Version-2 (Jul-Aug 2018)
- Citation
- Abstract
- Reference
- Full PDF
- Download Cover Page
Paper Type | : | Research Paper |
Title | : | Hog Feature - A Survey |
Country | : | India |
Authors | : | Suman Mondal |
: | 10.9790/0661-200402011 |
Abstract: Detecting a specified object in a given image is a difficult task due to its possible widely variable appearance. An essential requirement for this task is a robust feature set that allows the appearance of the object in the image to be discriminated cleanly, even in complex backgrounds under all possible illumination effects. Study of the existing literature shows that Histogram Oriented Gradient(HOG) feature is one of the most powerful feature for object recognition in scene images. In this report, we made a survey of the use of HOG feature in image classification tasks. This report also covers different variations of HOG features proposed at a later period. Results of the use of HOG feature along with Support Vector Machine (SVM) in scene text recognition tasks on several standard databases like ICDAR2003 robust reading dataset, Street View Text (SVT) etc. are available in the literature and these are comparable with the classification results provided by the state-of-the-art.
Keywords–HOG, Co-HOG, PHOG, Word-HOG
[1]. X. Chen and A. L. Yuille, "Detecting and reading text in natural scenes," in Proceedings of the 2004 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, ser. CVPR'04, 2004, pp. 366–373.
[2]. B. Bataineh, S. N. H. S. Abdullah, and K. Omar, "An adaptive local binarization method for document images based on a novel thresholding method and dynamic windows," Pattern Recogn. Lett., vol. 32, no. 14, pp. 1805–1813, Oct. 2011.
[3]. T. Wakahara and K. Kita, "Binarization of color character strings in scene images using k-means clustering and support vector machines," in Proceedings of the 2011 International Conference on Document Analysis and Recognition, ser. ICDAR '11, 2011, pp. 274–278.
[4]. K. Crammer and Y. Singer, "On the algorithmic implementation of multiclass kernel-based vector machines," J. Mach. Learn. Res., vol. 2, pp. 265–292, Mar. 2002.
[5]. C.-W. Hsu, C.-C. Chang, and C.-J. Lin, "A practical guide to support vector classification," Tech. Rep., 2003.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Performance Evaluation of Ekahau RTLS in Indoor Environments |
Country | : | Nigeria |
Authors | : | P. M. Asuquo || K. M. Udofia |
: | 10.9790/0661-2004021220 |
Abstract: The poor performance of global positioning system (GPS) in indoor environments has increased the demand for location based services (LBS) which is growing exponentially. This research work will look at the performance of Ekahau Real Time Location System (RTLS) an indoor positioning system, which is a software-based solution for tracking assets in real time. This work is carried out in different environments to evaluate the performance of Ekahau RTLS. The different experiments are clearly explained and the Experimental results indicate that Ekahau RTLS can achieve 3-5 metres of accuracy in a properly calibrated model. A comparative analysis carried out from the different test environments with different conditions shows that performance of Ekahau RTLS depends on density and placement of access points, quality of site survey and the nature of the experimental environment.
Keywords–Ekahau, Real Time Location System, WLAN, RSSI
[1]. BBC News Channel (2007) 'Wi-fi and RFID used for tracking ', BBC [Online]. Available at: http://news.bbc.co.uk/1/hi/technology/6691139.stm (Accessed: 13th June, 2018).
[2]. [2] Deak, Gabriel; Curran, K. and Condell, J. (2012). A Survey of Active and Passive Indoor Localisation Systems Computer Communications
[3]. Furey, E., Curran, k. and MC Kevitt, P. (2009) Habits: A Location Aware Based Wi-Fi Indoor Trracking System. Ireland: University of Ulster [Online]. Available at: http://www.infm.ulst.ac.uk/~Kevin/pgnet08.pdf (Accessed: 13th June, 2018).
[4]. Furey, E., Curran, K., and Mc Kevitt, P. (2012). HABITS: A Bayesian Filter Approach to Indoor Tracking and Location. International Journal of Bio-Inspired Computation (IJBIC), Vol. 4, No. 1, pp: xx, ISSN (Print): 1758-0366, InderScience
[5]. Gouveia, M. (2011) Study of Indoor Map Topology inferring through Local Positioning Systems. Master' Thesis
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Managing Authorization & Authentication Issues Using Single Sign-On & Server Directory |
Country | : | India |
Authors | : | Rashmi B H |
: | 10.9790/0661-2004022124 |
Abstract: Network security deals with basic principles of Authorization and Authentication. Basically, say any organization or in any institution one main principle of maintaining security is to have a well ordering authorization and authentication principles i.e. the process of verification and validation. Authorization is a process of verifying the data, whereas authentication is the process of validating the data. Many issues are involved with the principles of Authentication & Authorization in maintaining security in an organization. There will be problems associated with authentication and access control mechanisms. This paper presents a mechanism called Single sign-on using Kerberos and Directory server using LDAP to employ a solution for managing network security in an organization.
Keywords–Security, Authentication, Authorization, Single sign-on, directory Server, Kerberos, LDAP
[1]. Guilin Wang, Jiangshan Yu, and Qi Xie," Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks", IEEE Transactions On Industrial Informatics, Vol. 9, No. 1, February 2013.
[2]. Manvi Mishra,Shivangi Tyagi,Nikitha Jaiswal, Shivangi bJohri," Authentication and Authorization issues for Multi-hop Networks, IJICT,ISSN 0974-2239,volume 3,number 10(2013).
[3]. S.schwoon,S.Jha,T.Reps,S.Stubblebine," On Generalized Authentication Problems".
[4]. Rashmi B H, Usha C.R, Jayanth.P.Raj, "Firewall: A Perimeter Security solution", International Journal of Scientific & Engineering Research, Volume 8, Issue 1,Jan-2017
[5]. Fabian Alenius," Authentication and Authorization", Examensarbete 15 hp August 2010.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Searchable encryption (SE) has been a promising technology which allows users to perform search queries over encrypted data. However, the most of existing SE schemes cannot deal with the shared records that have hierarchical structures. In this paper, we devise a basic cryptographic primitive called as attribute-based keyword search over hierarchical data (ABKS-HD) scheme by using the ciphertext-policy attribute-based encryption (CP-ABE) technique, but this basic scheme cannot satisfy all the desirable requirements of cloud systems. In this paper, we focus on a different yet more challenging scenario where the outsourced dataset can be contributed from multiple owners and are searchable by multiple users, i.e. multi-user multicontributor case. Inspired by attribute-based encryption (ABE), we present the first attribute-based keyword search scheme with efficient user revocation (ABKS-UR) that enables scalable fine-grained (i.e. file-level) search authorization. Our scheme allows multiple owners to encrypt...........
Keywords– hierarchical structures, ciphertext-policy, chosen-plaintext attack, Searchable encryption, attribute-based encryption,, chosen-keyword attack.
[1]. S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing," in Proc. of INFOCOM. IEEE, 2010, pp. 1–9.
[2]. M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, "Scalable and secure sharing of personal health records in cloud computing using attributebased encryption," IEEE TPDS, vol. 24, no. 1, pp. 131–143, 2013.
[3]. S. Kamara and K. Lauter, "Cryptographic cloud storage," in Financial Cryptography and Data Security. Springer, 2010, pp. 136–149.
[4]. D. X. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," in Proc. of S&P. IEEE, 2000, pp. 44–55.
[5]. Y. Huang, D. Evans, J. Katz, and L. Malka, "Faster secure two-party computation using garbled circuits." in USENIX Security Symposium, vol. 201, no. 1, 2011.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Network Port for the Internet of Things Using Cloud Computing |
Country | : | |
Authors | : | Mohammed Al-Rawe || Sefer Kurnaz |
: | 10.9790/0661-2004023237 |
Abstract: The high availability of internet connections as well as the huge number of services provided on the internet has encouraged the use of this network to connect devices of many types, other than computers, in order to communicate information or make use of these services. These devices are known as Things, andthis phenomenon has created the Internet of Things (IoT), where most of these devices are of limited resources to maintain smaller sizes that achieve the main feature of these devices, which is mobility. As computers have always been used to support devices with fewer resources, and according to the benefits of using cloud computing, a novel method is proposed in this study to reduce the resources required from the IoT devices to achieve their intended tasks. The proposed method consists, mainly, of three components, which are a web application to provide the required configurations to support each task, a data management server, and a service that communicates with the IoT devices...........
Keywords– Cloud Computing, Efficiency, Internet Services,Internet of Things
[1]. D. Popovic and V. P. Bhatkar, Distributed Computer Control Systems in Industrial Automation vol. 66: CRC Press, 1990.
[2]. S. Rosminah and A. Z. M. Ali, "Development of hardware-interfacing learning kit for novice learning programming," International Journal of Information and Education Technology, vol. 6, p. 647, 2016.
[3]. V. K. Patel and M. N. Patel, "Development of Smart Sensing Unit for Vibration Measurement by Embedding Accelerometer with the Arduino Microcontroller," International Journal of Instrumentation Science, vol. 6, pp. 1-7, 2017.
[4]. E. Popa and V. Popa, "Graphic interface for numerical commands on the USB port of PC compatible computers," in MATEC Web of Conferences, 2017, p. 01008.
[5]. J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, "Internet of Things (IoT): A vision, architectural elements, and future directions," Future generation computer systems, vol. 29, pp. 1645-1660, 2013..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Survey on Smart Health Monitoring System |
Country | : | |
Authors | : | Aalan Santhosh.B || Dr.S.Sujatha |
: | 10.9790/0661-2004023841 |
Abstract: Health-related problems are regarded as one of the main issues that directly impact the quality of lifetime of someone and development of the state. Among the extensive applications enabled by the Internet of Things (IoT), digital healthcare may be principally essential one. Internet of Things (IoT) provides a replacement life to medical field. This enormously improves the quality of data and also the patient care within the healthcare. This paper presents the survey about the use of Internet of Things in healthcare, its issues and challenges and also the need for integration of cloud and IoT.
Keywords–Cloud Computing, Healthcare, Internet of Things,Security, Sensors
[1]. Ahmed Dridi, Salma Sassi,"A Smart IoT platform for personalized healthcare monitoring using semantic technologies", 2017 International Conference on Tools with Artificial Intelligence.
[2]. Noha MM. AbdElnapi, Nahla F. Omran,"A survey of Internet of Things Technologies and projects for health care service",2018 International Conference on Innovative Trends in Computer Engineering (ITCE 2018), Aswan University, Egypt.
[3]. Shreya Rajkumar , Malavika Srikanth "Health Monitoring System using Raspberry PI", 2017 International Conference on Big Data, IoT and Data Science (BID) ,Vishwakarma Institute of Technology, Pune, Dec 20-22, 2017.
[4]. Zainab Alansari, Nor Badrul Anuar1 and Amirrudin,"The Internet of Things Adoption in Healthcare Applications",2017
[5]. DurgaAmarnath, M. Budida,"Design and Implementation of Smart HealthCareSystem Using IoT" 2017, International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS).
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Data Privacy through Optimal Classification in Large Datasets |
Country | : | India |
Authors | : | arshiya Tabassum || p.Pranitha || dr.M.Sujatha |
: | 10.9790/0661-2004024247 |
Abstract: The sharing of information has been proven to be beneficial for business partnerships in many application areas such as business planning or marketing. Today, association rule mining imposes threats to data sharing, since it may disclose patterns and various kinds of sensitive knowledge that are difficult to find. Such information must be protected against unauthorized access. The challenge is to protect actionable knowledge for strategic decisions, but at the same time not to lose the great benefit of association rule mining. To address this challenge, a sanitizing process transforms the source database into a released database in which the counterpart cannot extract sensitive rules from it. Unlike existing works that focused on hiding sensitive association rules at a single concept level, this paper emphasizes on building a sanitizing algorithm for hiding association rules at multiple..........
Keywords– Database sanitization, learning algorithm, privacy preserving data mining, multi-level association rule hiding.
[1]. X. Wu, X. Zhu, G.-Q. Wu, and W. Ding, "Data mining with big data," IEEE Transactions on Knowledge and Data Engineering,
vol. 26, no. 1, pp. 97–107, 2014.
[2]. U.S. Dept. of Health and Human Services, "Standards for privacy and individually identifiable health information; final rule,"
Federal Register, vol. 65, no. 250, pp. 82 462–82 829, 2000.
[3]. Committe on the Judiciary House of Representatives, "Federal Rules of Civil Procedure," 2014
[4]. European Parliament and Council of the European Union, "Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data," Official Journal of the EC, vol. 281, pp. 0031–0050, 1995.
[5]. B. Fung, K. Wang, R. Chen, and P. S. Yu, "Privacy preservingdata publishing:Asurvey of recent developments," ACM Computing Surveys, vol. 42, no. 4, p. 14, 2010.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Rotation Perturbation Technique for Privacy Preserving In Data Stream Mining |
Country | : | India |
Authors | : | Kalyani Kathwadia || Aniket Patel |
: | 10.9790/0661-2004024855 |
Abstract: Datasets is very challenging task in the systems. It is real processing. Data mining technique classification is one of the most important technique, in this paper is to classify the data as improve the classification accuracy, we have used ensemble model for classification of data. Randomization process added to privacy sensitive data after next process reconstruction to the main data from the perturbed data. Principal Component Analysis (PCA) is used to preserve the variability in the data. Rotation transformation can enlarge the increase the base classifiers and improve the accuracy of the ensemble classifier. In this paper, we analyses a rotation perturbation technique for PCA find eigenvector, load line plot and Zscore-Normalization method using to dimension in stream mining..
Keywords– Data mining, Classification, Privacy, PCA, Z score – Normalization
[1]. N P Nethravathi, Prasanth G Rao, P Deepa Shenoy, Venugopal K R, Indramma M."CBTS: correlation based transformation strategy for privacy preserving data mining" (IEEE), 2015.
[2]. Julius Adebayo, Lalana Kagal. "A Privacy Protection for Procedure for Large Scale Individual Level Data" (IEEE), 2015.
[3]. C.Gokulnath, M.K.Priyan, Vishnu Ballan." Preservation of privacy in data mining by using PCA based perturbation technique" (IEEE), 2015.
[4]. Yingpeng Sang, Hong Shan, and Hui Tian. "Effective reconstruction of data perturbed by random projections" (IEEE) 2012.
[5]. Shuheng Zhou, Katrina Liggett, Larry Wasserman." Differential privacy with compression" (IEEE) 2009.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In the present digital time most of the document and papers are scanned or taking a photo as input and using some communication medium send to the other user.But few people have capability to copy hand written signatures or characters and also copy the pattern of the signatures or characters and words. Some time it is very difficult to make differentiate between the original handwritten signatures or characters (is written by authorized person) and duplicate hand written signatures orcharacters (is written by unauthorized person). In this situation we try to apply machine learning approach like Forward Algorithmof Hidden Markov Model, Baum Welch and Genetic Algorithm etc. In this paper we use computational approach for identification of the original and hand written characters with the help of different approaches. Every approach obtained separate results..
Keywords– HMM (Hidden Markov Model), GA (Genetic Algorithm), Handwritten Character Recognition (HC).
[1]. Zhou Kenong, "Genetic Algorithm Efficient Implementation", Control Theory and Application, vol. 19, no. 5, pp. 812-813, 2002
[2]. RajibLochan Das, Binod Kumar Prasad, GoutamSanyal "English Character Recognition using Global and Local Feature Extraction, International Journal of Computer Applications (0975 – 8887) Volume 46– No.10, May 2012.
[3]. El-Yacoubi,R.Sabourin, M. GillouxC.Y. Suen "Off- Line Handwritten Word Recognition using Hidden Markov Model".
[4]. Binod Kumar Prasad, GoutamSanyal, Department of Computer Science and Engineering, National Institute of Technology, Durgapur, INDIA, " A Model Approach to Offline English Character Recognition" International Journal of Scientific and Research Publications, Volume 2, Issue 6, June 2012 1 ISSN 2250-3153
[5]. Zhang Shan asked, Textbooks. MATLAB genetic algorithm toolbox and its application, Xi'an:Xidian University Press, pp. 137-139, 2005
- Citation
- Abstract
- Reference
- Full PDF