317 research outputs found
An Efficient Fingerprint Enhancement Technique Using Wave Atom Transform and MCS Algorithm
AbstractFingerprints are widely and successfully used for personal identification. This is mainly due to their individuality, stability through life, uniqueness among people, public acceptance and their minimum risk of intrusion. Fingerprint technology is a biometric technique utilized to identify persons based on their physical traits. The physical patterns of this technique consist of ridges and valleys that exist on the surface of fingertips. Fingerprint images are direction-oriented patterns formed by ridges and valleys. The eminence of the fingerprint image is determined by the sturdiness of a fingerprint authentication system. In order to improve the limitations of existing fingerprint image enhancement methods an efficient technique is proposed to deal with low quality fingerprint images. The proposed methodology can be divided into three modules. In the first module, the fingerprint image is subjected to denoising process where Wave atom transform is utilized. After the completion of this process the image enhancement is performed with the help of optimization algorithm. In our enhancement approach, a Modified Cuckoo Search (MCS) algorithm is used as an optimizer. This helps to look for the best gray level distribution that maximizes the objective function
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
The uniqueness, firmness, public recognition, and its minimum risk of intrusion made fingerprint is an expansively used personal authentication metrics. Fingerprint technology is a biometric technique used to distinguish persons based on their physical traits. Fingerprint based authentication schemes are becoming increasingly common and usage of these in fingerprint security schemes, made an objective to the attackers. The repute of the fingerprint image controls the sturdiness of a fingerprint authentication system. We intend for an effective method for fingerprint classification with the help of soft computing methods. The proposed classification scheme is classified into three phases. The first phase is preprocessing in which the fingerprint images are enhanced by employing median filters. After noise removal histogram equalization is achieved for augmenting the images. The second stage is the feature Extraction phase in which numerous image features such as Area, SURF, holo entropy, and SIFT features are extracted. The final phase is classification using hybrid Neural for classification of fingerprint as fake or original. The neural network is unified with BAT algorithm for optimizing the weight factor
Water-saving Rice Production Technologies in Krishna Western Delta Command of Andhra Pradesh – An Economic Analysis
The economic analysis of water-saving rice production technologies, viz. system of rice intensification (SRI), semi-dry and rotational irrigation vis-à-vis farmers’ practice has been carried out based on the study executed in Modukuru pilot area of Guntur district of Andhra Pradesh. Among the three water-saving rice production technologies analyzed, the total cost of cultivation has been recorded highest in SRI (Rs 58645/ha), followed by rotational (Rs 47140/ha) and semi-dry (Rs 39321/ha). But, the per hectare yield has been found highest in SRI (6.85 t), followed by semi-dry (6.66 t) and rotational (6.2 t), inferring that all the three technologies have recorded higher yields over farmers’ practice of 5.5 t/ha. However, the net returns and B-C ratio are maximum in semi-dry (Rs 43,484/ha; 1.11), followed by rotational (Rs 30,085; 0.64) and SRI (Rs 26,466/ha; 0.45) methods. Similarly, the water-use efficiency has been found highest in SRI (8.53 kg/ ha-mm), followed by semi-dry (8.02 kg/ha-mm) and rotational (7.33 kg/ ha-mm) methods, while the water-use efficiency benefit (Rs/ha-mm) has been recorded maximum in semi-dry (52.39), followed by SRI (42.08) and rotational (35.56) methods. With the initiation of Andhra Pradesh Water Management Project, Bapatla, the area under semi-dry rice cultivation has been found increasing over a period of four years, from 0.6 ha in 2004-2005 to 22 ha in 2007 -2008.Agricultural and Food Policy,
FORMULATION DESIGN AND IN VITRO EVALUATION OF BILAYER SUSTAINED RELEASE MATRIX TABLETS OF DOXOFYLLINE
Objective: To develop bilayer matrix tablet of Doxofylline by providing a loading dose followed by the maintenance dose that suppose to enhance the therapeutic efficacy the drug for acute and sustainable asthma.Methods: Both immediate release layer and sustained release layer were prepared by wet granulation methods. Different Pre compression and post compression characterization of the tablet were carried out. Swelling studies were carried out for all the formulation. To optimise the immediate release layer, similarity (f2) and difference factor (f1) were calculated and optimised IR formulation was used for all formulations of bilayer tablet. In-vitro release studies were carried out in USP II paddle type dissolution apparatus for different formulations and release kinetic studies were carried out different kinetic model. FTIR and DSC studies were carried out for pure drug Doxofylline, IR layer and SR layer of optimised formulation to know the physical and chemical compatibility of drug and excipients. Accelerated stability studies were carried out to confirm the stability of dosage forms.Results: Pre compression and post compression parameters satisfied with pharmacopeia specifications. The formulation that contained highest percent of HPMC had highest swelling index. Formulation DBMF6 showed an initial release of 44% of drug within one hour as the loading dose and remaining drug were sustained release up to 12 h. Release kinetic followed Hixon-Crowell kinetic model with drug release mechanism quasi-fickian diffusion. From accelerated stability studies no significant changes in physicochemical properties were noticed.Conclusion: Doxofylline bilayer matrix tablets were successfully developed and can be used as an alternative to the conventional dosage form because it can be therapeutically beneficial for management of asthma.Â
MOBILE APPS FRAUD DETECTION USING RANKING
Positioning misrepresentation in the portable Application business shows to false or dubious activities which have a motivation behind, thumping up the Applications in the popularity list. To be sure, it ends up being more endless for Application architects to adventure shady means, for instance, developing their Applications' business or posting fraud Application assessments, to ponder situating deception. While the ramification of abstaining from positioning misrepresentation has been by and large maintained, there is constrained comprehension and examination here. This paper gives an all-inclusive viewpoint of situating deception and proposes a Positioning misrepresentation distinguishing proof structure for versatile Applications. In particular, it is proposed to precisely discover the mining in order to posture blackmail the dynamic periods, to be particular driving sessions, of compact Applications. Such driving sessions can be used for recognizing the area irregularity as opposed to an overall anomaly of Application rankings. In addition, three sorts of verification s are investigated, i.e., situating based affirmations, displaying to rate based confirmations and study based evidences, Applications' situating, rating and review rehearses through genuine speculations tests. In the request, this paper gets the skill of the proposed system, and shows the distinguishing proof's flexibility estimation furthermore some consistency of situating deception works out
Neuro-Fuzzy Based Hybrid Model for Web Usage Mining
AbstractWeb Usage mining consists of three main steps: Pre-processing, Knowledge Discovery and Pattern Analysis. The information gained from the analysis can then be used by the website administrators for efficient administration and personalization of their websites and thus the specific needs of specific communities of users can be fulfilled and profit can be increased. Also, Web Usage Mining uncovers the hidden patterns underlying the Web Log Data. These patterns represent user browsing behaviours which can be employed in detecting deviations in user browsing behaviour in web based banking and other applications where data privacy and security is of utmost importance. Proposed work pre-process, discovers and analyses the Web Log Data of Dr. T.M.A.PAI polytechnic website. A neuro-fuzzy based hybrid model is employed for Knowledge Discovery from web logs
A EVIDENCE MULTICOPY DYNAMIC DATA POSSESSION IN MULTI CLOUD COMPUTING SYSTEM
Now a day more and more organizations increasing and are opting for outsource data to remote cloud services provider .the customers can rent the CSPs storage infrastructures to stores and retrieves almost unlimited amount of data by paying fees metered in gigabyte/month. In this paper, proposes a map-based provable multicopy dynamic data possession (MB-PMDDP) scheme that’s has to follows features: 1) its provide an evidences to customer that the CSPs is not going to cheat by storing the copy of data; 2) its support outsourcing of dynamic data and its support block levels operation,  such as block modifications, insertion, deletion, and append; and 3) it allows authorized users to seamlessly access the file copies stored by the CSP. It gives a comparative analysis of the proposed MB-PMDDP scheme with a reference model obtained by extends existing provable possessions of dynamics single copies scheme.
3D Printing: The Dawn of a New Era in Manufacturing
Printing is a process for reproducing text and images, typically with ink on paper using a print press.3D printing is method of converting a virtual 3D model into a physical object from a digital file. It is achieved using Additive Process, where an object is created by laying down successive layers of material until the entire object is created.3D printing could revolutionize and reshape the world. Advances in 3D printing technology can significantly change and improve the manufacturing world with effects on energy use, waste reduction, customization, product availability, medicine, art, construction and science. By using this technology it becomes easier to transmit designs for new objects around the world
Artificial Intelligence Tool for Fake Account Detection from Online Social Networks
Online social networks such as Facebook or Twitter contains user’s details, and some malicious users will hack social network database to steal or breach users’ information. Usually, all fake user’s main intention is to send friend request to normal users to hack their machine or to steal their data and never they will have many numbers of posts or have many following friends and their account age also will have a smaller number of years. By analysing this features Facebook will mark whether user profile is fake or genuine. Therefore, to protect the users’ data, this project uses artificial neural networks (ANNs) to identify whether given social network account details are from genuine or fake users. ANN algorithm will be trained with all previous users fake and genuine account dataset then this ANN pretrained model will be applied on new test data to identify whether the given new account details are from genuine or fake users
- …