Series-1 (Sep-Oct 2019)Sep-Oct 2019 Issue Statistics
- Citation
- Abstract
- Reference
- Full PDF
- Download Cover Page
Abstract: This study reviews how voice recognition can be used in making it easier for people with disabilities to access door systems and provide better security to lives and properties. Popular Biometric technology includes iris scan, fingerprint scan and facial recognition. These biometric identifiers are unique and distinctive based on features and characteristics used to identify different individuals for the safety and security of their lives and properties. Unfortunately, these biometrics can be hacked. An individual's finger can be cut off to perform fingerprint scan, an eye ball can be removed to perform an iris scan, a pin or password can be hacked, and a picture of the individual can be used to perform facial recognition. These setbacks can be averted with voice recognition biometrics technology...........
Keywords:Access Control, Biometrics, Security, Voice Recognition
[1]. Ehud, Y. Shapiro, The fifth-generation project—a trip report, 1983, 637-641.
[2]. M. Cho, and J. Kang, ―Voice Security On the Rise: Examining the Path to Secure Voice Automation,‖Alticast Inc. Colorado, 2017.
[3]. de Vries, N. Cross, and D. P. Grant, Design Methodology and Relationships with Science: Introduction. Eindhoven: Kluwer Academic Publishers. p. 32. 1992, Archived from the original on 2016-10-24
[4]. Schlage's History of Locks. (n.d.). Retrieved from http://www.locks.ru/germ/informat/schlagehistory.htm.
[5]. Key Dimensions. (n.d.). Retrieved from http://www.dimensionsinfo.com/tabular-key-dimensions
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Examination and Comparison of Signatures by Computational Technique |
Country | : | India |
Authors | : | Suramya || Poonam Prakash || Vaibhav Saran |
: | 10.9790/0661-2105011316 |
Abstract: Many signature verification techniques have been developed in order to distinguish between the genuine signatures and the forgeries. In this paper, an attempt is made to provide an effective method of examination and comparison of signatures by using a computational technique. For various legal problems and in relation to their admissibility in court this computational approach is given which is used as a reflection of the true state of evidence and to strengthen ones observation regarding differences among the two specimens. The computational method of measuring pixel values of signatures based on distance and angle based classification of signatures with better accuracy...........
Keywords: Signature, Examination, comparison, computational approach.
[1]. Bhattacharya, I., Ghosh P., Biswas S., (2013) Offline Signature Verification Using Pixel Matching Technique, International Conference on Computational Intelligence: Modeling Techniques and Applications (CIMTA) 971-977
[2]. Datta, D., Saha R. and Jana R., (2014) Offline signature verification using Euclidian distance, International Journal of Computer science and Information Technologies, 5(1), 707-710
[3]. Gunjal, S.N, Dange B.J and Brahmane A.V, (2016) Offline signature verification using feature point extraction, International Journal of Computer Application, 141(14) ,6-15
[4]. Malik, V., and Arora A., (2015) Signature Recognition Using MATLAB, IJRASET, 3(VI), 682-687
[5]. Osborn, A. S, (1929) Questioned Documents" 2nd ed. Nelson-Hall, Chicago, 205-216, 226-233, 247-248, 363-376.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: This paper titled simulation model to determine the severity of corruption in Adamawa State civil service identifies various forms of staff corruption. despite numerous anti-corruption strategies that have been put in place to curb corruption, such as Economic and Financial Crime Commission (EFCC), Independent Corrupt Practices Commission (ICPC), Police Code of Conduct Bureau (PCCB), Police Service Commission (PSC), the X-Squad Unit and Public Complaint Bureau (PCB), it remains difficult to reduce corruption within the sector. This paper analysed.........
Keywords: Corruption, Fuzzy logic Model, Simulation, MATLAB
[1]. A.Schleifer & R.W. Vishny. (1993). "Corruption." The Quarterly Journal of Economics: 599-617.
[2]. J. Pope. (2000). Transparency International Source Book 2000: Confronting Corruption: The Element of a National Integrity System 13. Online available from
http://www.transparency.org/content/download/2439/14493/file/sourcebook.pdf.zip
[3]. L. K. Hoffman & R. N. Patel (2017). Collective Action on Corruption in Nigeria A Social Norms Approach to Connecting Society and Institutions Great Britain: The Royal Institute of International Affairs, http://www.chathamhouse.org
[4]. M. Salihu. (2000).Corruption in Nigeria. Lancaster University Management School Working Paper 2000/006. The LUMS Working Papers series
[5]. M. Morteza,M. T. Gholamreza & R. Hamed. (2013) Administrative corruption: Providing fuzzy inference system of good governance to combat corruption. 13th Iranian Conference on Fuzzy Systems (ICFS). Qazvin, Iran: IEEE Online available [Accessed November 12, 2017]
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Taking attendance is a long process and takes lot of effort and time, especially if it involves huge number of students. It is also problematic when an exam is held and causes a lot of disturbance. Moreover, the attendance sheet is subjected to damage and loss while being passed on between different students or teaching staff. And when the number of students enrolled in a certain course is huge, the lecturers tend to call the names of students randomly which is not fair student evaluation process either. This process could be easy and effective with a small number of students but on the other hand dealing with the records of a large number of students often leads to human error. Human face detection by computer systems has become a major field of interest. Face detection algorithms are used in a wide range of applications, such as security control, video retrieving, biometric signal processing........
Keywords: biometric, attendance, machine, learning, facial, recognition
[1]. Ahonen, Timo, Abdenour Hadid, and Matti Pietikainen. "Face description with local binary patterns: Application to face recognition." IEEE transactions on pattern analysis and machine intelligence 28.12 (2006): 2037–2041.
[2]. XueMei Zhao, Cheng Bing Wei. "A Real-time Face Recognition System Based on the Improved LBPH Algorithm". IEEE transactions on lbph recognizer for face recognition (2017).
[3]. Ojala, Timo, Matti Pietikainen, and Topi Maenpaa. "Multiresolution gray-scale and rotation invariant texture classification with local binary patterns." IEEE Transactions on pattern analysis and machine intelligence24.7 (2002): 971–987.
[4]. Ahonen, Timo, Abdenour Hadid, and Matti Pietikäinen. "Face recognition with local binary patterns." Computer vision-eccv 2004 (2004): 469–481.
[5]. X. Zhao, W. Zhang, G. Evangelopoulos, D. Huang, S. Shah, Y. Wang, I. Kakadiaris, L. Chen, "Benchmarking Asymmetric 3D2D Face Recognition Systems", Pattern Analysis and Machine Intelligence, pp. 218-233, 2013.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Study on Life Cycle of a Software Project |
Country | : | Saudi Arabia |
Authors | : | Muzammil H Mohammed |
: | 10.9790/0661-2105013338 |
Abstract: In Software improvement for the effective project arranging and the executives, the serious issues are cost estimation and exertion allotment. Cost estimation process includes irregular advances, software instruments, various calculations and suspicions. In the field of software designing the focal point of research examinations are to give opportune estimation of the likely software advancement. For the Software improvement projects to carefully foresee the cost, the real specialists have been chipping away at various models and calculations. Analysts have begun bothering about the forecast exhibition relies upon structure of information as opposed to the models. Industry intensity relies upon cost, execution, and opportune conveyance of the item. In this way, exacting.........
Keywords: Life cycle, software project, data technology
[1]. Akif, R. and Majeed, H. (2012), 'Issues and challenges in scrum implementation', International Journal of Scientific and Engineering Research 3(8), 1–4.
[2]. AL-Taani, R. H. and Razali, R. (2013), 'Prioritizing requirements in agile development: A conceptual framework', Procedia Technology 11, 733–739.
[3]. Alenljung, B. and Persson, A. (2008), 'Portraying the practice of decision-making in requirements engineering: a case of large scale bespoke development', Requirements engineering 13(4), 257–279
[4]. Alzoubi, Y. I., Gill, A. Q. and Al-Ani, A. (2016), 'Empirical studies of geographically distributed agile development communication challenges: A systematic review', Information and Management 53(1), 22–37.
[5]. Babar, M. I., Ghazali, M., Jawawi, D. N., Shamsuddin, S. M. and Ibrahim, N. (2015), 'Phandler: an expert system for a scalable software requirements prioritization process', Knowledge-Based Systems 84, 179–202.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: This research proposed to analyze and predict grade 10 students' performance in Mathematics for the Sultanate of Oman. Several factors were considered in this research that may influence students' performance such as factors related to the student textbook, school environment, factors associated with the teacher, and factor related to student behaviors and human and physical resources. The primary data was collected using questionnaires and secondary data such as students result in mathematics subject collected from the Ministry of Education (educational portal........
Keywords: Machine learning process, Neural Network, Decision Tree
[1]. Wakelam ,E.Jefferies ,A, Davey ,N and Sun ,Y(2015)'The Potential for Using Artificial Intelligence Techniques to Improve e-Learning Systems ' [Online] Available from https:// pdfs.semanticscholar.org/ 641e/ 9fe2856abaa7dbf59c3712aa2ad470d49242.pdf[14 Apr 2019]
[2]. Farooq,M.Chaudhry ,A.Shafiq ,M .and Berhanu ,G.(2011)'FACTORS AFFECTING STUDENTS' QUALITY OF ACADEMIC PERFORMANCE: A CASE OF SECONDARY SCHOOL LEVEL ' Journal of Quality and Technology Management' [Online]II(II)
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Image segmentation plays a vital role in ultrasound digital image applications, for the study of anatomical structures of medical-image. Image segmentation is a tool for dividing an image into multiple parts, to identify objects or other relevant information in digital images. This paper shows some implementation and comparison of different segmentation algorithms like Edge based segmentation, Watershed segmentation, Region based segmentation, Thresholding and Clustering method which separates stones sections from ultrasound kidney image. This paper is to present which method is performing best for segmentation task. The performance of those segmentation methods are measured by calculating the MSE, PSNR and elapsed time of segmented kidney stoned image..
Keywords: Image Segmentation, Objective Evaluation, Edge Detection, Watershed, Thresholding, Clustering
[1]. R. C. Gonzalez and R. E. Woods, "Digital Image Processing", Second Edition, Englewood Cliffs, NJ: Prentice -Hall, 2002.
[2]. P.S. Hiremath, Prema T. Akkasaligar and Sharan Badiger, "Speckle Noise Reduction in Medical Ultrasound Images", International Journal of Computer Science Issues, Vol 9, Issue 2, No 3, March 2012 ISSN 1694-0814.
[3]. K. M. Hassan, M. E. Hamid, and M. K. I. Molla, "A method for voiced/unvoiced classification of noisy speech by analyzing Time-Domain features of spectrogram image," Science Journal of Circuits, Systems and Signal Processing, vol. 6, no. 2, pp. 6–12, 2017.
[4]. P. Rastogi and N. Gupta, "Review of Noise Removal Techniques for Fixed Valued Impulse Noise," International Journal of Computer Applications (0975 – 8887) Volume 123 – No.5, August 2015.
[5]. P. K. Mondal, M. M. Khatun, U. H. Akter, "Comparing the performance of various filters on stoned kidney images," IOSR Journal of Computer Engineering (IOSR-JCE), Volume 18, Issue 4, Ver. V (Jul.-Aug. 2016), PP 73-78.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Telecommunication industry plays a vital role in the modern fast-moving world. At the same time, the industry is highly competitive because of multiple providers provide different solutions to their consumers. As a result, customers are rapidly moving from one service provider to another. Furthermore, human communications have been moving far from traditional calls and text messages to alternatives. Therefore, mobile operators are under real revenue threats as well as the risk of losing their potential customers. To solve this kind of issues, they need to increase their capabilities on understanding customer behavior patterns and preferences, in order to achieve a high level of customer profitability and revenue. The major aim of this study is to cluster the customers based..........
Keywords:Profitability, Clustering, Neural Network, K-means, Telecom
[1]. P. K. Chang and H. L. Chong, "Customer satisfaction and loyalty on service provided by Malaysian telecommunication companies," in International Conference on Electrical Engineering and Informatics, Bandung, Indonesia, 2011.
[2]. Q. Ho, W. Lin, E. Shaham, S. Krishnaswamy, T. A. Dang, J. Wang, I. C. Zhongyan and A. Shi-Nash, "A Distributed Graph Algorithm for Discovering Unique Behavioral Groups from Large-Scale Telco Data," in 25th ACM International on Conference on Information and Knowledge Management, Indianapolis, Indiana, USA, 2016.
[3]. M. Xu, Y. Qiu and J. Qiu, "Mining for profitable customers," in International Conference on Information Technology: Coding and Computing, Las Vegas, NV, USA, USA, 2003.
[4]. H. I. Arumawadu, R. M. K. T. Rathnayaka and S. K. Illangarathne, "Mining Profitability of Telecommunication Customers Using K-Means Clustering," Journal of Data Analysis and Information Processing, pp. 63-71, 2015.
[5]. I. K. Savvas, C. Chaikalis, F. Messina and D. Tselios, "Understanding customers' behaviour of telecommunication companies increasing the efficiency of clustering techniques," in 25th Telecommunication Forum (TELFOR), Belgrade, Serbia, 2017..
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The analysis and prediction of students' performance have become an essential topic in the educational sector nowadays. Data mining and machine learning techniques used to investigate data from education institutions. However, assessing the students' academic performance is not an easy task since the students' performance depends on different factors.
This research proposed to predict students' second-semester mark from the begging of the second semester by taking the first-semester mark as an input variable. A sample of 1300 students with the low performance in Mathematics, was taken from 13 schools especially government schools in the Muscat region for the school year 2018-2019 to develop prediction models which can efficiently predict grade 10 students' marks in Mathematics. Since the second semester mark is unknown..........
Keywords: Neural Network, Decision Tree, Linear Regression, Clustering, Regression
[1]. Wakelam ,E.Jefferies ,A, Davey ,N and Sun ,Y(2015)'The Potential for Using Artificial Intelligence Techniques to Improve e-Learning Systems ' [Online] Available from https://pdfs.semanticscholar.org/641e/9fe2856abaa7dbf59c3712aa2ad470d49242.pdf[14 Apr 2019]
[2]. Farooq,M.Chaudhry ,A.Shafiq ,M .and Berhanu ,G.(2011)'FACTORS AFFECTING STUDENTS' QUALITY OF ACADEMIC PERFORMANCE: A CASE OF SECONDARY SCHOOL LEVEL ' Journal of Quality and Technology Management......
- Citation
- Abstract
- Reference
- Full PDF
- Citation
- Abstract
- Reference
- Full PDF