7 research outputs found

    Late Semantic Fusion Approach for the Retrieval of Multimedia Data

    Get PDF
    In Multimedia information retrieval late semantic fusion is used to combine textual pre-filtering with an image re-ranking. Three steps are used for retrieval processes. Visual and textual techniques are combined to help the developed Multimedia Information Retrieval System to minimize the semantic gap for given query. In the paper, different late semantic fusion approaches i.e. Product, Enrich, MaxMerge and FilterN are used and for experiments publicly available ImageCLEF Wikipedia Collection is used. DOI: 10.17762/ijritcc2321-8169.150610

    Simple and Naïve Techniques for Backdoor Elimination in RCA

    Get PDF
    World is rapidly going to be digitalized and security is major challenge in digital world. Digital data should be protected against bad natured users. Number of system has come up with different solutions, some of them adopting response computation authentication. In Response Computation Authentication System, system calculates users response and if it matches with system expected value then system authenticates user. Response computation system authenticates user independently. In RCA bad natured developer have plant backdoor to avoid regular authentication procedure. Developer can add some delicate vulnerability in source code or can use some insufficient cryptographic algorithm to plant backdoor. Because of insufficient cryptographic algorithm it is very difficult to detect and eliminate backdoor in RCA. Here proposed system provides solution to check whether any system contain any backdoor or not? Login module is divided into number of components and component having simple logic are checked by code review and component which contains cryptography are sandboxed. DOI: 10.17762/ijritcc2321-8169.150613

    A survey on Response Computaion Authentication techniques.

    Get PDF
    as we know the problems regarding data and system security are challenging and taking attraction of researchers. Although there are many techniques available which offers protection to systems there is no single Method which can provide full protection. As we know to provide security to system authentication in login system is main issue for developers. Response Computable Authentication is two way methods which are used by number of authentication system where an authentication system independently calculates the expected user response and authenticates a user if the actual user response matches the expected value. But such authentication system have been scare by malicious developer who can bypass normal authentication by covering logic in source code or using weak cryptography. This paper mainly focuses on RCA system to make sure that authentication system will not be influenced by backdoors. In this paper our main goal is to take review of different methods, approaches and techniques used for Response Computation Authentication

    Multimedia Retrieval: Survey Of Methods And Approaches

    Get PDF
    As we know there are numbers of applications present where multimedia retrieval is used and also numbers of sources are present. So accuracy is the major issue in retrieval process. There are number of techniques and datasets available to retrieve information. Some techniques uses only text-based image retrieval (TBIR), some uses content-based image retrieval (CBIR) while some are using combination of both. In this paper we are focusing on both TBIR and CBIR results and then fusing these two results. For fusing we are using late fusion. TBIR captures conceptual meaning while CBIR used to avoid false results. So final results are more accurate. In this paper our main goal is to take review of different methods and approaches used for Multimedia Retrieval

    Metal nanoparticles: The protective shield against virus infection.

    No full text
    Re-emergence of resistance in different pathogens including viruses are the major cause of human disease and death, which is posing a serious challenge to the medical, pharmaceutical and biotechnological sectors. Though many efforts have been made to develop drug and vaccines against re-emerging viruses, researchers are continuously engaged in the development of novel, cheap and broad-spectrum antiviral agents, not only to fight against viruses but also to act as a protective shield against pathogens attack. Current advancement in nanotechnology provides a novel platform for the development of potential and effective agents by modifying the materials at nanolevel with remarkable physicochemical properties, high surface area to volume ratio and increased reactivity. Among metal nanoparticles, silver nanoparticles have strong antibacterial, antifungal and antiviral potential to boost the host immunity against pathogen attack. Nevertheless, the interaction of silver nanoparticles with viruses is a largely unexplored field. The present review discusses antiviral activity of the metal nanoparticles, especially the mechanism of action of silver nanoparticles, against different viruses such HSV, HIV, HBV, MPV, RSV, etc. It is also focused on how silver nanoparticles can be used in therapeutics by considering their cytotoxic level, to avoid human and environmental risks
    corecore