22 research outputs found

    Currencies analysis based on stability using apriori-algorithm

    Get PDF
    This paper presents the stability of currency that is more stable with respect to other currencies. Various currencies are studied and graphs are plotted with reference to dates on a yearly basis and analyze its patterns. The stability of a currency was determined by using Apriori-algorithm. This algorithm maneuver in continues manner unless the desired results are achieved.

    Efficient securing of iris image template by using grayscale level incremented/decremented method

    Get PDF
    The proposed techniques in the paper is based on grayscale level incremented/decremented method. In this paper we used CASIA dataset for experimentation. Efficient results were achieved with respect to image hiding validated by entropy. Graphical results are also shown at the end to visualize our results

    Mahmud, Maqsood

    No full text

    Currencies Analysis Based on Stability: Using Apriori-Algorithm

    No full text
    This paper presents the stability of currency that is more stable with respect to other currencies. Various currencies are studied and graphs are plotted with reference to dates on a yearly basis and analyze its patterns. The stability of a currency was determined by using Apriori-algorithm. This algorithm maneuver in continues manner unless the desired results are achieved.Currency Conversion; Data mining; Decision graph

    Data Mining Strategies and Methods to Develop Microfinance Market – Use Case Currency Exchange

    No full text
    The intrinsic characteristics of data mining are being inculcated in the market of microfinance. The use case that is brought under our consideration is of Currency Exchange. The idea was conceived and perceived by the current financial crises in the world market in the year 2008-09.The financial recession in world wide compelled individuals to think and start micro businesses rather than macro businesses. In our paper we conceived and designed some algorithms by using data mining techniques to have general micro currency exchange businesses for a developing country. Our algorithm processes two years historical data of currency rates and applies data mining strategies. The "Median Method" and "Rise & Fall Method" with probabilistic approach are being presented. It can be applied to N year’s data with unless desired results are achieved. This is to give best choice to micro currency business men to take decision either to buy or to sell currency. Some previous currency rates (i.e. Ups & Down) are also recorded from a popular bank of Canada & currency open markets as a proof of concept using our algorithm. The statistical and graphical analysis are being made on the data .Our algorithm can be efficiently used by all those who wish to initialize a small business (Cottage Industries) with a profitable income with less investment. Our research will lead to a new dimension in the fields of Micro finance and Data mining

    Systems and Methods for Improving a Cryptosystem using Biometrics

    No full text
    The patent describes systems and methods to improve cryptosystems, which in one implementation provides Biometric-Gaussian-Stream (BGS) cipher with new aspect of image encryption--data hiding. More specifically, the systems and methods encrypt any image/biometric template using stream cipher and a Gaussian noise function while using biometric data as an encryption key. For example, in one exemplary embodiment, the system uses a Gabor wavelet to generate iriscode for iris bits (Ө) generation. In another embodiment, the system utilizes smart card technology comprising stored biometric data. The Keystream used in this novel system is generated with help of biometrics (e.g., an Iris code) to encrypt multimedia objects like a picture or even an iris image. The selection of bits for inputs to a linear feedback shift register (“LFSR”) key is done, for example, by hamming code method

    Intrinsic Authentication of Multimedia Objects using Biometric Data Manipulation

    No full text
    The Biometric-Gaussian-Stream(BGS) cryptosystem was extended by extensive research experimentation. Using this system, complexity is added to an image by passing it through a Gaussian noise function. This function is applied with specific parameters for the mean and variance, which also works as a parallel key. To implement a stream cipher (BGS) with help of biometric images, the “Initial Condition (IC) for LFSR (Linear Feed Back Shift Register) from is extracted iriscode. A comparison between various stream ciphers is also made to measure the strength of the BGS cryptosystem. The previous experimentation work has been extended by formulating the algorithmic runtime complexity of the BGS Cryptosystem which proves to be O(n) algorithmically. New techniques to encrypt and assess multimedia objects have been introduce

    Information Security in Business: A Bibliometric Analysis of the 100 Top Cited Articles

    Get PDF
    This study aims a bibliometric analysis of the 100 top-cited articles extracted from the Web of Science database on the topic of information security in the business context. A retrospective method was applied to the dataset extracted from the Web of Science Database. A total of 500 most cited items were downloaded and the authors selected the articles related to information security and business for further analysis. It was found that the top-cited papers were published between the years 1990 and 2018 and had received 3,375 citations. While most of the articles followed the three-author pattern, the single author pattern articles had received the maximum citation impact. Cybersecurity policies were recognized as the most researched topic and the majority of articles had been published in Quartile-1 journals. Furthermore, the majority (67%) of the articles were published in journals having impact factors ranging from 2.3 to 6.95. The Journal of Management Information System was found to top the list of most prolific journals with 13 articles. This study identifies the trends and patterns of research publications on information security in the business. This evaluation is likely to develop awareness in understanding the scope and coverage of information security from a business perspective. The findings of this study have highlighted the various parameters of highly cited articles on information security published during the last three decades. The results might support new researchers’ interest in information security in the context of businesses
    corecore