein many biological areas. Needleman-Wunsch algorithm is the most famous algorithm for DNA global alignment. Awkwardly, it is based on sequential computing so it has a problem of being slow. Parallel Version of Needleman-Wunsch algorithm purposed aim to overcome this sequential computing limitation. This paper presents an implementation of this algorithm along with experiments in real parallel environment. Finally, the paper study the suitability of this algorithm to the grid-computing environment and provide it as a Cloud Service..
Keywords: DNA Computing, Computational biology, Cloud computing, Grid computing, Bioinformatics
[1]. J. Daugelaite, A. O‟ Driscoll and R. D. Sleator, "An Overview of Multiple Sequence Alignments and Cloud Computing in Bioinformatics," ISRN Biomathematics, vol. 2013, p. 14, 2013.
[2]. C. Kemena and C. Notredame, "Upcoming challenges for multiple sequence alignment methods in the high-throughput era," BIOINFORMATICS, vol. 25 , no. 19, p. 2455–2465, 2009.
[3]. R. C. Edgar and S. Batzoglou, "Multiple sequence alignment," Current Opinion in Structural Biology, vol. 16, no. 3, p. 368–373, 2006.
[4]. A. Chaudhary, D. Kagathara and V. Patel, "A GPU based implementation of Needleman-Wunsch Algorithm using Skewing Transformation," in IC3 '15 Proceedings of the 2015 Eighth International Conference on Contemporary Computing (IC3), USA, 2015.
[5]. M. Assal, A. Said, S. Souliman and A. Essam, "A Study to the different implementation approaches for the Grid YM-Algorithm DNA alignment," IOSR Journal of Computer Engineering (IOSR-JCE), vol. 18, no. 6, pp. 16-21, 2016.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Hiperspace: The Forgotten Giant of Mainframe Storage |
Country | : | India |
Authors | : | Antariksha Gupta |
: | 10.9790/0661-1905033846 |
Abstract: Hiperspace, a framework on IBM Mainframes, enables application programs to store data up to very large capacities. Normally, a COBOL program can have a working storage section storing up to a few Megabytes of data. Hiperspace allows the temporary storage to expand up to Terabytes. While doing so, it does not burden the application program with the I/O overheads of the large amount of data. It provides for an efficient I/O operation handling. In spite of its usefulness, Hiperspace is a gray area. Very few are aware about it and even fewer actually know how to work with it. This paper tries to demystify the Hiperspace from an application programmer's perspective..
Keywords: CSRIDAC, CSRSCOT, CSRVIEW, Hiperspace, Window Services
[1]. IBM Knowledge Centre - https://www.ibm.com/support/knowledgecenter/en/ssw_ibm_i_72/rzase/mgrtwrkstgsect.htm
[2]. IBM Support: Enterprise Cobol - http://www-01.ibm.com/support/docview.wss?uid=swg21220835
[3]. IBM Knowledge Centre - https://www.ibm.com/support/knowledgecenter/en/SSLTBW_2.1.0/com.ibm.zos.v2r1.ieac100/ws.htm
- Citation
- Abstract
- Reference
- Full PDF
Abstract: this paper presents an architecture for the data warehouse of Higher Education Student Information System (DWHESIS) system as the single source for decision makers to obtain information. The most important motivations to implement this architecture are technology reliability; efficient data report platform and most importantly different data format integration from a different data source in the Higher Education Student Information. The indexed view is a technique utilized to query huge amounts of data. Consequently, the process of developing on-line analytical processing (OLAP) is proposed for decision support to find interesting information from large databases..
Keywords: Data warehouse (Star schema), Database of outpatient healthcare, Excel file, Extract Transform and Load (ETL) process, Indexed view, OLAP.
[1]. Ralph Kimball, Margy Ross, Warren Thornthwaite, Joy Mundy, Bob Becker, "The Data Warehouse Lifecycle Toolkit: Practical Techniques for Building Data Warehouse and Business Intelligence Systems", Second Edition John Wiley & Sons, Inc., 2008.
[2]. K. Laudon, J. Laudon, "Management Information Systems: Manage the Digital Firm", Twelfth Edition, Pearson Education, Inc., United States of America, 2012.
[3]. Paulraj Ponniah, "Data Warehousing Fundamentals", John Wiley & Sons, Inc. 2001.
[4]. Lekha Narra, Tony Sahama , Peta Stapleton, "Clinical Data Warehousing A Business Analytics approach for managing health data", Proceedings of the 8th Australasian Workshop on Health Informatics and Knowledge Management (HIKM 2015), Pages 101 104, Sydney, Australia, January 2015.
[5]. Ralph Kimball, Margy Ross, "The Data Warehouse Toolkit: The Definitive Guide to Dimensional Modeling", Third Edition, John Wiley & Sons, Inc., Indiana, United States of America, 2013.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Cloud Computing: Enterprise Applicationand Data Security Challenges And Solutions |
Country | : | India |
Authors | : | Gautam Deb |
: | 10.9790/0661-1905035460 |
Abstract: The purpose of this paper was to identify and establish the capabilities of cloud computing as a secured solution for an enterprise, where both the data and application can be stored and accessed in a secure way. Cloud computing claims to help enterprises achieve more by eliminating the common enterprise IT concerns. At the same time, certain concerns have emerged as potential barriers to rapid adoption of cloud services such as security, privacy and reliability. Givingconfidential data and services to the cloud provider to maintain, implies giving access to your valuables to a third party, hence it is crucial that we ensure that the cloud services are capable enough to provide state of the art security and leaves no scope for vulnerabilities. Security is the degree of resistance to............
Keywords:Cloud computing, Data Security, Security Concerns.
[1]. O'Sullivan, Arthur; Sheffrin, Steven M. (2003). Economics: Principles in Action. Upper Saddle River, New Jersey: Pearson Prentice Hall. p. 29. ISBN 0-13-063085-3.
[2]. Nicholas A Sherwood . (2015). Enterprise Security Architecture: A Business-Driven Approach. CRC Press. ISBN978-1578203185.
[3]. Microsoft. What is cloud computing. https://azure.microsoft.com/en-in/overview/what-is-cloud-computing/ (accessed 22 Sep 2017).
[4]. IEEE. Cloud Service and Deployment Models. https://cloudcomputing.ieee.org/images/files/education/studygroup/Cloud_Service_and_Deployment_Models.pdf (accessed 22 Sep 2017).
[5]. Tech Target. Shared responsibility model. http://searchcloudcomputing.techtarget.com/definition/shared-responsibility-model (accessed on 23 Sep 2017)..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Review Paper on Web Service Security and Logging |
Country | : | India |
Authors | : | Ms.Mehdi Tanweer Mehmooda || Prof. Nagaraju Bogiri |
: | 10.9790/0661-1905036164 |
Abstract: Web service‖ is an application running on Internet by a service provider, which is accessible by the users through standard internet protocols. Web Service Security has become significantly important and very harder to achieve which deals with management of authentication, authorization, monitoring and logging of the web services data usage. Web services provides reusability, virtualization, integrity, availability and interoperability through the application of technology such as SOAP and service oriented architecture and Representational State Transfer. Whenever a request is goes to application then the application handles the request and also application engine automatically logs the request. Logs provide lots of valuable and important information about systems, networks, and applications. Logs encompassing audit records, and alerts also provides signs of something is already broken or will be broken............
Keywords:Web service, Web services security, web-content mining, web structure mining, web usage, web logs.
[1] John Steven , Gunnar Peterson, Deborah A. Frincke, Deborah ―Building Security In‖ IEEE SE CURITY & PRI VACY
[2] Vivek R, Prasad Mirje and Sushmitha N ―RECOMMENDATION FOR WEB SERVICE COMPOSITION BY MINING USAGE LOGS‖ (IJDKP) Vol.6, No.2, March 2016.
[3] B.Meena, I.S.L.Sarwani, S.V.S.S.Lakshmi "Web Service mining and its techniques in Web Mining" (IJDKP) vol.2 issue-1 Jan 2014
[4] OverView of Amazon web services April 2017.
[5] G T Raju1 and P S Satyanarayana -―Knowledge Discovery from Web Usage Data: Complete Preprocessing Methodology‖, IJCSNS
International Journal of Computer Science and Network Security, VOL.8 No.1, January 2008...