An Analysis of Raman’s Psychopath Problem In “Raman Raghav 2.0” Film by Anurag Kashyap
Review Paper | Journal Paper
Vol.6 , Issue.12 , pp.952-954, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.952954
Abstract
The main aim of this research paper is to study the film “Raman Raghav 2.0”. In this research, the researcher has used the movie Raman Raghav 2.0 as the unit of analysis and has studied the characterization of the main character. This research is conducted by the application of psychological theories. The Abnormal Theory of Psychology is employed as the theoretical framework of the analysis. The individuals who are affected with Psychopathological Drawback are termed as “Psychopath”. Psychopaths are impulsive people who find it hard to control themselves. They never take time to weigh the merits of their action and they do not care about what they had done or what they are going to do in the future. Individuals affected with Psychopathological Drawback are easily triggered with trivial things. Psychopaths are people who get ignited with disappointment, failure, criticism and easily attack others just because of trivial things. Thus, to study these traits, a Descriptive Qualitative Structural Analysis Methodology has been adapted as this analysis clarifies the concerning intrinsic and extrinsic part of the film. According to the researcher, the intrinsic and extrinsic parts of the film are the dialogs used for communication and the scenarios used to highlight the main character’s activities that help us identify with the Psychopathological Drawback. Through observations of the scenes and the dialogues, the researcher can find that the filmmaker has evidently provided a unique characterization of the main character Raman, who exhibits Psychopathological Drawback. There are plenty of opportunity exist in the field of psychology and film’s impact. This research work can be extended to other similar films.
Key-Words / Index Term
— Film analysis, Characterization, Psychonalysis, Abnormal psychology, Film narration, content analysis, Film making, Psychopath
References
[1] Ardiyansyahkoto “The personality structure of the main character frank in catch me if you can” 2015
[2] Nurul hikmah maulaine “An analysis of esther’s psychopath problem in orphan film viewed from psychoanalysis theory by Sigmund Freud.” 2011.
[3] Ahmad anul hasib “The psychoanalysis of ophelia’s character in ‘savage’ movie. 2016.
[4] M. Ainul Yaqin “Sigmund freud’s psychoanalytic theory of id, ego and superego critical study of director shankar’s movie, anniyan love and its relation with the psychopatch’s motive in autopsy movie” 2014.
[5] Erie Putri Rachmadany “Dynamics of personality in the character of Amy Dunne in David Fincher’s moivw Gone Girl”
[6] Ainul Yagin, “Love & Its Relation with Psychopaths’ motive in Autopsy movie”, 2010
[7] Calvin“Sigmund Freud - Psychoanalysis”, Cleve land the world publishing company. Page 28 1954.
[8] iman arif setiadi, dinamika kepribadian: gangguan dan terapinya. (bandung: pt. refika aditama. 2006), pp. 17
[9] Keval J. Kumar “Mass Communication in India” 2010
Citation
S. R. Mohan Raja, Logranjan Tamilporai, Chandra Mouly. V, "An Analysis of Raman’s Psychopath Problem In “Raman Raghav 2.0” Film by Anurag Kashyap," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.952-954, 2018.
Probability based Watershed Segmentation Algorithm for Multiple Brain Tumor Detection
Research Paper | Journal Paper
Vol.6 , Issue.12 , pp.955-960, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.955960
Abstract
Automatic tumor detection is one of the difficult tasks in medical image diagnosis due to variations in size, type, shape and location of tumors. In the traditional brain tumor detection models, intra and inter slice resolutions may affect the segmentation accuracy. In addition, brain tumors have different intensities overlapping with normal tissue. In this paper, we have proposed an automatic tumor detection framework to detect the multiple tumors in brain tumor databases. This system has three main phases, namely image preprocessing, iterative threshold image enhancement and multi tumor segmentation algorithm. Experimental results show that our proposed system efficiently detects multiple tumors at different locations in the brain tumor image dataset.
Key-Words / Index Term
PWS, Brain, Tumor, Noise reduction, MRI Images
References
[1] Amsaveni, V.; Singh, N. Albert," Detection of brain tumor using neural network" Institute of Electrical and Electronics Engineers – Jul 4, 2013.
[2] Tulsani, Saxena, Mamta," Comparative study of techniques for brain tumor segmentation", IEEE, Nov 23,2013.
[3] Dhage, Phegade, Shah," Watershed segmentation brain tumor detection", IEEE, 2015.
[4] Francis, Premi," Kernel Weighted FCM based MR image segmentation for brain tumor detection",IEEE,2015.
[5] Badmera, Nilawar, Anil," Modified FCM approach for MR brain iamge segmentation", IEEE,2013.
[6] Hanuman Verma, Ramesh, " Improved Fuzzy entropy clustering algorithm for MRI Brain image segmentation", IJIST, 2014.
[7]S.Luo, "Automated Medical image segementation using a new deformable surface model", IJCSNS,2006.
[8] Gordiallo, Eduard," State of the art survey on MRI Brain tumor segmentation" , Magnetic resonance imaging,2013.
[9] Tang, Welping,"Tumor segmentation form single constrast MR images of human brain”, IEEE,2015.
Citation
Srikanth Busa, E.S. Reddy, "Probability based Watershed Segmentation Algorithm for Multiple Brain Tumor Detection," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.955-960, 2018.
An Empirical Study of Knowledge Sharing in Agile Organisations: An Indian Perspective
Survey Paper | Journal Paper
Vol.6 , Issue.12 , pp.961-967, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.961967
Abstract
Knowledge is a core resource for agile organizations and sharing of knowledge is essential across any organization. Within teams, different members often have different deep knowledge and knowledge management is required in every software industry. This paper empirically investigates the knowledge sharing environment in the context of agile methodologies from software practitioners in India. This paper can serve as a reference to the agile users who tends to initiate knowledge sharing culture in the organisation. Organisations are divided into small, medium and large size based upon the total number of teams in the company using agile methodology. It is found that the communication-related issues are the major concern for effective knowledge sharing in the Indian software industry. Knowledge sharing through review meetings and the scrum of scrums are the most used practice among all respondents whereas informal meeting is the least accepted practice for knowledge transfer. We also employed cross table analysis to evaluate the association among practices adopted, issues faced for effective KS and company experience on agile software development.
Key-Words / Index Term
Agile software development, Knowledge management, Knowledge sharing, Organisational knowledge sharing
References
[1] M. Levy, & O. Hazzan, “Knowledge management in practice: The case of agile software development.” In Cooperative and Human Aspects on Software Engineering, CHASE`09. ICSE Workshop pp.60-65, 2009
[2] T. Chau., F. Maurer, G. Melnik, “Knowledge sharing: agile methods vs. Tayloristic methods.” In: Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 302–307, 2003
[3] P. Rasmussen, P. Nielsen, “Knowledge management in the firm: concepts and issues”, International Journal of Manpower, pp. 479 – 493, 2011
[4] I. Nonaka, H. Takeuchi, “The knowledge creation company: how Japanese companies create the dynamics of innovation.” Oxford University Press, New York, USA, pp. 304, 1995
[5] R. Ramanujam, I. Lee, “Collaborative and competitive strategies for agile scrum development.” In: Proceedings of the 7th International Conference on Networked Computing and Advanced Information Management, pp. 123-127, 2011.
[6] J. Highsmith, A. Cockburn. “Agile software development: The business of innovation. Computer”, Vol.34 Issue 9, pp.120–122, 2001
[7] M. Alavi, D.E. Leidner, “Knowledge Management and Knowledge Management Systems: Conceptual Foundations and Research Issues” MIS Quarterly, Vol. 25, Issue 1, pp.107-136, 2001
[8] M.T. Hansen, N. Nohria, T. Tierney, “What is your strategy for managing knowledge?” Harvard Business Review, Vol.77 Issue 2, pp. 106 – 116, 1999
[9] K. Beck, “Embracing change with extreme programming.” Computer, Vol. 32, Issue 10, pp. 70-77, 1999
[10] K. Schwaber, M. Beedle, “Agile software development with scrum”, Upper Saddle River, N.J.: Prentice Hall, 2002
[11] A. Cockburn, “Agile Software Development.” Boston Addison-Wesley 2002 (a)
[12] J.T. Karlsen, L. Hagman, T. Pedersen, “Intra-project transfer of knowledge in information systems development firms.” Journal of System Information Technology, Vol.13 Issue 1, pp.66–80, 2011
[13] V. Santos, A. Goldman, C. DeSouza, “Fostering effective Inter-Team Knowledge Sharing in Agile Software Development.”, Empirical Software Engineering, Vol. 20, Issue 4, pp. 1006-1051, 2015.
[14] V. Santos, A. Goldman, H. Filho, D. Martins, M. Cortés, “The Influence of organizational factors on inter-team knowledge sharing effectiveness in agile environments.” System Sciences (HICSS), 47th Hawaii International Conference on, pp. 4729–4738, 2014
[15] R. Phalnikar, V.S. Deshpande, S.D. Joshi, S.D, “Applying agile principles for distributed software development”, In International Conference on Advanced Computer Control, pp. 535–539, 2009.
Citation
R. Kaur, B.K. Sidhu, "An Empirical Study of Knowledge Sharing in Agile Organisations: An Indian Perspective," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.961-967, 2018.
A Study On the Effects of Video Games On Behavioral Change
Survey Paper | Journal Paper
Vol.6 , Issue.12 , pp.968-970, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.968970
Abstract
This research paper aimed to study the effect of video games and violence behaviour of the college students. Also, this research tries to study the relationship between the exposure level and the aggressiveness level. Prolonged exposure to video games, even the mundane ones, leads to repetitive stress injuries or addiction. Playing video games with violent content are linked to more aggressive behavior in teens. In interactive video games, players are encouraged to identify with and role plays their favorite characters. In a video game about stockcars, winning may mean winning the race. Many of the popular games played by the youngsters have fighting sequence. Violent video games do increase aggression, but other factors contribute to real life violent behavior and it is the parent’s responsibility to imprint good morals onto the child. Violent video games are significantly associated with: increased aggressive behaviour, thoughts, and affect; increased physiological arousal; and decreased prosaically (helping) behaviour. But it helps to flush out one’s anger, stress and depression. Aggressive behaviors occur in natural environments does not make them "normal" play behavior, but it does increase the face validity of the measures. Younger children are more negatively affected than young adults and males are more affected than females. The practiced youngsters can handle the stress better than others who don’t play. Also, they can actually feel less depressed and stressful. Non frequent players are consistently affected by brief exposures. The development of the increased aggressive behaviour is linked to the amount of time youngsters are allowed to use video games. There are plenty of research opportunity is available in the field of game addiction and behavioural change.
Key-Words / Index Term
Video games, Aggressive behaviour, Stress, Violence, Depression, Physiological Arousal, Role play
References
[1] Gore, Tipper. “Raising PG Kids In An X-Rated Society”, Nashville, TN: Abingdon Press 256-310, 1987.
[2]. Grossman, Dave & Gloria, De Gaetano. “Stop Teaching Our Kids To Kill: A Call To Action Against TV”, Movie & Video Game Violence. New York, NY: Crown Publishers 80-85, 1999.
[3]. Wimmer & Domnick, “Mass Media Research Processes, Approaches, and Applications”, India Edition Wadsworth Publication, New Delhi, 2006
[4]. Hughes, Donna R., & Pamela T. Campbell. “Kids Online: Protecting Your Children in Cyber space” Grand Rapids, MI: Fleming H. Revell. 60-154 1998
[5]. James, Torr D. (Ed.). “Is Media Violence A Problem?”, San Diego, CA: Green haven Press, Inc. (2002). 50-75, 2002
[6]. Levine, Madeline. “Viewing Violence: How Media Violence Affects Your Child’s and Adolescent’s” 2010
[7]. David Bond, “The effects of the violent video games on aggressive behavior and the relationship”, Thesis, university of south Florida, 2011
[8]. Praveen, “the impact of video gaming on students: An embrical study, Research gate, 2018
[9]. Anna, “meta analysis of the relationships between video game play and physical aggression”, SCI, 2018
[10]. Mehran, “A canadian national study, child”, SCI, pp 254.2582013.
Citation
S. Kalaiselvan, A.K Branesh, B. Senthil Kumar, A. Kalimuthu, "A Study On the Effects of Video Games On Behavioral Change," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.968-970, 2018.
Detection and Analysis of Multi Signals Processing based on Curvelet Transform: a Survey Report
Survey Paper | Journal Paper
Vol.6 , Issue.12 , pp.971-975, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.971975
Abstract
Digital Signal Processing has a vast spectrum and does not end within electronics. It is the permissive technology for the origination, conversion, and understanding of data. The intention of this paper is to give a brief survey of curvelet transform for detection and analysis of signal processing. The curvelet transform is a family of mathematical appliances and overcomes the missing directional selectivity of wavelet transforms in images and signal analysis. The Curvelet handles curve discontinuities well; best spatial compare to wavelet transform to calculated stand for signals at dissimilar scales and angles. In order to improve the detection management, the conventional signal requires to be transformed into other field, in which the characteristic of the key signal is clearer. The paper is concluded with a brief discussion of curvelet transform implementations on digital signal processing.
Key-Words / Index Term
Signal Processing, Curvelet Transform, EEG signals, Image Enhancement, Image Fusion
References
[1] Tanaya Mandal,” Face recognition using curvelet and selective PCA”, IEEE international Conference: 8-11, 2008.
[2] Farhad Mohammad kazemi,” Vehicle Recognition Using Curvelet Transform and Thresholding ” Advances in Computer and Information Sciences and Engineering, 142–146. January, 2007.
[3] N.G.Chitaliya and A.I.Trivedi,” Automated Vehicle Identification System based on Discrete Curvelet Transform for Visual Surveillance and Traffic Monitoring System”, International Journal of Computer Applications (0975 – 8887) Volume 57– No.1, 2012.
[4] Hanene Trichili and Adel M. Alimi,” Fingerprint verification system based on curvelet transform and possibility theory”, Volume 74, Issue 9, pp 3253–3272, 2015.
[5] Jianmei Bian and Shubo Qiu,” Pulp Fibre Recognition Based on Curvelet Transform and Skeleton Tracing Algorithm” 2nd IEEE Conference on Industrial Electronics and Applications, ICIEA 2007.
[6] S. Prabha and Dr. M. Sasikala,” Texture Classification Using Curvelet Transform”, International Journal of Advancements in Research & Technology, Volume 2, Issue4, April-2013.
[7] Dr. G. Murali and Subhani Shaik “A novel approach based on Curvelet transform for weak radar signal detection” in the International Conference on Knowledge, Information, Science and Technology (ICKIST-2016), 2016.
[8] Subhani Shaik and Dr.U.Ravi babu, "Detection and Classification of Power Quality Disturbances Using curvelet Transform and Support Vector Machines", in the 5th IEEE International Conference on Information Communication and Embedded System(ICICES-2016), 2016.
[9] Subhani Shaik and Dr.U.Ravi babu, "Curvelet based Signal Detection for Spectrum Sensing using Principal Component of Analysis", in the 2nd IEEE International Conference on Engineering and Technology (ICETECH-2016), Pages: 917 – 922, 2016.
[10] Starck , Murtagh , E.J Candes , D.L. Donoho, "Gray and Color Image Contrast Enhancement by the Curvelet Transform," IEEE Transactions on Image Processing .vol. 12, pp. 706- 716, 2003.
[11] Jean-Luc Starck, Emmanuel J. Candes, and David L. Donoho, “The Curvelet Transform for Image Denoising” IEEE Transactions on Image Processing, vol. 11, no. 6, 2002.
[12] A. Cohen, C. Rabut, and L. L. Schumaker, Eds. Nashville, “Curvelets—A surprisingly effective nonadaptive representation for objects with edges,” in Curve and Surface Fitting: Saint-Malo 1999, TN: Vanderbilt Univ. Press, 1999.
[13]J.CandèsandD.L.Donoho,“Curvelets,”[Online]Available:http://www.stat.stanford.edu/~donoho/Reports/1999/curvelets.pdf, 1999.
[14] D.Narain Ponraj, M.Evangelin Jenifer, P. Poongodi, J.Samuel Manoharan, “A Survey on the Preprocessing Techniques of Mammogram for the Detection of Breast Cancer”, Journal of Emerging Trends in Computing and Information Sciences, vol. 2, no. 12, pp 656-664, December 2011.
[15] Vikas Wasson and Baljit,”SinghA Parallel Optimized Approach for Prostate Boundary Segmentation from Ultrasound Images” International Journal of Scientific Research in Computer Science and Engineering, Volume-1, Issue-1, Jan- Feb-2013.
[16] D. Sherlin , D. Murugan,” A Case Study on Brain Tumor Segmentation Using Content based Imaging”, IJSRNSC, Volume-6, Issue-3, June 2018.
Citation
Shaik Subhani, "Detection and Analysis of Multi Signals Processing based on Curvelet Transform: a Survey Report," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.971-975, 2018.
A Case Study on Indian Youngsters: Internet Gaming Disorder and Internet Pornography Addiction
Research Paper | Journal Paper
Vol.6 , Issue.12 , pp.976-979, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.976979
Abstract
This research aimed to study the major psychological problems faced by Indian youngsters in internet addiction in connection with pornography and gaming.Also, this research discusses the economical benefits of the developed nations by the pornography industry. Hardcore pornography business and the vast, enormous and huge profit gained by the pornography movie makers, the porn-websites and the internet linkers which connect the link to the world people and marked as a mass destruction in the changing era of globalization. This case study clearly analyses the key element found throughout all internet related experiences: "The ability to maintain or heighten arousal with the click of a mouse of a finger". The research is conducted on the basis of an extensive literature search and review was performed utilizing a variety of sources. EBSCO collections like ERIC, LISTA, PsychARTICLES, PsychINFO and SocINDEX are referred for the researrch study. Internet related addictions are examined through ambiguosly titled papers performed by first author. Real incidents related to internet ponography addiction is taken as main consideration for analysing the case study. This research clearly shows that there is a significant level of development found in the internet pornography viewers group. This research clearly defines the source of addictions, effects and the recovery mechanism for psychological rebooting. This researchshows the importance of restrictions needed to stop the addition and other health issues. Apart from the internet pornography and addiction, internet gaming devlops the addictive nature of the younger generation groups. In order to reduce the side effects, the governemt has to implement strong rules in the dissemination of informtion through internet.
Key-Words / Index Term
Dopamine, DSM – Diagonastic and statistical manual of mental disorders, Dysphoria, Internet Pornography
References
[1]. W.L. White, “Slaying the Dragon: The History of Addiction Treatment and Recovery in America”, 1st EDITION; Chestnut Health Systems: Bloomington, IL, USA, 1998.
[2]. M. Brand, K.S. Young, C. Laier, “Prefrontal Control and Internet Addiction: A theoretical model and review of neuropsychological and neuroimaging findings”, Frontal Human Neuroscience. 2014,8, 375. Behavioural Science. 2015.
[3]. M.D Griffiths, D.L King, Z. Demetrovics,“DSM-5 internet gaming disorder needs a unified approach to assessment”. Neuropsychiatry 2014.
[4]. R.A Davis’ “A Cognitive behavioural model of pathological internet use”, Computers in Human Behaviour 2001.
[5]. T.E Robinson, K.CBerridge, “Review - The incentive sensitization theory of addiction: Some current issues”. Philosophical Transactions, Royal Society, London. 2008, 363, 3137–3146.
[6]. J.E Grant,J.A Brewer, M.N Potenza, “The neurobiology of substance and behavioural addictions”,CNS Spectrum2006, 11, 924–930.
[7]. C.M Olsen,“Natural rewards, neuroplasticity, and non-drug addictions”,Neuropharmacology 2011, 61, 1109–1122.
[8]. R. Karim,P. Chaudhri, “Behavioral addictions: An overview”. J. Psychoactive Drugs,2012, 44, 5–17.
[9]. R.F Leeman, M.N Potenza, “A targeted review of the neurobiology and genetics of behavioural addictions: An emerging area of research”. Can J Psychiatry, 2013.
[10]. J.E Grant, M.N Potenza, A. Weinstein, D.A. Gorelick, “Introduction to behavioral addictions”. Am. J. Drug Alcohol Abuse 2010.
Citation
Anthony Kimton Prabhu, "A Case Study on Indian Youngsters: Internet Gaming Disorder and Internet Pornography Addiction," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.976-979, 2018.
Blockchain Distributed Cloud Storage Network Tool(BCCNT)
Review Paper | Journal Paper
Vol.6 , Issue.12 , pp.980-983, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.980983
Abstract
BCCNT (Blockchain Cloud Network Tool) is open source project to make cloud storage applications decentralized which will make them secure and efficient for the end users. It provides a platform for the prototype of a completely distributed network. It is proposed to develop an application which can provide a user interface for less technical/non-technical users. The cryptocurrencies functions both as a bonus and payment method. While on the other hand a separate blockchain is used to store the data for the metadata file. The application needs to be run in a P2P mesh from systems that will execute the code, present on a public chain of data instead of a central database. The main thought behind BCCNT is to offer a group of functions which makes it easy to connect Cloud & major platforms’ and end users.
Key-Words / Index Term
decentalized, cryptocurrencies, P2P
References
[1] David Irvine (2017), “MaidSafe: SAFE, use case. Honest data networks”,
website: https://medium.com/metaquestions/safe-use-case-honest-data-networks-3f2516610d51.
[2] Daniel Larimer (2013), “Torent: ReadMe.md, Generic P2P Tools”,
website: https://github.com/bytemaster/tornet.
[3] Ilan Shamir (2017), “Resilio: P2P is Always Faster”, website: https://www.resilio.com/blog/p2p-always-faster.
[4] Satoshi Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System,” published.
[5] Tony Arcieri (2013), “What’s wrong with in-browser cryptography?”, website: https://tonyarcieri.com/whats-wrong-with-webcrypto.
[6] Digital Ocean, “Simple, predictable pricing”, website: https://www.digitalocean.com/pricing/.
[7] Steve Eschweiler (2018), “Six Benefits of a Dedicated Server”, website: https://www.hivelocity.net/blog/six-benefits-dedicated-server/.
[8] Wladimir J. van der Laan, “Datacoin - First Censorship-Free Data Storage
Cryptocurrency”, website: https://github.com/datacoinproject/datacoin.
[9] Timothy B. Lee (2013), “Bitcoin needs to scale by a factor of 1000 to compete with Visa. Here’s how to do it”, website: https://goo.gl/FvVuaK.
[10] Crystal Wiese (2018), “Why Factom is perfect for Smart Contracts”, website:https://www.factom.com/company/blog/factom-for-smart-contracts/.
[11] Jakob Nielsen (1988), “Nielsen`s Law of Internet Bandwidth”.
[12] CHIP WALTER (2005), “The doubling of processor speed every 18 months is a snail’s pace compared with rising hard-disk capacity, and Mark Kryder plans to squeeze in even more bits”.
[13] Javed I. Khan, Adam Wierzbicki (2008), “Guest editors’ introduction:
Foundation of peer-to-peer computing”, website: https://goo.gl/n8ws9p.
[14] Michael Dickson (2018), “Kaleido Announces the First Blockchain-as-a-Service Subscription Plans Built for the Full Spectrum of Enterprise
Ecosystems”, website: https://goo.gl/nsTgv5.
Citation
Ankita Sharma, Rishabh Bansal, Nimish Niret Soren, "Blockchain Distributed Cloud Storage Network Tool(BCCNT)," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.980-983, 2018.
New approach to Generate, Re-Generate, Encode, and Compress 3D structures using polynomial equations
Research Paper | Journal Paper
Vol.6 , Issue.12 , pp.984-992, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.984992
Abstract
Almost every 3D objects can be represented with the help of a set of equations. When 3D objects are converted to text in terms of equations, any standard cryptographic techniques can be applied to encrypt it. This method is useful to hide classified military secrets, as we compress it to a large amount in the form of text, yet it can be regenerated in mathmod software, after decrypting it using the key. In this study, we propose a new way to formulate polynomial equation of any objects in context by fitting it using brute force techniques. We find that the complexity of the algorithm is too high to be achieved in practical scenarios, which encourages more efficient work in this new field.
Key-Words / Index Term
Compression, Cryptographic techniques, Generation, 3D, and Polynomial equations
References
[1]. https://www.desmos.com/calculator/ accessed on 14.10.2018.
[2]. https://tpenguinltg.wordpress.com/2014/02/15/representing-the-heart-shape-precisely/ accessed on 09.10.2018.
[3]. M. M. Blane, Z. Lei, and D. B. Cooper, “The 3L Algorithm for Fitting Implicit Polynomial Curves and Surfaces to Data”, http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.53.8289&rep=rep1&type=pdf accessed on 10.10.2018, June 1996.
[4]. C. Oden, A. Ercil, V. T. Yildiz, H. Kirmizita, and B. Buke, “Hand Recognition Using Implicit Polynomials and Geometric Features” https://pdfs.semanticscholar.org/1432/01f8d05e22882fe01f3f2ac2e17b14e78a93.pdf accessed on 10.10.2018.
[5]. J. C. Quiroz, and S. M. Dascalu, “Design and Implementation of a Procedural Content Generation Web Application for Vertex Shaders”, arXiv: 1608.05231[cs.GR], https://arxiv.org/abs/1608.05231 accessed on 10.10.2018, August 2016.
[6]. A. A. Ahmadi, G. Hall, A. Makaida, and V. Sindhwani, “Geometry of 3D Environments and Sum of Squares Polynomials”, arXiv: 1611.07369 [math.OC], https://arxiv.org/abs/1611.07369 accessed on 10.10.2018, November 2016.
[7]. S. Hu, and J. Ji, “Using Chebyshev polynomials interpolation to improve the computation efficiency of gravity near an irregular-shaped asteroid”, arXiv: 1708.06493 [astro-ph.EP], https://arxiv.org/abs/1708.06493 accessed on 10.10.2018, August 2017.
[8]. J. Komorowski, and P. Rokita, “Face Recognition Based on Sequence of Images”, arXiv: 1809.11069 [cs.CV], https://arxiv.org/abs/1809.11069 accessed on 10.10.2018, September 2018.
[9]. P. Mandikal, N. K. L, and R. V. Babu, “3D-PSRNet: Part Segment 3D Point Cloud Reconstruction from a Single Image”, arXiv: 1810.00461 [cs.CV],
https://arxiv.org/abs/1810.00461v1 accessed on 10.10.2018, September 2018.
[10]. Y. L. Qiao, L. Gao, Y. K. Lai, and S. Xia, “Learning Bidirectional LSTM Networks for Synthesizing 3D Mesh Animation Sequences”, arXiv: 1810.02042 [cs.GR], https://arxiv.org/abs/1810.02042 accessed on 10.10.2018, October 2018.
[11]. J. C. Carr, R. K. Beaston, J. B. Cherrie, T. J. Mitchell, W. R. Fright, B. C. McCallum, and T. R. Evans, “Reconstruction and Representation of 3D Objects with Radial Bias Functions”, http://www.cs.jhu.edu/~misha/Fall05/Papers/carr01.pdf accessed on 10.10.2018.
[12]. H. Gross, U. Thoennessen, and W. V. Hansen, “3D-Modelling of Urban Structures”, Research Institute for Optronics and Pattern Recognition, Stilla U, Rottensteiner F, Hinz S (Eds) CMRT05. IAPRS, Vol. XXXVI, Part 3/W24,
http://www.isprs.org/proceedings/XXXVI/3-W24/papers/CMRT05_Gross_et_al.pdf accessed on 10.10.2018, August 2018.
[13]. N. Kholgade, T. Simon, A. Efros, and Y. Sheikh, “3D Object Manipulation in a Single Photograph using Stock 3D Models”, https://dl.acm.org/citation.cfm?id=2601209 accessed on 10.10.2018.
[14]. https://github.com/parisolab/mathmod accessed on 09.10.2018.
[15]. StorageCraft, https://blog.storagecraft.com/5-common-encryption-algorithms/ 5 Common Encryption Algorithms and the Unbreakables of the Future, Contel Bradford, accessed on 9.10.18.
[16]. Diagram of the AES Algorithm (9.16.04), https://www.eng.tau.ac.il/~yash/crypto-netsec/rijndael.htm, colorful crypto rijindial, Christopher Brown, The Advanced Encryption Standard (Rijndael), accessed on 15.10.2018.
[17]. http://rijndael.online-domain-tools.com/ -- tool for encryption, accessed on 14.10.2018.
[18]. https://bodhis96.wixsite.com/website-3d/ accessed on 09.10.2018.
Citation
Jimut Bahan Pal, Asoke Nath, "New approach to Generate, Re-Generate, Encode, and Compress 3D structures using polynomial equations," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.984-992, 2018.
Analysis of CAPTCHA Breakage- Employing Object Detection Deep Learning Methods to Identify CAPTCHA Characters
Research Paper | Journal Paper
Vol.6 , Issue.12 , pp.993-998, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.993998
Abstract
This research paper delves into the analysis of CAPTCHA breakage through the utilization of object detection deep learning techniques aimed at identifying CAPTCHA characters. CAPTCHAs, designed to differentiate between humans and bots, are widely used as a security measure on various online platforms. However, the effectiveness of traditional CAPTCHAs has been challenged by advancements in machine learning and artificial intelligence. This study explores the application of object detection methods within deep learning frameworks to bypass CAPTCHA security measures. Specifically, convolutional neural networks (CNNs) and other deep learning architectures are employed to detect and classify CAPTCHA characters, thus undermining their intended purpose. The research investigates the efficacy of these techniques in circumventing CAPTCHA challenges and analyzes the implications for online security. Through experimentation and evaluation, insights are gained into the vulnerabilities of current CAPTCHA systems and the potential threats posed by sophisticated machine learning algorithms. Additionally, considerations are made regarding the development of more robust CAPTCHA mechanisms to mitigate the risk of exploitation.
Key-Words / Index Term
Deep learning Techniques, CNN, CAPTCHA, Machine Learning, Artificial Intelligence
References
[1] On Ahn, L., Maurer, B., McMillen, C., Abraham, D., & Blum, M. reCAPTCHA: Human-Based Character Recognition via Web Security Measures. Science, 321(5895), pp.1465-1468, 2008. DOI: 10.1126/science.1160379.
[2] Szegedy, C., Liu, W., Jia, Y., Sermanet, P., Reed, S., Anguelov, D., ... & Rabinovich, A. Going deeper with convolutions. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp.1-9, 2015.
[3] He, K., Zhang, X., Ren, S., & Sun, J. Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp.770-778, 2016.
[4] Goodfellow, I., Bengio, Y., Courville, A., & Bengio, Y. (2016). Deep learning (Vol. 1). MIT press Cambridge, 2016.
[5] Redmon, J., Divvala, S., Girshick, R., & Farhadi, A. You only look once: Unified, real-time object detection. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp.779-788, 2016.
[6] Bursztein, E., Aigrain, J., Moscicki, A., & Mitchell, J. C. The end is nigh: Generic solving of text-based CAPTCHAs. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp.541-552, 2014.
[7] von Ahn, L., Maurer, B., McMillen, C., Abraham, D., & Blum, M. reCAPTCHA: Human-Based Character Recognition via Web Security Measures. Science, 321(5895), pp.1465-1468, 2008. DOI: 10.1126/science.1160379.
[8] Hasegawa, T., Mori, G., & Sato, Y. Real-time HMM-based CAPTCHA breaking with convolutional neural networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp.5201-5209, 2016.
[9] Chellapilla, K., Larson, K., Simard, P., & Czerwinski, M. Designing human-friendly human interaction proofs (HIPs). In Proceedings of the 8th Conference on Electronic Commerce, pp.266-275, 2005.
[10] Yamaguchi, Y., Uchida, S., & Iwamura, M. A proof of work with low difficulty by solving simultaneous linear equations for CAPTCHA. In Proceedings of the International Conference on Image Processing, pp.3674-3678, 2014.
[11] Zhang, Z., & Zhang, J. Breaking color-based image CAPTCHA with convolutional neural networks. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp.1415-1423, 2012.
[12] Elson, J., Douceur, J. R., Howell, J., & Saul, J. Asirra: A CAPTCHA that exploits interest-aligned manual image categorization. In Proceedings of the ACM Conference on Computer and Communications Security, pp.366-374, 2007.
[13] Gao, H., & Ye, W. Robust CAPTCHA based on adversarial examples. In Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, pp.159-164, 2015.
[14] Mityagin, A., & Pasko, I. Towards understanding of social network CAPTCHA security. In Proceedings of the IEEE International Conference on Advanced Information Networking and Applications, pp.817-824, 2017.
[15] Jansen, Y., Knijnenburg, B., & Pieterse, V. (2011). Towards human-friendly CAPTCHA design. In Proceedings of the 3rd Symposium on Usable Privacy and Security (pp. 12:1-12:12).
[16] Mohaisen, A., Alrawi, O., & Chen, Y. (2015). Honeybot Captcha: Human Interactive Proofs Based on Entropy Measurement. IEEE Transactions on Information Forensics and Security, 10(12), 2646-2657. DOI: 10.1109/TIFS.2015.2457083.
[17] Gafurov, D., & Bours, P. (2011). Time-Based CAPTCHA: A Comparative Analysis of Existing Techniques. In Proceedings of the 3rd International Conference on Intelligent Networking and Collaborative Systems (pp. 379-385). DOI: 10.1109/INCOS.2011.94.
[18] Bursztein, E., Aigrain, J., Moscicki, A., & Mitchell, J. C. (2014). The end is nigh: Generic solving of text-based CAPTCHAs. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (pp. 541-552).
[19] Hasegawa, T., Mori, G., & Sato, Y. (2016). Real-time HMM-based CAPTCHA breaking with convolutional neural networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (pp. 5201-5209).
[20] Yan, J., & El Ahmad, A. S. (2012). A low-cost attack on a Microsoft CAPTCHA. In Proceedings of the 18th ACM conference on Computer and communications security (pp. 103-114).
[21] Mori, G., Malik, J., & Ren, X. (2003). Recovering human body configurations: Combining segmentation and recognition. In Proceedings of the IEEE International Conference on Computer Vision (pp. 326-333).
[22] Chellapilla, K., Larson, K., Simard, P., & Czerwinski, M. (2005). Designing human-friendly human interaction proofs (HIPs). In Proceedings of the 8th Conference on Electronic Commerce (pp. 266-275).
[23] Bursztein, E., Aigrain, J., Moscicki, A., & Mitchell, J. C. The end is nigh: Generic solving of text-based CAPTCHAs. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp.541-552, 2014.
[24] Yan, J., & El Ahmad, A. S. A low-cost attack on a Microsoft CAPTCHA. In Proceedings of the 18th ACM conference on Computer and communications security, pp.103-114, 2012.
[25] Chellapilla, K., Larson, K., Simard, P., & Czerwinski, M. Designing human-friendly human interaction proofs (HIPs). In Proceedings of the 8th Conference on Electronic Commerce, pp.266-275, 2005.
[26] Yan, J., & El Ahmad, A. S. A low-cost attack on a Microsoft CAPTCHA. In Proceedings of the 18th ACM conference on Computer and communications security, pp.103-114, 2012.
[27] Bursztein, E., Aigrain, J., Moscicki, A., & Mitchell, J. C. The end is nigh: Generic solving of text-based CAPTCHAs. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp.541-552, 2014.
[28] He, K., Gkioxari, G., Dollár, P., & Girshick, R. Mask R-CNN. In Proceedings of the IEEE international conference on computer vision, pp.2961-2969, 2017.
[29] Redmon, J., Divvala, S., Girshick, R., & Farhadi, A. You only look once: Unified, real-time object detection. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp.779-788, 2016.
[30] Lin, T. Y., Dollár, P., Girshick, R., He, K., Hariharan, B., & Belongie, S. Feature pyramid networks for object detection. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp.2117-2125, 2017.
[31] Szegedy, C., Ioffe, S., Vanhoucke, V., & Alemi, A. A. Inception-v4, inception-resnet and the impact of residual connections on learning. In Proceedings of the AAAI conference on artificial intelligence,Vol.4, pp.12, 2017.
Citation
Dayanand, Wilson Jeberson, "Analysis of CAPTCHA Breakage- Employing Object Detection Deep Learning Methods to Identify CAPTCHA Characters," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.993-998, 2018.