7 research outputs found

    A comparative analysis of selected clustering algorithms for criminal profiling

    Get PDF
    Several criminal profiling systems have been developed to assist the Law Enforcement Agencies in solving crimes but the techniques employed in most of the systems lack the ability to cluster criminal based on their behavioral characteristics. This paper reviewed different clustering techniques used in criminal profiling and then selects one fuzzy clustering algorithm (Expectation Maximization) and two hard clustering algorithm (K-means and Hierarchical). The selected algorithms were then developed and tested on real life data to produce "profiles" of criminal activity and behavior of criminals. The algorithms were implemented using WEKA software package. The performance of the algorithms was evaluated using cluster accuracy and time complexity. The results show that Expectation Maximization algorithm gave a 90.5% clusters accuracy in 8.5s, while K-Means had 62.6% in 0.09s and Hierarchical with 51.9% in 0.11s. In conclusion, soft clustering algorithm performs better than hard clustering algorithm in analyzing criminal data. Keywords: Clustering Algorithm, Profiling, Crime, Membership valu

    AN INTELLIGENT CLASSIFIER FUSION TECHNIQUE FOR IMPROVED MULTIMODAL BIOMETRIC AUTHENTICATION USING MODIFIED DEMPSTER-SHAFER RULE OF COMBINATION

    Get PDF
    Multimodal biometric technology relatively is a technology developed to overcome those limitations imposed by unimodalbiometric systems. The paradigm consolidates evidence from multiple biometric sources offering considerableimprovements in reliability with reasonably overall performance in many applications. Meanwhile, the issue of efficient andeffective information fusion of these evidences obtained from different sources remains an obvious concept that attractsresearch attention. In this research paper, we consider a classical classifier fusion technique, Dempster’s rule of combinationproposed in Dempster-Shafer Theory (DST) of evidence. DST provides useful computational scheme for integratingaccumulative evidences and possesses the potential to update the prior every time a new data is added in the database.However, it has some shortcomings. Dempster Shafer evidence combination has this inability to respond adequately to thefusion of different basic belief assignments (bbas) of evidences, even when the level of conflict between sources is low. Italso has this tendency of completely ignoring plausibility in the measure of its belief. To solve these problems, this paperpresents a modified Dempster’s rule of combination for multimodal biometric authentication which integrates hyperbolictangent (tanh) estimators to overcome the inadequate normalization steps done in the original Dempster’s rule ofcombination. We also adopt a multi-level decision threshold to its measure of belief to model the modified Dempster Shaferrule of combination.Keywords: Information fusion, Multimodal Biometric Authentication, Normalization technique, Tanh Estimators

    Enhanced Stegano-Cryptographic Model for Secure Electronic Voting

    Get PDF
    The issue of security in Information and Communication Technology has been identified as the most critical barrier in the widespread adoption of electronic voting (e-voting). Earlier cryptographic models for secure e-voting are vulnerable to attacks and existing stegano-cryptographic models can be manipulated by an eavesdropper. These shortcomings of existing models of secure e-voting are threats to confidentiality, integrity and verifiability of electronic ballot which are critical to overall success of e-democratic decision making through e-voting.This paper develops an enhanced stegano-cryptographic model for secure electronic voting system in poll-site, web and mobile voting scenarios for better citizens’ participation and credible e-democratic election. The electronic ballot was encrypted using Elliptic Curve Cryptography and Rivest-Sharma-Adleman cryptographic algorithm. The encrypted voter’s ballot was scattered and hidden in the Least Significant Bit (LSB) of the cover media using information hiding attribute of modified LSB-Wavelet steganographic algorithm. The image quality of the model, stego object was quantitatively assessed using Peak Signal to Noise Ratio (PSNR), Signal to Noise Ratio (SNR), Root Mean Square Error (RMSE) and Structural Similarity Index Metrics (SSIM).The results after quantitative performance evaluation shows that the developed stegano-cryptographic model has generic attribute of secured e-voting relevant for the delivery of credible e-democratic decision making. The large scale implementation of the model would be useful to deliver e-voting of high electoral integrity and political trustworthiness, where genuine e-elections are conducted for the populace by government authority. Keywords: Electronic Voting, Cryptography, Steganography, Video, Image, Wavelet, Securit

    Velocity profile simulation for natural gas flow underneath waterbody following a full-bore rupture of an offshore pipeline

    Get PDF
    Ovaj rad razvija model koji se zasniva na načelu očuvanja gibanja kako bi se predvidio tok prirodnog plina u vodenoj masi nakon neočekivana istjecanja kroz pukotinu punog presjeka (FBR) iz uronjenoga podmorskog cjevovoda. Za diskretizaciju modela korištena je metoda konačnih razlika, za njegovu simulaciju primijenjena je Crank-Nicholson numerička metoda, dok je MATLAB 7 korišten za simuliranje rezultirajućeg algoritma. Rješenja modela generirana su na različitim točkama mreže u proračunskoj domeni računanja kako bi se prikazao model toka na različitim točkama vodene mase, vertikalno i horizontalno. Model dobro prikazuje tok prirodnog plina u usporedbi sa sličnim postojećim modelima, pa je primjenjiv pri planiranju i koordinaciji aktivnosti u akcidentnim situacijama (ARPU).This work develops a model based on principle of conservation of momentum to predict natural gas flow pattern in waterbody following an accidental release through a full bore rupture (FBR) from a submerged pipeline. The model was discretized using Finite Difference Method; Crank-Nicholson numerical technique was applied to simulate it while MATLAB 7 was used to simulate the resulting algorithm. Solutions to the model are generated at various mesh points in the computational domain to show the flow pattern at various points within the waterbody both vertically and horizontally. This model gives a good representation of the flow pattern when compared with the existing similar models, thus, the model is useful for the Accident Response Planning Unit (ARPU) in case of such disaster

    New Performance of Square of Numbers

    No full text
    The new discovery of squaring number can be use in getting a square of any number be it positive integers or negative integers.@JASE

    Superiority of Legendre Polynomials to Chebyshev Polynomial in Solving Ordinary Differential Equation

    No full text
    In this paper, we proved the superiority of Legendre polynomial to Chebyshev polynomial in solving first order ordinary differential equation with rational coefficient. We generated shifted polynomial of Chebyshev, Legendre and Canonical polynomials which deal with solving differential equation by first choosing Chebyshev polynomial T*n(X), defined with the help of hypergeometric series T*n(x) =F ( -n, n, 1/2 ;X) and later choosing Legendre polynomial P*n (x) define by the series P*n (x) = F ( -n, n+1, 1;X); with the help of an auxiliary set of Canonical polynomials Qk in order to find the superiority between the two polynomials. Numerical examples are given which show the superiority of Legendre polynomials to Chebyshev polynomials. @JASE
    corecore