11 research outputs found

    A new approach for web usage mining using case based reasoning

    Get PDF
    In this study, we present a new approach for Web Usage Mining using Case Based Reasoning. Case-Based Reasoning techniques are a knowledge-based problem-solving approach which is based on the reuse of previous work experience. Thus, the past experience can be deemed as an efficient guide for solving new problems. Web personalization systems which have the capability to adapt the next set of visited pages to individual users according to their interests and navigational behaviors have been proposed. The proposed architecture consists of a number of components, namely, basic log preprocessing, pattern discovery methods (By Case Based Reasoning and peer to peer similarity—Clustering—association rules mining methods), and recommendations. One of the issues considered in this study is that there are no recommendations to those who are different from the existing users in the log file. Also, it is one of the challenges facing the recommendations systems. To deal with this problem, Apriori algorithm was designed individually in order to be utilized in presenting recommendations; in other words, in cases where recommendations may be inadequate, using association rules can enhance the overall system performance recommendations. A new method used in this study is clustering algorithms for Nominal web data. Our evaluations show that the proposed method along with Standard case-classified Log provides more effective recommendations for the users than the Logs with no case classification

    Image encryption techniques: A comprehensive review

    Get PDF
    This paper presents an exhaustive review of research within the field of image encryption techniques. It commences with a general introduction to image encryption, providing an overview of the fundamentals. Subsequently, it explores a comprehensive exploration of chaos-based image encryption, encompassing various methods and approaches within this domain. These methods include full encryption techniques as well as selective encryption strategies, offering insights into their principles and applications. The authors place significant emphasis on surveying prior research contributions, shedding light on noteworthy developments within the field. Additionally, the paper addresses emerging challenges and issues that have arisen as a consequence of these advancements

    A functional enhancement on scarred fingerprint using sigmoid filtering

    Get PDF
    Fingerprint has been widely used in biometric applications. Numerous established researches on image enhancement techniques have been done to improve the quality of fingerprint images. However, the production of low-quality images due to the presence of scars remains a challenge in biometrics. The scars damage the fingerprint minutiae information due to broken ridges and they reduce the accuracy of identification. This research developed an image enhancement approach to improve the quality of scarred fingerprint images to generate accurate minutiae extraction. To achieve the aim, the scarred image was improved by removing noise using a new filter, Median Sigmoid (MS), and the corrected ridges were reconstructed using ridges structure enhancement algorithm. This was done to enhance the broken ridges structure. MS filter is a combination of median filter and modified sigmoid function that improves the image contrast and simultaneously removes noise in the fingerprint image. Following that, the filtered image was used in the ridges structure enhancement process. To identify true minutiae, the broken ridges structure in the filtered image needed to be accurately verified. In the ridges structure reconstruction process, an algorithm was enhanced to identify the best value of Sigma parameter (σ) used in the Gaussian Low-pass filter to generate a better orientation image. The image is important to reconstruct the corrupted fingerprint ridges structure. The evaluation for the proposed approach used the National Institute of Standards and Technology Special Database 14, and the results showed a 37% improvement of the quality index in comparison to approaches found in related research. The findings of the evaluation showed that the proposed enhancement approach produced a better minutiae extraction result and this is very significant in the field of fingerprint image enhancement

    Review on 3D printers

    Get PDF
    In this paper of the report, it is all the different research in the that has been done to under-stand more about the subject of 3D printers and the health sector. In this paper all the different research that was done was information that is very closely related to subjects previously stated, although these papers are very professional and informative the focus of this part of the paper is to better show all the different gaps in the information and what it could be missing that could possibly be showed in this paper that they have missed out on

    High imperceptibility and robustness watermarking scheme for brain MRI using Slantlet transform coupled with enhanced knight tour algorithm

    Get PDF
    This research introduces a novel and robust watermarking scheme for medical Brain MRI DICOM images, addressing the challenge of maintaining high imperceptibility and robustness simultaneously. The scheme ensures privacy control, content authentication, and protection against the detachment of vital Electronic Patient Record information. To enhance imperceptibility, a Dynamic Visibility Threshold parameter leveraging the Human Visual System is introduced. Embeddable Zones and Non-Embeddable Zones are defined to enhance robustness, and an enhanced Knight Tour algorithm based on Slantlet Transform shuffles the embedding sequence for added security. The scheme achieves remarkable results with a Peak Signal-to-Noise Ratio (PSNR) evaluation surpassing contemporary techniques. Extensive experimentation demonstrates resilience to various attacks, with low Bit Error Rate (BER) and high Normalized Cross-Correlation (NCC) values. The proposed technique outperforms existing methods, emphasizing its superior performance and effectiveness in medical image watermarking

    Point-based Gesture Recognition Techniques

    Get PDF
    Gesture recognition is a computing process that attempts to recognize and interpret human gestures through the use of mathematical algorithms. In this paper, we describe Point Based Gesture Recognition and Point Clouds nearest neighbors and sampling. Also, we explore these techniques with previous studies

    Point-based Gesture Recognition Techniques

    Get PDF
    Gesture recognition is a topic in computer science and language technology with the goal of interpreting human gestures via mathematical algorithms. It is a subdiscipline of computer vision. In this paper, we describe some of Gesture recognition techniques such as Vision based gesture recognition and Graph based gesture recognition. Also, we explore these techniques with previous studies

    Investigation on the Impact of Video Games on People Who Use New Technology

    No full text
    Nowadays, every fourth person in the world is a player, which means that there are two billion players in the world, the gaming industry is enormous and the average person, several times during everyday life, encounters something related to games. The impact that games have on the modern world is massive. In particular popular games that have different types of influence on players and those messages from this game are not necessarily good things. The main task of this project is to reduce the impact of games that have negative aspects of our society in particular violence. This project objective is to create a program that will help a person examine if this person can play games that contain violence. The secondary objective is to post materials that show how long a person can use various gaming devices and encourage young people to spend more time without games. This project’s program aims to inform a person can play games that contain violence, to inform what the negative aspects of prolong use different gaming devices are and to inform of better ways to spend time without any electronic devices

    Finger Vein Recognition Techniques: A Comprehensive Review

    No full text
    This paper discusses a comprehensive review of the previous research in the field of the finger vein recognition system with a focus on finger vein enhancements and features extraction advances and shortcomings. It starts with a general introduction of the biometric system followed by detailed descriptions on finger vein identification, and its architecture archival of it, which includes image acquisition, preprocessing of the image, feature extraction, and vein matching. This study focuses on related work proposed by previous researchers, issues in the field that originated from the related work, and a discussion of each of the issues associated and the proposed solutions to each of them. Next a comprehensive discussion on the advances and shortcomings of the existing techniques based on the qualities, capturing device, database, and feature of that quality is presented. Accurate comparisons between existing techniques are presented as tables to make it easy for new researchers to come up with advances and drawbacks of each technique without spending time on all existing research in this area

    Improved methods for finger vein identification using composite Median-Wiener filter and hierarchical centroid features extraction

    No full text
    Finger vein patterns contain highly discriminative characteristics, which are difficult to be forged due to residing underneath the skin. Several pieces of research have been carried out in this field but there is still an unresolved issue when data capturing and processing is of low quality. Low-quality data have caused errors in the feature extraction process and reduced identification performance rate in finger vein identification. The objective of this paper is to address this issue by presenting two methods, a new image enhancement, and a feature extraction method. The image enhancement, Composite Median-Wiener (CMW) filter, improves image quality and preserves the edges. Moreover, the feature extraction method, Hierarchical Centroid Feature Method (HCM), is fused with the statistical pixel-based distribution feature method at the feature-level fusion to improve the performance of finger vein identification. These methods were evaluated on public SDUMLA-HMT and FV-USM finger vein databases. Each database was divided into training and testing sets. The average result of the experiments conducted was taken to ensure the accuracy of the measurements. The k-Nearest Neighbor classifier with city block distance to match the features was implemented. Both these methods produced accuracy as high as 97.64% for identification rate and 1.11% of equal error rate (EER) for measures verification rate. These showed that the accuracy of the proposed finger vein identification method is higher than the existing methods. The results have proven that the CMW filter and HCM have significantly improved the accuracy of finger vein identification
    corecore