Traffic Sign Recognition Using Optimized Convolutional Neural Network
Research Paper | Journal Paper
Vol.06 , Issue.11 , pp.103-106, Dec-2018
Abstract
Convolutional Neural Network (CNN) is one of the most efficient Deep Neural Networks. The addition of more layers and neurons to the CNN increases its computational complexity. Even though CNNs are capable of solving many real time image recognition tasks flawlessly, it is also crucial to design optimum neural network architecture by reducing the associated memory and computational costs for resource critical applications. The proposed method optimizes a pre-trained CNN model for Traffic Sign Recognition by identifying and eliminating the redundant channels in fully connected layer of the neural network. The basis of the algorithm is that in a large neural network, the contribution of some of the neurons is negligible and can be eliminated without much effect on the overall performance. After eliminating the channels, the resulting model is retrained to compensate for the performance loss. The process of elimination and retraining is repeated until no more redundant channels are identified. The performance of the models so developed are further compared with the original model and evaluated based on accuracy and inference time. By removing 69% of the neurons in the fully connected layer, a compression rate of 2.85 was achieved and inference time got reduced by 97ms .The model so developed had accuracy slightly higher than the original model due to the retraining performed after each iteration.
Key-Words / Index Term
Convolutional Neural Network, Network Pruning, Traffic Sign Recognition
References
[1]. Denil, M., Shakibi, B., Dinh, L., Ranzato, M., de Freitas, N.: Predicting parameters in deep learning. CoRR abs/1306.0543(2013)
[2]. Lin, M., Chen, Q., Yan, S.: Network in network. CoRR abs/1312.4400(2013)
[3]. Szegedy, C., Liu, W., Jia, Y., Sermanet, P., Reed, S.E.,Anguelov, D., Erhan, D., Vanhoucke, V.,Rabinovich,A.: Going deeper with convolutions. CoRRabs/1409.4842(2014)
[4]. Hanson, S.J., Pratt, L.: Advances in neural information processing systems 1. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA (1989) 177–185
[5]. Hassibi, B., Stork, D.G.: Second order derivatives for network pruning: Optimal brain surgeon In:Advances in Neural Information Processing Systems 5, [NIPS Conference], San Francisco, CA, USA, Morgan Kaufmann Publishers Inc. (1993) 164–171
[6]. HHan, S., Mao, H., Dally, W.J.: Deep compression: Compressing deep neural networks with pruning trained quantization and Huffman coding. arXiv preprint arXiv:1510.00149 (2015)
[7]. HHengyuan Hu, Rui Peng, Yu-Wing Tai, and Chi-Keung Tang. Network trimming: A data-driven neuron pruning approach towards efficient deep architectures. arXiv preprint arXiv:1607.03250, 2016.
[8]. YYihui He ; Xiangyu Zhang ; Jian Sun : Channel Pruning for Accelerating Very Deep Neural Networks (2017), IEEE International Conference on Computer Vision (ICCV)
[9]. Kaoutar Sefrioui Boujemaa, Ismail Berrada, Afaf Bouhoute: Traffic sign recognition using convolutional neural networks, 2017 International Conference on Wireless Networks and Mobile Communications (WINCOM)
[10]. GTSRB Dataset-http://dx.doi.org/10.1016/j.neunet.2012.02.016
Citation
Anjali T P, N Ramasubramanian , "Traffic Sign Recognition Using Optimized Convolutional Neural Network", International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.103-106, 2018.
The Development of Business Strategy in the Digital Society of Social Media
Review Paper | Journal Paper
Vol.06 , Issue.11 , pp.107-109, Dec-2018
Abstract
Internet image has been improving day by day, where every activities of a person is concerned with the digital environment. This surfing behaviour of an individual can be monitored and analysed for various purposes. We should be aware that our accessing strategy is a key factor for various companies that leads business growth and the privacy of the user is compromised. Mainly when we are accessing social networks like Facebook, twitter, YouTube and Instagram etc. there are lot of data is being served to the agents of the organization. Accumulating these data, the marketing growth can be analysed. So the user must be known what is happening in the social network. So in this paper we expose how the privacy and knowledge data can be collected from customer and therebycompanies use the customer interaction for their business directly through social media.
Key-Words / Index Term
SNS, behaviour, business, marketing, privacy, analysis
References
[1] Composite Behavioral Modeling for IdentityTheft Detection in Online Social NetworksCheng Wang, Senior Member, IEEE, and Bo Yang
[2] The Continuous Rise for Social Networking Privacy and Security, Adrian M. Powell Professor Li Yang CPSC 5620, Computer Network Security University of Tennessee at Chattanooga April 20, 2012
[3] Social networking and identity theft in the digitalSocietyEric HolmBond University, eric.holm@student.bond.edu.au
[4] Business Growth thru Social Media Marketing, AbeerAlharbie,College of Public and International Affairs,University of Bridgeport, Bridgeport, CT06604, USA
[5] Quaestus multidisciplinary research journalthe growing importance of social mediaIn business marketing Pavel Ciprian
[6] Awareness of Behavioral Tracking and InformationPrivacy Concern in Facebook andGoogleEmilee RaderDepartment of Media and InformationCollege of Communication Arts and SciencesMichigan State Universityemilee@msu.edu
[7] The Impact of Social Media on Business Growth andPerformance in IndiaITina P. Singh, IIDr.RatnaSinhaIResearch Scholar, ISBR Research Centre, Mysore University, Karnataka, IndiaIIResearch Guide, ISBR Research Centre, Mysore University, Karnataka, India
[8] Developing an Internet Marketing Strategy 2011 The Internet Marketing Academy &Ventus Publishing ApSISBN 978-87-7681-813-5.
[9] “IntSocial Media, How does it Work for Business?”,W. V. Siricharoen, Member, IACSITernational Journal of Innovation, Management and Technology, Vol. 3, No. 4, August 2012
[10] International Journal of Enterprise Computing and Business System, “Social media and its role in Marketing”,Ms.SisiraNeti, ISSN: 2230-8849, July 2011
Citation
D. Ananthi, S. Jenila, "The Development of Business Strategy in the Digital Society of Social Media", International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.107-109, 2018.
Texture Segmation Based Filters for Water Images
Review Paper | Journal Paper
Vol.06 , Issue.11 , pp.110-114, Dec-2018
Abstract
Image segmentation is a mechanism used to divide an image into various segments. It will make image flat and easy to evaluate. Segmentation process also helps to find region of interest in a particular image. The main goal is to make image simpler and meaningful. Image Segmentation is an main pixel based measurement of image processing which often has a large impact on quantitative image study result. The texture is the main attribute in many image analysis or computer vision applications. The procedures developed for texture segmentation can be subdivided into four categories: structural approach, statistical approach, model based approach and filter based approach. Different definitions of texture are described, but more importance is given to filter based methods, such as Median Filter, Gaussian Smoothing and Mean Filter. These filters are used in Water images. The main objective of this analysis is to study different filtering methods for texture segmentation of water images.
Key-Words / Index Term
Image Processing, Segmentation, Median Filter, Gaussian Smoothing, Mean Filter
References
[1] P.S.S. Akilashri, and Dr.E.Kirubakaran, Estimation of Metal Surface Defect Using CD Segmentation, Proceedings of International Journal of Engineering and Innovative Technology, Vol.3, Issue 3, Sep-2013.
[2] Ani1 K. Jain and FarshidFarrokhnia(1990), “Unsupervised Texture Segmentation Using Gabor Filters”, IEEE.
[3] Taramati S Taji and Deipali V Gore(2013), “Overview of Texture Image Segmentation Techniques”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 12.
[4] Vaijinath V. Bhosle and Vrushsen P. Pawar(2013), “Texture Segmentation: Different Methods”, International Journal of Soft Computing and Engineering (IJSCE), Volume-3, Issue-5.
[5] J. Yuan, D. Wang and A. M. Cheriyadat(2013), “Factorization-Based Texture Segmentation”.
[6] NawalHouhou, Jean-Philippe Thiran and Xavier Bresson(2009), “Fast Texture Segmentation Based on Semi-Local Region Descriptor and Active Contour”, Global-Science Press, Vol. 2, No. 4, pp. 445-468.
[7] Kyong I. Chang, Kevin W. Bowyer and MunishSivagurunath(1999), “Evaluation of Texture Segmentation Algorithms”, IEEE.
[8] Jitendra Malik, Serge Belongie, Thomas Leung and JianboShi(2001), “Contour and Texture Analysis for Image Segmentation”, International Journal of Computer Vision 43(1), 7–27.
[9] S. Jayaraman, S.Esakkirajan, T. Veerakumar, Digital Image Processing, Tata McGraw Hill Education Private Limited.
[10] Vipula Singh, Digital Image Processing with MATLAB and LabVIEW, Reed Elsevier India Private Limited.
[11] R.C Gonzalez, R.E Woods and S.L Eddins, Digital Image Processing Using MATLAB, Pearson, Fifth Impression,2009.
[12] G.EvelinSuji, Y.V.S. Lakshmi, G. WiselinJiji, Image Segmentation Algorithms on MR Brain Images, IJCA, Vol 67, 18-20,2013.
[13] Krishna Kant Singh, Akansha Singh, A study of Image Segmentation Algorithms For Different Types of Images, International Journal of Computer Science, vol 7, 2010.
[14] H.D. Cheng, X.H.Jiang, Y.Sun, J. Wang, Color Image Segmentation:advances and prospects, Pattern Recognition, Vol 34(12),2259-281, 2001.
[15] RavikanthMalladi, James A. Sethian and Baba C. Vemuri, Shape modeling with front propagation: a level set approach, IEEE Transactons on Pattern analysis and machine intelligence, vol 17,1995.
[16] SameenaBanu, The comparative study on color Image segmentation Algorithm, IJERA, vol 2, pp 1277-1281,2012.
[17] S.K. Pal et al., A review on Image segmentation techniques, Pattern Recognition, 29, 1277,1294, 1993.
[18] J. M. Keller, and C. L. Carpenter, Image Segmentation in the presence of Uncertainty, International Journal of Intelligent Systems, Vol. SMC-15, 193-208, 1990.
[19] S. K. Pal and R. A. King, On Edge Detection of X-ray Images Using Fuzzy Sets, IEEE Transaction on Pattern Analysis and Machine Intelligence, Vol. PAMI-5, No.1, 69-77, 1983.
[20] I. Bloch, Fuzzy Connectivity and Mathematical Morphology, Pattern Recognition letters, Vol. 14, 483-488, 1993.
[21] T. L. Huntsberger, C. L. Jacobs and R. L. Canon, Iterative Fuzzy Image Segemntation, Pattern Recognition, Vol. 18, No. 2, 131-138, 1985.
[23] A. Borji, M. Hamidi and A.M.E. Moghadam, CLPSO-based Fuzzy color Image Segmentation, Proceedings of North American Fuzzy Information Processing Society,2007.
[24] Zhenghao Shi, Lifeng He, Application of neural Networks in Medical Image Processing, Proceedings of the second International Symposium on Networking and Network Security. ISBN 978-952-5726-09-1, 2010, 023-026.
[25] L. shafarenko, M. Petrou, J. Kittler, Automatic watershed segmentation of randomly textured color images, IEEE Trans. On Image Processing, Vol 6, 1530-44,1997.
Citation
M. Umamaheswari, "Texture Segmation Based Filters for Water Images", International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.110-114, 2018.
Protection of Data in Cloud Computing using Image Processing - Watermarking Technique
Review Paper | Journal Paper
Vol.06 , Issue.11 , pp.115-118, Dec-2018
Abstract
With the dawn of easiness in manipulating and transferring digital data in today’s world, insuring digital image integrity has therefore become a major issue. One solution to this problem is to embed watermark in the digital data, i.e. Digital watermarking. Usually watermarking has been used in currency notes, government documents, passport for security features and stamp papers for legal purpose. Watermarking is very beneficial for identifying the document of any authorized person. Digital watermarking emerged as a solution for copyrights detection, protection and maintenance of important data. Millions of private images are generated in various digital devices every day. Cloud computing, one of the most important computing paradigms emerged in recent years. Watermarking techniques to ensure data privacy. Consequently, this framework will increase the speed of development on ready-to-use digital humanities tools.
Key-Words / Index Term
Digital Watermarking, Cloud Computing, various algorithm and various Techniques
References
[1]. A survey on watermarking methods for security of cloud data, Mrs. Anitha P1 , Dr. Malini M Patil2 1.2Department of Information Science and Engineering, JSSATE (India), (ICRISEM-16), 26TH February 2016, www.conferenceworld.in.
[2]. Data Provenance for Cloud Computing using Watermark, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 8, No. 6, 2017
[3]. To Propose A Novel Technique for Watermarking In Cloud Computing, © 2015 IJEDR | Volume 3, Issue 2 | ISSN: 2321-9939
[4]. An Efficient Approach for Security of Cloud Using Watermarking Technique, International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 7, July 2013
[5]. A Survey on Security in Cloud Computing, Varsha Yadav et al, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.4, April- 2014, pg. 509-513
[6]. Data Leakage Detection and Security Using Cloud Computing, S.Geetha et. Al. Int. Journal of Engineering Research and Applications, ISSN: 2248-9622, Vol. 6, Issue 3, (Part - 2) March 2016, pp.01-04
[7]. The Amalgamation of Digital Watermarking & Cloud Watermarking for Security Enhancement in Cloud Computing, IJCSMC, Vol. 2, Issue. 4, April 2013, pg.333 – 339, ISSN 2320–088X.
[8]. A Cloud-User Protocol Based on Ciphertext Watermarking Technology, Security and Communication Networks, Volume 2017, Article ID 4376282,14 pages, https://doi.org/10.1155/2017/4376282
[9]. A method for trust management in cloud computing: Data coloring by cloud watermarking,International Journal of Automation and Computing 8(3):280-285 • August 2011
[10]. An Efficient Approach for Data Security in Cloud Environment using Watermarking Technique and RSA Digital Signatures, International Research Journal of Engineering and Technology (IRJET), Volume: 04 Issue: 02 | FEB -2017.
[11]. A Secured Data Processing Technique for Effective Utilization of Cloud Computing, HAL Id: hal-01466986 https://hal.archives-ouvertes.fr/hal-01466986v2 Submitted on 21 Nov 2017.
[12]. A Survey about Cloud Computing and an Improved Method of Data Security using Watermarking Technique with RSA Algorithm in Cloud Environment, Asian Journal of Research in Social Sciences and Humanities Vol. 7, No. 5, May 2017, pp. 325-336
[13]. Secure Medical Images Sharing over Cloud Computing environment, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 4, No. 5, 2013.
[14]. A Survey on Watermarking Methods for Security of Cloud Data, Mrs. Anitha P1 , Dr. Malini M Patil2 1.2Department of Information Science and Engineering, JSSATE (India), (ICRISEM-16), 26TH February 2016, www.conferenceworld.in.
[15]. Amandeep verma ,sakshi kaul ,”Cloud computing Issues & challenges :A survey “, Springer verlag Berlin Heidelberg, part IV,ccis 193,2011,pp.445-454.
Citation
S.Thaiyalnayaki, S.Devi, "Protection of Data in Cloud Computing using Image Processing - Watermarking Technique", International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.115-118, 2018.
Reviews on Digital Payment System
Review Paper | Journal Paper
Vol.06 , Issue.11 , pp.119-123, Dec-2018
Abstract
this paper digital payments are using in developing countries. As the world has become globalized, it is tough to give the whole perspective of digital payments & how this is really helpful in our day-to-day life. This work will give maximum contribution to the knowledge and understanding the digital payment. It reveals that covered some basic points of digital payments & customer relationship management that goes to little higher level. So that it can give the overview on its structure & how it works. The customer can place orders at home to save their time. Digital payment systems have a very important role in E-commerce and they are used to complete E-commerce transactions. The purpose of this paper is to introduce current state, the challenges and future expectations of Digital Payment Systems. It depicts that the details of history of the e-commerce, the current situation of e-commerce and the methods of digital payment systems used in e-commerce. The results of the research show that now-a-days online payment systems are popular. All the respondents have experience on digital payments. Debit card (Visa or MasterCard) and Net Bank, PayPal, Payment wall ,Google Wallet, Mobile Money Wallets, Braintree, Stripe are the most popular digital payment systems, not only in countries. The second one is third-party digital payment systems. PayPal is more popular in the country. The two main factors contributing to choosing digital payment system are convenience and the quickness of transaction. Technical problems and vulnerability to cyber-crime are the main pros of digital payment system. Malware attack and financial issue are the main challenges of digital payment. Having a secure, reliable and trustworthy digital payment environment is important.
Key-Words / Index Term
Digital payment system, card types, payment
References
[1] Vineet Kandpal and **R. K. Singh, Latest Face of Cybercrime and Its Prevention In India, International Journal of Basic and Applied Sciences Vol. 2. No. 4. 2013
[2] Er. Harpreet Singh Dalla, Ms. Geeta HOD, Department of CSE & IT Patiala Institute of Engineering & Technology for Women, Patiala, India, Cyber Crime – A Threat to Persons, Property, Government and Societies, Volume 3, Issue 5, May 2013 ISSN: 2277 128X
[3] Jamal Raiyn, A survey of Cyber Attack Detection Strategies, International Journal of Security and Its Applications Vol.8, No.1 (2014).
[4] Angel cruz,chief information security officer state of Texas, cyber security tips, monthly newsletter 2013
[5] Atul M. Tonge1, Suraj S. Kasture2, Surbhi R. Chaudhari3 IOSR Journal of Computer Engineering (IOSR-JCE) CSE, Cyber security: challenges for society,ISSN: 2278-0661, p- ISSN: 2278-8727, Volume 12, Issue 2 (May. - Jun. 2013).
[6] Forensic technology services cybercrime survey report 2014 kpmg.com/in
[7] Atul Kum ar, Sr. Analyst, Chiranshu Ahuja, Sr. Analyst, Cyber Security Research Developments Global and Indian Context, A NASSCOM® Initiative
[8] Sumanjit Das and Tapaswini Nayak, “impact of cyber crime: issues and challenges‖, International Journal of Engineering Sciences & Emerging Technologies, October 2013. ISSN: 22316604 Volume 6, Issue 2, pp: 142-153.
[9] Janhavi J Deshmukh and Surbhi R Chaudhari, Cyber crime in Indian scenario – a literature snapshot, International Journal of Conceptions on Computing and Information Technology Vol.2, Issue 2, April‘ 2014; ISSN: 2345 – 9808.
[10] Shantosh Rout (2008), Network Interferences, Available at: http://www.santoshraut.com/ forensic/ cybercrime.htm, Visited: 28/01/2012
[11] By Jessica Stanicon (2009), Available at: http://www.dynamicbusiness.com/articles/articles-news/one-in-five-victims-of-cybercrime3907.html, Visited: 28/01/2012.
[12] Ictact Journal On Soft Computing: Special Issue On Soft Computing Models For Big Data, July 2015, Volume: 05, Issue: 04 1035
[13] Application Of Big Data In Education Data Mining And Learning Analytics – A Literature Review -Katrina Sin1 and Loganathan Muthu2-1Faculty of Education and Languages, Open University Malaysia, Malaysia-http://bmcbioinformatics.biomedcentral.com/articles/10.1186/1471-2105-11-12-1
[14] https://developer.yahoo.com/blogs/hadoop/comparing-pig-latin-sql-constructing-data-processing-pipelines-444.html
[15] M.Chen et al., Big data: Related Technologies, Challenges and future Prospects,:"-Springer Brief in computer science 319-06245-7_6#page-2.
[16] Newswise (2009), China Linked to 70 Percent of World`s Spam, Says Computer Forensics Expert, Available at: http://www.newswise.com/articles/view/553655/, Visited: 28/01/2012.
[17] Cyberlawtimes (2009), Available at: http://www.cyberlawtimes.com/forums/index.php?board =52.0, Visited: 10/31/09
[18] Kevin G. Coleman (2011), Cyber Intelligence: The Huge Economic Impact of Cyber Crime, Available at: http://gov.aol.com/2011/09/19/cyber-intelligence-the-huge-economic-impact-of-cyber-crime/, Visited: 28/01/2012
[19] Gordon, L. A. et al., 2003, A Framework for Using Insurance for Cyber-Risk Management, Communications of the ACM, 46(3): 81-85.
[20] D. Ariz. (April 19, 2000), American Guarantee & Liability Insurance Co. v. Ingram Micro, Inc. Civ. 99-185 TUC ACM, 2000 U.S. Dist. Lexis 7299.
[21] Kelly, B. J., 1999, Preserve, Protect, and Defend, Journal of Business Strategy, 20(5): 22-26.
[22] Berinato, S. (2002), Enron IT: A take of Excess and Chaos, CIO.com, March 5 http://www.cio.com/executive/edit/030502_enron.html, Visited: 28/01/2012
[23] Power, R., 2001, 2001 CSI/FBI Computer Crime and Security Survey, Computer Security Issues and Trends, 7(1): 1-18.
[24] Hoffer, J. A., and D. W. Straub, 1989, The 9 to 5 Underground: Are You Policing Computer Crimes?, Sloan Management Review (Summer 1989): 35-43
[25] Sprecher, R., and M. Pertl, 1988, Intra-Industry Effects of the MGM Grand Fire, Quarterly Journal of Business and Economics, 27: 96-16.
[26] Baskerville, R., 1991, Risk Analysis: An Interpretive Feasibility Tool in Justifying Information Systems Security, European Journal of Information Systems, 1(2): 121-130.
[27] Lyman, J., 2002, In Search of the World‘s Costliest Computer Virus, http://www. newsfactor.com/perl/story/16407.html. 2002.
[28] D‘Amico, A., 2000, What Does a Computer Security Breach Really Cost?, The Sans Institute
[29] Hancock, B., 2002, Security Crisis Management—The Basics, Computers & Security, 21(5): 397-401.
[30] Cyber Trust and Crime Prevention, Mid-Term Review, November 2005 – January 2009, Available at: http://www.bis.gov.uk/assets/bispartners/foresight/docs/cyber/ctcp_midterm_ review.pdf, Visited: 28/01/2012
Citation
S. Ramani, "Reviews on Digital Payment System", International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.119-123, 2018.
Anti-Theft ATM Robbery System for Big Video Surveillance using Improved_SVM Algorithm
Review Paper | Journal Paper
Vol.06 , Issue.11 , pp.124-130, Dec-2018
Abstract
Video survey framework has turned into a basic part in the security and assurance arrangement of urban areas, since Smart Monitoring cameras furnished with canny video examination procedures can screen and pre-alert anomalous practices or occasions. Nonetheless, with the extension of the reconnaissance arrange monstrous observation video information postures colossal difficulties to the examination, stockpiling and recovery in the Big Data time. This paper proposed the new enhanced SVM Algorithm is called IMROVED_SVM. This algorithm shows a novel insightful preparing and usage answer for enormous reconnaissance video information in light of the occasion recognition and disturbing messages from front-end shrewd cameras. The technique incorporates three sections: the astute pre-disturbing for strange occasions, keen stockpiling for observation video and fast recovery for confirm recordings, which completely explores the transient spatial affiliation investigation regarding the unusual occasions in various checking locales. Test comes about uncover that our proposed approach can dependably pre-alert security hazard occasions, considerably diminish storage room of recorded video and essentially accelerate the proof video recovery related with particular suspects.
Key-Words / Index Term
Big Data, Support Vector Machine (SVM)
References
[1] Amanze B.C , Ononiwu C.C , Nwoke B.C , Amaefule I.A "Video Surveillance And Monitoring System For Examination Malpractice In Tertiary Institutions" 2016
[2] Junjun Jiang, Member, IEEE, Jiayi Ma, Member, IEEE, Chen Chen, Xinwei Jiang, and Zheng Wang " Noise Robust Face Image Super-Resolution Through Smooth Sparse Representation" 2016
[3] Du Tran, Student Member, IEEE, Junsong Yuan, Member, IEEE, and David Forsyth, Fellow " Video Event Detection: From Subvolume Localization to Spatiotemporal Path Search" february 2014
[4] Ms. Kranti Wanawe 1, Ms. Supriya Awasare 2, Mrs. N. V. Puri " An Efficient Approach to Detecting Phishing A Web Using K-Means and Naïve-Bayes Algorithms" 2014
[5] Divya J " Automatic Video Based Surveillance System for Abnormal Behavior Detection " 2013.
[6] Gerhard P. Hancke 1,*, Bruno de Carvalho e Silva 1 and Gerhard P. Hancke Jr." The Role of Advanced Sensing in Smart Cities" 27 December 2012
[7] R. Raghavendra1 , Alessio Del Bue1, Marco Cristani1,2, Vittorio Murino1,2 " Abnormal Crowd Behavior Detection by Social Force Optimization" 2012
[8] Mubarak Shah " Automated Visual Surveillance in Realistic Scenarios" 2014
[9] ABITEBOUL J. et al., “Turbulent momentum transport in core tokamak plasmas and penetration of scrape-off layer flows”, Plasma Physics and Controlled Fusion, vol. 55, no. 7, p. 074001, 2013.
[10] ACKOFF R.L., “From data to wisdom”, Journal of Applied Systems Analysis, vol. 15, pp. 3–9, 2015.
[11] AGERON B., MARIE-LYNEGOURY, SPALANZANI A., Knowledge Management appliqué aux problématiques de développement durable dans la Supply Chain, Cahier de recherche n° 2010–03 E5.Version 1, CNRS, 2010.
Citation
R. Pradheepa, V. Priya, "Anti-Theft ATM Robbery System for Big Video Surveillance using Improved_SVM Algorithm", International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.124-130, 2018.
A Study on Spatial-Temporal Load Balancing Approach in Cloud Computing
Review Paper | Journal Paper
Vol.06 , Issue.11 , pp.131-132, Dec-2018
Abstract
The main aim of this research paper is to study the spatial-temporal load balancing method and its efficiency of load balancing in cloud computing environment. This paper discusses the methods such as the singular structure and algorithms for unified spatial and temporal load balancing. A novel spatial-temporal load balancing approach that exploits both the geographic and temporal variant of power rate to cope with this trouble. To our best understanding, that is the primary strategy that takes a systematic, unified spatial and temporal load scheduling method in this topic.Rigorous evaluation and tremendous reviews based totally on actuallife statistics exhibit that the proposed spatial-temporal load balancing method can substantially schedule work and assure a provider of completion time for person requests.
Key-Words / Index Term
Cloud computing,spatial-temporal load balancing, cloud computing, unified spatial and temporal approach, algorithms, etc.
References
[1] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A view of cloud computing,” Commun. ACM, vol. 53, pp. 50–58, April 2010.
[2] J. Hamilton, “Cooperative expendable micro-slice servers (cems): Low cost, low power servers for internet-scale services,” Jan. 2009
[3] J. Hamilton, “Cooperative expendable micro-slice servers (cems): Low cost, low power servers for internet-scale services,” Jan. 2009
[4] Martin et al. “A comparative study of distributed load balancing algorithms for cloud computing:”, IEEE Xplore, 2010
[5] Kaur, Rajwinder, and PawanLuthra. "Load balancing in cloud computing." Second Symposium on Cloud computing, ACEEE, 2012.
[6] Zenon et al, “Availability in load balancing in cloud computing”, International conference computer on software and modeling”, LACSIT press, Singapore 2011.
[7] Neethu, “Load balancing in cloud computing”, International conference on recent innovations science, engineering and management”, Delhi, 2015
[8] Ramprasad. “Load balancing in cloud computing”,B.Tech Thesis submitted to NIT. Roorkela, 2011
[9] James et al. “Efficient VM load balancing algorithm for cloud computing”,International journal of CS and engineering, ProQuest, 2012
[10] Yiqiu et al. “A Task Scheduling Algorithm Based on Load Balancing in Cloud Computing” Springer, 2010
[11] M. Sharma et al. “Efficeincett load balancing algorithms in VM cloud environment”, IJCST, 20112.
[12] R.l. Charter et al. “ Resource allocation in distributed computing environment”, digital avionics system conference, IEEE/SAE, 1998 Page No;1-8
[13] D. Durkee, “Why cloud computing will never be free”, Queue, Volume 8, page 20-29, 2010.
Citation
V. Geetha Dhanalakshmi, L. Jayasimman, "A Study on Spatial-Temporal Load Balancing Approach in Cloud Computing", International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.131-132, 2018.
A Review on Analytics Tools and Techniques for E-Commerce
Review Paper | Journal Paper
Vol.06 , Issue.11 , pp.133-138, Dec-2018
Abstract
Nowadays the ecommerce play a vital role in our day today life .The knowledge of ecommerce is also a great need for the basic economy in India. The increase in ecommerce is increase the necessity of analyzing to make the virtual stores in India. The commercial E-Commerce platforms and Business owners recognize that, analytics are an integral part of success. Analytics make more than 110,000 e-commerce websites out there which depending revenue of a meaningful scale. That doesn`t even include the smaller e-commerce businesses that are new to launch, and growing. They all are competing for the attention of different customer, so it is really need to step up our marketing game to be successful. Using B2C like purchasing and ordering experience in current years as they continue their product discovery and buying behaviors to online and mobile. Research says, in the past decade or so, there have been several changes in consumer behavior .The advantage of sitting at home and comparing prices , features and products has brought new dynamics to the shopping practice the analytics play a crucial role in ecommerce. The paper aims to observe the role of analytics tools in ecommerce and it will make a survey of different business analytical tools available for ecommerce.
Key-Words / Index Term
E-commerce, Analytics, Tools
References
[1]Likitha Ravi,Qiping Yan,Sergiu M.Dascalu,Fredrick C.Harris “A Survey of Visualization Techniques and Tools for Environmental Data”
[2]Aigner W., Bertone A., and Miksch S., "Comparing information visualization tools focusing the temporaldimensions” 12th International conference on information Visualisation, pp. 69 - 74, July 2008.
[3]NanaKwamegyampi, Princeappiah, ”BigDataAnalytics-Survey paper”
[4]Bibhudutta Jena,” A Review on data visualisation tools Used for Big Data” International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017,
[5]Zhao Kaidi,” Data visualization” Iscp0075@nus.edu.sg
[6]Alpa K. Oza,” Data Visualization for University Research Papers”, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-6, January 2013
[7]Dr.Shahid Amin, Kesav kasana “A review on E-Commerce”
Citation
Y. Priya, "A Review on Analytics Tools and Techniques for E-Commerce", International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.133-138, 2018.
The Indexing Strategy to Prevent Worm Holes in Manet - An Analysis
Review Paper | Journal Paper
Vol.06 , Issue.11 , pp.139-141, Dec-2018
Abstract
A temporary network of wireless mobile hosts without the assistance of standard administration form mobile ad hoc network (MANET). It has a dynamic topology because mobiles can enter and leave the network continuously. As MANET are wireless, dynamic and have no central administration, maintaining security in this network is difficult. The wireless nature of the communication makes nodes susceptible to various kinds of attacks such as black hole attack, worm hole attacks, DoS attacks etc. In present work, we aim at detection and prevention of the wormhole attack.
Key-Words / Index Term
MANET, Wormhole
References
[1] “Prevention of BLACK HOLE attack in MANET Using Indexing Algorithm”, Monika Shivhare1 , Prof. Praveen Kumar , Gautam Department of Computer Science and Engineering Sagar Institute of Research & Technology, Indore, India, IJESC,Volume 7,IssueNo. 5,2017
[2] Dhruvi Sharma, Vimal Kumar, Rakesh Kumar, " Prevention of Wormhole Attack Using Identity Based Signature Scheme in MANET " , Computational Intelligence in Data Mining. Volume 2. Volume 411 of the series “Advances in Intelligent Systems and Computing” pp 475-485. 10 December 2015, Springer.
[3] “Wormhole Attack Detection and Prevention in MANET Using Bait Scheme” Harjinder Kaur , Sukhjit Singh ,Department of Electronics Golden College, Gurdaspur, India,IJESC,Volume 7,IssueNo. 5,2017
[4] " Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach" , IEEE Systems Journal, Vol. 9, No. 1, March 2015
[5] “Security issues in MANET”,Rashid Sheikh,Mahakal Singh Chandel,Durgesh Kumar Mishra, 978-1-4244-7202-4/10 IEEE 2010.
[6] P. Basu, N. Khan, and T. D. C. Little, “A Mobility Based Metric for Clustering in Mobile Ad Hoc Networks,” in proceedings of IEEE ICDCSW‟ 01, pp. 413–18, Apr. 2001
[7] T. Hara, “Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility,” Proc. IEEE INFOCOM, pp. 1568- 1576, 2001.
[8] Wireless sensor Network security by Intrusion Detection in Energy Efficient Way by P N Rajitha et al,International Journal of Science Engineering and Technology Research,Vol 5,Issue 4, April 2016.
[9] Honeypot-An external layer of security against advanced attacks on Networks by Aaditya Jain et al. ,3rd International Conference on Recent Trends in Engineering Science and Management,April 2016. [10] A. P. K. Gagandeep, "Analysis of Different Security Attacks in MANETs on Protocol Stack A-Review," International Journal of Engineering and Advanced Technology (IJEAT), vol. 1, no. 5, 2012
Citation
J.Nithyapriya, V. Pazhanisamy, "The Indexing Strategy to Prevent Worm Holes in Manet - An Analysis", International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.139-141, 2018.
Generating Secure Key for VoIP Network by Fusion of Irises
Review Paper | Journal Paper
Vol.06 , Issue.11 , pp.142-146, Dec-2018
Abstract
Over the year several new technologies and applications has being developed to deploy and reap the benefits of the Internet, Voice over Internet Protocol (VoIP) is one of those technologies. VoIP converts the voice signal from your telephone into a digital signal that travels over the Internet. One particular juicy offer that the VoIP provides is its cheapness and the ability to use an existing Internet connection/access to make calls. VoIP has come with both its advantages and challenges which make it yet another issue to worry about. The chief problem is to protect our data in a unique way that could only be worked upon by encrypting the voice data which run over the open network. Enforcement of using encryption is to provide confidentiality in communication channel. Using biometric we can generate an exclusive key that will be unique for each and every individual. Here we propose to make a contribution of the sender’s iris and database iris biometrics to have a secured VoIP communication. After fusing these two irises, the key will be generated. The key will be used for encrypting our data in VoIP. Thus the proposed method will provide secured VoIP communication and billions of unique keys can be generated, making VoIP technology hard for an attacker to guess the key . This key act as a symmetric key for both encryption and decryption. This proposed system is composed following modules 1) Feature extraction of Iris 2) Cryptographic key generation. 3) Fusion of irises.
Key-Words / Index Term
Biometrics, Cryptosystem, Iris Extraction, Minutiae point, Fusion
References
[1] “Voice over Internet Protocol” from http://en.wikipedia.org/wiki/Voice_over_IP
[2] Persky, D. (2007). VoIP Security Vulnerabilities. Sans Institute 2007. Retrieved July 13, 2009
[3] N. K. Ratha, J. H. Connell, and R. M. Bolle “Enhancing security and privacy in biometrics based authentication systems”, IBM Systems Journal, vol. 40, pp. 614-634, 2001.
[4] T. Zhang, X. Li, D. Tao, and J. Yang, “Multi-modal biometrics using geometry preserving projections”, Pattern Recognition, vol. 41, no. 3, pp. 805-813, 2008.
[5]Yan Yan and Yu-Jin Zhang, “Multimodal Biometrics Fusion Using Correlation Filter Bank", in proceedings of 19th International Conference on Pattern Recognition, pp. 1-4, Tampa, FL, 2008.
[6]S. C. Chong, A. B. J. Teoh, and D. C. L. Ngo, “Iris Authentication Using Privatized Advanced Correlation Filter,” in ICB, pages 382–388, 2006
[7] A. Czajka and A. Pacut, “Iris recognition with adaptive coding”,Rough Sets and Knowledge Technology, Lecture Notes in Artifical Intelligence, vol. 4481, Springer, 2007, pp. 195–202. [8]
[8] P. Balakumar and R. Venkatesan, Secure Biometric Key Generation Scheme for Cryptography using Combined Biometric Features of Fingerprint and Iris , IJCSI International Journal of Computer Science Issues, 8(5), 2011, 349-356.
[9] Feng Hao, Ross Anderson and John Daugman, "Combining Crypto with Biometrics Effectively", IEEE Transactions on Computers, vol. 55, no 9, 2006.
[10] Peter Thermos; Ari Takanen, “Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures”, Addison-Wesley Professional, August 2007, ISBN-10: 0-321-43734-9.
[11] P.Arul, Dr.A.Shanmugam, "Generate a Key for AES Using Biometric for VOIP Network Security", Journal of Theoretical and Applied Information Technology, vol. 5, no.2, 2009.
[12] Umut Uludag, Sharath Pankanti, Salil Prabhakar, Anil K.Jain,“Biometric Cryptosystems Issues and Challenges”, in Proceedings of the IEEE, vol. 92, pp. 948-960, 2004.
[13] Jain AK, Bolle R, Pankanti S. Biometrics: personal identification in network society. Kluwer Academic Publishers; 1999.
[14] Daugman John. High confidence visual recognition of persons by a test of statistical independence. IEEE Trans Pattern Anal Mach Intell 1993;15(11):1148–61.
[15] Daugman JG. Statistical richness of visual phase information: update on recognizing persons by iris patterns. Int J Comput Vision 2001;45(1):25–38.
[16]Wildes RP.Iris recognition: an emerging biometric technology. Proc IEEE 1997;85(9):1348–63.
[17] Boles WW. A wavelet transform based technique for the recognition of the human iris. In: Proceedings of the international symposium on signal processing and its application, ISSPA, Gold Coast, Australia; August 1996. p. 25–30.
[18] Debnath Bhattacharyya, Poulami Das,Samir Kumar Bandyopadhyay and Tai-hoon Kim, "IRIS Texture Analysis and Feature Extraction for Biometric Pattern Recognition", International Journal of Database Theory and Application, vol. 1, no. 1, pp. 53-60, December 2008.
[19] J. Daugman, “Statistical Richness of Visual Phase Information Update on Recognizing Persons by Iris Patterns,” International Journal of Computer Vision, vol. 45, no. 1, pp. 25-38, 2001.
[20] A. Ross and A. K. Jain, .Information Fusion, in Biometrics ,Pattern Recognition, , 24 (13), 2115-2125 (2003).
[21]S. Soviany and M. Jurian, “Multimodal biometric securing methods for informatic systems,” in Proceedings of the 34th International Spring Seminar on Electronic Technology, pp. 12– 14, Phoenix, Ariz, USA, May 2011.
[22] S. Soviany, C. Soviany, and M. Jurian, “A multimodal approach for biometric authentication with multiple classifiers,” in International Conference on Communication, Information and Network Security, pp. 28–30, 2011.
[23] F. Besbes, H. Trichili, and B. Solaiman, “Multimodal biometric system based on fingerprint identification and iris recognition,” in Proceedings of the 3rd International Conference on Information and Communication Technologies: From Theory to Applications (ICTTA ’08), pp. 1–5, Damascus, Syria, April 2008.
[24] Bremananth R and Chitra A, „An efficient biometri cryptosystem using autocorrelators‟ International Journal of SignalProcessing 2;3, pp.158-164, 2006..
[25] John Daugman, “How Iris Recognition Works”, in Proceedings of International Conference on Image Processing, vol.1, pp. I-33- I-36, 2002.
[26] Beng.A, Jin Teoh and Kar-Ann Toh, "Secure biometric-key generation with biometric helper”, in proceedings of 3rd IEEE Conference on Industrial Electronics and Applications, pp.2145-2150, Singapore, June 2008.
Citation
S. Bhuvaneshwari, P. Arul, "Generating Secure Key for VoIP Network by Fusion of Irises", International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.142-146, 2018.