Version-2 (Sep-Oct 2018)
- Citation
- Abstract
- Reference
- Full PDF
- Download Cover Page
Paper Type | : | Research Paper |
Title | : | Texture Based Approach For Face Image Recognition Using Low Resolution Images |
Country | : | India |
Authors | : | Heena Goyal || Sonika Jindal |
: | 10.9790/0661-2005020106 |
Abstract: Face recognition based on Euclidean distance and texture feature. A method for face recognition by using the GLCM (Gray Level Co-occurrence Matrix) and texture features. Euclidean distance classifier is used for the matching between the training and testing images. In this paper purpose of the research is to improve the accuracy for the low resolution images. By analysing various approaches for face recognition there is need to develop a new approach which can provide better results using texture features for blurred images.
Keywords–EULBP, False Acceptance Rate, False Recognition Rate, Face Recognition.
[1]. Anil K. Jain, Fellow, IEEE, Arun Ross, Member, IEEE, and Salil Prabhakar, Member, IEEE-An Introduction to Biometric Recognition. IEEE journal January 2004.
[2]. Kyungnam Kim "Face Recognition by using Principal Component Analysis" International Journal of Security and Its Applications
[3]. Pong C. Yuen, J.H. Lai "Face representation using independent component analysis" the journal of Pattern Recognition society, Pattern Recognition volume 35 (2002) Page No.1247–1257.
[4]. Jian Yang, Davis Zhang, Alejandro F. Frangi and Jing Ju Yang "Two-Dimensional PCA:A New Approach to Appearance-Based Face Representation and Recognition" IEEE Transactions On Pattern Analysis And Machine Intelligence, Vol. 26, No. 1, January 2004
[5]. Timo Ahonen, Abdenour Hadid, and Matti Pietikainen "Face Description with Local Binary Patterns: Application to Face Recognition" IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 28, No. 12, December 2006..
- Citation
- Abstract
- Reference
- Full PDF
Abstract: This paper presents a review on Content based medical image retrieval for medical imaging modalities. Theevolution in the field of medical imaging system has lead industries to intellectualize a complete automated system for the medical procedures, diagnosis, analysis, treatment and prediction.CBMIR for medical images has becomes a major necessity with the growing technological advancements. Basically the purpose of CBMIR is to include this domain specific knowledge to increase the performance of medical CBIR system and to study the stability of different methods for medical image retrievals for different imaging modalities.The successful execution of such system largely depends upon the robustness, accuracy and speed of the retrieval systems.
Keywords–CBIR (content based image Retrieval), CBMIR (Content based medical image retrieval), Medical imaging modalities.
[1]. Blaser, Database Techniques for PictorialApplications, Lecture Notes in Computer Science,Vol.81, Springer Verlag GmbH, 1979.
[2]. V.S. Murthy, E.Vamsidhar, J.N.V.R. Swarup Kumar, and P. Sankara Rao,"Content based Image Retrieval using Hierarchical and Kmeans Clustering Techniques", International Journal of Engineering Science and Technology, Vol. 2, No. 3, 2010, pp. 209-212.
[3]. B. Ramamurthy, and K.R. Chandran, "CBMIR: Shape-based Image Retrieval using Canny Edge Detection and K-means Clustering Algorithms for Medical Images", International Journal of Engineering Science and Technology, Vol. 3, No. 3, 2011, pp. 209-212.
[4]. Monireh Esnaashari, S. Amirhassan Monadjami, and Gholamali Naderian,"A Content-based Retinal Image Retrieval Method for Diabetes- Related Eye Diseases Diagnosis", International Journal of Research and Reviews in Computer Science(IJRRCS), Vol. 2, No. 6, 2011, pp. 1222-1227.
[5]. Ashish Oberoi, and Manpreet Singh," Content Based Image Retrieval System for Medical Databases (CBIR-MD) - Lucratively tested on Endoscopy, Dental and Skull Images", International Journal of Computer Science Issues, Vol. 9, Issue 3, No 1, May 2012..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Analysis of Data Mining Tasks, Techniques, Tools, Applications And Trends |
Country | : | India |
Authors | : | Dr.R. Shankar || Dr.S. Duraisamy |
: | 10.9790/0661-2005021219 |
Abstract: Data mining is a process which finds useful patterns from huge amount of data. It is a powerful new technology with great potential to help companies focus on the most important information in their data warehouses. It uses machine learning, statistical and visualization techniques to discovery and present knowledge in a form which is easily comprehensible to humans. This paper deals with detail study of Data Mining its techniques, tasks and related Tools and also focuses on applications ad trends in the data mining which will helpful in the further research.
Keywords– Data mining, KDD, Clustering, Tools, Regression.
[1]. M H Dunham, Data Mining: Introductory and Advanced Topics, Prentice Hall, 2002.
[2]. Dunham, M. H., Sridhar S, Data Mining: Introductory and Advanced Topics, Pearson Education, New Delhi, ISBN: 81-7758-785- 4, 1st Edition, 2006
[3]. http://www.zentut.com/data-mining/data-mining-processes/
[4]. https://www.loginworks.com/blogs/217-data-mining-and-its-importance/
[5]. https://blog.galvanize.com/four-data-mining-techniques-for-businesses-that-everyone- should-know/.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Technology is currently growing very rapidly, and evolved changes, both robots using media technology cable or Bluetooth robot, which is in use is limited by distance. Smart computers are growing very rapidly including Smartphones android, which uses a linux based operating system. The limitations of controlling the robot with a media cable or Bluetooth can be overcome by a robot monitor using the Android smartphone with Wi-Fi as a liaison between the robot with the smartphone, where the results of robot watches will be seen on the android phone interface...
Keywords– ATmega8, Robot ,Surveillance, Wifi.
[1]. T. Salat, S. Raich, S. Mahto and S. Togarwar, "A Wireless Battery Charger for Mobile Device," International Journal of Emerging Trends and Technology in Computer Science, vol. 2, no. 3, pp. 103-105, 2013.
[2]. S. R. Madkar, V. Mehta, N. Bhuwania and M. Parida, "Robot Controlled Car Using Wi-Fi Module," International Journal of Advanced Research in Computer Science and Software Engineering, 2016.
[3]. A. Aneiba and K. Hormos, "A Model for Remote Controlled Mobile Robotic over Wi-Fi Network Using Arduino Technology," in ieee, 2014.
[4]. X. Lu, W. Liu, H. Wang and Q. Sun, " Robot control design based on smartphone," in Control and Decision Conference (CCDC), 2013.
[5]. A. Modh, M. Dabhi, L. N. Mishra and V. N. Mishra, "Wireless Network Controlled Robot using a Website, Android Application or Simple hand Gestures," Journal of Computer Networks, pp. 1-5, 2015.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Detecting Vulnerable User in Twitter Using Tweet Description Logic Rule Generation |
Country | : | India |
Authors | : | S. Revathi || Dr.M.Suriakala |
: | 10.9790/0661-2005022735 |
Abstract: In today's modern era, Social media have become a mandatory, exciting and mundane apparatus in our lives and diverse informal organizations have distinctive focused set of people. Among these networks, twitter standout in the top list that has nearly 313 million dynamic clients on a monthly basis with a whopping 500 million of tweets each day. The commonly shared information on Twitter varies from current affairs, occasions, superstars in every field to government or political issues. Therefore, there is a need to conduct targeted research on identifying approaches for vulnerable user identification in twitter. The proposed system is used in identifying the maximum set of profile data that are necessary for identifying vulnerable user in twitter and identify the appropriate..........
Keywords– Privacy leak, Twitter, Online Social Networks, security, machine learning, fake follower, online social activities..
[1]. Malik Mateen, Muhammad Aleem, Muhammad Azhar Iqbal, Muhammad Arshad Islam, ―A Hybrid Approach for Spam Detection for Twitter‖, IBCAST, 2017, pp. 466 – 471.
[2]. M. Verma and S. Sofat, ―Techniques to detect spammers in twitter-a survey‖, IJCA, Vol. 85, No. 10, 2014, pp. 27 - 32.
[3]. ZHENG Guojun, JIA Wenchao, SHI Jihui, SHI Fan, ZHU Hao, LIU Jiang, ―Design and Application of Intelligent Dynamic Crawler for Web Data Mining‖, IEEE, pp. 1098–1105.
[4]. Mitch Macdonald, Richard Frank, Joseph Mei, and Bryan Monk, ―Identifying Digital Threats in a Hacker Web Forum‖, IEEE/ACM ASONAM, 2015, pp. 926–933.
[5]. Anupama Aggarwal, Saravana Kumar, Kushagra Bhargava, Ponnurangam Kumaraguru, ―The Follower Count Fallacy: Detecting Twi.er Users with Manipulated Follower Count‖, In Proceedings of SAC 2018: Symposium on Applied Computing , Pau, France, April 9–13, 2018 (SAC 2018), 8 pages. DOI: 10.1145/3167132.3167318.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: This study aims to produce a product in the form of a Project Based Learning model to build a compliant attitude to traffic regulations. The study subjects were taken as many as 42 students consisting of 9 limited test students in small groups, 15 students were limited to large groups and 18 students were field tested. Data collection techniques in the form of questionnaires, interviews and tests. Furthermore, it was analyzed using tests of effectiveness, efficiency and attractiveness. The results of the effectiveness data analysis showed that N-Gain in the field test was effective because of 0.78≥0.70. Thus based on the calculation of the average N-Gain normalized to 0.78% with high qualifications so that the use of the Project Based Learning model to build students' obedience towards traffic regulations proved effective..........
Keywords– Project Based Learning, Obedience, Traffic Regulations.
[1]. Al Rasyidin & Wahyudin Nur Nasution.2011.Teori Belajar dan pembelajaran. Medan: Perdana Publishing.
[2]. Amti, dkk. 2004. Layanan bimbingan dan konseling kelompok. Padang: Jurusan Bimbingan dan Konseling Fakultas Ilmu Pendidikan Universitas Negeri Padang.
[3]. Anni, Catharina, Tri. 2004. Psikologi Belajar. Semarang: Unnes Press.
[4]. Azwar, Saifuddin. 2005. Realibilitas dan Validitas. Yogyakarta: Pustaka Pelajar.
[5]. Budimansyah, Dasim. 2009. Paradigma Pembangunan Pendidikan Nasional: Konsep, Teori, dan Aplikasi. Bandung: Widya Aksara Press.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Challenges In Cloud Computing on Security Issues And Solutions |
Country | : | India |
Authors | : | Dr.K.Sasikala || Mr. M.Annamalai |
: | 10.9790/0661-2005024652 |
Abstract: Cloud computing is a technology concept that enables organizations or individuals to share various services in a seamless and cost-effective manner. Technology innovation and its adoption are two critical successful factors for any business/organization. This paper describes cloud computing challenges. A computing platform which faces various challenges in securing the data of the cloud environment. This paper discuss about the cloud, cloud types, security issues, cloud security attacks, applications and methodologies of security solutions in Cloud Computing.
Keywords– Noc- network architects, data center, Cloud Security Alliance, Distributed Denial of Service, Advanced persistent threats
[1]. PankajSareen, ―Cloud Computing: Types, Architecture, Applications, Concerns, Virtualization and Role of IT Governance in Cloud‖, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 3, March 2013. [2]. Md. Sakib Bin Alam, ―Cloud Computing – Architecture, Platform and Security Issues: A Survey‖,World Scientific News
[3]. Ahmed E. Youssef and ManalAlagee, ―A Framework for A Framework for Framework forSecure Cloud ureCloudure Cloud ureCloudComputing Computing Computing‖, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 3, July 2012 [4]. BhushanRathod, PrashantYelmar, PrachiSarode , ― A Survey Paper on Cloud Security Threats Issues and Attack Detection‖ available from:https://www.researchgate.net/ publication/313222138
[5]. AnamikaChoudhary ,SunitaGodara, ―Internet of Things: A Survey Paper on Architecture and Challenges‖ , IJETSR, June 2017.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Design of Non-Volatile SRAM Using Magnetic Tunnel Junction |
Country | : | India |
Authors | : | Veronica Sheran .E |
: | 10.9790/0661-2005025360 |
Abstract: In the last 10 years, FPGA circuits have developed rapidly, because of their flexibility, their ease of use and the low cost to design a function with them. However, the internal memories used in FPGA circuit could limit their future use. Most FPGA circuits use SRAM based flip-flop as internal memory. But since SRAM is volatile, both the configuration and information stored is lost. Internal Flash technology is sometime used to replace the external memory. However, it's slow re-programming and its limited number of writing cycles (up to 106) prevents its use to replace SRAM. By working at high writing and reading speed, MRAM (Magnetic RAM) technology is one of the best solutions to bring complete non-volatility to the FPGA technology while keeping the power dissipation low. An MRAM can be re-programmed 1012times and has a large retention time up to 10 years. This technology is now mature and a lot of progress in its development has been done lately, especially by IBM, Freescale and Samsung [1].
[1]. Bryan John Baker, (2003) 'A model for the behaviour of Magnetic Tunnel Junctions', , IOWA state University.
[2]. HaoMeng and Jian Ping Wang, (2005) 'Spin Transfer Effect in Magnetic Tunnel Junction with a Nano Current Channel layer in free layer', IEEE transactions on Magnetics, Volume 41, No. 10,
[3]. J. C. Slonczewski, (1989) 'Conductance and exchange coupling of two ferromagnets separated by a tunnelling barrier', Physical Review, Volume 39, No 10,.
[4]. Morgan Madec, Jean Baptiste and Fabien Pregaldiny, (2008) 'Compact Modelling of Magnetic Tunnel Junction', IEEE transactions.
[5]. Saied Tehrani and Brad N. Engel(2003.), 'Magnetoresistive Random Access Memory using Magnetic Tunnel Junction', Proceedings of the IEEE, Vol.91, No.5, May
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Skill Acquisition: An E-Learning Approach |
Country | : | Nigeria |
Authors | : | Aneke Stephen O || EzugwuAssumptaO |
: | 10.9790/0661-2005026166 |
Abstract: The attention of the Nigerian Government for over twenty years now has been on youth's empowerment through skill acquisition for self-realisation and economic independence. The Government and individuals, both in the past and present have designed skill acquisition programmes that seem not to be impacting much on the youths due to problem of low self-esteem, master-apprentice gap, abuse and some other ugly experiences youths encounter in the course of their training. Therefore, this work looks at how skill can be acquired through e-learning platform. Experimental methodology was used to demonstrate that skill can be acquired from the comfort of the trainee's home as long as there is availability of internet service, the trainee does not need any formal education to qualify but it can be an advantage.
[1]. Jim Haris, 2018, "What is e-learning", eLEARNINGNC : Available: http://www.elearningnc.gov/about_elearning/what_is_elearning/
[2]. Auer, Michael E., Guralnick, David, and Simonics, Istvan 2017 "Teaching and Learning in a Digital World", Springer journal, Proceedings of the 20th International Conference on Interactive Collaborative Learning – Volume 1. Available: https://www.springer.com/us/book/9783319732091
[3]. Idoko, Cletus Usman, 2014 "Skill Acquisition And Youth Empowerment In Nigeria", Global Journal of Commerce and Management Perspective, ISSN 2319–7285, Vol.3(1):51-54. Available: https://pdfs.semanticscholar.org/67d5/a7008248f9ed14d691d513dff17e308fd77d.pdf
[4]. Florence Undiyaundeye and Ekpungu Anselm Out, 2015, "Entrepreneurship Skills Acquisition and the Benefits amongst the Undergraduate Students in Nigeria", European Journal of Social Sciences Education and Research 5(1), DOI: 10.26417/ejser.v4i1.p9-14. Available: https://www.researchgate.net/publication/284414043_Entrepreneurship_Skills_Acquisition_and_the_Benefits_amongst_the_Undergraduate_Students_in_Nigeria
- Citation
- Abstract
- Reference
- Full PDF
Abstract: CRM (Customer Relationship Management) is a method and tool that helps organizations to maintain customer relationships in a structured manner. It can help to choose the right people or decide on new products that their customers might be interested in. Customer satisfaction plays an important role in any organization to maintain CRM. The main aim of this research is to improve CRM of an organization with cluster analysis. Similarity index has been used to determine the relationship between customers. On the basis of similarity index values, K-mean clustering approach has been used to form groups of various customers on the basis of their interest. After, clustering approach, classification technique such as SVM (Support vector machine) is used to provide the data as per customers need. To determine the efficiency of the proposed model, different parameters such as precision, recall, and F-measure have been measured.
Keywords:– CRM, Similarity Index, Jaccard similarity, Precision, Recall, and F-measure
[1]. Croteau, A.-M., & Li, P. (2003). Critical success factors of CRM technological initiatives. Canadian Journal of Administrative Sciences, 1(20), 21–34.
[2]. Sigala, M. (2005). Integrating customer relationship management in hotel operations: Managerial and operational implications. International Journal of Hospitality Management, 24(3), 391–413.
[3]. Ling, R., & Yen, D. C. (2001). Customer relationship management: An analysis framework and implementation strategies. Journal of Computer Information Systems, 41(3), 17.
[4]. Sathish, S., Pan, S., & Raman, K. (2002, August 9–11). Customer relationship management (CRM) network: A new approach to studying CRM. AMCIS 2002 Proceedings, paper 79, Dallas, TX.
[5]. Payne, A. (2006). Handbook of CRM: achieving excellence in customer management. Oxford: Routledge
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Online applications have turned into an essential piece of our day by day lives, yet in the meantime, security of digital data put away in the web databases has been a developing concern. SQL injection attacks have been an overwhelming and inescapable security risk on web applications in the course of the last one and half decades. The helplessness has been abused by attackers bringing about enormous information break episodes. Advanced and mechanized attack devices have made the circumstance disturbing than at any other time. In spite of broad research on relief of SQL injection attacks, the threat has persevered with almost a similar force. Over some time, SQL injection attack vectors..........
Keywords– SQL, Injection Attack, Normal Use Model.
[1]. Jim,S., and Borrajo,k.(2009) ―A Review Of Machine Learning: For Automated Planning‖, The knowledge engineering review, cambridge university press, vol. 01,pp. 1–24.
[2]. Kotsiantis,B.(2007) ―Supervised Machine Learning: A Review Of Classification Techniques‖, Department of Computer Science and Technology University of Peloponnese, Tripolis GR ,Vol .5,pp.45-67.
[3]. McClure,R. and Kruger,I.(2005) ―SQL DOM: Compile Time Checking of Dynamic SQL Statements‖ International Conference on Software Engineering ,vol31, pp. 88–96.
[4]. Cova,M. and Pintelas,H.(2007) ― An Approach for the Anomaly-based Detection of State Violations inWeb Applications,‖ International Workshop on Recent Advances in Intrusion Detection,vol. 14, pp. 63–86.
[5]. Halfond, W.G. and Orso,W. (2005)―AMNESIA: Analysis and Monitoring for Neutralizing SQL-Injection Attacks,‖ International Conference on Automated Software Engineering ,vol. 3 , pp. 174–183.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | An Effective Keyword Search over Encrypted Data In Cloudenvironment |
Country | : | India |
Authors | : | j. Sailaja |
: | 10.9790/0661-2005028489 |
Abstract: As Cloud Computing ends up pervasive, touchy data are as a rule progressively unified into the cloud. For the insurance of information protection, delicate information must be scrambled before outsourcing, which makes compelling information usage an extremely difficult errand. Albeit customary accessible encryption plans enable clients to safely seek over encoded information through watchwords, these methods bolster just boolean inquiry, without catching any importance of information documents. This approach experiences two fundamental downsides when straightforwardly connected with regards to Cloud Computing. From one viewpoint, clients, who don't really have pre-information of the encoded cloud information, need to post process each recovered document so as to discover ones most coordinating..........
Keywords– Keyword Search, Radix Sort, Data Privacy, Searchable Encryption, Cloud Computing.
[1]. R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, "Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility," Future Generation Computer Systems, vol. 25, no. 6, pp. 599–616, 2009.
[2]. D. X. Song, D. Wagner, and A. Perrig, "Practical Techniques for Searches on Encrypted Data," IEEE Symposium on Security and Privacy, pp. 44–55, 2000.
[3]. D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, "Public Key Encryption with Keyword Search," in Proceedings of the Advances in Cryptology-Eurocrypt 2004, pp. 506–522, 2004.
[4]. A. Singhal, "Modern Information Retrieval: A Brief Overview," IEEE Data Eng. Bull., vol. 24, no. 4, pp. 35–43, 2001.
[5]. C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, "Secure Ranked Keyword Search over Encrypted Cloud Data," in Proceedings of the IEEE 30th International Conference on Distributed Computing Systems (ICDCS), pp. 253–262, 2010.