Version-2 (Jan-Feb 2018)
- Citation
- Abstract
- Reference
- Full PDF
- Download Cover Page
Abstract: Now a day everyone is using the smart phone for different purposes. This facility can also be used for the security purposes. In our application we are creating a security system that can be used by the every woman and they can be safe if they are outside of their residence. Parents are very concerned with the security of their daughter, using this application one can always be in touch with their parents or friends. In this application we are using an android mobile phone to provide the security for the woman. Here will provide a way on that woman don't have to worry about mobile screen is locked or what, all they have to do is to start the service once and then that service will run for 24 hours. Here we are using the concept of service in android using that we will run a service in the background always and that service will keep checking for the disturbance and if any problem found then the total screen...........
Keywords: Security, woman, protection, android, Location.
..........
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Due to development of malls there is a severe impact on local shops, leading to decline in sales of groceries, fruits and vegetables, processed foods, garments, shoes, electronic and electrical goods. All such local shops can use the Dynamic Advertising application to attract customers and cope with the loss. Moreover, on user side, if we are stuck in some situation and cannot find a particular product then with the help of this application we can find stores in which we may get the desired product.
Keywords: Data Mining, Data Sources, Dynamic Advertising, Databases, Data Warehouse.
[1]. Sheng-Tang Wu, Yuefeng Li and quot; Pattern-Based Web Mining Using Data Mining Techniques and quota, International Journal of e-Education, e- Business, April 2013.
[2]. Harshawardhan S. Bhosale, Prof. Devendra P. Gadekar A Review Paper on Big Data and Hadoop, International Journal of Scientific and Research Publi- cations, Volume 4, Issue 10, October 2014.
[3]. Sandy Moens, Emin Aksehirli, Bart Goethals Frequent Itemset Mining for Big Data.
[4]. Manjunath T. N., Ravindra S. Hegadi, Umesh I. M., and Ravikumar G. K. Realistic Analysis of Data Warehousing and Data Mining Application, Education Domain.
[5]. Sachin Chaudhary, Devendra Prasad Murala, V. K. Srivastav A Critical Re- view of Data Warehouse , Global Journal
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Developing Data Warehouse for Student Information System ( IIUM as a Case Study ) |
Country | : | Iraq |
Authors | : | Hewa Majeed Zangana |
: | 10.9790/0661-2001020914 |
Abstract: Intensive research and discussion activities on the data warehouse have been found to take place since the past three decades. In large enterprises, huge volumes of data are generated and consumed, and substantial fractions of the data change rapidly. IIUM as an International University need up-to-date information to make decisions and acquaint quality reports. In IIUM there are three student data servers support ITD in order to obtain a report on students by using a way that takes a long time and efforts for preparation. This paper proposes the integration between the three student database servers by comprehensive data warehouse contains student Information to Up-to-date and quality data to ensured the correct decision making and reports producing..
Keywords: Data Warehouse, Integration
[1]. Professional Development for the Massachusetts Education Data Warehouse, September 2008, Introduction to the Data Warehouse, Version 2.0.
[2]. SUN, ZHANG, PAN Qidong, and YAN Shaoling, August 02,2010Research and Design of Data Warehouse in Coal Mine Enterprise
[3]. David J. DeWitt, How to Build a High-Performance Data Warehouse
[4]. Weisensee D. Matthews E., McInnis A. (2004) Implementing Data Warehousing and Business Intelligence at McMaster University Using the SAS Intelligence Value Chain 20 Oct 2004 pp125-30.
[5]. Fabio Casati, Malu Castellanos, Norman Salazar, and Umeshwar Dayal, 2007 Abstract Process Data Warehousing.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Now a day's, most of the people are depended on the transaction over internet through which they carry out their daily task such as, banking transition, shopping etc. So, it is most important to ensure the security of the data that are transmitted over the internet. In this regard, we proposed a partial blind signature scheme based on Elliptic Curve Discrete Logarithm Problem (ECDLP) which is an extension of blind signature. In partial blind signature scheme, both user and signer have some common agreed information. The user only blind the message but the common agreed information remain unblind to the signer. Using common agreed information signer can find out the user but he cannot trace message signature pair. The proposed scheme satisfies all the security properties of blind signature. As, the scheme is based on ECDLP so it can provide same level of security using smaller key size compared...........
Keywords: Partial blind signature, ECC, Discrete logarithm problem, RSA, ECDLP
[1]. D. Chaum, "Blind signature for untraceable payments," Advances in Cryptology, Proceedings of CRYPTO '82, pp. 199–203, 2000.
[2]. A. Juels, M. Luby, and R. Ostrovsky, "Security of blind signatures," Advances in Cryptology - Crypto 1997, LNCS 1294. Springer-Verlag, pp. 150–164., 1997.
[3]. D. Pointcheval, "Strengthened security for blind signatures," Advances in Cryptology -Eurocrypt 1998, LNCS 1403. Springer-Verlag,, pp. 391– 403, 1998.
[4]. D. Pointcheval and J. Stern, "Provably secure blind signature schemes," Advances in Cryptology - Asiacrypt 1996, LNCS 1163. Springer- Verlag, pp. 252–265, 1996.
[5]. T. Abe, M. Okamoto, "Provably secure partially blind signatures," Advances In Cryptology-Crypto,LNCS 1880.Springer-Verlag, vol. 5, pp. 271–286, 2000.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Belief Rule Based Expert System to Assess Hyperthyroidism |
Country | : | Bangladesh |
Authors | : | Ferdous Ara |
: | 10.9790/0661-2001022635 |
Abstract: Hyperthyroidism is a condition in which the thyroid gland is overactive and makes excessive amounts of thyroid hormone, which could lead to loss of live. The primary diagnosis of hyperthyroidism is carried out by using different signs and symptoms of patient. However, the disease cannot be measured with 100% certainty since the existence of different types of uncertainties with signs and symptoms of a patient. Most common hyperthyroidism sign and symptoms are mood swings, anxiety, trouble sleeping, muscle weakness, weight loss, irregular heartbeat, heat intolerance etc. This paper describes the accuracy of Belief Rule Based Expert Systems (BRBES) over the traditional hyperthyroidism assessment system by using signs and symptoms. Belief rule based expert system can adapt with the uncertainty...........
Keywords: Hyperthyroidism, Uncertainty, Expert System, Belief Rule Base, Signs and Symptoms
[1]. Hanley, J.A. (1988). The robustness of the "Binormal" assumptions used in fitting ROC curves. Med Decis Making, 8(3):197–203
[2]. Hubay, C.A. & Evans, R. D. (1995). Hyperthyroidism. The American Journal of Nursing, Lippincott Williams & Wilkins , 55(10), 1206-1210.
[3]. Khanale, P.B. & Ambilwade, S.P.(2011). A fuzzy inference system for diagnosis of Hypothyroidism, Journal of Artificial Intelligence, 4(1), 45-54.
[4]. Khanale, P.B. & Ambilwade, S.P.(2011). A fuzzy inference system for diagnosis of Hypothyroidism, Journal of Artificial Intelligence, 4(1), 45-54.
[5]. Kong, G.L, Xu, D.L., & Yang, J.B. (2009). An evidence-adaptive belief rule based decision support system for clinical risk assessment in emergency care. In: Proc. 23rd European Conference on Operational Research, Bonn, Germany.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Testing Docker Performance for HPC Applications |
Country | : | |
Authors | : | Alexey Ermakov || Alexey Vasyukov |
: | 10.9790/0661-2001023643 |
Abstract: The main goal for this article is to compare performance penalties when using KVM virtualization and Docker containers for creating isolated environments for HPC applications. The article provides both data obtained using synthetic tests (High Performance Linpack) and real life applications (OpenFOAM). The article highlights the influence on performance of major infrastructure configuration options – CPU type presented to VM, networking connection type used..
Keywords: Docker, KVM, MPI, HPL, OpenFOAM, benchmark.
[1]. U. Markwardt. Running virtual machines in a slurm batch system.In Slurm User Group, 2015.
[2]. W. Felter, A. Ferreira, R. Rajamony, and J. Rubio.An updated performance comparison of virtual machines and linux containers. Technical Report Technical Report RC25482 (AUS1407-001), IBM Research Division, Austin Research Laboratory, July 2014.
[3]. D. M. Jacobsen and S. Canon. Contain this, unleashing docker for hpc. In Cray User Group Conference Proceedings, 2015.
[4]. D. Jacobsen, D. Botts, and Canon S. Never port your code again – docker functionality with shifter using slurm. In Slurm User Group, 2015.
[5]. H.-E. Yu and W. Huang.Building a Virtual HPC Cluster with Auto Scaling by the Docker.ArXiv e-prints, September 2015, 1509.08231..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | An Emprical Study on Secured Cloud Storage Techniques |
Country | : | India |
Authors | : | P Jayasree || Dr.V.Saravanan |
: | 10.9790/0661-2001024455 |
Abstract: Cloud computing is a large-scale distributed computing paradigms for Information and Communications Technology because of promising vision. Cloud computing presents an incredible convenience for organizations to store the data in cloud. The key advantage of cloud storage is ubiquitous user accessibility and virtually unlimited data storage capability. Data integrity is preservation, assurance of accuracy and consistency of data over its complete life-cycle. It is an essential feature to design, execution and usage of system that stores, processes, or retrieve data. Cloud data auditing is an essential for securing the cloud storage as it allocates the cloud users to authenticate the integrity of outsourced data in efficient manner. However, the existing techniques failed to improve the data integrity rate and reduce the data accessing time. Our main objective is to improve the security of cloud storage by considering cryptographic techniques.
Keywords: Cloud computing, Cloud data auditing, Cloud storage, Information and Communications Technology, Data integrity.
[1]. Yong Yu, Man Ho Au, Giuseppe Ateniese, Xinyi Huang, Willy Susilo, Yuanshun Dai, and Geyong Min, "Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage", IEEE Transactions on Information Forensics and Security, Volume 12, Issue 4, April 2017, Pages 767-778
[2]. Tao Jiang, Xiaofeng Chen, and Jianfeng Ma, "Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation", IEEE Transactions on Computers, Volume 65, Issue 8, August 2016, Pages 2363 – 2373
[3]. Huaqun Wang, Debiao He and Shaohua Tang, "Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud", IEEE Transactions on Information Forensics and Security, Volume 11, Issue 6, June 2016, Pages 1165 – 1176
[4]. Yousheng Zhou, Feng Wang, Fei Tang and Xiaojun Wang, "Cellular automata based secure distributed storage scheme with integrity proof", Computers & Electrical Engineering, Elsevier, Volume 59, April 2017, Pages 291-304
[5]. Xianglong Wu, Rui Jiang, and Bharat Bhargava, "On the Security of DataAccess Control for Multiauthority Cloud Storage Systems", IEEE Transactions on Services Computing, Volume 10, Issue 2, March-April 2017, Pages 258 – 272..
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Signature is a very accepted biometric way for personal authentication and identification due to the fact that each person has their own unique signature with its specific behavioral feature. Therefore, it's highly important to recognizing the signature itself. Signature system is a behavioral biometric method, and it is divided in; online signature system and Offline signature system, the first one captures dynamic properties like time, pressure of the hand and speed during writing, while the second type analyzes stationary images of signatures, post the writing operation. Off-line system has no dynamic information available, and thus, it is a harder procedure than on-line system. An offline signature is of interest in cases where only hard copies of signatures are available, especially in which many documents have to be authenticated. We proposed applying the Novel Offline signature identification system to retrieve the personal's information, this system can be apply by using cloud server according to the type of input taken by the Client. After the signature will be identified on cloud which been uploaded by client, user information can be retrieved. As a result, a (98.86%) test accuracy is obtained by using the proposed method and (SigComp2011) dataset to train and test the classifier (identifier)..
Keywords: offline signature – identification – SIFT – Bag of Word - SVM – cloud.
[1]. A. R. ,. S. P. K. Jain, "An introduction to biometric recognition," IEEE Trans. Circuits. Syst. Video Technol, pp. 4-20, 2004.
[2]. D. S. S. B. S. J. Sushma Jaiswal, "BIOMETRIC: CASE STUDY," Journal of Global Research in Computer Science, vol. 2, pp. 19-49, 2011.
[3]. M. B. YILMAZ, "OFFLINE SIGNATURE VERIFICATION WITH USER-BASED AND GLOBAL CLASSIFIERS OF LOCAL FEATURES," thises, February 2015.
[4]. A. R. S. P. Anil K. Jain, "An Introduction to Biometric Recognition," IEEE, vol. 14, JANUARY 2004.
[5]. S. K. Deepti Joon, "An Offline Handwritten Signature Verification System - A Comprehensive Review," International Journal of Enhanced Research in Science Technology & Engineering, vol. 4, pp. 433-439, 2015..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Cloud System For Encryption And Authentication Medical Images |
Country | : | Turkey |
Authors | : | Sefer kurnaz || Abdulrahman Ahmed jasim |
: | 10.9790/0661-2001026575 |
Abstract: Lately, a great number of applications has emerged during the fast and continuous development in telecommunications area. One of those important applications is a tele-medicine where the patient digital medical data can be transferred between doctors in order to farther diagnosis. Thus, protecting the exchanged medical data is the mission of this study, especially when exchanging that medical data over an insecure channel like the cloud computing environment, Medical images standard form called DICOM (Digital imaging and communications in Medicine). When we are outsourcing these medical images which contains sensitive information about patient such as medical status about the patient there is a need to give privacy for this information. Where security is considered a valuable issue, in this study proposes a novel framework to enhance the protection of DICOM images and privacy...............
Keywords: medical image security, encryption, steganography, cloud system, telemedicine.
[1]. O. S. Pianykh, "Digital Imaging and Communications in Medicine (DICOM) APractical Introduction and Survival Guide.," Springer, 2008.
[2]. E. Borko Furht, HandBook of Cloud computing, Springer Science + business Media, LLC, 2010.
[3]. D. C. a. Yanjun, "A Study on Secure Data Storage Strategy in Cloud Computing," ournal of Convergence Information Technology, vol. Volume 5, September 2010.
[4]. G. U. V. V. N. Mustafa Ulutas, "Medical image security and EPR hiding using Shamir's secret sharing scheme," The Journal of Systems and Software, 2011.
[5]. W. B. a. C. B. H. Nyeem, "review of medical image watermarking requirements for teleradiology," Journal of Digital Imaging, vol. 26, p. 326 – 343, 2013...
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Study on Pattern Recognition in Image Processing |
Country | : | |
Authors | : | B srinivasrao |
: | 10.9790/0661-2001027681 |
Abstract: Pattern recognition is the study of how machines can observe the environment, learn to distinguish patterns of interest, make sound and reasonable decisions about the categories of the patterns. Image processing has been proved to be effective tool for analysis in various fields and applications. Many times expert advice may not be affordable, majority times the availability of expert and their services may consume time. Image processing along with availability of communication network can change the situation of getting the expert advice well within time and at affordable cost since image processing was the effective tool for analysis of parameters... In this paper, a practical implementation of image processing and isolated word recognition has been explained.
[1]. Haque, Mohammad Nazmul, and Mohammad ShorifUddin. "Accelerating Fast Fourier Transformation for Image Processing using Graphics Processing Unit." (2011).
[2]. R. C. Gonzalez and R. E. Woods, Digital Image Processing, 3rd, Ed. Prentice Hall, 2008.
[3]. S. W. Smith, The Scientist and Engineer's Guide to Digital Signal Processing. California Technical Publishing
[4]. Vibhute, Anup, and S. K. Bodhe. "Applications of image processing in agriculture: a survey." International Journal of Computer Applications 52.2 (2012): 34-40.
[5]. Dadhwal V.K., R.P. Singh, S.Dutta& J.S. Parihar 2002, "Remote sensing based crop inventory: A review of Indian experience". for Tropical Ecology,43(1): 107-122...