83 research outputs found
Data Sharing using BFID Encryption for Privacy Preseration of Data in Cloud
The most important functionality in cloud storage is data sharing. With the advent of cloud computing [1], data owners are motivated to outsource their complex data management systems from local sites to the commercial public cloud for great flexibility and economic savings. But for protecting data privacy and integrity, sensitive data have to be encrypted before outsourcing, which causes the need of traditional data utilization based on plaintext keyword search. Thus, enabling an encrypted cloud data search service is of paramount importance.Typically cloud computing is a combination of computing recourses accessible via internet. Historically the client or organizations store data in data centers with firewall and various security techniques used to protect data against intrudes to access the data. Since the data was contained to data centers in limits of organisation, the control over the data was more and well defined procedures could be used for accessing its own data. Howeverin cloud computing, since the data is stored anywhere across the world, the client organizations have less control over the stored data.Identity-Based Encryption (IBE) which is used to simplifies the public key and certificate management at Public Key Infrastructure (PKI) is an important alternative to public key encryption. Identity-based encryption (IBE) is an important aspect of ID-based cryptography. As such it is a type of public-key encryption in which the public key of a user is provides unique information about the identity of the user (e.g. a user's Identification). This can use the text-value of the name or domain name as a key or the physical IP address it translates to
Gold Market Analyzer using Selection based Algorithm
Gold is the most important and valuable element right from its discovery. It is the most significant element at present and also the most valuable asset to. In the present market scenario the investors use gold as the security for their shares investment. During International trade all the countries use gold as their main mode of transaction. It is seen that all the currencies accepted by the International market are having the gold as the backup for their economy. The prices of gold are rising day by day continuously. As we see in the history of gold market the present prices of gold are much high as compare to the past values and that's why the gold market has attracted the most attention. The paper focus on the continuous changing in the gold rates, investment policies depend on the forecasting of trends in gold which will help the data mining companies to minimize the risk The description of the future situation on the basis of present trends is just not limited to the forecasting the prices. The knowledge discovers by the data mining techniques is gathered from the different gold related websites and also from the jewellers database. It is much more important for the ornaments making companies to know the demand and the requirements for the ornaments during the unstable (uncertain) market conditions. For the classification purpose the maid and sale database was gathered from the nearest jewellery shops of the past 5 years. The prediction is done after complete analysis of the gathered data set. With this the paper concentrate on making the information available about the government and private schemes related to gold market on one place. The paper proposes the system that gives the total access to the registered user and limited access to the unregistered user to get the required information of gold. The latest updates are provided to the registered user by sending mail or text message when the user was offline
Palm Print Recognition Using Curve let Transform
In the era of Information Technology, openness of the information is a major concern. As the confidentiality and integrity of the information is critically important, it has to be secured from unauthorized access. Traditional security and identification are not sufficient enough; people need to find a new authentic system based on behavioral & physiological characteristics of person which is called as Biometric. Palm print recognition gives several advantages over the other biometrics such as low resolution, low cost, non-intrusiveness and stable structure features. Now a days Palm print based personal verification system is used in many security application due to its ease of acquisition, high user acceptance and reliability. Various approaches which deal with palm recognition are texture approach, line approach and appearance approach. By using texture approach it is possible to obtain texture sample with low resolution and texture is much more stable as compare to line and appearance. This paper is aimed to analyze the performance of palm print recognition systems using Curvelet features and for dimension reduction PCA is used
Biometric Validation by Storing different Patterns using Mouse Gesture Signatures
In this paper, the construct Authentication of automatic data processing system by Mouse Gestures was summarized and its significance towards its Methodologies was illustrated. The Authentication of ancient ways that like victimization text parole or image parole results in less secure and harder to user to recollect. Based on Neural Network formula and its analysis has been user to attain the Biometric Authentication based on user behavior on Neural Network and is additionally surveyed. This paper conjointly conducts a review of the realm of Artificial Neural Network and biometric methods that add another layer of security to computing system.
DOI: 10.17762/ijritcc2321-8169.160413
Classification and Grading of Wheat Granules using SVM and Naive Bayes Classifier
India is the second leading producer of wheat in the world. Specifying the quality of wheat manually is very time consuming and requires an expert judgment. With the help of image processing techniques, a system can be made to avoid the human inspection. Classification of wheat grains is carried out according to their grades to determine the quality. Images are acquired for wheat grains using digital camera. Conversions to gray scale, Smoothing, Thresholding, Canny edge detection are the checks that are performed on the acquired image using image processing technique. Classification and Grading of wheat grain is carried out by extracting morphological, color and texture features. These features are given to SVM and Naive Bayes Classifier for classification. To evaluate the classification accuracy, from the total of 1300 data sets 50% were used for training and the remaining 50% was used for testing. The classification system was supervised corresponding to the predefined classes of grades. Results showed that overall accuracy of SVM and Naive Bayes classifier is 94.45%, 92.60% respectively. So, the classification performance of SVM is better than Naive Bayes Classifier.
DOI: 10.17762/ijritcc2321-8169.15085
Circular Hough Transform For Detecting And Measuring Circles of Object
This article presents a robust method for detecting and measuring the circles of industrial object like water pump pulley(WPP-44), images based on circular Hough transform. The software of the application is based on detecting and measuring the circles surrounding of that object. The objective of this application is the recognition of circular shapes in an image. This paper presents efficient implementation of Image Processing technique for measurement of dimension of the object used in Turbine system. The proposed work makes use of the Matlab software for the said work..At First an segmentation or edge detection technique is used for finding the edges in the input image, then the characteristic points of circles are determined, after this process the pattern of the circles is extracted, and then with the help of other extraction parameter of the diameter of object(WPP-44).
DOI: 10.17762/ijritcc2321-8169.15023
Simulation on probabilistic anti collision protocols of RFID using variable delay
In RFID System, it is important to avoid tag collision for identifying tag faster. In this paper, we proposed concept of variable delay for tag estimation & identification. The scheme is based on the Multi-level dynamic framed ALOHA protocol. Simulation results indicate that the time delay is added to each tag for avoiding collision. The main advantage of this is the delay is in microseconds which will not create problem of more time consumption
Effect of High Pressure Coolant on Surface Finish In Turning Operation,
Abstract: Present study focuses on effect of high pressure coolant on surface finish of EN8 material during turning operation. In industry common practices is to use low pressure coolant up to 10 bar. In the present experimentation, instead of low pressure, high pressure coolant of 10 bar to 70 bar is used. The experimentation is done on CNC machine during turning operation of a particular job of EN8 material. It is concluded that increase of pressure results improved surface finish to considerable level
Outcomes from elective colorectal cancer surgery during the SARS-CoV-2 pandemic
This study aimed to describe the change in surgical practice and the impact of SARS-CoV-2 on mortality after surgical resection of colorectal cancer during the initial phases of the SARS-CoV-2 pandemic
- âŠ