9 research outputs found

    Generalized Multi-manifold Graph Ensemble Embedding for Multi-View Dimensionality Reduction

    Get PDF
    In this paper, we propose a new dimension reduction (DR) algorithm called ensemble graph-based locality preserving projections (EGLPP); to overcome the neighborhood size k sensitivity in locally preserving projections (LPP). EGLPP constructs a homogeneous ensemble of adjacency graphs by varying neighborhood size k and finally uses the integrated embedded graph to optimize the low-dimensional projections. Furthermore, to appropriately handle the intrinsic geometrical structure of the multi-view data and overcome the dimensionality curse, we propose a generalized multi-manifold graph ensemble embedding framework (MLGEE). MLGEE aims to utilize multi-manifold graphs for the adjacency estimation with automatically weight each manifold to derive the integrated heterogeneous graph. Experimental results on various computer vision databases verify the effectiveness of proposed EGLPP and MLGEE over existing comparative DR methods

    A Comparative Analysis on Handling Big Data Using Cloud Services

    Get PDF
    In this era of technology, a lot of advancements have been done in almost every field such as medical, science, aerospace and other fields. With the increasing advancements in technology, a lot of data is being produced at the same time. For instances in the field of medicine there is a huge amount of data that is being generated as there are hundreds and thousands of patients who came for their checkup. So now the question arises where this huge amount of data is being stored. This huge amount of data is called as Big Data. And the major problem faced is how to manage and organize this huge amount of data along with its security and not being lost. Big data is used for extracting a lot of useful information but it is not easy to organize it. If the data is being lost than there are a lot of problems that can occur on a huge level as a lot of data being stored in big data is very confidential. This data can be stored on cloud which is the new advancement in the field of technology as it is highly reliable for huge amount of information. So, in this survey paper we will discuss about the solutions of organizing and handling big data proposed by different authors

    Wormhole attack on On Demand routing protocols in mobile ad hoc networks

    No full text
    Abstract — A mobile ad hoc network (MANET) consists of mobile wireless nodes. In MANET nodes are selfmotivated topologies can randomly change their geographic locations. Wireless networks are susceptible to many attacks, including an attack known as the wormhole attack. On occurrence of wormhole can cause a significant breakdown in communication across a wireless network. This paper explores and compares the effect of wormhole attacks on the performance of on demand routing protocols in mobile ad hoc network (MANET). The evaluation has been done by studying and comparing end to end delay, packet delivery ratio and throughput for wormhole attack and without wormhole attack. Keywords — Mobile ad hoc networks; routing protocol; wormhole attacks; end to end delay; throughput; packet delivery ratio. I

    A New Nearest Centroid Neighbor Classifier Based on K Local Means Using Harmonic Mean Distance

    No full text
    The K-nearest neighbour classifier is very effective and simple non-parametric technique in pattern classification; however, it only considers the distance closeness, but not the geometricalplacement of the k neighbors. Also, its classification performance is highly influenced by the neighborhood size k and existing outliers. In this paper, we propose a new local mean based k-harmonic nearest centroid neighbor (LMKHNCN) classifier in orderto consider both distance-based proximity, as well as spatial distribution of k neighbors. In our method, firstly the k nearest centroid neighbors in each class are found which are used to find k different local mean vectors, and then employed to compute their harmonic mean distance to the query sample. Lastly, the query sample is assigned to the class with minimum harmonic mean distance. The experimental results based on twenty-six real-world datasets shows that the proposed LMKHNCN classifier achieves lower error rates, particularly in small sample-size situations, and that it is less sensitive to parameter k when compared to therelated four KNN-based classifiers

    A Technique and Architectural Design for Criminal Detection based on Lombroso Theory Using Deep Learning

    No full text
    Crimes and criminal activities are increasing day by day and there are no proper criteria to search, detect, identify, and predict these criminals. Despite various surveillance cameras in different areas still, crimes are at a peak. The police investigation department cannot efficiently detect the criminals in time. However, in many countries for the sake of public and private security, the initiation of security technologies has been employed for criminal identification or recognition with the help of footprint identification, fingerprint identification, facial recognition, or based on other suspicious activity detections through surveillance cameras. However, there are limited automated systems that can identify the criminals precisely and get the accurate or precise similarity between the recorded footage images with the criminals that already are available in the police criminal records. To make the police investigation department more effective, this research work presents the design of an automated criminal detection system for the prediction of criminals. The proposed system can predict criminals or possibilities of being criminal based on Lombrosso's Theory of Criminology about born criminals or the persons who look like criminals. A deep learning-based facial recognition approach was used that can detect or predict any person whether he is criminal, or not and that can also give the possibility of being criminal. For training, the ResNet50 model was used, which is based on CNN and SVM Classifiers for feature extracting from the dataset. Two different labeled based datasets were used, having different criminals and noncriminals images in the database. The proposed system could efficiently help the investigating officers in narrowing down the suspects' pool

    TrustWalker: An Efficient Trust Assessment in Vehicular Internet of Things (VIoT) with Security Consideration

    No full text
    The Internet of Things (IoT) is a world of connected networks and modern technology devices, among them vehicular networks considered more challenging due to high speed and network dynamics. Future trends in IoT allow these inter networks to share information. Also, the previous security solutions to vehicular IoT (VIoT) much emphasize on privacy protection and security related issues using public keys infrastructure. However, the primary concern about efficient trust assessment, authorized users malfunctioning, and secure information dissemination in vehicular wireless networks have not been explored. To cope with these challenges, we propose a trust enhanced on-demand routing (TER) scheme, which adopts TrustWalker (TW) algorithm for efficient trust assessment and route search technique in VIoT. TER comprised of novel three-valued subjective logic (3VSL), TW algorithm, and ad hoc on-demand distance vector (AODV) routing protocol. The simulated results validate the accuracy of the proposed scheme in term of throughput, packet drop ratio (PDR), and end to end (E2E) delay. In the simulation, the execution time of the TW algorithm is analyzed and compared with another route search algorithm, i.e., Assess-Trust (AT), by considering real-world online datasets such as Pretty Good Privacy and Advogato. The accuracy and efficiency of the TW algorithm, even with a large number of vehicle users, are also demonstrated through simulations

    Hybrid self-inertia weight adaptive particle swarm optimisation with local search using C4.5 decision tree classifier for feature selection problems

    No full text
    Feature selection is an important task to improve the classifier’s accuracy and to decrease the problem size. A number of methodologies have been presented for feature selection problems using metaheuristic algorithms. In this paper, an improved self-adaptive inertia weight particle swarm optimisation with local search and combined with C4.5 classifiers for feature selection algorithm is proposed. In this proposed algorithm, the gradient base local search with its capacity of helping to explore the feature space and an improved self-adaptive inertia weight particle swarm optimisation with its ability to converge a best global solution in the search space. Experimental results have verified that the SIW-APSO-LS performed well compared with other state of art feature selection techniques on a suit of 16 standard data sets
    corecore